Science.gov

Sample records for management efficient scheme

  1. A High Fuel Consumption Efficiency Management Scheme for PHEVs Using an Adaptive Genetic Algorithm

    PubMed Central

    Lee, Wah Ching; Tsang, Kim Fung; Chi, Hao Ran; Hung, Faan Hei; Wu, Chung Kit; Chui, Kwok Tai; Lau, Wing Hong; Leung, Yat Wah

    2015-01-01

    A high fuel efficiency management scheme for plug-in hybrid electric vehicles (PHEVs) has been developed. In order to achieve fuel consumption reduction, an adaptive genetic algorithm scheme has been designed to adaptively manage the energy resource usage. The objective function of the genetic algorithm is implemented by designing a fuzzy logic controller which closely monitors and resembles the driving conditions and environment of PHEVs, thus trading off between petrol versus electricity for optimal driving efficiency. Comparison between calculated results and publicized data shows that the achieved efficiency of the fuzzified genetic algorithm is better by 10% than existing schemes. The developed scheme, if fully adopted, would help reduce over 600 tons of CO2 emissions worldwide every day. PMID:25587974

  2. A high fuel consumption efficiency management scheme for PHEVs using an adaptive genetic algorithm.

    PubMed

    Lee, Wah Ching; Tsang, Kim Fung; Chi, Hao Ran; Hung, Faan Hei; Wu, Chung Kit; Chui, Kwok Tai; Lau, Wing Hong; Leung, Yat Wah

    2015-01-01

    A high fuel efficiency management scheme for plug-in hybrid electric vehicles (PHEVs) has been developed. In order to achieve fuel consumption reduction, an adaptive genetic algorithm scheme has been designed to adaptively manage the energy resource usage. The objective function of the genetic algorithm is implemented by designing a fuzzy logic controller which closely monitors and resembles the driving conditions and environment of PHEVs, thus trading off between petrol versus electricity for optimal driving efficiency. Comparison between calculated results and publicized data shows that the achieved efficiency of the fuzzified genetic algorithm is better by 10% than existing schemes. The developed scheme, if fully adopted, would help reduce over 600 tons of CO2 emissions worldwide every day. PMID:25587974

  3. An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter

    PubMed Central

    Qin, Zhongyuan; Zhang, Xinshuai; Feng, Kerong; Zhang, Qunfang; Huang, Jie

    2014-01-01

    With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, small memory, power supply limitations and price, we propose an efficient identity-based key management (IBKM) scheme, which exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead. PMID:25264955

  4. An efficient identity-based key management scheme for wireless sensor networks using the Bloom filter.

    PubMed

    Qin, Zhongyuan; Zhang, Xinshuai; Feng, Kerong; Zhang, Qunfang; Huang, Jie

    2014-01-01

    With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, small memory, power supply limitations and price, we propose an efficient identity-based key management (IBKM) scheme, which exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead. PMID:25264955

  5. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    PubMed Central

    Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    2008-01-01

    For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.

  6. A novel key management scheme using biometrics

    NASA Astrophysics Data System (ADS)

    Sui, Yan; Yang, Kai; Du, Yingzi; Orr, Scott; Zou, Xukai

    2010-04-01

    Key management is one of the most important issues in cryptographic systems. Several important challenges in such a context are represented by secure and efficient key generation, key distribution, as well as key revocation. Addressing such challenges requires a comprehensive solution which is robust, secure and efficient. Compared to traditional key management schemes, key management using biometrics requires the presence of the user, which can reduce fraud and protect the key better. In this paper, we propose a novel key management scheme using iris based biometrics. Our newly proposed scheme outperforms traditional key management schemes as well as some existing key-binding biometric schemes in terms of security, diversity and/or efficiency.

  7. How much are people willing to pay for efficient waste management schemes? A benefit transfer application.

    PubMed

    Damigos, Dimitris; Kaliampakos, Dimitris; Menegaki, Maria

    2016-04-01

    To socially justify the need for better municipal solid waste management services, especially in the light of the limited availability of public funds, it is important to quantify the monetary value of the potential social and environmental benefits offered by them. This article aims at estimating society's willingness to pay improved municipal solid waste management and establishing suitable reference values using the 'benefit transfer' method. To this direction, relevant studies from the global scientific and grey literature in the field of municipal solid waste management valuation are analysed and two different transfer approaches are implemented. According to the analysis, the mean annual willingness to pay per household is 88.4 USD(2014) (5%-trimmed mean: 78.7 USD(2014); 95% confidence interval lower bound: 64.8 USD(2014) and upper bound: 112.0 USD(2014)). The analysis yields estimates with a high standard deviation and notably broad confidence intervals, owing to design issues of the primary studies, the different socioeconomic profiles of the populations surveyed and the existing level of municipal solid waste management services. Thus, a meta-regression model is estimated to explore the sources of heterogeneity and facilitate more accurate transfer values. Nevertheless, the limited number of observations and some methodological issues in the design and conduct of the original surveys set certain challenges and increase the level of uncertainty of the transfer values. PMID:26917560

  8. Efficient DSMC collision-partner selection schemes.

    SciTech Connect

    Gallis, Michail A.; Torczynski, John Robert

    2010-07-01

    The effect of collision-partner selection schemes on the accuracy and the efficiency of the Direct Simulation Monte Carlo (DSMC) method of Bird is investigated. Several schemes to reduce the total discretization error as a function of the mean collision separation and the mean collision time are examined. These include the historically first sub-cell scheme, the more recent nearest-neighbor scheme, and various near-neighbor schemes, which are evaluated for their effect on the thermal conductivity for Fourier flow. Their convergence characteristics as a function of spatial and temporal discretization and the number of simulators per cell are compared to the convergence characteristics of the sophisticated and standard DSMC algorithms. Improved performance is obtained if the population from which possible collision partners are selected is an appropriate fraction of the population of the cell.

  9. Efficient DSMC collision-partner selection schemes.

    SciTech Connect

    Gallis, Michail A.; Torczynski, John Robert

    2010-05-01

    The effect of collision-partner selection schemes on the accuracy and the efficiency of the Direct Simulation Monte Carlo (DSMC) method of Bird is investigated. Several schemes to reduce the total discretization error as a function of the mean collision separation and the mean collision time are examined. These include the historically first sub-cell scheme, the more recent nearest-neighbor scheme, and various near-neighbor schemes, which are evaluated for their effect on the thermal conductivity for Fourier flow. Their convergence characteristics as a function of spatial and temporal discretization and the number of simulators per cell are compared to the convergence characteristics of the sophisticated and standard DSMC algorithms. Improved performance is obtained if the population from which possible collision partners are selected is an appropriate fraction of the population of the cell.

  10. Efficient multiparty quantum-secret-sharing schemes

    SciTech Connect

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-05-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information.

  11. Efficient Conservative Reformulation Schemes for Lithium Intercalation

    SciTech Connect

    Urisanga, PC; Rife, D; De, S; Subramanian, VR

    2015-02-18

    Porous electrode theory coupled with transport and reaction mechanisms is a widely used technique to model Li-ion batteries employing an appropriate discretization or approximation for solid phase diffusion with electrode particles. One of the major difficulties in simulating Li-ion battery models is the need to account for solid phase diffusion in a second radial dimension r, which increases the computation time/cost to a great extent. Various methods that reduce the computational cost have been introduced to treat this phenomenon, but most of them do not guarantee mass conservation. The aim of this paper is to introduce an inherently mass conserving yet computationally efficient method for solid phase diffusion based on Lobatto III A quadrature. This paper also presents coupling of the new solid phase reformulation scheme with a macro-homogeneous porous electrode theory based pseudo 20 model for Li-ion battery. (C) The Author(s) 2015. Published by ECS. All rights reserved.

  12. An efficient authentication scheme for telecare medicine information systems.

    PubMed

    Zhu, Zhian

    2012-12-01

    To ensure patients' privacy, such as telephone number, medical record number, health information, etc., authentication schemes for telecare medicine information systems (TMIS) have been studied widely. Recently, Wei et al. proposed an efficient authentication scheme for TMIS. They claimed their scheme could resist various attacks. However, in this paper, we will show their scheme is vulnerable to an off-line password guessing attack when user's smart card is lost. To improve the security, we propose a new authentication scheme for TMIS. The analysis shows our scheme could overcome the weaknesses in Wei et al.'s scheme and has better performance than their scheme. PMID:22527784

  13. EFFICIENCY PROBLEMS RELATED TO PERMANGANATE OXIDATION SCHEMES

    EPA Science Inventory

    Oxidation schemes for the in-situ destruction of chlorinated solvents, using potassium permanganate, are receiving considerable attention. Indication from field studies and from our own work are that permanganate oxidation schemes have inherent problems that could severely limit...

  14. An efficient compression scheme for bitmap indices

    SciTech Connect

    Wu, Kesheng; Otoo, Ekow J.; Shoshani, Arie

    2004-04-13

    When using an out-of-core indexing method to answer a query, it is generally assumed that the I/O cost dominates the overall query response time. Because of this, most research on indexing methods concentrate on reducing the sizes of indices. For bitmap indices, compression has been used for this purpose. However, in most cases, operations on these compressed bitmaps, mostly bitwise logical operations such as AND, OR, and NOT, spend more time in CPU than in I/O. To speedup these operations, a number of specialized bitmap compression schemes have been developed; the best known of which is the byte-aligned bitmap code (BBC). They are usually faster in performing logical operations than the general purpose compression schemes, but, the time spent in CPU still dominates the total query response time. To reduce the query response time, we designed a CPU-friendly scheme named the word-aligned hybrid (WAH) code. In this paper, we prove that the sizes of WAH compressed bitmap indices are about two words per row for large range of attributes. This size is smaller than typical sizes of commonly used indices, such as a B-tree. Therefore, WAH compressed indices are not only appropriate for low cardinality attributes but also for high cardinality attributes.In the worst case, the time to operate on compressed bitmaps is proportional to the total size of the bitmaps involved. The total size of the bitmaps required to answer a query on one attribute is proportional to the number of hits. These indicate that WAH compressed bitmap indices are optimal. To verify their effectiveness, we generated bitmap indices for four different datasets and measured the response time of many range queries. Tests confirm that sizes of compressed bitmap indices are indeed smaller than B-tree indices, and query processing with WAH compressed indices is much faster than with BBC compressed indices, projection indices and B-tree indices. In addition, we also verified that the average query response time

  15. Efficient implementation of weighted ENO schemes

    NASA Technical Reports Server (NTRS)

    Jiang, Guang-Shan; Shu, Chi-Wang

    1995-01-01

    In this paper, we further analyze, test, modify and improve the high order WENO (weighted essentially non-oscillatory) finite difference schemes of Liu, Osher and Chan. It was shown by Liu et al. that WENO schemes constructed from the r-th order (in L1 norm) ENO schemes are (r+1)-th order accurate. We propose a new way of measuring the smoothness of a numerical solution, emulating the idea of minimizing the total variation of the approximation, which results in a 5-th order WENO scheme for the case r = 3, instead of the 4-th order with the original smoothness measurement by Liu et al. This 5-th order WENO scheme is as fast as the 4-th order WENO scheme of Liu et al., and both schemes are about twice as fast as the 4-th order ENO schemes on vector supercomputers and as fast on serial and parallel computers. For Euler systems of gas dynamics, we suggest computing the weights from pressure and entropy instead of the characteristic values to simplify the costly characteristic procedure. The resulting WENO schemes are about twice as fast as the WENO schemes using the characteristic decompositions to compute weights, and work well for problems which do not contain strong shocks or strong reflected waves. We also prove that, for conservation laws with smooth solutions, all WENO schemes are convergent. Many numerical tests, including the 1D steady state nozzle flow problem and 2D shock entropy wave interaction problem, are presented to demonstrate the remarkable capability of the WENO schemes, especially the WENO scheme using the new smoothness measurement, in resolving complicated shock and flow structures. We have also applied Yang's artificial compression method to the WENO schemes to sharpen contact discontinuities.

  16. Secure SCADA communication by using a modified key management scheme.

    PubMed

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks. PMID:23528753

  17. An efficient medical image compression scheme.

    PubMed

    Li, Xiaofeng; Shen, Yi; Ma, Jiachen

    2005-01-01

    In this paper, a fast lossless compression scheme is presented for the medical image. This scheme consists of two stages. In the first stage, a Differential Pulse Code Modulation (DPCM) is used to decorrelate the raw image data, therefore increasing the compressibility of the medical image. In the second stage, an effective scheme based on the Huffman coding method is developed to encode the residual image. This newly proposed scheme could reduce the cost for the Huffman coding table while achieving high compression ratio. With this algorithm, a compression ratio higher than that of the lossless JPEG method for image can be obtained. At the same time, this method is quicker than the lossless JPEG2000. In other words, the newly proposed algorithm provides a good means for lossless medical image compression. PMID:17280962

  18. An Efficient Variable-Length Data-Compression Scheme

    NASA Technical Reports Server (NTRS)

    Cheung, Kar-Ming; Kiely, Aaron B.

    1996-01-01

    Adaptive variable-length coding scheme for compression of stream of independent and identically distributed source data involves either Huffman code or alternating run-length Huffman (ARH) code, depending on characteristics of data. Enables efficient compression of output of lossless or lossy precompression process, with speed and simplicity greater than those of older coding schemes developed for same purpose. In addition, scheme suitable for parallel implementation on hardware with modular structure, provides for rapid adaptation to changing data source, compatible with block orientation to alleviate memory requirements, ensures efficiency over wide range of entropy, and easily combined with such other communication schemes as those for containment of errors and for packetization.

  19. A Secure and Efficient Threshold Group Signature Scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Yansheng; Wang, Xueming; Qiu, Gege

    The paper presents a secure and efficient threshold group signature scheme aiming at two problems of current threshold group signature schemes: conspiracy attack and inefficiency. Scheme proposed in this paper takes strategy of separating designed clerk who is responsible for collecting and authenticating each individual signature from group, the designed clerk don't participate in distribution of group secret key and has his own public key and private key, designed clerk needs to sign part information of threshold group signature after collecting signatures. Thus verifier has to verify signature of the group after validating signature of the designed clerk. This scheme is proved to be secure against conspiracy attack at last and is more efficient by comparing with other schemes.

  20. Improved-efficiency DSMC collision-partner selection schemes.

    SciTech Connect

    Gallis, Michail A.; Torczynski, John Robert

    2010-11-01

    The effect of collision-partner selection schemes on the accuracy and the efficiency of the Direct Simulation Monte Carlo (DSMC) method of Bird is investigated. Several schemes to reduce the total discretization error as a function of the mean collision separation and the mean collision time are examined. These include the historically first sub-cell scheme, the more recent nearest-neighbor scheme, and various near-neighbor schemes, which are evaluated for their effect on the thermal conductivity for Fourier flow. Their convergence characteristics as a function of spatial and temporal discretization and the number of simulators per cell are compared to the convergence characteristics of the sophisticated and standard DSMC algorithms. Improved performance is obtained if the population from which possible collision partners are selected is an appropriate fraction of the population of the cell.

  1. An Efficient Scheme for Updating Sparse Cholesky Factors

    NASA Technical Reports Server (NTRS)

    Raghavan, Padma

    2002-01-01

    Raghavan had earlier developed the software package DCSPACK which can be used for solving sparse linear systems where the coefficient matrix is symmetric and positive definite (this project was not funded by NASA but by agencies such as NSF). DSCPACK-S is the serial code and DSCPACK-P is a parallel implementation suitable for multiprocessors or networks-of-workstations with message passing using MCI. The main algorithm used is the Cholesky factorization of a sparse symmetric positive positive definite matrix A = LL(T). The code can also compute the factorization A = LDL(T). The complexity of the software arises from several factors relating to the sparsity of the matrix A. A sparse N x N matrix A has typically less that cN nonzeroes where c is a small constant. If the matrix were dense, it would have O(N2) nonzeroes. The most complicated part of such sparse Cholesky factorization relates to fill-in, i.e., zeroes in the original matrix that become nonzeroes in the factor L. An efficient implementation depends to a large extent on complex data structures and on techniques from graph theory to reduce, identify, and manage fill. DSCPACK is based on an efficient multifrontal implementation with fill-managing algorithms and implementation arising from earlier research by Raghavan and others. Sparse Cholesky factorization is typically a four step process: (1) ordering to compute a fill-reducing numbering, (2) symbolic factorization to determine the nonzero structure of L, (3) numeric factorization to compute L, and, (4) triangular solution to solve L(T)x = y and Ly = b. The first two steps are symbolic and are performed using the graph of the matrix. The numeric factorization step is of dominant cost and there are several schemes for improving performance by exploiting the nested and dense structure of groups of columns in the factor. The latter are aimed at better utilization of the cache-memory hierarchy on modem processors to prevent cache-misses and provide execution

  2. An efficient scheme of IDCT optimization in H.264 decoding

    NASA Astrophysics Data System (ADS)

    Bao, Guoxing

    2011-02-01

    This paper proposes an efficient scheme of IDCT in H.264 decoder. Firstly, motion compensation residuals of macro-block get from the bit-stream are classified into four cases: only dc coefficient is non-zero, only first row coefficients are non-zero, only first column coefficients are non-zero and others, and it is obvious that inverse transform processing of previous cases can be optimized, so in the second, we use different processing of IDCT in different cases to reduce their complexity. Compared with traditional IDCT scheme, the proposed scheme achieves an average 51.8% reduction in computation complexity without degradation in visual quality.

  3. Performance of the efficient data-driven evaluation scheme

    SciTech Connect

    Johnson, D.; Berman, F. . Dept. of Computer Science and Engineering)

    1993-07-01

    The Efficient Data-Driven Evaluation Scheme is a two-phase strategy for optimizing the execution time of programs in the IF1 dataflow format. The first phase involves adding extra nodes and edges to the IF1 program graph at compile-time. In the second phase, the new nodes and edges facilitate the determination of useless computations (i.e., computations which do not contribute to the final results) at run-time and prevent these computations from being executed. By focusing on the execution of potentially useful computations, architectural models with limited processors can be used more effectively, and execution times may be reduced. In this paper, the authors briefly review the Efficient Data-Driven Evaluation Scheme and describe performance results of the scheme on a large set of benchmarks which include the Livermore Loops. Their experiments compare the Efficient Data-Driven Evaluation Scheme to eager and lazy compilation for these benchmarks and characterized programs for which their scheme may be used effectively as a computer optimization.

  4. Compound management beyond efficiency.

    PubMed

    Burr, Ian; Winchester, Toby; Keighley, Wilma; Sewing, Andreas

    2009-06-01

    Codeveloping alongside chemistry and in vitro screening, compound management was one of the first areas in research recognizing the need for efficient processes and workflows. Material management groups have centralized, automated, miniaturized and, importantly, found out what not to do with compounds. While driving down cost and improving quality in storage and processing, researchers still face the challenge of interfacing optimally with changing business processes, in screening groups, and with external vendors and focusing on biologicals in many companies. Here we review our strategy to provide a seamless link between compound acquisition and screening operations and the impact of material management on quality of the downstream processes. Although this is driven in part by new technologies and improved quality control within material management, redefining team structures and roles also drives job satisfaction and motivation in our teams with a subsequent positive impact on cycle times and customer feedback. PMID:19502566

  5. An Efficient Variable Length Coding Scheme for an IID Source

    NASA Technical Reports Server (NTRS)

    Cheung, K. -M.

    1995-01-01

    A scheme is examined for using two alternating Huffman codes to encode a discrete independent and identically distributed source with a dominant symbol. This combined strategy, or alternating runlength Huffman (ARH) coding, was found to be more efficient than ordinary coding in certain circumstances.

  6. Cost efficient command management

    NASA Technical Reports Server (NTRS)

    Brandt, Theresa; Murphy, C. W.; Kuntz, Jon; Barlett, Tom

    1996-01-01

    The design and implementation of a command management system (CMS) for a NASA control center, is described. The technology innovations implemented in the CMS provide the infrastructure required for operations cost reduction and future development cost reduction through increased operational efficiency and reuse in future missions. The command management design facilitates error-free operations which enables the automation of the routine control center functions and allows for the distribution of scheduling responsibility to the instrument teams. The reusable system was developed using object oriented methodologies.

  7. A Complete Hierarchical Key Management Scheme for Heterogeneous Wireless Sensor Networks

    PubMed Central

    Zheng, Xinying

    2014-01-01

    Heterogeneous cluster-based wireless sensor networks (WSN) attracted increasing attention recently. Obviously, the clustering makes the entire networks hierarchical; thus, several kinds of keys are required for hierarchical network topology. However, most existing key management schemes for it place more emphasis on pairwise key management schemes or key predistribution schemes and neglect the property of hierarchy. In this paper, we propose a complete hierarchical key management scheme which only utilizes symmetric cryptographic algorithms and low cost operations for heterogeneous cluster-based WSN. Our scheme considers four kinds of keys, which are an individual key, a cluster key, a master key, and pairwise keys, for each sensor node. Finally, the analysis and experiments demonstrate that the proposed scheme is secure and efficient; thus, it is suitable for heterogeneous cluster-based WSN. PMID:24983001

  8. A generic efficient adaptive grid scheme for rocket propulsion modeling

    NASA Technical Reports Server (NTRS)

    Mo, J. D.; Chow, Alan S.

    1993-01-01

    The objective of this research is to develop an efficient, time-accurate numerical algorithm to discretize the Navier-Stokes equations for the predictions of internal one-, two-dimensional and axisymmetric flows. A generic, efficient, elliptic adaptive grid generator is implicitly coupled with the Lower-Upper factorization scheme in the development of ALUNS computer code. The calculations of one-dimensional shock tube wave propagation and two-dimensional shock wave capture, wave-wave interactions, shock wave-boundary interactions show that the developed scheme is stable, accurate and extremely robust. The adaptive grid generator produced a very favorable grid network by a grid speed technique. This generic adaptive grid generator is also applied in the PARC and FDNS codes and the computational results for solid rocket nozzle flowfield and crystal growth modeling by those codes will be presented in the conference, too. This research work is being supported by NASA/MSFC.

  9. Energy Efficient Cluster Based Scheduling Scheme for Wireless Sensor Networks

    PubMed Central

    Srie Vidhya Janani, E.; Ganesh Kumar, P.

    2015-01-01

    The energy utilization of sensor nodes in large scale wireless sensor network points out the crucial need for scalable and energy efficient clustering protocols. Since sensor nodes usually operate on batteries, the maximum utility of network is greatly dependent on ideal usage of energy leftover in these sensor nodes. In this paper, we propose an Energy Efficient Cluster Based Scheduling Scheme for wireless sensor networks that balances the sensor network lifetime and energy efficiency. In the first phase of our proposed scheme, cluster topology is discovered and cluster head is chosen based on remaining energy level. The cluster head monitors the network energy threshold value to identify the energy drain rate of all its cluster members. In the second phase, scheduling algorithm is presented to allocate time slots to cluster member data packets. Here congestion occurrence is totally avoided. In the third phase, energy consumption model is proposed to maintain maximum residual energy level across the network. Moreover, we also propose a new packet format which is given to all cluster member nodes. The simulation results prove that the proposed scheme greatly contributes to maximum network lifetime, high energy, reduced overhead, and maximum delivery ratio. PMID:26495417

  10. An Energy Efficient Instruction Prefetching Scheme for Embedded Processors

    NASA Astrophysics Data System (ADS)

    Gu, Ji; Guo, Hui

    Existing instruction prefetching schemes improve performance with significant energy sacrifice, making them unsuitable for embedded and ubiquitous systems where high performance and low energy consumption are all demanded. In this paper, we reduce energy overhead in instruction prefetching by using a simple prefetching hardware/software design and an efficient prefetching operation scheme. Two approaches are investigated: one, Decoded Loop Instruction Cache based Prefetching (DLICP) that is most effective for loop intensive applications; two, enhanced DLICP with the popular existing Next Line Prefetching (NLP) for applications of a moderate number of loops. Our experimental results show that both DLICP and enhanced DLICP deliver improved performance at greatly reduced energy overhead. Up to 21% performance can be improved by the enhanced DLICP at about 3.5% energy overhead, as in comparison to the maximal 11% performance improvement and 49% energy overhead from NLP.

  11. Distributed Mobility Management Scheme for Mobile IPv6

    NASA Astrophysics Data System (ADS)

    Wakikawa, Ryuji; Valadon, Guillaume; Shigechika, Noriyuki; Murai, Jun

    Mobile IPv6 and Network Mobility (NEMO) have been standardized as IP extensions. While these technologies are planned to be adopted by several communities, such as the vehicle, aviation, and cellular industries, Mobile IPv6 has serious deployment issues such as scalability, protocol resilience, and redundancy. In these technologies, a special router called a home agent is introduced to support the movement of mobile nodes. This home agent introduces overlapping, inefficient routes, and becomes a single point of failure and a performance bottleneck. In this paper, a new concept for scalable and dependable mobility management scheme is proposed. Multiple home agents serve the same set of mobile nodes. The Home Agent Reliability protocol and Home Agent migration are introduced to achieve this concept. We also propose an overlay network named a Global Mobile eXchange (GMX) that efficiently handles data traffic from and to mobile nodes, and operates home agents as would an Internet eXchange Point (IXP).

  12. A bandwidth efficient coding scheme for the Hubble Space Telescope

    NASA Astrophysics Data System (ADS)

    Pietrobon, Steven S.; Costello, Daniel J., Jr.

    1991-11-01

    As a demonstration of the performance capabilities of trellis codes using multidimensional signal sets, a Viterbi decoder was designed. The choice of code was based on two factors. The first factor was its application as a possible replacement for the coding scheme currently used on the Hubble Space Telescope (HST). The HST at present uses the rate 1/3 nu = 6 (with 2 (exp nu) = 64 states) convolutional code with Binary Phase Shift Keying (BPSK) modulation. With the modulator restricted to a 3 Msym/s, this implies a data rate of only 1 Mbit/s, since the bandwidth efficiency K = 1/3 bit/sym. This is a very bandwidth inefficient scheme, although the system has the advantage of simplicity and large coding gain. The basic requirement from NASA was for a scheme that has as large a K as possible. Since a satellite channel was being used, 8PSK modulation was selected. This allows a K of between 2 and 3 bit/sym. The next influencing factor was INTELSAT's intention of transmitting the SONET 155.52 Mbit/s standard data rate over the 72 MHz transponders on its satellites. This requires a bandwidth efficiency of around 2.5 bit/sym. A Reed-Solomon block code is used as an outer code to give very low bit error rates (BER). A 16 state rate 5/6, 2.5 bit/sym, 4D-8PSK trellis code was selected. This code has reasonable complexity and has a coding gain of 4.8 dB compared to uncoded 8PSK (2). This trellis code also has the advantage that it is 45 deg rotationally invariant. This means that the decoder needs only to synchronize to one of the two naturally mapped 8PSK signals in the signal set.

  13. A bandwidth efficient coding scheme for the Hubble Space Telescope

    NASA Technical Reports Server (NTRS)

    Pietrobon, Steven S.; Costello, Daniel J., Jr.

    1991-01-01

    As a demonstration of the performance capabilities of trellis codes using multidimensional signal sets, a Viterbi decoder was designed. The choice of code was based on two factors. The first factor was its application as a possible replacement for the coding scheme currently used on the Hubble Space Telescope (HST). The HST at present uses the rate 1/3 nu = 6 (with 2 (exp nu) = 64 states) convolutional code with Binary Phase Shift Keying (BPSK) modulation. With the modulator restricted to a 3 Msym/s, this implies a data rate of only 1 Mbit/s, since the bandwidth efficiency K = 1/3 bit/sym. This is a very bandwidth inefficient scheme, although the system has the advantage of simplicity and large coding gain. The basic requirement from NASA was for a scheme that has as large a K as possible. Since a satellite channel was being used, 8PSK modulation was selected. This allows a K of between 2 and 3 bit/sym. The next influencing factor was INTELSAT's intention of transmitting the SONET 155.52 Mbit/s standard data rate over the 72 MHz transponders on its satellites. This requires a bandwidth efficiency of around 2.5 bit/sym. A Reed-Solomon block code is used as an outer code to give very low bit error rates (BER). A 16 state rate 5/6, 2.5 bit/sym, 4D-8PSK trellis code was selected. This code has reasonable complexity and has a coding gain of 4.8 dB compared to uncoded 8PSK (2). This trellis code also has the advantage that it is 45 deg rotationally invariant. This means that the decoder needs only to synchronize to one of the two naturally mapped 8PSK signals in the signal set.

  14. Efficient seismic volume compression using the lifting scheme

    NASA Astrophysics Data System (ADS)

    Khene, Faouzi M.; Abdul-Jauwad, Samir H.

    2000-12-01

    An advanced seismic compression technique is proposed to mange seismic data in a world of ever increasing data volumes in order to maintain productivity without compromising interpretation results. A separable 3D discrete wavelet transform using long biorthogonal filters is used. The computation efficiency of the DWT is improved by factoring the wavelet filters using the lifting scheme. In addition, the lifting scheme offers: 1) a dramatic reduction of the required auxiliary memory, 2) an efficient combination with parallel rendering algorithms to perform arbitrary surface and volume rendering for interactive visualization, and 3) an easy integration in the parallel I/O seismic data loading routines. The proposed technique is tested on a seismic volume from the Stratton field in South Texas. The resulting 3-level multiresolution decomposition yields 21 detail sub-volumes and a unique low-resolution sub-volume. The detail wavelet coefficients are quantized with an adaptive threshold uniform scalar quantizer. The scale-dependent thresholds are determined with the Stein unbiased risk estimate principle. As the approximation coefficients represents a smooth low-resolution version of the input data they are only quantized using a uniform scalar quantizer. Finally, a run-length plus a Huffman encoding are applied for binary coding of the quantized coefficients.

  15. A Distributed Network Mobility Management Scheme for Hierarchical Mobile IPv6 Networks

    NASA Astrophysics Data System (ADS)

    Kawano, Keita; Kinoshita, Kazuhiko; Yamai, Nariyoshi

    Route optimization for network mobility is a key technique for providing a node in a mobile network (Mobile Network Node or MNN) with high quality broadband communications. Many schemes adding route optimization function to Network Mobility (NEMO) Basic Support protocol, the standardized network mobility management protocol from the IETF nemo working group, have already been proposed in recent years. One such scheme, a scheme using Hierarchical Mobile IPv6 (HMIPv6) aims to overcome micromobility management issues as well by applying a mechanism based on HMIPv6. The traditional scheme, however, suffers from a significant number of signaling messages as the number of MNNs and/or the number of their Correspondent Nodes (CNs) increase, because many messages notifying the MNNs' Home Agents (HAMNNs) and the CNs of the mobile network's movement are generated simultaneously each time the mobile network moves to the domain of another micromobility management router (Mobility Anchor Point or MAP). This paper proposes a scheme to overcome this problem. Our scheme reduces the number of signaling messages generated at the same time by managing the mobility of MNNs using multiple MAPs distributed within a network for load sharing. The results of simulation experiments show that our scheme works efficiently compared to the traditional scheme when a mobile network has many MNNs and/or these MNNs communicate with many CNs.

  16. A Watermarking Scheme for High Efficiency Video Coding (HEVC)

    PubMed Central

    Swati, Salahuddin; Hayat, Khizar; Shahid, Zafar

    2014-01-01

    This paper presents a high payload watermarking scheme for High Efficiency Video Coding (HEVC). HEVC is an emerging video compression standard that provides better compression performance as compared to its predecessor, i.e. H.264/AVC. Considering that HEVC may will be used in a variety of applications in the future, the proposed algorithm has a high potential of utilization in applications involving broadcast and hiding of metadata. The watermark is embedded into the Quantized Transform Coefficients (QTCs) during the encoding process. Later, during the decoding process, the embedded message can be detected and extracted completely. The experimental results show that the proposed algorithm does not significantly affect the video quality, nor does it escalate the bitrate. PMID:25144455

  17. Efficient photon management with nanostructures for photovoltaics

    NASA Astrophysics Data System (ADS)

    Hua, Bo; Lin, Qingfeng; Zhang, Qianpeng; Fan, Zhiyong

    2013-07-01

    Efficient photon management schemes are crucial for improving the energy conversion efficiency of photovoltaic devices; they can lead potentially to reduced material usage and cost for these devices. In this review, photon trapping mechanisms are discussed briefly in the beginning, followed by a summary of recent progress on a number of major categories of nanostructures with intriguing photon management properties. Specifically, nanostructures including nanowires, nanopillars, nanopyramids, nanocones, nanospikes, and so forth, have been reviewed comprehensively with materials including Si, Ge, CdS, CIGS, ZnO, etc. It is found that these materials with diverse configurations have tunable photon management properties, namely, optical reflectance, transmittance and absorption. Investigations on these nanostructures have not only shed light on the fundamental interplay between photons and materials at the nanometer scale, but also suggested a potential pathway for a new generation of photovoltaic devices.

  18. Centrally managed name resolution schemes for EPICS

    SciTech Connect

    Jun, D.; Bryan, D.; Watson, W.

    1997-12-01

    The Experimental Physics and Industrial Control System (EPICS) uses a broadcast method to locate resources and controls distributed across control servers. There are many advantages offered by using a centrally managed name resolution method, in which resources are located using a repository. The suitability of DCE Directory Service as a name resolution method is explored, and results from a study involving DCE are discussed. An alternative nameserver method developed and in use at the Thomas Jefferson national Accelerator Facility (Jefferson Lab) is described and results of integrating this new method with existing EPICS utilities presented. The various methods discussed in the paper are compared.

  19. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    PubMed

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%. PMID:27091755

  20. Resource management scheme based on ubiquitous data analysis.

    PubMed

    Lee, Heung Ki; Jung, Jaehee; Yi, Gangman

    2014-01-01

    Resource management of the main memory and process handler is critical to enhancing the system performance of a web server. Owing to the transaction delay time that affects incoming requests from web clients, web server systems utilize several web processes to anticipate future requests. This procedure is able to decrease the web generation time because there are enough processes to handle the incoming requests from web browsers. However, inefficient process management results in low service quality for the web server system. Proper pregenerated process mechanisms are required for dealing with the clients' requests. Unfortunately, it is difficult to predict how many requests a web server system is going to receive. If a web server system builds too many web processes, it wastes a considerable amount of memory space, and thus performance is reduced. We propose an adaptive web process manager scheme based on the analysis of web log mining. In the proposed scheme, the number of web processes is controlled through prediction of incoming requests, and accordingly, the web process management scheme consumes the least possible web transaction resources. In experiments, real web trace data were used to prove the improved performance of the proposed scheme. PMID:25197692

  1. Resource Management Scheme Based on Ubiquitous Data Analysis

    PubMed Central

    Lee, Heung Ki; Jung, Jaehee

    2014-01-01

    Resource management of the main memory and process handler is critical to enhancing the system performance of a web server. Owing to the transaction delay time that affects incoming requests from web clients, web server systems utilize several web processes to anticipate future requests. This procedure is able to decrease the web generation time because there are enough processes to handle the incoming requests from web browsers. However, inefficient process management results in low service quality for the web server system. Proper pregenerated process mechanisms are required for dealing with the clients' requests. Unfortunately, it is difficult to predict how many requests a web server system is going to receive. If a web server system builds too many web processes, it wastes a considerable amount of memory space, and thus performance is reduced. We propose an adaptive web process manager scheme based on the analysis of web log mining. In the proposed scheme, the number of web processes is controlled through prediction of incoming requests, and accordingly, the web process management scheme consumes the least possible web transaction resources. In experiments, real web trace data were used to prove the improved performance of the proposed scheme. PMID:25197692

  2. EGPS: An Efficient Privacy Preserving Scheme for Vehicular ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Zhao, Baokang; Su, Xiangyu; Su, Jinshu; Song, Ziming; Sun, Yipin; Tao, Jing; Tang, Yong; Chen, Shuhui; Zhao, Guohong; Chen, Yijiao

    2010-09-01

    In this paper, we propose EGPS, an efficient privacy preserving scheme for vehicular ad hoc networks. The EGPS scheme is based on a very efficient group signature and Identity Based Cryptography(IBC) techniques. Several security properties of EGPS, including the correctness and unforgeability have been proved. Furthermore, EGPS is also proved to be more efficient than GSIS, which is currently one of the best state-of-the-art VANET privacy preserving schemes.

  3. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems. PMID:23392626

  4. Managed care and efficient rationing.

    PubMed

    Rosenthal, Meredith B; Newhouse, Joseph P

    2002-01-01

    Widespread dissatisfaction with managed care has led to calls for major reform and consumer protection. Although some have concluded that managed care backlash is simply a result of too much rationing, we propose an alternative view that focuses on the nature of services eliminated by managed care. In particular, we point out that managed care rations services largely without regard to consumer preferences. We question whether managed care's emphasis on supply-side control of moral hazard is consistent with the principles of efficient rationing. Further research on the nature of provider and consumer rationing decisions is needed to inform the design of supply-side and demand-side incentives that will lead to an efficient allocation of services. PMID:12148660

  5. An efficient quantum scheme for Private Set Intersection

    NASA Astrophysics Data System (ADS)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    Private Set Intersection allows a client to privately compute set intersection with the collaboration of the server, which is one of the most fundamental and key problems within the multiparty collaborative computation of protecting the privacy of the parties. In this paper, we first present a cheat-sensitive quantum scheme for Private Set Intersection. Compared with classical schemes, our scheme has lower communication complexity, which is independent of the size of the server's set. Therefore, it is very suitable for big data services in Cloud or large-scale client-server networks.

  6. Efficient Low Dissipative High Order Schemes for Multiscale MHD Flows

    NASA Astrophysics Data System (ADS)

    Sjoegreen, Bjoern; Yee, Helen C.

    2002-11-01

    Accurate numerical simulations of complex multiscale compressible viscous flows, especially high speed turbulence combustion and acoustics, demand high order schemes with adaptive numerical dissipation controls. Standard high resolution shock-capturing methods are too dissipative to capture the small scales and/or long-time wave propagations without extreme grid refinements and small time steps. An integrated approach for the control of numerical dissipation in high order schemes for the compressible Euler and Navier-Stokes equations has been developed and verified by the authors and collaborators. These schemes are suitable for the problems in question. Basically, the scheme consists of sixth-order or higher non-dissipative spatial difference operators as the base scheme. To control the amount of numerical dissipation, multiresolution wavelets are used as sensors to adaptively limit the amount and to aid the selection and/or blending of the appropriate types of numerical dissipation to be used. Magnetohydrodynamics (MHD) waves play a key role in drag reduction in highly maneuverable high speed combat aircraft, in space weather forecasting, and in the understanding of the dynamics of the evolution of our solar system and the main sequence stars. Although there exist a few well-studied second and third-order high-resolution shock-capturing schemes for the MHD in the literature, these schemes are too diffusive and not practical for turbulence/combustion MHD flows. On the other hand, extension of higher than third-order high-resolution schemes to the MHD system of equations is not straightforward. Unlike the hydrodynamic equations, the inviscid MHD system is non-strictly hyperbolic with non-convex fluxes. The wave structures and shock types are different from their hydrodynamic counterparts. Many of the non-traditional hydrodynamic shocks are not fully understood. Consequently, reliable and highly accurate numerical schemes for multiscale MHD equations pose a great

  7. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    PubMed

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-01

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency. PMID:26840311

  8. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks

    PubMed Central

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-01

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency. PMID:26840311

  9. Efficient Scheme for Perfect Collective Einstein-Podolsky-Rosen Steering.

    PubMed

    Wang, M; Gong, Q H; Ficek, Z; He, Q Y

    2015-01-01

    A practical scheme for the demonstration of perfect one-sided device-independent quantum secret sharing is proposed. The scheme involves a three-mode optomechanical system in which a pair of independent cavity modes is driven by short laser pulses and interact with a movable mirror. We demonstrate that by tuning the laser frequency to the blue (anti-Stokes) sideband of the average frequency of the cavity modes, the modes become mutually coherent and then may collectively steer the mirror mode to a perfect Einstein-Podolsky-Rosen state. The scheme is shown to be experimentally feasible, it is robust against the frequency difference between the modes, mechanical thermal noise and damping, and coupling strengths of the cavity modes to the mirror. PMID:26212901

  10. Efficient Scheme for Perfect Collective Einstein-Podolsky-Rosen Steering

    NASA Astrophysics Data System (ADS)

    Wang, M.; Gong, Q. H.; Ficek, Z.; He, Q. Y.

    2015-07-01

    A practical scheme for the demonstration of perfect one-sided device-independent quantum secret sharing is proposed. The scheme involves a three-mode optomechanical system in which a pair of independent cavity modes is driven by short laser pulses and interact with a movable mirror. We demonstrate that by tuning the laser frequency to the blue (anti-Stokes) sideband of the average frequency of the cavity modes, the modes become mutually coherent and then may collectively steer the mirror mode to a perfect Einstein-Podolsky-Rosen state. The scheme is shown to be experimentally feasible, it is robust against the frequency difference between the modes, mechanical thermal noise and damping, and coupling strengths of the cavity modes to the mirror.

  11. Two efficient schemes for probabilistic remote state preparation and the combination of both schemes

    NASA Astrophysics Data System (ADS)

    Wei, Jiahua; Dai, Hong-Yi; Zhang, Ming

    2014-09-01

    We propose two novel schemes for probabilistic remote preparation of an arbitrary quantum state with the aid of the introduction of auxiliary particles and appropriate local unitary operations. The first new proposal could be used to improve the total successful probability of the remote preparation of a general quantum state, and the successful probability is twice as much as the one of the preceding schemes. Meanwhile, one can make use of the second proposal to realize the remote state preparation when the information of the partially entangled state is only available for the sender. This is in contrast to the fact that the receiver must know the non-maximally entangled state in previous typical schemes. Hence, our second proposal could enlarge the applied range of probabilistic remote state preparation. Additionally, we will illustrate how to combine these novel proposals in detail, and our results show that the union has the advantages of both schemes. Of course, our protocols are implemented at the cost of the increased complexity of the practical realizations.

  12. Efficient Buffering Scheme in the LMA for Seamless Handover in PMIPv6

    NASA Astrophysics Data System (ADS)

    Kim, Kwang-Ryoul; Lee, Hyo-Beom; Choi, Hyon-Young; Min, Sung-Gi; Han, Youn-Hee

    Proxy Mobile IPv6 (PMIPv6) is proposed as a new network-based local mobility protocol which does not involve the Mobile Node (MN) in mobility management. PMIPv6, which uses link-layer attachment information, reduces the movement detection time and eliminates duplicate address detection procedures in order to provide faster handover than Mobile IPv6 (MIPv6). To eliminate packet loss during the handover period, the Local Mobility Anchor (LMA) buffering scheme is proposed. In this scheme, the LMA buffers lost packets of the Mobile Access Gateway (MAG) and the MN during the handover and recovers them after handover. A new Automatic Repeat reQuest (ARQ) handler is defined which efficiently manages the LMA buffer. The ARQ handler relays ARQ result between the MAG and the MN to the LMA. The LMA removes any buffered packets which have been successfully delivered to the MN. The ARQ handler recovers the packet loss during the handover using buffered packets in the LMA. The ARQ information, between the MAG and LMA, is inserted in the outer header of IP-in-IP encapsulated packets of a standard PMIPv6 tunnel. Since the proposed scheme simply adds information to the standard operation of an IP-in-IP tunnel between the LMA and the MAG, it can be implemented seamlessly without modification to the original PMIPv6 messages and signaling sequence. Unlike other Fast Handovers for Mobile IPv6 (FMIPv6) based enhancement for PMIPv6, the proposed scheme does not require any handover related information before the actual handover.

  13. Wireless Instrumentation System and Power Management Scheme Therefore

    NASA Technical Reports Server (NTRS)

    Perotti, Jose (Inventor); Lucena, Angel (Inventor); Eckhoff, Anthony (Inventor); Mata, Carlos T. (Inventor); Blalock, Norman N. (Inventor); Medelius, Pedro J. (Inventor)

    2007-01-01

    A wireless instrumentation system enables a plurality of low power wireless transceivers to transmit measurement data from a plurality of remote station sensors to a central data station accurately and reliably. The system employs a relay based communications scheme where remote stations that cannot communicate directly with the central station due to interference, poor signal strength, etc., are instructed to communicate with other of the remote stations that act as relays to the central station. A unique power management scheme is also employed to minimize power usage at each remote station and thereby maximize battery life. Each of the remote stations prefembly employs a modular design to facilitate easy reconfiguration of the stations as required.

  14. An energy efficient cooperative hierarchical MIMO clustering scheme for wireless sensor networks.

    PubMed

    Nasim, Mehwish; Qaisar, Saad; Lee, Sungyoung

    2012-01-01

    In this work, we present an energy efficient hierarchical cooperative clustering scheme for wireless sensor networks. Communication cost is a crucial factor in depleting the energy of sensor nodes. In the proposed scheme, nodes cooperate to form clusters at each level of network hierarchy ensuring maximal coverage and minimal energy expenditure with relatively uniform distribution of load within the network. Performance is enhanced by cooperative multiple-input multiple-output (MIMO) communication ensuring energy efficiency for WSN deployments over large geographical areas. We test our scheme using TOSSIM and compare the proposed scheme with cooperative multiple-input multiple-output (CMIMO) clustering scheme and traditional multihop Single-Input-Single-Output (SISO) routing approach. Performance is evaluated on the basis of number of clusters, number of hops, energy consumption and network lifetime. Experimental results show significant energy conservation and increase in network lifetime as compared to existing schemes. PMID:22368459

  15. An Energy Efficient Cooperative Hierarchical MIMO Clustering Scheme for Wireless Sensor Networks

    PubMed Central

    Nasim, Mehwish; Qaisar, Saad; Lee, Sungyoung

    2012-01-01

    In this work, we present an energy efficient hierarchical cooperative clustering scheme for wireless sensor networks. Communication cost is a crucial factor in depleting the energy of sensor nodes. In the proposed scheme, nodes cooperate to form clusters at each level of network hierarchy ensuring maximal coverage and minimal energy expenditure with relatively uniform distribution of load within the network. Performance is enhanced by cooperative multiple-input multiple-output (MIMO) communication ensuring energy efficiency for WSN deployments over large geographical areas. We test our scheme using TOSSIM and compare the proposed scheme with cooperative multiple-input multiple-output (CMIMO) clustering scheme and traditional multihop Single-Input-Single-Output (SISO) routing approach. Performance is evaluated on the basis of number of clusters, number of hops, energy consumption and network lifetime. Experimental results show significant energy conservation and increase in network lifetime as compared to existing schemes. PMID:22368459

  16. Efficient Spin Injector Scheme Based on Heusler Materials

    NASA Astrophysics Data System (ADS)

    Chadov, Stanislav; Graf, Tanja; Chadova, Kristina; Dai, Xuefang; Casper, Frederick; Fecher, Gerhard H.; Felser, Claudia

    2011-07-01

    We present a rational design scheme intended to provide stable high spin polarization at the interfaces of the magnetoresistive junctions by fulfilling the criteria of structural and chemical compatibilities at the interface. This can be realized by joining the semiconducting and half-metallic Heusler materials with similar structures. The present first-principles calculations verify that the interface remains half-metallic if the nearest interface layers effectively form a stable Heusler material with the properties intermediately between the surrounding bulk parts. This leads to a simple rule for selecting the proper combinations.

  17. An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme

    PubMed Central

    Wang, Changji; Li, Yuan; Xia, Xiaonan; Zheng, Kangjia

    2014-01-01

    Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE) has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters’ identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters. PMID:25238418

  18. Division Scheme for Environmental Management Regionalization in China

    NASA Astrophysics Data System (ADS)

    Huang, Baorong; Fan, Ting; Li, Yingming; Wang, Yi

    2013-07-01

    Based on regional heterogeneity of environmental characteristics and factors influencing those characteristics, environmental units may be classified into homogeneous zones. Then, essential strategies and mitigation measures in each zone may be developed and environmental quality may be holistically improved using a system of environmental management regionalization (EMRZ). Here, an EMRZ scheme for China was devised by outlining regional management using integrated qualitative and quantitative methods. First, the land was subdivided into four environmental management domains using China's three physical geographic domains. Second, using a regionalization indicator system, the environmental characteristics of neighboring provinces in four domains was quantified using the one-dimensional Euclidean distance method; regions with high similarity were merged into one environmental management region (EMR) and the preliminary draft of EMRs was obtained. Based on the preliminary scheme, eight EMRs using prefecture-level administrative regions were obtained through boundary adjustment based on important natural geographical boundaries and existing regional plans. These include the Northeastern China Region, the North China Plain Region, the Loess Plateau Region, Southeast Coast Region, the Middle Reaches of the Yangtze River, the Southwestern China Region, the Northwestern China Region, and the Tibetan Plateau Region. Priority environmental problems of each EMR were discussed. The main contribution of this study is that it develops a novel methodological framework for EMRZ integrating qualitative and quantitative methodologies, and considers the spatial contiguity of each EMR and the spatial integrity of each administrative unit. Future research will focus on priority goals and establishment of suitable environmental management policies for each EMR based on known local environmental problems.

  19. Low color distortion adaptive dimming scheme for power efficient LCDs

    NASA Astrophysics Data System (ADS)

    Nam, Hyoungsik; Song, Eun-Ji

    2013-06-01

    This paper demonstrates the color compensation algorithm to reduce the color distortion caused by mismatches between the reference gamma value of a dimming algorithm and the display gamma values of an LCD panel in a low power adaptive dimming scheme. In 2010, we presented the YrYgYb algorithm, which used the display gamma values extracted from the luminance data of red, green, and blue sub-pixels, Yr, Yg, and Yb, with the simulation results. It was based on the ideal panel model where the color coordinates were maintained at the fixed values over the gray levels. Whereas, this work introduces an XrYgZb color compensation algorithm which obtains the display gamma values of red, green, and blue from the different tri-stimulus data of Xr, Yg, and Zb, to obtain further reduction on the color distortion. Both simulation and measurement results ensure that a XrYgZb algorithm outperforms a previous YrYgYb algorithm. In simulation which has been conducted at the practical model derived from the measured data, the XrYgZb scheme achieves lower maximum and average color difference values of 3.7743 and 0.6230 over 24 test picture images, compared to 4.864 and 0.7156 in the YrYgYb one. In measurement of a 19-inch LCD panel, the XrYgZb method also accomplishes smaller color difference values of 1.444072 and 5.588195 over 49 combinations of red, green, and blue data, compared to 1.50578 and 6.00403 of the YrYgYb at the backlight dimming ratios of 0.85 and 0.4.

  20. Efficiency improvements of public hospitals under a capitation payment scheme.

    PubMed

    García-Lacalle, Javier; Martín, Emilio

    2013-07-01

    In a context of cost containment and demands for better quality in public health care, payment systems are used as an instrument to promote efficiency improvements in service providers. Andalusia has adopted an original type of risk-adjusted capitation payment mechanism to reimburse public hospitals. This paper presents the main characteristics of the reimbursement mechanism of the Andalusian Health Service highlighting some differences with the mechanisms adopted in other parts of Europe. The paper also explores the evolution of the efficiency and quality of the hospitals after its implementation using the Malmquist index. Results indicate that hospitals have slightly improved their efficiency, particularly urban hospitals, and these improvements are not significantly related to a negative evolution of quality. However, it is not possible to assert to what extent, improvements are the consequence of the new payment system. The organisation of the Servicio Andaluz de Salud and the limited competition between hospitals reduce the effectiveness of the reform. PMID:23343663

  1. Efficient multiobjective optimization scheme for large scale structures

    NASA Astrophysics Data System (ADS)

    Grandhi, Ramana V.; Bharatram, Geetha; Venkayya, V. B.

    1992-09-01

    This paper presents a multiobjective optimization algorithm for an efficient design of large scale structures. The algorithm is based on generalized compound scaling techniques to reach the intersection of multiple functions. Multiple objective functions are treated similar to behavior constraints. Thus, any number of objectives can be handled in the formulation. Pseudo targets on objectives are generated at each iteration in computing the scale factors. The algorithm develops a partial Pareto set. This method is computationally efficient due to the fact that it does not solve many single objective optimization problems in reaching the Pareto set. The computational efficiency is compared with other multiobjective optimization methods, such as the weighting method and the global criterion method. Trusses, plate, and wing structure design cases with stress and frequency considerations are presented to demonstrate the effectiveness of the method.

  2. Efficient spares matrix multiplication scheme for the CYBER 203

    NASA Technical Reports Server (NTRS)

    Lambiotte, J. J., Jr.

    1984-01-01

    This work has been directed toward the development of an efficient algorithm for performing this computation on the CYBER-203. The desire to provide software which gives the user the choice between the often conflicting goals of minimizing central processing (CPU) time or storage requirements has led to a diagonal-based algorithm in which one of three types of storage is selected for each diagonal. For each storage type, an initialization sub-routine estimates the CPU and storage requirements based upon results from previously performed numerical experimentation. These requirements are adjusted by weights provided by the user which reflect the relative importance the user places on the resources. The three storage types employed were chosen to be efficient on the CYBER-203 for diagonals which are sparse, moderately sparse, or dense; however, for many densities, no diagonal type is most efficient with respect to both resource requirements. The user-supplied weights dictate the choice.

  3. Communication Improvement for the LU NAS Parallel Benchmark: A Model for Efficient Parallel Relaxation Schemes

    NASA Technical Reports Server (NTRS)

    Yarrow, Maurice; VanderWijngaart, Rob; Kutler, Paul (Technical Monitor)

    1997-01-01

    The first release of the MPI version of the LU NAS Parallel Benchmark (NPB2.0) performed poorly compared to its companion NPB2.0 codes. The later LU release (NPB2.1 & 2.2) runs up to two and a half times faster, thanks to a revised point access scheme and related communications scheme. The new scheme sends substantially fewer messages. is cache "friendly", and has a better load balance. We detail the, observations and modifications that resulted in this efficiency improvement, and show that the poor behavior of the original code resulted from deriving a message passing scheme from an algorithm originally devised for a vector architecture.

  4. An efficient and secure attribute based signcryption scheme with LSSS access structure.

    PubMed

    Hong, Hanshu; Sun, Zhixin

    2016-01-01

    Attribute based encryption (ABE) and attribute based signature (ABS) provide flexible access control with authentication for data sharing between users, but realizing both functions will bring about too much computation burden. In this paper, we combine the advantages of CP-ABE with ABS and propose a ciphertext policy attribute based signcryption scheme. In our scheme, only legal receivers can decrypt the ciphertext and verify the signature signed by data owner. Furthermore, we use linear secret sharing scheme instead of tree structure to avoid the frequent calls of recursive algorithm. By security and performance analysis, we prove that our scheme is secure as well as gains higher efficiency. PMID:27330910

  5. Efficient quantum key distribution scheme with pre-announcing the basis

    NASA Astrophysics Data System (ADS)

    Gao, Jingliang; Zhu, Changhua; Xiao, Heling

    2014-03-01

    We devise a new quantum key distribution scheme that is more efficient than the BB84 protocol. By pre-announcing the basis, Alice and Bob are more likely to use the same basis to prepare and measure the qubits, thus achieving a higher efficiency. The error analysis is revised and its security against any eavesdropping is proven briefly. Furthermore we show that, compared with the LCA scheme, our modification can be applied in more quantum channels.

  6. Power and spectrally efficient M-ARY QAM schemes for future mobile satellite communications

    NASA Technical Reports Server (NTRS)

    Sreenath, K.; Feher, K.

    1990-01-01

    An effective method to compensate nonlinear phase distortion caused by the mobile amplifier is proposed. As a first step towards the future use of spectrally efficient modulation schemes for mobile satellite applications, we have investigated effects of nonlinearities and the phase compensation method on 16-QAM. The new method provides about 2 dB savings in power for 16-QAM operation with cost effective amplifiers near saturation and thereby promising use of spectrally efficient linear modulation schemes for future mobile satellite applications.

  7. Risk management assessment of Health Maintenance Organisations participating in the National Health Insurance Scheme

    PubMed Central

    Campbell, Princess Christina; Korie, Patrick Chukwuemeka; Nnaji, Feziechukwu Collins

    2014-01-01

    Background: The National Health Insurance Scheme (NHIS), operated majorly in Nigeria by health maintenance organisations (HMOs), took off formally in June 2005. In view of the inherent risks in the operation of any social health insurance, it is necessary to efficiently manage these risks for sustainability of the scheme. Consequently the risk-management strategies deployed by HMOs need regular assessment. This study assessed the risk management in the Nigeria social health insurance scheme among HMOs. Materials and Methods: Cross-sectional survey of 33 HMOs participating in the NHIS. Results: Utilisation of standard risk-management strategies by the HMOs was 11 (52.6%). The other risk-management strategies not utilised in the NHIS 10 (47.4%) were risk equalisation and reinsurance. As high as 11 (52.4%) of participating HMOs had a weak enrollee base (less than 30,000 and poor monthly premium and these impacted negatively on the HMOs such that a large percentage 12 (54.1%) were unable to meet up with their financial obligations. Most of the HMOs 15 (71.4%) participated in the Millennium development goal (MDG) maternal and child health insurance programme. Conclusions: Weak enrollee base and poor monthly premium predisposed the HMOs to financial risk which impacted negatively on the overall performance in service delivery in the NHIS, further worsened by the non-utilisation of risk equalisation and reinsurance as risk-management strategies in the NHIS. There is need to make the scheme compulsory and introduce risk equalisation and reinsurance. PMID:25298605

  8. Extension of Efficient Low Dissipative High Order Schemes for 3-D Curvilinear Moving Grids

    NASA Technical Reports Server (NTRS)

    Vinokur, Marcel; Yee H. C.; Koga, Dennis (Technical Monitor)

    2000-01-01

    The efficient low dissipative high order schemes proposed by Yee et al. is formulated for 3-D curvilinear moving grids. These schemes consists of a high order base schemes combined with nonlinear characteristic filters. The amount of numerical dissipation is minimized by applying the schemes to the entropy splitting form of the inviscid flux derivatives. The analysis is given for a thermally perfect gas. The main difficulty in the extension of higher order schemes that were formulated in Cartesian coordinates to curvilinear moving grids is the higher order transformed metric evaluations. The higher order numerical evaluation of the transformed metric terms to insure freestream preservation is done in a coordinate invariant manner. The formulation is an improvement over existing formulation of high order scheme in curvilinear moving grids.

  9. A scheme for efficient quantum computation with linear optics

    NASA Astrophysics Data System (ADS)

    Knill, E.; Laflamme, R.; Milburn, G. J.

    2001-01-01

    Quantum computers promise to increase greatly the efficiency of solving problems such as factoring large integers, combinatorial optimization and quantum physics simulation. One of the greatest challenges now is to implement the basic quantum-computational elements in a physical system and to demonstrate that they can be reliably and scalably controlled. One of the earliest proposals for quantum computation is based on implementing a quantum bit with two optical modes containing one photon. The proposal is appealing because of the ease with which photon interference can be observed. Until now, it suffered from the requirement for non-linear couplings between optical modes containing few photons. Here we show that efficient quantum computation is possible using only beam splitters, phase shifters, single photon sources and photo-detectors. Our methods exploit feedback from photo-detectors and are robust against errors from photon loss and detector inefficiency. The basic elements are accessible to experimental investigation with current technology.

  10. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes. PMID:25750176

  11. Design and Analysis of a Dynamic Mobility Management Scheme for Wireless Mesh Network

    PubMed Central

    Roy, Sudipta

    2013-01-01

    Seamless mobility management of the mesh clients (MCs) in wireless mesh network (WMN) has drawn a lot of attention from the research community. A number of mobility management schemes such as mesh network with mobility management (MEMO), mesh mobility management (M3), and wireless mesh mobility management (WMM) have been proposed. The common problem with these schemes is that they impose uniform criteria on all the MCs for sending route update message irrespective of their distinct characteristics. This paper proposes a session-to-mobility ratio (SMR) based dynamic mobility management scheme for handling both internet and intranet traffic. To reduce the total communication cost, this scheme considers each MC's session and mobility characteristics by dynamically determining optimal threshold SMR value for each MC. A numerical analysis of the proposed scheme has been carried out. Comparison with other schemes shows that the proposed scheme outperforms MEMO, M3, and WMM with respect to total cost. PMID:24311982

  12. Regulation control and energy management scheme for wireless power transfer

    DOEpatents

    Miller, John M.

    2015-12-29

    Power transfer rate at a charging facility can be maximized by employing a feedback scheme. The state of charge (SOC) and temperature of the regenerative energy storage system (RESS) pack of a vehicle is monitored to determine the load due to the RESS pack. An optimal frequency that cancels the imaginary component of the input impedance for the output signal from a grid converter is calculated from the load of the RESS pack, and a frequency offset f* is made to the nominal frequency f.sub.0 of the grid converter output based on the resonance frequency of a magnetically coupled circuit. The optimal frequency can maximize the efficiency of the power transfer. Further, an optimal grid converter duty ratio d* can be derived from the charge rate of the RESS pack. The grid converter duty ratio d* regulates wireless power transfer (WPT) power level.

  13. A proposed group management scheme for XTP multicast

    NASA Technical Reports Server (NTRS)

    Dempsey, Bert J.; Weaver, Alfred C.

    1990-01-01

    The purpose of a group management scheme is to enable its associated transfer layer protocol to be responsive to user determined reliability requirements for multicasting. Group management (GM) must assist the client process in coordinating multicast group membership, allow the user to express the subset of the multicast group that a particular multicast distribution must reach in order to be successful (reliable), and provide the transfer layer protocol with the group membership information necessary to guarantee delivery to this subset. GM provides services and mechanisms that respond to the need of the client process or process level management protocols to coordinate, modify, and determine attributes of the multicast group, especially membership. XTP GM provides a link between process groups and their multicast groups by maintaining a group membership database that identifies members in a name space understood by the underlying transfer layer protocol. Other attributes of the multicast group useful to both the client process and the data transfer protocol may be stored in the database. Examples include the relative dispersion, most recent update, and default delivery parameters of a group.

  14. From generic scheme to brand-generic scheme: Have new policy influenced the efficiency of Iranian pharmaceutical companies?

    PubMed Central

    Hashemi-Meshkini, Amir; Varmaghani, Mehdi; Yousefi, Mehdi; Yaghoubifard, Saeed; Zekri, Hedieh-Sadat; Nikfar, Shekoufeh; Kebriaeezadeh, Abbas

    2014-01-01

    Objective: Brand-generic scheme was implemented in Iran to improve the competition in the pharmaceutical market. In this study, we aim to assess if this policy had any positive effect on efficiency of Iranian pharmaceutical companies. Methods: We used data envelopment analysis to evaluate the relative efficiency of pharmaceutical companies during 1999-2008. The Wilcoxon matched-pairs signed-rank and sign tests were used to assess the difference between mean technical efficiency of companies before and after implementation of the new policy. Findings: Although the Wilcoxon matched-pairs signed-rank tests did not show any significant differences in favor of the new policy in terms of both relative and pure (managerial) technical efficiency for included companies (P = 0.079 and 0.07, respectively), but the one-sided sign test indicated that only relative pure (managerial) efficiency has been improved after this policy (P = 0.031). Conclusion: The “brand-generic scheme” does not seem to be a successful policy to improve efficiency level and prompt competition in pharmaceutical companies in Iran. To achieve this aim, consideration of infrastructural requirements including transparent and non-discriminating laws and regulations to support competition, the competitive pricing policies, the presence of international companies in the market, and full privatization of companies had to be also deeming by policy makers. PMID:25328898

  15. Suitable scheme study of Chinese Building Energy Efficiency CDM Projects

    NASA Astrophysics Data System (ADS)

    Huang, Beijia; Yang, Haizhen; Wang, Shaoping; Wang, Feng

    2010-11-01

    China has great potential to develop Building Energy Efficiency Clean Development Mechanism (BEE CDM) projects, although have many challenges. Our results show that large-scale public buildings and urban residential buildings have relatively high BEE CDM potential, when comparing their characteristics to the CDM project requirements. The building enclosure, illumination energy conservation, air condition energy saving, solar thermal, and solar photovoltaic technology have relatively high application potential while considering the energy saving potential and marginal emission reduction cost. Case study of large-scale buildings shows that technology integration of building enclosure, illumination energy conservation, air condition energy saving, solar thermal can reduce required building number to 130 in order to meet the 1×105 tCO2 e/a reduction criteria. Some suggestions are also given in this paper.

  16. Development of an estuarine assessment scheme for the management of a highly urbanised catchment/estuary system, Sydney estuary, Australia.

    PubMed

    Birch, G F; Gunns, T J; Chapman, D; Harrison, D

    2016-05-01

    As coastal populations increase, considerable pressures are exerted on estuarine environments. Recently, there has been a trend towards the development and use of estuarine assessment schemes as a decision support tool in the management of these environments. These schemes offer a method by which complex environmental data is converted into a readily understandable and communicable format for informed decision making and effective distribution of limited management resources. Reliability and effectiveness of these schemes are often limited due to a complex assessment framework, poor data management and use of ineffective environmental indicators. The current scheme aims to improve reliability in the reporting of estuarine condition by including a concise assessment framework, employing high-value indicators and, in a unique approach, employing fuzzy logic in indicator evaluation. Using Sydney estuary as a case study, each of the 15 sub-catchment/sub-estuary systems were assessed using the current scheme. Results identified that poor sediment quality was a significant issue in Blackwattle/Rozelle Bay, Iron Cove and Hen and Chicken Bay while poor water quality was of particular concern in Duck River, Homebush Bay and the Parramatta River. Overall results of the assessment scheme were used to prioritise the management of each sub-catchment/sub-estuary assessed with Blackwattle/Rozelle Bay, Homebush Bay, Iron Cove and Duck River considered to be in need of a high priority management response. A report card format, using letter grades, was employed to convey the results of the assessment in a readily understood manner to estuarine managers and members of the public. Letter grades also provide benchmarking and performance monitoring ability, allowing estuarine managers to set improvement targets and assesses the effectiveness of management strategies. The current assessment scheme provides an effective, integrated and consistent assessment of estuarine health and

  17. A Security-Awareness Virtual Machine Management Scheme Based on Chinese Wall Policy in Cloud Computing

    PubMed Central

    Gui, Xiaolin; Lin, Jiancai; Tian, Feng; Zhao, Jianqiang; Dai, Min

    2014-01-01

    Cloud computing gets increasing attention for its capacity to leverage developers from infrastructure management tasks. However, recent works reveal that side channel attacks can lead to privacy leakage in the cloud. Enhancing isolation between users is an effective solution to eliminate the attack. In this paper, to eliminate side channel attacks, we investigate the isolation enhancement scheme from the aspect of virtual machine (VM) management. The security-awareness VMs management scheme (SVMS), a VMs isolation enhancement scheme to defend against side channel attacks, is proposed. First, we use the aggressive conflict of interest relation (ACIR) and aggressive in ally with relation (AIAR) to describe user constraint relations. Second, based on the Chinese wall policy, we put forward four isolation rules. Third, the VMs placement and migration algorithms are designed to enforce VMs isolation between the conflict users. Finally, based on the normal distribution, we conduct a series of experiments to evaluate SVMS. The experimental results show that SVMS is efficient in guaranteeing isolation between VMs owned by conflict users, while the resource utilization rate decreases but not by much. PMID:24688434

  18. An efficient Quality of Service (QoS) scheme for all optical networks

    NASA Astrophysics Data System (ADS)

    Garg, Amit Kumar; Kaler, R. S.

    2011-01-01

    This paper addresses the issue of providing Quality of Service (QoS) for optical burst switching (OBS) systems. In this paper, an efficient QoS oriented integrated scheme based on Optical Burst/Circuit Switching network architecture has been proposed. The proposed scheme utilizes the modified Just-Enough-Time (JET) protocol and advanced reservation based on Linear Predictive Filter (LPF), which can provide differentiated services for optical burst switching (OBS) network. Simulation results show that the proposed scheme is reasonably better than a First Come First Served (FCFS) protocol in guaranteeing QoS of real-time traffic. Also, the results yield significant delay reduction for time-critical traffic, while maintaining the bandwidth overhead within limits. As a result, the proposed scheme has achieved QoS differentiation in terms of burst loss rate in comparison to conventional schemes.

  19. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks

    PubMed Central

    Rani, Shalli; Talwar, Rajneesh; Malhotra, Jyoteesh; Ahmed, Syed Hassan; Sarkar, Mahasweta; Song, Houbing

    2015-01-01

    One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1) a hierarchical network design; (2) a model for the energy efficient IoT; (3) a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT. PMID:26569260

  20. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks.

    PubMed

    Rani, Shalli; Talwar, Rajneesh; Malhotra, Jyoteesh; Ahmed, Syed Hassan; Sarkar, Mahasweta; Song, Houbing

    2015-01-01

    One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1) a hierarchical network design; (2) a model for the energy efficient IoT; (3) a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT. PMID:26569260

  1. Efficient asymmetric image authentication schemes based on photon counting-double random phase encoding and RSA algorithms.

    PubMed

    Moon, Inkyu; Yi, Faliu; Han, Mingu; Lee, Jieun

    2016-06-01

    Recently, double random phase encoding (DRPE) has been integrated with the photon counting (PC) imaging technique for the purpose of secure image authentication. In this scheme, the same key should be securely distributed and shared between the sender and receiver, but this is one of the most vexing problems of symmetric cryptosystems. In this study, we propose an efficient asymmetric image authentication scheme by combining the PC-DRPE and RSA algorithms, which solves key management and distribution problems. The retrieved image from the proposed authentication method contains photon-limited encrypted data obtained by means of PC-DRPE. Therefore, the original image can be protected while the retrieved image can be efficiently verified using a statistical nonlinear correlation approach. Experimental results demonstrate the feasibility of our proposed asymmetric image authentication method. PMID:27411183

  2. A HIPAA-compliant key management scheme with revocation of authorization.

    PubMed

    Lee, Wei-Bin; Lee, Chien-Ding; Ho, Kevin I-J

    2014-03-01

    Patient control over electronic protected health information (ePHI) is one of the major concerns in the Health Insurance and Accountability Act (HIPAA). In this paper, a new key management scheme is proposed to facilitate control by providing two functionalities. First, a patient can authorize more than one healthcare institute within a designated time period to access his or her ePHIs. Second, a patient can revoke authorization and add new authorized institutes at any time as necessary. In the design, it is not required to re-encrypt ePHIs for adding and revoking authorizations, and the implementation is time- and cost-efficient. Consent exception is also considered by the proposed scheme. PMID:24480372

  3. Designing Pay-As-You-Throw schemes in municipal waste management services: A holistic approach

    SciTech Connect

    Elia, Valerio; Gnoni, Maria Grazia Tornese, Fabiana

    2015-10-15

    Highlights: • Pay-As-You-Throw (PAYT) schemes are becoming widespread in several countries. • Economic, organizational and technological issues have to be integrated in an efficient PAYT model design. • Efficiency refers to a PAYT system which support high citizen participation rates as well as economic sustainability. • Different steps and constraints have to be evaluated from collection services to type technologies. • An holistic approach is discussed to support PAYT systems diffusion. - Abstract: Pay-As-You-Throw (PAYT) strategies are becoming widely applied in solid waste management systems; the main purpose is to support a more sustainable – from economic, environmental and social points of view – management of waste flows. Adopting PAYT charging models increases the complexity level of the waste management service as new organizational issues have to be evaluated compared to flat charging models. In addition, innovative technological solutions could also be adopted to increase the overall efficiency of the service. Unit pricing, user identification and waste measurement represent the three most important processes to be defined in a PAYT system. The paper proposes a holistic framework to support an effective design and management process. The framework defines most critical processes and effective organizational and technological solutions for supporting waste managers as well as researchers.

  4. A new computational scheme for the Dirac-Hartree-Fock method employing an efficient integral algorithm

    NASA Astrophysics Data System (ADS)

    Yanai, Takeshi; Nakajima, Takahito; Ishikawa, Yasuyuki; Hirao, Kimihiko

    2001-04-01

    A highly efficient computational scheme for four-component relativistic ab initio molecular orbital (MO) calculations over generally contracted spherical harmonic Gaussian-type spinors (GTSs) is presented. Benchmark calculations for the ground states of the group IB hydrides, MH, and dimers, M2 (M=Cu, Ag, and Au), by the Dirac-Hartree-Fock (DHF) method were performed with a new four-component relativistic ab initio MO program package oriented toward contracted GTSs. The relativistic electron repulsion integrals (ERIs), the major bottleneck in routine DHF calculations, are calculated efficiently employing the fast ERI routine SPHERICA, exploiting the general contraction scheme, and the accompanying coordinate expansion method developed by Ishida. Illustrative calculations clearly show the efficiency of our computational scheme.

  5. A solution accurate, efficient and stable unsplit staggered mesh scheme for three dimensional magnetohydrodynamics

    NASA Astrophysics Data System (ADS)

    Lee, Dongwook

    2013-06-01

    In this paper, we extend the unsplit staggered mesh scheme (USM) for 2D magnetohydrodynamics (MHD) [D. Lee, A.E. Deane, An unsplit staggered mesh scheme for multidimensional magnetohydrodynamics, J. Comput. Phys. 228 (2009) 952-975] to a full 3D MHD scheme. The scheme is a finite-volume Godunov method consisting of a constrained transport (CT) method and an efficient and accurate single-step, directionally unsplit multidimensional data reconstruction-evolution algorithm, which extends Colella's original 2D corner transport upwind (CTU) method [P. Colella, Multidimensional upwind methods for hyperbolic conservation laws, J. Comput. Phys. 87 (1990) 446-466]. We present two types of data reconstruction-evolution algorithms for 3D: (1) a reduced CTU scheme and (2) a full CTU scheme. The reduced 3D CTU scheme is a variant of a simple 3D extension of Collela's 2D CTU method and is considered as a direct extension from the 2D USM scheme. The full 3D CTU scheme is our primary 3D solver which includes all multidimensional cross-derivative terms for stability. The latter method is logically analogous to the 3D unsplit CTU method by Saltzman [J. Saltzman, An unsplit 3D upwind method for hyperbolic conservation laws, J. Comput. Phys. 115 (1994) 153-168]. The major novelties in our algorithms are twofold. First, we extend the reduced CTU scheme to the full CTU scheme which is able to run with CFL numbers close to unity. Both methods utilize the transverse update technique developed in the 2D USM algorithm to account for transverse fluxes without solving intermediate Riemann problems, which in turn gives cost-effective 3D methods by reducing the total number of Riemann solves. The proposed algorithms are simple and efficient especially when including multidimensional MHD terms that maintain in-plane magnetic field dynamics. Second, we introduce a new CT scheme that makes use of proper upwind information in taking averages of electric fields. Our 3D USM schemes can be easily

  6. Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET

    NASA Astrophysics Data System (ADS)

    Park, Youngho; Sur, Chul; Jung, Chae Duk; Rhee, Kyung-Hyune

    In this paper, we propose an efficient authentication protocol with conditional privacy preservation for secure vehicular communications. The proposed protocol follows the system model to issue on-the-fly anonymous public key certificates to vehicles by road-side units. In order to design an efficient message authentication protocol, we consider a key-insulated signature scheme for certifying anonymous public keys of vehicles to such a system model. We demonstrate experimental results to confirm that the proposed protocol has better performance than other protocols based on group signature schemes.

  7. Highly efficient light management for perovskite solar cells

    NASA Astrophysics Data System (ADS)

    Wang, Dong-Lin; Cui, Hui-Juan; Hou, Guo-Jiao; Zhu, Zhen-Gang; Yan, Qing-Bo; Su, Gang

    2016-01-01

    Organic-inorganic halide perovskite solar cells have enormous potential to impact the existing photovoltaic industry. As realizing a higher conversion efficiency of the solar cell is still the most crucial task, a great number of schemes were proposed to minimize the carrier loss by optimizing the electrical properties of the perovskite solar cells. Here, we focus on another significant aspect that is to minimize the light loss by optimizing the light management to gain a high efficiency for perovskite solar cells. In our scheme, the slotted and inverted prism structured SiO2 layers are adopted to trap more light into the solar cells, and a better transparent conducting oxide layer is employed to reduce the parasitic absorption. For such an implementation, the efficiency and the serviceable angle of the perovskite solar cell can be promoted impressively. This proposal would shed new light on developing the high-performance perovskite solar cells.

  8. Highly efficient light management for perovskite solar cells

    PubMed Central

    Wang, Dong-Lin; Cui, Hui-Juan; Hou, Guo-Jiao; Zhu, Zhen-Gang; Yan, Qing-Bo; Su, Gang

    2016-01-01

    Organic-inorganic halide perovskite solar cells have enormous potential to impact the existing photovoltaic industry. As realizing a higher conversion efficiency of the solar cell is still the most crucial task, a great number of schemes were proposed to minimize the carrier loss by optimizing the electrical properties of the perovskite solar cells. Here, we focus on another significant aspect that is to minimize the light loss by optimizing the light management to gain a high efficiency for perovskite solar cells. In our scheme, the slotted and inverted prism structured SiO2 layers are adopted to trap more light into the solar cells, and a better transparent conducting oxide layer is employed to reduce the parasitic absorption. For such an implementation, the efficiency and the serviceable angle of the perovskite solar cell can be promoted impressively. This proposal would shed new light on developing the high-performance perovskite solar cells. PMID:26733112

  9. An Efficient Perturbed Parameter Scheme in the Lorenz System for Quantifying Model Uncertainty

    NASA Astrophysics Data System (ADS)

    Chen, G.; Kirtman, B. P.; Iskandarani, M.

    2014-12-01

    Our goal is to develop a reliable and efficient perturbed parameter scheme comparable to stochastic parameterization schemes. The Lorenz model is a simple testbed for numerical simulations. We used a two time-scale Lorenz 63 (L63) model to mimic the ocean-atmosphere coupled system and a Lorenz 96 (L96) model coupled to the atmospheric component representing a small-scale spatially resolved system. The full set of equations is defined as the "truth". The spatially resolved system will be bulk-parameterized by three different schemes: (i) deterministic, (ii) stochastic parameterization , and (iii) perturbed parameter. Perfect initial conditions are applied to investigate pure model error. Although stochastic parameterizations have been proven to resolve systematic errors, they become computationally expensive as the stochastic dimension increases. We propose to apply "informative" probability distributions for the perturbed parameter scheme to resolve systematic bias where previous research have failed to do so. The proposed scheme uses a stochastic spectral method, Polynomial Chaos Expansion (PCE), to reduce model runs while achieving fast convergence to the exact solution. PCE is implemented as an efficient "surrogate" model to generate a large ensemble. The PCE-accelerated informative perturbed parameter scheme generated competitive and reliable ensemble forecasts.

  10. Approaches of Improving University Assets Management Efficiency

    ERIC Educational Resources Information Center

    Wang, Jingliang

    2015-01-01

    University assets management, as an important content of modern university management, is generally confronted with the issue of low efficiency. Currently, to address the problems exposed in university assets management and take appropriate modification measures is an urgent issue in front of Chinese university assets management sectors. In this…

  11. An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem.

    PubMed

    Zhao, Zhenguo

    2014-02-01

    With the development of wireless networks and medical sensors, wireless body area networks are playing more and more important role in the field of healthcare service. The data transmitted in WBANs is very sensitive since it will be used in clinical diagnoses or measurements. Therefore, security and privacy of communication in WBANs derive increasing attentions from the academia and industry. In this paper, we propose an identity (ID)-based efficient anonymous authentication scheme for WBANs using elliptic curve cryptosystem (ECC). Due to the ID-based concept, there is no certificate is needed in the proposed scheme. Moreover, the proposed scheme not only provides mutual authentication between the client and the application provider but also provides client anonymity. Performance analysis shows that improvements of 50.58% and 3.87% in the client side and the application provider side separately. Then the proposed scheme is more suitable for WBANs. PMID:24481718

  12. An Energy-Efficient Game-Theory-Based Spectrum Decision Scheme for Cognitive Radio Sensor Networks

    PubMed Central

    Salim, Shelly; Moh, Sangman

    2016-01-01

    A cognitive radio sensor network (CRSN) is a wireless sensor network in which sensor nodes are equipped with cognitive radio. In this paper, we propose an energy-efficient game-theory-based spectrum decision (EGSD) scheme for CRSNs to prolong the network lifetime. Note that energy efficiency is the most important design consideration in CRSNs because it determines the network lifetime. The central part of the EGSD scheme consists of two spectrum selection algorithms: random selection and game-theory-based selection. The EGSD scheme also includes a clustering algorithm, spectrum characterization with a Markov chain, and cluster member coordination. Our performance study shows that EGSD outperforms the existing popular framework in terms of network lifetime and coordination overhead. PMID:27376290

  13. An Energy-Efficient Game-Theory-Based Spectrum Decision Scheme for Cognitive Radio Sensor Networks.

    PubMed

    Salim, Shelly; Moh, Sangman

    2016-01-01

    A cognitive radio sensor network (CRSN) is a wireless sensor network in which sensor nodes are equipped with cognitive radio. In this paper, we propose an energy-efficient game-theory-based spectrum decision (EGSD) scheme for CRSNs to prolong the network lifetime. Note that energy efficiency is the most important design consideration in CRSNs because it determines the network lifetime. The central part of the EGSD scheme consists of two spectrum selection algorithms: random selection and game-theory-based selection. The EGSD scheme also includes a clustering algorithm, spectrum characterization with a Markov chain, and cluster member coordination. Our performance study shows that EGSD outperforms the existing popular framework in terms of network lifetime and coordination overhead. PMID:27376290

  14. An efficient forward-secure group certificate digital signature scheme to enhance EMR authentication process.

    PubMed

    Yu, Yao-Chang; Hou, Ting-Wei

    2014-05-01

    The frequently used digital signature algorithms, such as RSA and the Digital Signature Algorithm (DSA), lack forward-secure function. The result is that, when private keys are renewed, trustworthiness is lost. In other words, electronic medical records (EMRs) signed by revoked private keys are no longer trusted. This significant security threat stands in the way of EMR adoption. This paper proposes an efficient forward-secure group certificate digital signature scheme that is based on Shamir's (t,n) threshold scheme and Schnorr's digital signature scheme to ensure trustworthiness is maintained when private keys are renewed and to increase the efficiency of EMRs' authentication processes in terms of number of certificates, number of keys, forward-secure ability and searching time. PMID:24652661

  15. POWER-COST EFFICIENCY OF EIGHT MACROBENTHIC SAMPLING SCHEMES IN PUGET SOUND, WASHINGTON, USA

    EPA Science Inventory

    Power-cost efficiency (PCEi = (n x c)min/(n, x, c,), where i = sampling scheme, n=minimum number of replicate samples needed to detect a difference between locations with an acceptable probability of Type 1 (a) and Type II (B) error (e.g. a = B = 0.05),c = mean "cost," in time or...

  16. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  17. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  18. Efficient schemes of joint remote preparation with a passive receiver via EPR pairs

    NASA Astrophysics Data System (ADS)

    Ma, Song-Ya; Gao, Cong; Luo, Ming-Xing

    2015-11-01

    Novel schemes are put forward to execute the joint remote preparation of an arbitrary two-qubit state with a passive receiver via EPR pairs as the entangled channel. Compared with the previous protocols, the required multi-particle measurement is simplified and the classical communication cost is reduced. When the number of senders increases, the advantage is more evident. It means that the proposed schemes are more efficient in practice. Project supported by the National Natural Science Foundation of China (Grant Nos. 61201253, 61303039, 61572246, and 61502147) and the Fundamental Research Fund for the Central Universities of China (Grant No. 2682014CX095).

  19. A High Efficiency Boost Converter with MPPT Scheme for Low Voltage Thermoelectric Energy Harvesting

    NASA Astrophysics Data System (ADS)

    Guan, Mingjie; Wang, Kunpeng; Zhu, Qingyuan; Liao, Wei-Hsin

    2016-07-01

    Using thermoelectric elements to harvest energy from heat has been of great interest during the last decade. This paper presents a direct current-direct current (DC-DC) boost converter with a maximum power point tracking (MPPT) scheme for low input voltage thermoelectric energy harvesting applications. Zero current switch technique is applied in the proposed MPPT scheme. Theoretical analysis on the converter circuits is explored to derive the equations for parameters needed in the design of the boost converter. Simulations and experiments are carried out to verify the theoretical analysis and equations. A prototype of the designed converter is built using discrete components and a low-power microcontroller. The results show that the designed converter can achieve a high efficiency at low input voltage. The experimental efficiency of the designed converter is compared with a commercial converter solution. It is shown that the designed converter has a higher efficiency than the commercial solution in the considered voltage range.

  20. Resource allocation for efficient environmental management.

    PubMed

    McCarthy, Michael A; Thompson, Colin J; Hauser, Cindy; Burgman, Mark A; Possingham, Hugh P; Moir, Melinda L; Tiensin, Thanawat; Gilbert, Marius

    2010-10-01

    Environmental managers must decide how to invest available resources. Researchers have previously determined how to allocate conservation resources among regions, design nature reserves, allocate funding to species conservation programs, design biodiversity surveys and monitoring programs, manage species and invest in greenhouse gas mitigation schemes. However, these issues have not been addressed with a unified theory. Furthermore, uncertainty is prevalent in environmental management, and needs to be considered to manage risks. We present a theory for optimal environmental management, synthesizing previous approaches to the topic and incorporating uncertainty. We show that the theory solves a diverse range of important problems of resource allocation, including distributing conservation resources among the world's biodiversity hotspots; surveillance to detect the highly pathogenic avian influenza H5N1 virus in Thailand; and choosing survey methods for the insect order Hemiptera. Environmental management decisions are similar to decisions about financial investments, with trade-offs between risk and reward. PMID:20718844

  1. An Efficient Resource Allocation Scheme for VoIP Services in the IEEE 802.16e OFDMA System

    NASA Astrophysics Data System (ADS)

    So, Jae-Woo

    In this letter, we propose an efficient resource allocation scheme that improves the system performance by reducing the signaling overhead for voice over Internet protocol (VoIP) services in the IEEE 802.16e OFDMA system. We theoretically analyze the performance of the proposed allocation scheme and carry out a computer simulation to evaluate the FA scheme.

  2. Efficiency Management in Spaceflight Systems

    NASA Technical Reports Server (NTRS)

    Murphy, Karen

    2016-01-01

    Efficiency in spaceflight is often approached as "faster, better, cheaper - pick two". The high levels of performance and reliability required for each mission suggest that planners can only control for two of the three. True efficiency comes by optimizing a system across all three parameters. The functional processes of spaceflight become technical requirements on three operational groups during mission planning: payload, vehicle, and launch operations. Given the interrelationships among the functions performed by the operational groups, optimizing function resources from one operational group to the others affects the efficiency of those groups and therefore the mission overall. This paper helps outline this framework and creates a context in which to understand the effects of resource trades on the overall system, improving the efficiency of the operational groups and the mission as a whole. This allows insight into and optimization of the controlling factors earlier in the mission planning stage.

  3. Efficiency Management in Spaceflight Systems

    NASA Technical Reports Server (NTRS)

    Murphy, Karen

    2016-01-01

    Efficiency in spaceflight is often approached as “faster, better, cheaper – pick two”. The high levels of performance and reliability required for each mission suggest that planners can only control for two of the three. True efficiency comes by optimizing a system across all three parameters. The functional processes of spaceflight become technical requirements on three operational groups during mission planning: payload, vehicle, and launch operations. Given the interrelationships among the functions performed by the operational groups, optimizing function resources from one operational group to the others affects the efficiency of those groups and therefore the mission overall. This paper helps outline this framework and creates a context in which to understand the effects of resource trades on the overall system, improving the efficiency of the operational groups and the mission as a whole. This allows insight into and optimization of the controlling factors earlier in the mission planning stage.

  4. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks. PMID:23553734

  5. Application of an efficient hybrid scheme for aeroelastic analysis of advanced propellers

    NASA Technical Reports Server (NTRS)

    Srivastava, R.; Sankar, N. L.; Reddy, T. S. R.; Huff, D. L.

    1989-01-01

    An efficient 3-D hybrid scheme is applied for solving Euler equations to analyze advanced propellers. The scheme treats the spanwise direction semi-explicitly and the other two directions implicitly, without affecting the accuracy, as compared to a fully implicit scheme. This leads to a reduction in computer time and memory requirement. The calculated power coefficients for two advanced propellers, SR3 and SR7L, and various advanced ratios showed good correlation with experiment. Spanwise distribution of elemental power coefficient and steady pressure coefficient differences also showed good agreement with experiment. A study of the effect of structural flexibility on the performance of the advanced propellers showed that structural deformation due to centrifugal and aero loading should be included for better correlation.

  6. An Automatic K-Point Grid Generation Scheme for Enhanced Efficiency and Accuracy in DFT Calculations

    NASA Astrophysics Data System (ADS)

    Mohr, Jennifer A.-F.; Shepherd, James J.; Alavi, Ali

    2013-03-01

    We seek to create an automatic k-point grid generation scheme for density functional theory (DFT) calculations that improves the efficiency and accuracy of the calculations and is suitable for use in high-throughput computations. Current automated k-point generation schemes often result in calculations with insufficient k-points, which reduces the reliability of the results, or too many k-points, which can significantly increase computational cost. By controlling a wider range of k-point grid densities for the Brillouin zone based upon factors of conductivity and symmetry, a scalable k-point grid generation scheme can lower calculation runtimes and improve the accuracy of energy convergence. Johns Hopkins University

  7. High efficient key-insulated attribute based encryption scheme without bilinear pairing operations.

    PubMed

    Hong, Hanshu; Sun, Zhixin

    2016-01-01

    Attribute based encryption (ABE) has been widely applied for secure data protection in various data sharing systems. However, the efficiency of existing ABE schemes is not high enough since running encrypt and decrypt algorithms need frequent bilinear pairing operations, which may occupy too much computing resources on terminal devices. What's more, since different users may share the same attributes in the system, a single user's private key exposure will threaten the security and confidentiality of the whole system. Therefore, to further decrease the computation cost in attribute based cryptosystem as well as provide secure protection when key exposure happens, in this paper, we firstly propose a high efficient key-insulated ABE algorithm without pairings. The key-insulated mechanism guarantees both forward security and backward security when key exposure or user revocation happens. Besides, during the running of algorithms in our scheme, users and attribute authority needn't run any bilinear pairing operations, which will increase the efficiency to a large extent. The high efficiency and security analysis indicate that our scheme is more appropriate for secure protection in data sharing systems. PMID:26933630

  8. Enhanced efficiency of plasma acceleration in the laser-induced cavity pressure acceleration scheme

    NASA Astrophysics Data System (ADS)

    Badziak, J.; Rosiński, M.; Jabłoński, S.; Pisarczyk, T.; Chodukowski, T.; Parys, P.; Rączka, P.; Krousky, E.; Ullschmied, J.; Liska, R.; Kucharik, M.

    2015-01-01

    Among various methods for the acceleration of dense plasmas the mechanism called laser-induced cavity pressure acceleration (LICPA) is capable of achieving the highest energetic efficiency. In the LICPA scheme, a projectile placed in a cavity is accelerated along a guiding channel by the laser-induced thermal plasma pressure or by the radiation pressure of an intense laser radiation trapped in the cavity. This arrangement leads to a significant enhancement of the hydrodynamic or electromagnetic forces driving the projectile, relative to standard laser acceleration schemes. The aim of this paper is to review recent experimental and numerical works on LICPA with the emphasis on the acceleration of heavy plasma macroparticles and dense ion beams. The main experimental part concerns the research carried out at the kilojoule sub-nanosecond PALS laser facility in Prague. Our measurements performed at this facility, supported by advanced two-dimensional hydrodynamic simulations, have demonstrated that the LICPA accelerator working in the long-pulse hydrodynamic regime can be a highly efficient tool for the acceleration of heavy plasma macroparticles to hyper-velocities and the generation of ultra-high-pressure (>100 Mbar) shocks through the collision of the macroparticle with a solid target. The energetic efficiency of the macroparticle acceleration and the shock generation has been found to be significantly higher than that for other laser-based methods used so far. Using particle-in-cell simulations it is shown that the LICPA scheme is highly efficient also in the short-pulse high-intensity regime and, in particular, may be used for production of intense ion beams of multi-MeV to GeV ion energies with the energetic efficiency of tens of per cent, much higher than for conventional laser acceleration schemes.

  9. Efficient and provable secure pairing-free security-mediated identity-based identification schemes.

    PubMed

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions. PMID:25207333

  10. Ancient numerical daemons of conceptual hydrological modeling: 1. Fidelity and efficiency of time stepping schemes

    NASA Astrophysics Data System (ADS)

    Clark, Martyn P.; Kavetski, Dmitri

    2010-10-01

    A major neglected weakness of many current hydrological models is the numerical method used to solve the governing model equations. This paper thoroughly evaluates several classes of time stepping schemes in terms of numerical reliability and computational efficiency in the context of conceptual hydrological modeling. Numerical experiments are carried out using 8 distinct time stepping algorithms and 6 different conceptual rainfall-runoff models, applied in a densely gauged experimental catchment, as well as in 12 basins with diverse physical and hydroclimatic characteristics. Results show that, over vast regions of the parameter space, the numerical errors of fixed-step explicit schemes commonly used in hydrology routinely dwarf the structural errors of the model conceptualization. This substantially degrades model predictions, but also, disturbingly, generates fortuitously adequate performance for parameter sets where numerical errors compensate for model structural errors. Simply running fixed-step explicit schemes with shorter time steps provides a poor balance between accuracy and efficiency: in some cases daily-step adaptive explicit schemes with moderate error tolerances achieved comparable or higher accuracy than 15 min fixed-step explicit approximations but were nearly 10 times more efficient. From the range of simple time stepping schemes investigated in this work, the fixed-step implicit Euler method and the adaptive explicit Heun method emerge as good practical choices for the majority of simulation scenarios. In combination with the companion paper, where impacts on model analysis, interpretation, and prediction are assessed, this two-part study vividly highlights the impact of numerical errors on critical performance aspects of conceptual hydrological models and provides practical guidelines for robust numerical implementation.

  11. An efficient, unconditionally energy stable local discontinuous Galerkin scheme for the Cahn-Hilliard-Brinkman system

    NASA Astrophysics Data System (ADS)

    Guo, Ruihan; Xu, Yan

    2015-10-01

    In this paper, we present an efficient and unconditionally energy stable fully-discrete local discontinuous Galerkin (LDG) method for approximating the Cahn-Hilliard-Brinkman (CHB) system, which is comprised of a Cahn-Hilliard type equation and a generalized Brinkman equation modeling fluid flow. The semi-discrete energy stability of the LDG method is proved firstly. Due to the strict time step restriction (Δt = O (Δx4)) of explicit time discretization methods for stability, we introduce a semi-implicit scheme which consists of the implicit Euler method combined with a convex splitting of the discrete Cahn-Hilliard energy strategy for the temporal discretization. The unconditional energy stability of this fully-discrete convex splitting scheme is also proved. Obviously, the fully-discrete equations at the implicit time level are nonlinear, and to enhance the efficiency of the proposed approach, the nonlinear Full Approximation Scheme (FAS) multigrid method has been employed to solve this system of algebraic equations. We also show the nearly optimal complexity numerically. Numerical experiments based on the overall solution method of combining the proposed LDG method, convex splitting scheme and the nonlinear multigrid solver are given to validate the theoretical results and to show the effectiveness of the proposed approach for the CHB system.

  12. Cap and trade schemes on waste management: A case study of the Landfill Allowance Trading Scheme (LATS) in England

    SciTech Connect

    Calaf-Forn, Maria; Roca, Jordi; Puig-Ventosa, Ignasi

    2014-05-01

    Highlights: • LATS has been effective to achieve a reduction of the amount of landfilled waste. • LATS has been one of the few environmental instruments for waste management with a cap and trade methodology. • LATS has achieved to increase recycling of the biodegradable and other waste fractions. - Abstract: The Landfill Allowance Trading Scheme (LATS) is one of the main instruments used in England to enforce the landfill diversion targets established in the Directive 1999/31/EC of the European Parliament and of the Council of 26 April 1999 on the landfill of waste (Landfill Directive). Through the LATS, biodegradable municipal waste (BMW) allowances for landfilling are allocated to each local authority, otherwise known as waste disposal authorities (WDAs). The quantity of landfill allowances received is expected to decrease continuously from 2005/06 to 2019/20 so as to meet the objectives of the Landfill Directive. To achieve their commitments, WDAs can exchange, buy, sell or transfer allowances among each other, or may re-profile their own allocation through banking and/or borrowing. Despite the goals for the first seven years – which included two target years (2005/06 and 2009/10) – being widely achieved (the average allocation of allowances per WDA was 22.9% higher than those finally used), market activity among WDAs was high and prices were not very stable. Results in terms of waste reduction and recycling levels have been satisfactory. The reduction of BMW landfilled (in percentage) was higher during the first seven years of the LATS period (2005/06–2011/12) (around 7% annually) than during the previous period (2001/02–2004/05) (4.2% annually). Since 2008, the significance of the LATS diminished because of an increase in the rate of the UK Landfill Tax. The LATS was suppressed after the 2012/13 target year, before what it was initially scheduled. The purpose of this paper is to describe the particularities of the LATS, analyse its performance as

  13. A Study on Efficient Mobile IPv6 Fast Handover Scheme Using Reverse Binding Mechanism

    NASA Astrophysics Data System (ADS)

    Tolentino, Randy S.; Lee, Kijeong; Kim, Sung-Gyu; Kim, Miso; Park, Byungjoo

    This paper proposes a solution for solving the packet handover issues of MIPv6. We propose an efficient scheme that can support fast handover effectively in standard Mobile IPv6 (MIPv6) by optimizing the associated data and the flow of signal during handover. A new signaling message Reverse Packet Binding Mechanism is defined and utilized to hasten the handover procedure by adding a buffer in access point (AP) and home agent (HA).

  14. Search for Efficient Laser Resonance Ionization Schemes of Refractory Elements for KISS

    NASA Astrophysics Data System (ADS)

    Mukai, M.; Hirayama, Y.; Imai, N.; Ishiyama, H.; Jeong, S. C.; Miyatake, H.; Oyaizu, M.; Watanabe, Y. X.; Kim, Y. H.; Kimura, S.

    Laser resonance ionization is employed for the element-selective ionization of multi-nucleon transfer reaction products which are stopped and neutralized in the gas cell filled with argon gas of 50 kPa. We searched for laser resonance ionization schemes of tantalum (Z = 73), tungsten (Z = 74), rhenium (Z = 75) and iridium (Z = 77) elements. We deduced the photon absorption cross section for each transition and the laser ionization efficiency in the gas cell.

  15. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Kumar, Neeraj

    2015-11-01

    In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System, where the patient and medical server exchange medical information using Internet. We have found that most of the schemes are not usable for practical applications due to known security weaknesses. It is also worth to note that unrestricted number of patients login to the single medical server across the globe. Therefore, the computation and maintenance overhead would be high and the server may fail to provide services. In this article, we have designed a medical system architecture and a standard mutual authentication scheme for single medical server, where the patient can securely exchange medical data with the doctor(s) via trusted central medical server over any insecure network. We then explored the security of the scheme with its resilience to attacks. Moreover, we formally validated the proposed scheme through the simulation using Automated Validation of Internet Security Schemes and Applications software whose outcomes confirm that the scheme is protected against active and passive attacks. The performance comparison demonstrated that the proposed scheme has lower communication cost than the existing schemes in literature. In addition, the computation cost of the proposed scheme is nearly equal to the exiting schemes. The proposed scheme not only efficient in terms of different security attacks, but it also provides an efficient login, mutual authentication, session key agreement and verification and password update phases along with password recovery. PMID:26433889

  16. Efficient high-order discontinuous Galerkin schemes with first-order hyperbolic advection-diffusion system approach

    NASA Astrophysics Data System (ADS)

    Mazaheri, Alireza; Nishikawa, Hiroaki

    2016-09-01

    We propose arbitrary high-order discontinuous Galerkin (DG) schemes that are designed based on a first-order hyperbolic advection-diffusion formulation of the target governing equations. We present, in details, the efficient construction of the proposed high-order schemes (called DG-H), and show that these schemes have the same number of global degrees-of-freedom as comparable conventional high-order DG schemes, produce the same or higher order of accuracy solutions and solution gradients, are exact for exact polynomial functions, and do not need a second-derivative diffusion operator. We demonstrate that the constructed high-order schemes give excellent quality solution and solution gradients on irregular triangular elements. We also construct a Weighted Essentially Non-Oscillatory (WENO) limiter for the proposed DG-H schemes and apply it to discontinuous problems. We also make some accuracy comparisons with conventional DG and interior penalty schemes. A relative qualitative cost analysis is also reported, which indicates that the high-order schemes produce orders of magnitude more accurate results than the low-order schemes for a given CPU time. Furthermore, we show that the proposed DG-H schemes are nearly as efficient as the DG and Interior-Penalty (IP) schemes as these schemes produce results that are relatively at the same error level for approximately a similar CPU time.

  17. Developing Efficient Coordination Schemes to Control Over-Pumping in the Heihe River Basin, China

    NASA Astrophysics Data System (ADS)

    Pedrazzini, G.

    2015-12-01

    Many wicked water resources problems are approached in a social planner perspective. This not always matches the real institutional and policy-making context, where, rather, multiple decision-makers (DMs) can act independently, or weakly cooperate, ultimately producing system-wide inefficient trade-offs. The idea in this work is to adopt a more realistic approach, where the multi-DMs nature of the problem is preserved and the uncoordinated DMs are driven, thorough coordination mechanisms, towards a more system-wide efficient solution. An agent-based modelling framework linked to a surface and groundwater model is used to design these coordination mechanisms as constraints to the independent agents (i.e., DMs) behaviour. In the Heihe Basin the ongoing introduction of smart meter IC-card systems on farmers' pumping wells will soon allow monitoring and control of abstractions with the goal of preventing further depletion of the resource. The major interest of policy makers in the region concerns the development of new and the improvement of existing legislation on pricing schemes and/or groundwater quotas. The model outcome where agents act rationally but selfishly is compared to the optimal solution at system-level assuming perfect coordination and cooperation. The optimal solutions with respect to the given utility functions are computed using nonlinear optimization with a rolling out time horizon. The Pareto-Frontier is synthesized through an exhaustive sampling of the weight coefficient space and related to the current and to the historical management of the last 4 decades. The best parameter values for the proposed coordination mechanisms are determined and the alternatives are compared with respect to their efficiency and acceptability. Preliminary results suggest that a regulatory tax on groundwater of about a factor 10 of the current resource fee is required to increase the elasticity of the groundwater demand curve such that reducing consumption becomes

  18. The performance evaluation of a new neural network based traffic management scheme for a satellite communication network

    NASA Technical Reports Server (NTRS)

    Ansari, Nirwan; Liu, Dequan

    1991-01-01

    A neural-network-based traffic management scheme for a satellite communication network is described. The scheme consists of two levels of management. The front end of the scheme is a derivation of Kohonen's self-organization model to configure maps for the satellite communication network dynamically. The model consists of three stages. The first stage is the pattern recognition task, in which an exemplar map that best meets the current network requirements is selected. The second stage is the analysis of the discrepancy between the chosen exemplar map and the state of the network, and the adaptive modification of the chosen exemplar map to conform closely to the network requirement (input data pattern) by means of Kohonen's self-organization. On the basis of certain performance criteria, whether a new map is generated to replace the original chosen map is decided in the third stage. A state-dependent routing algorithm, which arranges the incoming call to some proper path, is used to make the network more efficient and to lower the call block rate. Simulation results demonstrate that the scheme, which combines self-organization and the state-dependent routing mechanism, provides better performance in terms of call block rate than schemes that only have either the self-organization mechanism or the routing mechanism.

  19. Decentralising Zimbabwe’s water management: The case of Guyu-Chelesa irrigation scheme

    NASA Astrophysics Data System (ADS)

    Tambudzai, Rashirayi; Everisto, Mapedza; Gideon, Zhou

    Smallholder irrigation schemes are largely supply driven such that they exclude the beneficiaries on the management decisions and the choice of the irrigation schemes that would best suit their local needs. It is against this background that the decentralisation framework and the Dublin Principles on Integrated Water Resource Management (IWRM) emphasise the need for a participatory approach to water management. The Zimbabwean government has gone a step further in decentralising the management of irrigation schemes, that is promoting farmer managed irrigation schemes so as to ensure effective management of scarce community based land and water resources. The study set to investigate the way in which the Guyu-Chelesa irrigation scheme is managed with specific emphasis on the role of the Irrigation Management Committee (IMC), the level of accountability and the powers devolved to the IMC. Merrey’s 2008 critique of IWRM also informs this study which views irrigation as going beyond infrastructure by looking at how institutions and decision making processes play out at various levels including at the irrigation scheme level. The study was positioned on the hypothesis that ‘decentralised or autonomous irrigation management enhances the sustainability and effectiveness of irrigation schemes’. To validate or falsify the stated hypothesis, data was gathered using desk research in the form of reviewing articles, documents from within the scheme and field research in the form of questionnaire surveys, key informant interviews and field observation. The Statistical Package for Social Sciences was used to analyse data quantitatively, whilst content analysis was utilised to analyse qualitative data whereby data was analysed thematically. Comparative analysis was carried out as Guyu-Chelesa irrigation scheme was compared with other smallholder irrigation scheme’s experiences within Zimbabwe and the Sub Saharan African region at large. The findings were that whilst the

  20. Cap and trade schemes on waste management: a case study of the landfill allowance trading scheme (LATS) in England.

    PubMed

    Calaf-Forn, Maria; Roca, Jordi; Puig-Ventosa, Ignasi

    2014-05-01

    The Landfill Allowance Trading Scheme (LATS) is one of the main instruments used in England to enforce the landfill diversion targets established in the Directive 1999/31/EC of the European Parliament and of the Council of 26 April 1999 on the landfill of waste (Landfill Directive). Through the LATS, biodegradable municipal waste (BMW) allowances for landfilling are allocated to each local authority, otherwise known as waste disposal authorities (WDAs). The quantity of landfill allowances received is expected to decrease continuously from 2005/06 to 2019/20 so as to meet the objectives of the Landfill Directive. To achieve their commitments, WDAs can exchange, buy, sell or transfer allowances among each other, or may re-profile their own allocation through banking and/or borrowing. Despite the goals for the first seven years - which included two target years (2005/06 and 2009/10) - being widely achieved (the average allocation of allowances per WDA was 22.9% higher than those finally used), market activity among WDAs was high and prices were not very stable. Results in terms of waste reduction and recycling levels have been satisfactory. The reduction of BMW landfilled (in percentage) was higher during the first seven years of the LATS period (2005/06-2011/12) (around 7% annually) than during the previous period (2001/02-2004/05) (4.2% annually). Since 2008, the significance of the LATS diminished because of an increase in the rate of the UK Landfill Tax. The LATS was suppressed after the 2012/13 target year, before what it was initially scheduled. The purpose of this paper is to describe the particularities of the LATS, analyse its performance as a waste management policy, make a comparison with the Landfill Tax, discuss its main features as regards efficiency, effectiveness and the application of the "polluter pays" principle and finally discuss if the effect of the increase in the Landfill Tax is what made the LATS ultimately unnecessary. PMID:24661742

  1. Towards an Efficient Flooding Scheme Exploiting 2-Hop Backward Information in MANETs

    NASA Astrophysics Data System (ADS)

    Le, Trong Duc; Choo, Hyunseung

    Flooding is an indispensable operation for providing control or routing functionalities to mobile ad hoc networks (MANETs). Previously, many flooding schemes have been studied with the intention of curtailing the problems of severe redundancies, contention, and collisions in traditional implementations. A recent approach with relatively high efficiency is 1HI by Liu et al., which uses only 1-hop neighbor information. The scheme achieves local optimality in terms of the number of retransmission nodes with time complexity &Theta(n log n), where n is the number of neighbors of a node; however, this method tends to make many redundant transmissions. In this paper, we present a novel flooding algorithm, 2HBI (2-hop backward information), that efficiently reduces the number of retransmission nodes and solves the broadcast storm problem in ad hoc networks using our proposed concept, “2-hop backward information.” The most significant feature of the proposed algorithm is that it does not require any extra communication overhead other than the exchange of 1-hop HELLO messages but maintains high deliverability. Comprehensive computer simulations show that the proposed scheme significantly reduces redundant transmissions in 1HI and in pure flooding, up to 38% and 91%, respectively; accordingly it alleviates contention and collisions in networks.

  2. Hybrid tilted-pulse-front excitation scheme for efficient generation of high-energy terahertz pulses.

    PubMed

    Pálfalvi, L; Ollmann, Z; Tokodi, L; Hebling, J

    2016-04-18

    Conception of a hybrid type tilted-pulse-front pumping scheme for the generation of high-energy terahertz pulses is presented. The proposed setup is the combination of the conventional setup containing imaging optics and the contact grating. The solution was developed for nonlinear materials requiring large pulse-front-tilt angle, like LiNbO3. Due to the creation of the pulse-front-tilt in two steps the limitations of imaging errors can be significantly reduced. Furthermore the necessary grating constant of the contact grating can be larger compared to the simple contact grating scheme making possible the fabrication of the grating profile with significantly higher precision. A detailed optimization procedure with respect to the diffraction efficiency on the contact grating is given for LiNbO3. Instructions are also given how to construct the geometry of the setup in order to minimize imaging errors. Examples are given for LiNbO3 based practically realizable, optimized schemes with reduced imaging errors and high diffraction efficiency on the contact grating. PMID:27137255

  3. Energy efficient in-network RFID data filtering scheme in wireless sensor networks.

    PubMed

    Bashir, Ali Kashif; Lim, Se-Jung; Hussain, Chauhdary Sajjad; Park, Myong-Soon

    2011-01-01

    RFID (Radio frequency identification) and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes' energy and affects network lifetime. In this paper, we propose an in-network RFID data filtering scheme that efficiently eliminates the duplicate data. For this we use a clustering mechanism where cluster heads eliminate duplicate data and forward filtered data towards the base station. Simulation results prove that our approach saves considerable amounts of energy in terms of communication and computational cost, compared to existing filtering schemes. PMID:22163999

  4. Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks

    PubMed Central

    Bashir, Ali Kashif; Lim, Se-Jung; Hussain, Chauhdary Sajjad; Park, Myong-Soon

    2011-01-01

    RFID (Radio frequency identification) and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes’ energy and affects network lifetime. In this paper, we propose an in-network RFID data filtering scheme that efficiently eliminates the duplicate data. For this we use a clustering mechanism where cluster heads eliminate duplicate data and forward filtered data towards the base station. Simulation results prove that our approach saves considerable amounts of energy in terms of communication and computational cost, compared to existing filtering schemes. PMID:22163999

  5. Efficient alignment scheme for zone-plates-based transmission soft X-ray microscope

    NASA Astrophysics Data System (ADS)

    Lim, Jun; Shin, Hyun-Joon; Hong, Chung Ki

    2010-12-01

    Alignment and operation of a zone-plate (ZP)-based transmission soft X-ray microscope (TXM) is difficult and time consuming, especially when the TXM has no dedicated X-ray source. We introduce here an efficient TXM alignment scheme. The TXM employed is a simple in-situ-experiment-capable setup. It includes ultrahigh-vacuum (UHV)-compatible conflat flanges and is mountable in tandem with any soft X-ray synchrotron radiation beamlines. Obtaining zeroth- and first-order diffracted (condenser-zone-plate [CZP]-focused) beams simultaneously by means of the objective zone plate (OZP) is the most essential step in the alignment scheme. We were able to acquire, in one hour at a radiation wavelength of 2.49 nm, an image of 50 nm spatial resolution.

  6. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication. PMID

  7. Efficient quantum secret sharing scheme with two-particle entangled states

    NASA Astrophysics Data System (ADS)

    Zhu, Zhen-Chao; Zhang, Yu-Qing; Fu, An-Min

    2011-04-01

    This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time.

  8. Efficient massively parallel simulation of dynamic channel assignment schemes for wireless cellular communications

    NASA Technical Reports Server (NTRS)

    Greenberg, Albert G.; Lubachevsky, Boris D.; Nicol, David M.; Wright, Paul E.

    1994-01-01

    Fast, efficient parallel algorithms are presented for discrete event simulations of dynamic channel assignment schemes for wireless cellular communication networks. The driving events are call arrivals and departures, in continuous time, to cells geographically distributed across the service area. A dynamic channel assignment scheme decides which call arrivals to accept, and which channels to allocate to the accepted calls, attempting to minimize call blocking while ensuring co-channel interference is tolerably low. Specifically, the scheme ensures that the same channel is used concurrently at different cells only if the pairwise distances between those cells are sufficiently large. Much of the complexity of the system comes from ensuring this separation. The network is modeled as a system of interacting continuous time automata, each corresponding to a cell. To simulate the model, conservative methods are used; i.e., methods in which no errors occur in the course of the simulation and so no rollback or relaxation is needed. Implemented on a 16K processor MasPar MP-1, an elegant and simple technique provides speedups of about 15 times over an optimized serial simulation running on a high speed workstation. A drawback of this technique, typical of conservative methods, is that processor utilization is rather low. To overcome this, new methods were developed that exploit slackness in event dependencies over short intervals of time, thereby raising the utilization to above 50 percent and the speedup over the optimized serial code to about 120 times.

  9. Development of efficient GPU parallelization of WRF Yonsei University planetary boundary layer scheme

    NASA Astrophysics Data System (ADS)

    Huang, M.; Mielikainen, J.; Huang, B.; Chen, H.; Huang, H.-L. A.; Goldberg, M. D.

    2015-09-01

    The planetary boundary layer (PBL) is the lowest part of the atmosphere and where its character is directly affected by its contact with the underlying planetary surface. The PBL is responsible for vertical sub-grid-scale fluxes due to eddy transport in the whole atmospheric column. It determines the flux profiles within the well-mixed boundary layer and the more stable layer above. It thus provides an evolutionary model of atmospheric temperature, moisture (including clouds), and horizontal momentum in the entire atmospheric column. For such purposes, several PBL models have been proposed and employed in the weather research and forecasting (WRF) model of which the Yonsei University (YSU) scheme is one. To expedite weather research and prediction, we have put tremendous effort into developing an accelerated implementation of the entire WRF model using graphics processing unit (GPU) massive parallel computing architecture whilst maintaining its accuracy as compared to its central processing unit (CPU)-based implementation. This paper presents our efficient GPU-based design on a WRF YSU PBL scheme. Using one NVIDIA Tesla K40 GPU, the GPU-based YSU PBL scheme achieves a speedup of 193× with respect to its CPU counterpart running on one CPU core, whereas the speedup for one CPU socket (4 cores) with respect to 1 CPU core is only 3.5×. We can even boost the speedup to 360× with respect to 1 CPU core as two K40 GPUs are applied.

  10. An Efficient Molecular Dynamics Scheme for Predicting Dopant Implant Profiles in Semiconductors

    SciTech Connect

    Beardmore, K.M.; Gronbech-Jensen, N.

    1998-09-15

    The authors present a highly efficient molecular dynamics scheme for calculating the concentration profile of dopants implanted in group-IV alloy, and III-V zinc blende structure materials. The program incorporates methods for reducing computational overhead, plus a rare event algorithm to give statistical accuracy over several orders of magnitude change in the dopant concentration. The code uses a molecular dynamics (MD) model, instead of the binary collision approximation (BCA) used in implant simulators such as TRIM and Marlowe, to describe ion-target interactions. Atomic interactions are described by a combination of 'many-body' and screened Coulomb potentials. Inelastic energy loss is accounted for using a Firsov model, and electronic stopping is described by a Brandt-Kitagawa model which contains the single adjustable parameter for the entire scheme. Thus, the program is easily extensible to new ion-target combinations with the minimum of tuning, and is predictive over a wide range of implant energies and angles. The scheme is especially suited for calculating profiles due to low energy, large angle implants, and for situations where a predictive capability is required with the minimum of experimental validation. They give examples of using their code to calculate concentration profiles and 2D 'point response' profiles of dopants in crystalline silicon, silicon-germanium blends, and gallium-arsenide. They can predict the experimental profiles over five orders of magnitude for <100> and <110> channeling and for non-channeling implants at energies up to hundreds of keV.

  11. Efficient Z-scheme charge separation in novel vertically aligned ZnO/CdSSe nanotrees.

    PubMed

    Li, Zhengxin; Nieto-Pescador, Jesus; Carson, Alexander J; Blake, Jolie C; Gundlach, Lars

    2016-04-01

    A new tree-like ZnO/CdSSe nanocomposite with CdSSe branches grown on ZnO nanowires prepared via a two-step chemical vapor deposition is presented. The nanotrees (NTs) are vertically aligned on a substrate. The CdSSe branches result in strong visible light absorption and form a type-II heterojunction with the ZnO stem that facilitates efficient electron transfer. A combination of photoluminescence spectroscopy and lifetime measurements indicates that the NTs are promising materials for applications that benefit from a Z-scheme charge transfer mechanism. Vertically aligned branched ZnO nanowires can provide direct electron transport pathways to substrates and allow for efficient charge separation. These advantages of nanoscale hierarchical heterostructures make ZnO/CdSSe NTs a promising semiconductor material for solar cells, and other opto-electronic devices. PMID:26894995

  12. Efficient Z-scheme charge separation in novel vertically aligned ZnO/CdSSe nanotrees

    NASA Astrophysics Data System (ADS)

    Li, Zhengxin; Nieto-Pescador, Jesus; Carson, Alexander J.; Blake, Jolie C.; Gundlach, Lars

    2016-04-01

    A new tree-like ZnO/CdSSe nanocomposite with CdSSe branches grown on ZnO nanowires prepared via a two-step chemical vapor deposition is presented. The nanotrees (NTs) are vertically aligned on a substrate. The CdSSe branches result in strong visible light absorption and form a type-II heterojunction with the ZnO stem that facilitates efficient electron transfer. A combination of photoluminescence spectroscopy and lifetime measurements indicates that the NTs are promising materials for applications that benefit from a Z-scheme charge transfer mechanism. Vertically aligned branched ZnO nanowires can provide direct electron transport pathways to substrates and allow for efficient charge separation. These advantages of nanoscale hierarchical heterostructures make ZnO/CdSSe NTs a promising semiconductor material for solar cells, and other opto-electronic devices.

  13. Towards an ultra efficient kinetic scheme. Part I: Basics on the BGK equation

    NASA Astrophysics Data System (ADS)

    Dimarco, Giacomo; Loubere, Raphaël

    2013-12-01

    In this paper we present a new ultra efficient numerical method for solving kinetic equations. In this preliminary work, we present the scheme in the case of the BGK relaxation operator. The scheme, being based on a splitting technique between transport and collision, can be easily extended to other collisional operators as the Boltzmann collision integral or to other kinetic equations such as the Vlasov equation. The key idea, on which the method relies, is to solve the collision part on a grid and then to solve exactly the transport linear part by following the characteristics backward in time. The main difference between the method proposed and semi-Lagrangian methods is that here we do not need to reconstruct the distribution function at each time step. This allows to tremendously reduce the computational cost of the method and it permits for the first time, to the author's knowledge, to compute solutions of full six dimensional kinetic equations on a single processor laptop machine. Numerical examples, up to the full three dimensional case, are presented which validate the method and assess its efficiency in 1D, 2D and 3D.

  14. A Lightweight Encryption Scheme Combined with Trust Management for Privacy-Preserving in Body Sensor Networks.

    PubMed

    Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N

    2015-12-01

    With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system. PMID:26490148

  15. Resource Allocation and Power Management Schemes in an LTE-Advanced Femtocell Network

    NASA Astrophysics Data System (ADS)

    Lee, Byung-Bog; Yu, Jae-Hak; Lee, In-Hwan; Pyo, Cheol-Sig; Kim, Se-Jin

    In this letter, we introduce two different resource allocation and Tx power management schemes, called resource control and fixed power (RCFP) and fixed resource and power control (FRPC), in an LTE-Advanced femtocell network. We analyze and compare the two schemes in terms of the system throughput for downlink and energy consumption of home evolved NodeB (HeNB) Tx power according to the number of HeNBs and home user equipment (HUE)'s user traffic density (C). The simulation results show that the FRPC scheme has better performance in terms of system throughput for macro user equipments (MUEs) and energy consumption in low C.

  16. MODEL OF PHYTOPLANKTON COMPETITION FOR LIMITING AND NONLIMITING NUTRIENTS: IMPLICATIONS FOR DEVELOPMENT OF ESTUARINE AND NEARSHORE MANAGEMENT SCHEMES

    EPA Science Inventory

    The global increase of noxious bloom occurrences has increased the need for phytoplankton management schemes. Such schemes require the ability to predict phytoplankton succession. Equilibrium Resources Competition theory, which is popular for predicting succession in lake systems...

  17. Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian

    2015-06-01

    The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments. PMID:25900328

  18. Modeling and Performance Analysis of an Improved Movement-Based Location Management Scheme for Packet-Switched Mobile Communication Systems

    PubMed Central

    Chung, Yun Won; Park, Suwon

    2014-01-01

    One of the key technologies to support mobility of mobile station (MS) in mobile communication systems is location management which consists of location update and paging. In this paper, an improved movement-based location management scheme with two movement thresholds is proposed, considering bursty data traffic characteristics of packet-switched (PS) services. The analytical modeling for location update and paging signaling loads of the proposed scheme is developed thoroughly and the performance of the proposed scheme is compared with that of the conventional scheme. We show that the proposed scheme outperforms the conventional scheme in terms of total signaling load with an appropriate selection of movement thresholds. PMID:24741363

  19. An efficient sparse matrix multiplication scheme for the CYBER 205 computer

    NASA Technical Reports Server (NTRS)

    Lambiotte, Jules J., Jr.

    1988-01-01

    This paper describes the development of an efficient algorithm for computing the product of a matrix and vector on a CYBER 205 vector computer. The desire to provide software which allows the user to choose between the often conflicting goals of minimizing central processing unit (CPU) time or storage requirements has led to a diagonal-based algorithm in which one of four types of storage is selected for each diagonal. The candidate storage types employed were chosen to be efficient on the CYBER 205 for diagonals which have nonzero structure which is dense, moderately sparse, very sparse and short, or very sparse and long; however, for many densities, no diagonal type is most efficient with respect to both resource requirements, and a trade-off must be made. For each diagonal, an initialization subroutine estimates the CPU time and storage required for each storage type based on results from previously performed numerical experimentation. These requirements are adjusted by weights provided by the user which reflect the relative importance the user places on the two resources. The adjusted resource requirements are then compared to select the most efficient storage and computational scheme.

  20. Implementation of a compressive sampling scheme for wireless sensors to achieve energy efficiency in a structural health monitoring system

    NASA Astrophysics Data System (ADS)

    O'Connor, Sean M.; Lynch, Jerome P.; Gilbert, Anna C.

    2013-04-01

    Wireless sensors have emerged to offer low-cost sensors with impressive functionality (e.g., data acquisition, computing, and communication) and modular installations. Such advantages enable higher nodal densities than tethered systems resulting in increased spatial resolution of the monitoring system. However, high nodal density comes at a cost as huge amounts of data are generated, weighing heavy on power sources, transmission bandwidth, and data management requirements, often making data compression necessary. The traditional compression paradigm consists of high rate (>Nyquist) uniform sampling and storage of the entire target signal followed by some desired compression scheme prior to transmission. The recently proposed compressed sensing (CS) framework combines the acquisition and compression stage together, thus removing the need for storage and operation of the full target signal prior to transmission. The effectiveness of the CS approach hinges on the presence of a sparse representation of the target signal in a known basis, similarly exploited by several traditional compressive sensing applications today (e.g., imaging, MRI). Field implementations of CS schemes in wireless SHM systems have been challenging due to the lack of commercially available sensing units capable of sampling methods (e.g., random) consistent with the compressed sensing framework, often moving evaluation of CS techniques to simulation and post-processing. The research presented here describes implementation of a CS sampling scheme to the Narada wireless sensing node and the energy efficiencies observed in the deployed sensors. Of interest in this study is the compressibility of acceleration response signals collected from a multi-girder steel-concrete composite bridge. The study shows the benefit of CS in reducing data requirements while ensuring data analysis on compressed data remain accurate.

  1. An approach for quantifying the efficacy of ecological classification schemes as management tools

    NASA Astrophysics Data System (ADS)

    Flanagan, A. M.; Cerrato, R. M.

    2015-10-01

    Rigorous assessments of ecological classification schemes being applied to submerged environments are needed to evaluate their utility as management tools. Verification that a scheme can quantitatively capture habitat and community variation would be of considerable value to individuals responsible for making difficult management decisions relevant to widespread environmental challenges including those in fisheries, preservation or restoration of critical habitats, and climate change. In this paper, an assessment approach that evaluates a scheme by treating it like a quantitative statistical model is presented. It couples two direct gradient, multivariate statistical techniques, multivariate regression trees (MRT) and redundancy analysis (RDA), with a modelling protocol involving model formulation, model selection, parameter estimation, and measurement of precision to produce a very flexible strategy for analyzing structure in ecological data. To illustrate the proposed approach, the assessment focused on benthic infauna and evaluating the Folk grain size classification scheme, along with some alternative grain size models. Analysis of data sets revealed that while it was fairly easy to uncover biotic-environmental relationships that were over-fitted, the community structure inherent in the data tended to be robustly discernible and preserved across all grain size models, but rigidly parameterized models (i.e., a one size fits all approach for grain size characterization with fixed boundaries) were generally ineffective. The proposed approach provided a clear, detailed, and rigorous assessment of Folk and several alternative models and can be used for the quantitative evaluation of existing ecological classification schemes and/or in the development of new schemes.

  2. The efficiency of a carbamazepine-mianserin combination scheme in opiate detoxification.

    PubMed

    Zullino, Daniele F; Krenz, Sonia; Favrat, Bernard; Zimmermann, Grégoire; Bertschy, Gilles; Besson, Jacques

    2004-08-01

    A recent comparative randomized double-blind study has suggested the utility of a carbamazepine/mianserin combination as a treatment for opiate withdrawal. The aim of the present study was to explore the feasibility and efficiency of this combination under naturalistic conditions. Five hundred and fifty mostly polysubstance abusing patients treated with a standardized scheme combining carbamazepine and mianserin were assessed with regard to deviations to the protocol, used co-medications and retention in treatment. Three hundred and sixty three patients (66.0%) received the carbamazepine/mianserin combination as specified by the standardized protocol. In 350 patients (63.7%) the whole 10 days was completed. The most frequently used p.r.n. medications were for anxiety (47.5%) and insomnia (54.5%). The treatment of opiate withdrawal with a carbamazepine/mianserin combination scheme in an inpatient setting seems to be feasible and applicable with few adaptations to most patients, and may represent an interesting treatment option for multidrug users. PMID:15303247

  3. Efficient congestion control scheme for providing QoS to I-VPN

    NASA Astrophysics Data System (ADS)

    De Marco, Martino; Trabucchi, Sara

    1998-12-01

    In this paper we outline an overall network architecture for the Internet Service Providers who want offer an Internet- Virtual Private Network service with QoS guarantees and, at the same time, with a high-level of efficiency in the network resource usage. The proposed approach is based on the negotiation of a service level agreement, which includes the definition of profile of traffic the user is allowed to emit. The ingress nodes perform an adaptive shaping of the user traffic entering the network, driven by a fast congestion notification scheme. In this scenario, the adoption of a service architecture based on a class-of- service concept enables the Internet Service Provider to offer different level of network performance according to the customer needs.

  4. An efficient approximate factorization implicit scheme for the equations of gasdynamics

    NASA Technical Reports Server (NTRS)

    Barth, T. J.; Steger, J. L.

    1984-01-01

    An efficient implicit finite-difference algorithm for the gas dynamic equations utilizing matrix reduction techniques is presented. A significant reduction in arithmetic operations is achieved while maintaining the same favorable stability characteristics and generality found in the Beam and Warming approximate factorization algorithm. Steady-state solutions to the conservative Euler equations in generalized coordinates are obtained for transonic flows about a NACA 0012 airfoil. The theoretical extension of the matrix reduction technique to the full Navier-Stokes equations in Cartesian coordinates is presented in detail. Linear stability, using a Fourier stability analysis, is demonstrated and discussed for the one-dimensional Euler equations. It is shown that the method offers advantages over the conventional Beam and Warming scheme and can retrofit existing Beam and Warming codes with minimal effort.

  5. A nonlinearity interval mapping scheme for efficient waste load allocation simulation-optimization analysis

    NASA Astrophysics Data System (ADS)

    Zou, Rui; Liu, Yong; Riverson, John; Parker, Andrew; Carter, Stephen

    2010-08-01

    Applications using simulation-optimization approaches are often limited in practice because of the high computational cost associated with executing the simulation-optimization analysis. This research proposes a nonlinearity interval mapping scheme (NIMS) to overcome the computational barrier of applying the simulation-optimization approach for a waste load allocation analysis. Unlike the traditional response surface methods that use response surface functions to approximate the functional form of the original simulation model, the NIMS approach involves mapping the nonlinear input-output response relationship of a simulation model into an interval matrix, thereby converting the original simulation-optimization model into an interval linear programming model. By using the risk explicit interval linear programming algorithm and an inverse mapping scheme to implicitly resolve nonlinearity in the interval linear programming model, the NIMS approach efficiently obtained near-optimal solutions of the original simulation-optimization problem. The NIMS approach was applied to a case study on Wissahickon Creek in Pennsylvania, with the objective of finding optimal carbonaceous biological oxygen demand and ammonia (NH4) point source waste load allocations, subject to daily average and minimum dissolved oxygen compliance constraints at multiple points along the stream. First, a simulation-optimization model was formulated for this case study. Next, a genetic algorithm was used to solve the problem to produce reference optimal solutions. Finally, the simulation-optimization model was solved using the proposed NIMS, and the obtained solutions were compared with the reference solutions to demonstrate the superior computational efficiency and solution quality of the NIMS.

  6. An efficient parallel implementation of explicit multirate Runge–Kutta schemes for discontinuous Galerkin computations

    SciTech Connect

    Seny, Bruno Lambrechts, Jonathan; Toulorge, Thomas; Legat, Vincent; Remacle, Jean-François

    2014-01-01

    Although explicit time integration schemes require small computational efforts per time step, their efficiency is severely restricted by their stability limits. Indeed, the multi-scale nature of some physical processes combined with highly unstructured meshes can lead some elements to impose a severely small stable time step for a global problem. Multirate methods offer a way to increase the global efficiency by gathering grid cells in appropriate groups under local stability conditions. These methods are well suited to the discontinuous Galerkin framework. The parallelization of the multirate strategy is challenging because grid cells have different workloads. The computational cost is different for each sub-time step depending on the elements involved and a classical partitioning strategy is not adequate any more. In this paper, we propose a solution that makes use of multi-constraint mesh partitioning. It tends to minimize the inter-processor communications, while ensuring that the workload is almost equally shared by every computer core at every stage of the algorithm. Particular attention is given to the simplicity of the parallel multirate algorithm while minimizing computational and communication overheads. Our implementation makes use of the MeTiS library for mesh partitioning and the Message Passing Interface for inter-processor communication. Performance analyses for two and three-dimensional practical applications confirm that multirate methods preserve important computational advantages of explicit methods up to a significant number of processors.

  7. Efficient real gas Navier-Stokes computations of high speed flows using an LU scheme

    NASA Technical Reports Server (NTRS)

    Coirier, William J.

    1990-01-01

    An efficient method to account for the chemically frozen thermodynamic and transport properties of air in three dimensional Navier-Stokes calculations was demonstrated. This approach uses an explicitly specified equation of state (EOS) so that the fluid pressure, temperature and transport properties are directly related to the flow variables. Since the pressure is explicitly known as a general function of the flow variables no assumptions are made regarding the pressure derivatives in the construction of the flux Jacobians. The method is efficient since no sub-iterations are required to deduce the pressure and temperature from the flux variables and allows different equations of state to be easily supplied to the code. The flexibility of the EOS approach is demonstrated by implementing a high order TVD upwinding scheme based upon flux differencing and Van Leer's flux vector splitting. The EOS approach is demonstrated by computing the hypersonic flow through the corner region of two mutually perpendicular flat plates and through a simplified model of a scramjet module gap-seal configuration.

  8. An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.

    PubMed

    Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho

    2016-03-01

    Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties. PMID:26743628

  9. Assessing the efficiency gains of improved spatial targeting of policy interventions; the example of an agri-environmental scheme.

    PubMed

    van der Horst, Dan

    2007-12-01

    GIS-based spatial targeting is increasingly recognised as a potentially useful tool to design more efficient policy interventions. The use of this tool has also been advocated in the context of incentive-based agri-environmental schemes, but there has been little work to date to estimate the level of efficiency gains which it may help to achieve. This paper investigates the requirements to arrive at such estimates, using a Scottish farm woodland scheme as a case study. This agri-environmental scheme aims to provide visual amenity and biodiversity. Maps of these two benefits are used to develop improved spatial targeting scenarios that deliver significant efficiency gains in comparison to the existing scheme design. The paper discusses the nature of the spatial distribution of the relevant benefits at the landscape scale and the data requirements for the realistic estimation of efficiency gains. It concludes that although much work needs to be done, the methods available today could and should play a much greater role in improving the landscape-scale design of existing land use schemes focused on the delivery of non-market benefits. PMID:17350157

  10. Efficient architectures for two-dimensional discrete wavelet transform using lifting scheme.

    PubMed

    Xiong, Chengyi; Tian, Jinwen; Liu, Jian

    2007-03-01

    Novel architectures for 1-D and 2-D discrete wavelet transform (DWT) by using lifting schemes are presented in this paper. An embedded decimation technique is exploited to optimize the architecture for 1-D DWT, which is designed to receive an input and generate an output with the low- and high-frequency components of original data being available alternately. Based on this 1-D DWT architecture, an efficient line-based architecture for 2-D DWT is further proposed by employing parallel and pipeline techniques, which is mainly composed of two horizontal filter modules and one vertical filter module, working in parallel and pipeline fashion with 100% hardware utilization. This 2-D architecture is called fast architecture (FA) that can perform J levels of decomposition for N * N image in approximately 2N2(1 - 4(-J))/3 internal clock cycles. Moreover, another efficient generic line-based 2-D architecture is proposed by exploiting the parallelism among four subband transforms in lifting-based 2-D DWT, which can perform J levels of decomposition for N * N image in approximately N2(1 - 4(-J))/3 internal clock cycles; hence, it is called high-speed architecture. The throughput rate of the latter is increased by two times when comparing with the former 2-D architecture, but only less additional hardware cost is added. Compared with the works reported in previous literature, the proposed architectures for 2-D DWT are efficient alternatives in tradeoff among hardware cost, throughput rate, output latency and control complexity, etc. PMID:17357722

  11. PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs

    PubMed Central

    Liu, Anfeng; Dong, Mianxiong; Ota, Kaoru; Long, Jun

    2015-01-01

    In this paper, a Per-Hop Acknowledgement (PHACK)-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes’ ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes. PMID:26690178

  12. Consolidating the social health insurance schemes in China: towards an equitable and efficient health system.

    PubMed

    Meng, Qingyue; Fang, Hai; Liu, Xiaoyun; Yuan, Beibei; Xu, Jin

    2015-10-10

    Fragmentation in social health insurance schemes is an important factor for inequitable access to health care and financial protection for people covered by different health insurance schemes in China. To fulfil its commitment of universal health coverage by 2020, the Chinese Government needs to prioritise addressing this issue. After analysing the situation of fragmentation, this Review summarises efforts to consolidate health insurance schemes both in China and internationally. Rural migrants, elderly people, and those with non-communicable diseases in China will greatly benefit from consolidation of the existing health insurance schemes with extended funding pools, thereby narrowing the disparities among health insurance schemes in fund level and benefit package. Political commitments, institutional innovations, and a feasible implementation plan are the major elements needed for success in consolidation. Achievement of universal health coverage in China needs systemic strategies including consolidation of the social health insurance schemes. PMID:26466052

  13. Augmented Z scheme blueprint for efficient solar water splitting system using quaternary chalcogenide absorber material.

    PubMed

    Sarswat, Prashant K; Bhattacharyya, Dhiman; Free, Michael L; Misra, Mano

    2016-02-01

    Photoelectrochemical hydrogen (H2) production from water is a key method of addressing energy needs using an environmentally friendly approach. In the last two decades we have witnessed the evolution of many different expensive catalysts, photoelectrodes and related technologies, especially those involving precious metals and use of acidic or basic electrolytes for hydrogen production. Cu2ZnSnS4 (CZTS) is a relatively new candidate in the category of efficient photocathodes, due to its high absorption coefficient and near optimal energy band gap. In this paper, we demonstrate photoelectrochemical viability of CZTS in combination with other photoanodes such as TiO2, BiVO4, and WO3 for H2 production with the use of an electrolyte of near neutral pH, a single redox mediator, and insignificant potential biasing. A systematic study was performed to understand CZTS performance with each photoanode, band energetics of CZTS with other photoanodes, impedance behavior of each photoelectrode, and utility of a CZTS photocell in place of a CZTS photocathode. Our assessment indicates that a protected CZTS photocell performs well when used in a Z-scheme containing TiO2 nanotubular array-CZTS or nanocrystalline WO3-CZTS. Preliminary experiments indicated that apart from band energetics, porosity and effective surface area of the photoanodes play a crucial role in determining the photoelectrochemical performance of the system. PMID:26762553

  14. Efficient Schemes of Joint Remote State Preparation for Two-Qubit Equatorial States

    NASA Astrophysics Data System (ADS)

    Wei, Zhao-Hui; Zha, Xin-Wei; Yu, Yan

    2016-08-01

    Recently, Binayak S. Choudhury (Quantum Inf. Process 13, 239 2014), proposed a protocol of joint remote state preparation of an equatorial two-qubit pure quantum state using GHZ states. According to their scheme the probability of success is 0.25. In this letter, an improved scheme is proposed, which can enhance the probability of success to 100 %. Moreover, we propose a scheme to prepare the two-qubit pure quantum state whose coefficient is more general.

  15. An efficient scheme for sampling fast dynamics at a low average data acquisition rate

    NASA Astrophysics Data System (ADS)

    Philippe, A.; Aime, S.; Roger, V.; Jelinek, R.; Prévot, G.; Berthier, L.; Cipelletti, L.

    2016-02-01

    We introduce a temporal scheme for data sampling, based on a variable delay between two successive data acquisitions. The scheme is designed so as to reduce the average data flow rate, while still retaining the information on the data evolution on fast time scales. The practical implementation of the scheme is discussed and demonstrated in light scattering and microscopy experiments that probe the dynamics of colloidal suspensions using CMOS or CCD cameras as detectors.

  16. An efficient horizontal advection scheme for the modeling of global transport of constituents

    SciTech Connect

    Hundsdorfer, W.; Spee, E.J.

    1995-12-01

    In this paper the authors consider a dimensional-splitting scheme for horizontal advection on a sphere with a uniform longitude-latitude grid. The 1D subprocesses that arise within the splitting are solved with an explicit finite-volume type scheme, which is made unconditionally stable by allowing the stencil to vary with the Courant numbers. The scheme is made positive by flux limiting. For the inaccuracies at the poles some special measures are discussed. Numerical tests show that the scheme is almost shape preserving and conservative, and it gives accurate results at low computational costs. 23 refs., 7 figs., 1 tab.

  17. Analysis and performance assessment of a fragment retransmission scheme for energy efficient IEEE 802.11 WLANs.

    PubMed

    Mafole, Prosper; Aritsugi, Masayoshi

    2016-01-01

    Backoff-free fragment retransmission (BFFR) scheme enhances the performance of legacy MAC layer fragmentation by eliminating contention overhead. The eliminated overhead is the result of backoff executed before a retransmission attempt is made when fragment transmission failure occurs within a fragment burst. This paper provides a mathematical analysis of BFFR energy efficiency and further assesses, by means of simulations, the energy efficiency, throughput and delay obtained when BFFR is used. The validity of the new scheme is evaluated in different scenarios namely, constant bit rate traffic, realistic bursty internet traffic, node mobility, rigid and elastic flows and their combinations at different traffic loads. We also evaluate and discuss the impact of BFFR on MAC fairness when the number of nodes is varied from 4 to 10. It is shown that BFFR has advantages over legacy MAC fragmentation scheme in all the scenarios. PMID:27610322

  18. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  19. Efficient Low Dissipative High Order Schemes for Multiscale MHD Flows, I: Basic Theory

    NASA Technical Reports Server (NTRS)

    Sjoegreen, Bjoern; Yee, H. C.

    2003-01-01

    The objective of this paper is to extend our recently developed highly parallelizable nonlinear stable high order schemes for complex multiscale hydrodynamic applications to the viscous MHD equations. These schemes employed multiresolution wavelets as adaptive numerical dissipation controls t o limit the amount of and to aid the selection and/or blending of the appropriate types of dissipation to be used. The new scheme is formulated for both the conservative and non-conservative form of the MHD equations in curvilinear grids. The four advantages of the present approach over existing MHD schemes reported in the open literature are as follows. First, the scheme is constructed for long-time integrations of shock/turbulence/combustion MHD flows. Available schemes are too diffusive for long-time integrations and/or turbulence/combustion problems. Second, unlike exist- ing schemes for the conservative MHD equations which suffer from ill-conditioned eigen- decompositions, the present scheme makes use of a well-conditioned eigen-decomposition obtained from a minor modification of the eigenvectors of the non-conservative MHD equations t o solve the conservative form of the MHD equations. Third, this approach of using the non-conservative eigensystem when solving the conservative equations also works well in the context of standard shock-capturing schemes for the MHD equations. Fourth, a new approach to minimize the numerical error of the divergence-free magnetic condition for high order schemes is introduced. Numerical experiments with typical MHD model problems revealed the applicability of the newly developed schemes for the MHD equations.

  20. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    PubMed

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system. PMID:22673892

  1. Exploring efficiencies of SISO, multi-SISO, and MIMO AVC schemes for floor vibration control

    NASA Astrophysics Data System (ADS)

    Nyawako, Donald S.; Reynolds, Paul; Hudson, Malcolm J.

    2012-04-01

    Continued advancements in steel and concrete materials as well as improved computer-optimized designs are resulting in more efficient floor structures, which have longer spans and are more lightweight. In addition, there is a tendency for offices to be more open-plan with fewer internal partitions. These structures possess low and closely spaced natural frequencies, sometimes falling within the range of frequencies produced by human activities, as well as low damping levels. Vibration serviceability problems are thus arising more frequently than before. The tendency for developers to require floor structures suitable for a variety of types of occupation so as to increase their economic viability also has clear ramifications for their vibration serviceability. Active vibration control (AVC) is emerging as a viable technology for mitigation of human-induced vibrations in problem floors. Past AVC research work, as demonstrated in analytical studies and successfully implemented in field trials, have focused predominantly on collocated sensor and actuator pairs in SISO or multi-SISO direct-output feedback schemes, for example, direct velocity feedback (DVF). This paper demonstrates the potential benefits that may be derived from using model-based control approaches, for example, in isolating and controlling specific problematic frequencies only. The approaches investigated here comprise of independent modal space control (IMSC) and pole-placement controllers that are implemented in SISO, SIMO, and MIMO control structures. Both the analytical and experimental studies presented are based on a laboratory structure. Attenuations in target modes of vibration ranged between 15.0-27.0 dB in the analytical studies and experimental implementation for all the controllers studied. Further, both analytical studies and experimental implementation yielded a 70-89 % reduction in acceleration responses from two different walking frequencies.

  2. The role of agri-environment schemes in conservation and environmental management.

    PubMed

    Batáry, Péter; Dicks, Lynn V; Kleijn, David; Sutherland, William J

    2015-08-01

    Over half of the European landscape is under agricultural management and has been for millennia. Many species and ecosystems of conservation concern in Europe depend on agricultural management and are showing ongoing declines. Agri-environment schemes (AES) are designed partly to address this. They are a major source of nature conservation funding within the European Union (EU) and the highest conservation expenditure in Europe. We reviewed the structure of current AES across Europe. Since a 2003 review questioned the overall effectiveness of AES for biodiversity, there has been a plethora of case studies and meta-analyses examining their effectiveness. Most syntheses demonstrate general increases in farmland biodiversity in response to AES, with the size of the effect depending on the structure and management of the surrounding landscape. This is important in the light of successive EU enlargement and ongoing reforms of AES. We examined the change in effect size over time by merging the data sets of 3 recent meta-analyses and found that schemes implemented after revision of the EU's agri-environmental programs in 2007 were not more effective than schemes implemented before revision. Furthermore, schemes aimed at areas out of production (such as field margins and hedgerows) are more effective at enhancing species richness than those aimed at productive areas (such as arable crops or grasslands). Outstanding research questions include whether AES enhance ecosystem services, whether they are more effective in agriculturally marginal areas than in intensively farmed areas, whether they are more or less cost-effective for farmland biodiversity than protected areas, and how much their effectiveness is influenced by farmer training and advice? The general lesson from the European experience is that AES can be effective for conserving wildlife on farmland, but they are expensive and need to be carefully designed and targeted. PMID:25997591

  3. Hydro-geomorphic approaches to designing nature-based flood and drought management schemes

    NASA Astrophysics Data System (ADS)

    Hetherington, David; Large, Andy; Quinn, Paul

    2016-04-01

    The need for nature-based solutions to runoff management is more pressing than ever. If it is possible to calculate how much water needs to be managed and where the opportunities are in the landscape, then it would be a significant step forward in water resources management. Here we will show how basic hydro-geomorphic indices can guide a catchment manager in identifying the types of intervention that are appropriate at different scales. Using runoff management zones can provide key ecosystems services that make the whole catchment system function better. The key indicators are: a) The Topographic Wetness Index, for use in small catchment and on hillslopes for identifying overland flow pathways that can be managed to store and disconnect fast runoff; b) Strahler stream order to show which small channels can be directly managed to slow, store and filter flow and c) Geomorphic Indices that estimate the floodplain extent, related to stream order, where flood storage zones could be created to hold back large amounts of water. Estimating how much flood water and sediment can be managed by the addition of runoff attenuation features in a landscape could be very important to policy makers. If enough water can be stored in small, medium and extreme events, then the more severe issues of floods, pollution and drought could potentially be addressed, obviating calls for ever bigger and more complex flood protection schemes.

  4. Design and simulation of a fuel cell hybrid emergency power system for a more electric aircraft: Evaluation of energy management schemes

    NASA Astrophysics Data System (ADS)

    Njoya Motapon, Souleman

    . The energy management schemes are compared based on the following criteria: the hydrogen consumption, the state of charges of the batteries and supercapacitors and the overall system efficiency. Moreover the stress on each energy source, which impacts their life cycle, are measured using a new approach based on the wavelet transform of their instantaneous power. A simulation model and an experimental test bench are developed to validate all analysis and performances. The main results obtained are as follows: the state machine control scheme provided a slightly better efficiency and stresses on the batteries and supercapacitors. The classical PI control and the proposed scheme had the lowest fuel consumption and more use of the battery energy. As expected, the lowest fuel cell stress and lowest use of the battery energy was achieved with the frequency decoupling and fuzzy logic scheme, but at the expense of more fuel consumption and lower overall efficiency. The DC bus or supercapacitor voltage was maintained nearly constant for all the schemes. Also, the proposed strategy performed slightly better than the ECMS in terms of efficiency and fuel consumption, with an increase in fuel economy by 3 %. The energy management scheme suitable for a MEA emergency system should be a multischeme EMS such that each scheme is chosen based on a specific criterion to prioritize. As an example, depending on the operating life of each energy source, the energy management strategy can be chosen to either minimise the stress on the fuel cell system, the battery system or supercapacitor system, hence maximizing the life cycle of the hybrid power system. Also if the target is to reduce the fuel consumption, the proposed or the classical PI strategies are better alternatives.

  5. Efficient construction of high-resolution TVD conservative schemes for equations with source terms: application to shallow water flows

    NASA Astrophysics Data System (ADS)

    Burguete, J.; García-Navarro, P.

    2001-09-01

    High-resolution total variation diminishing (TVD) schemes are widely used for the numerical approximation of hyperbolic conservation laws. Their extension to equations with source terms involving spatial derivatives is not obvious. In this work, efficient ways of constructing conservative schemes from the conservative, non-conservative or characteristic form of the equations are described in detail. An upwind, as opposed to a pointwise, treatment of the source terms is adopted here, and a new technique is proposed in which source terms are included in the flux limiter functions to get a complete second-order compact scheme. A new correction to fix the entropy problem is also presented and a robust treatment of the boundary conditions according to the discretization used is stated. Copyright

  6. Fiber-optic integration and efficient detection schemes for optomechanical resonators

    NASA Astrophysics Data System (ADS)

    Cohen, Justin D.

    optomechanical resonators to optical fibers, with an emphasis on fabrication processes and optical characterization. I will then proceed to describe a few experiments enabled by the fiber couplers. The first studies the performance of an optomechanical resonator as a precise sensor for continuous position measurement. The sensitivity of the measurement, limited by the detection efficiency of intracavity photons, is compared to the standard quantum limit imposed by the quantum properties of the laser probe light. The added noise of the measurement is seen to fall within a factor of 3 of the standard quantum limit, representing an order of magnitude improvement over previous experiments utilizing optomechanical crystals, and matching the performance of similar measurements in the microwave domain. The next experiment uses single photon counting to detect individual phonon emission and absorption events within the nanomechanical oscillator. The scattering of laser light from mechanical motion produces correlated photon-phonon pairs, and detection of the emitted photon corresponds to an effective phonon counting scheme. In the process of scattering, the coherence properties of the mechanical oscillation are mapped onto the reflected light. Intensity interferometry of the reflected light then allows measurement of the temporal coherence of the acoustic field. These correlations are measured for a range of experimental conditions, including the optomechanical amplification of the mechanics to a self-oscillation regime, and comparisons are drawn to a laser system for phonons. Finally, prospects for using phonon counting and intensity interferometry to produce non-classical mechanical states are detailed following recent proposals in literature.

  7. An Energy-Efficient and Compact Clustering Scheme with Temporary Support Nodes for Cognitive Radio Sensor Networks

    PubMed Central

    Salim, Shelly; Moh, Sangman; Choi, Dongmin; Chung, Ilyong

    2014-01-01

    A cognitive radio sensor network (CRSN) is a wireless sensor network whose sensor nodes are equipped with cognitive radio capability. Clustering is one of the most challenging issues in CRSNs, as all sensor nodes, including the cluster head, have to use the same frequency band in order to form a cluster. However, due to the nature of heterogeneous channels in cognitive radio, it is difficult for sensor nodes to find a cluster head. This paper proposes a novel energy-efficient and compact clustering scheme named clustering with temporary support nodes (CENTRE). CENTRE efficiently achieves a compact cluster formation by adopting two-phase cluster formation with fixed duration. By introducing a novel concept of temporary support nodes to improve the cluster formation, the proposed scheme enables sensor nodes in a network to find a cluster head efficiently. The performance study shows that not only is the clustering process efficient and compact but it also results in remarkable energy savings that prolong the overall network lifetime. In addition, the proposed scheme decreases both the clustering overhead and the average distance between cluster heads and their members. PMID:25116905

  8. An energy-efficient and compact clustering scheme with temporary support nodes for cognitive radio sensor networks.

    PubMed

    Salim, Shelly; Moh, Sangman; Choi, Dongmin; Chung, Ilyong

    2014-01-01

    A cognitive radio sensor network (CRSN) is a wireless sensor network whose sensor nodes are equipped with cognitive radio capability. Clustering is one of the most challenging issues in CRSNs, as all sensor nodes, including the cluster head, have to use the same frequency band in order to form a cluster. However, due to the nature of heterogeneous channels in cognitive radio, it is difficult for sensor nodes to find a cluster head. This paper proposes a novel energy-efficient and compact clustering scheme named clustering with temporary support nodes (CENTRE). CENTRE efficiently achieves a compact cluster formation by adopting two-phase cluster formation with fixed duration. By introducing a novel concept of temporary support nodes to improve the cluster formation, the proposed scheme enables sensor nodes in a network to find a cluster head efficiently. The performance study shows that not only is the clustering process efficient and compact but it also results in remarkable energy savings that prolong the overall network lifetime. In addition, the proposed scheme decreases both the clustering overhead and the average distance between cluster heads and their members. PMID:25116905

  9. A comparison of temperature and precipitation responses to different Earth radiation management geoengineering schemes

    NASA Astrophysics Data System (ADS)

    Crook, J. A.; Jackson, L. S.; Osprey, S. M.; Forster, P. M.

    2015-09-01

    Earth radiation management has been suggested as a way to rapidly counteract global warming in the face of a lack of mitigation efforts, buying time and avoiding potentially catastrophic warming. We compare six different radiation management schemes that use surface, troposphere, and stratosphere interventions in a single climate model in which we projected future climate from 2020 to 2099 based on RCP4.5. We analyze the surface air temperature responses to determine how effective the schemes are at returning temperature to its 1986-2005 climatology and analyze precipitation responses to compare side effects. We find crop albedo enhancement is largely ineffective at returning temperature to its 1986-2005 climatology. Desert albedo enhancement causes excessive cooling in the deserts and severe shifts in tropical precipitation. Ocean albedo enhancement, sea-spray geoengineering, cirrus cloud thinning, and stratospheric SO2 injection have the potential to cool more uniformly, but cirrus cloud thinning may not be able to cool by much more than 1 K globally. We find that of the schemes potentially able to return surface air temperature to 1986-2005 climatology under future greenhouse gas warming, none has significantly less severe precipitation side effects than other schemes. Despite different forcing patterns, ocean albedo enhancement, sea-spray geoengineering, cirrus cloud thinning, and stratospheric SO2 injection all result in large scale tropical precipitation responses caused by Hadley cell changes and land precipitation changes largely driven by thermodynamic changes. Widespread regional scale changes in precipitation over land are significantly different from the 1986-2005 climatology and would likely necessitate significant adaptation despite geoengineering.

  10. On the computational efficiency of particle dynamics simulations in the radiation belt: comparison between implicit and semi-implicit schemes

    NASA Astrophysics Data System (ADS)

    Camporeale, E.; Delzanno, G.; Zaharia, S. G.; Koller, J.

    2012-12-01

    The particle dynamics in the Earth's radiation belt is generally modeled by means of a two-dimensional diffusion equation for the particle distribution function in energy and pitch angle. In this work we survey and compare different numerical schemes for the solution of the diffusion equation, with the goal of outlining which is the optimal strategy from a numerical point of view. We focus on the general (and more computationally challenging) case where the mixed terms in the diffusion tensor are retained. We compare fully-implicit and semi-implicit schemes. For the former we have analyzed a direct solver based on a LU decomposition routine for sparse matrices, and an iterative ILU-preconditioned GMRES. For the semi-implicit scheme we have studied an Alternating Direction Implicit scheme. We present a convergence study for a realistic case that shows that the timestep and grid size are strongly constrained by the desired accuracy of the solution. We show that the fully-implicit scheme is to be preferred in most cases as the more computationally efficient.

  11. Energy efficiency through integrated environmental management.

    PubMed

    Benromdhane, Souad Ahmed

    2015-05-01

    Integrated environmental management became an economic necessity after industrial development proved to be unsustainable without consideration of environmental direct and indirect impacts. Energy dependency and air pollution along with climate change grew into major challenges facing developed and developing countries alike. Thus, a new global market structure emerged and changed the way we do trade. The search intensified for alternatives to petroleum. However, scientists, policy makers, and environmental activists agreed to focus on strategic conservation and optimization of energy use. Environmental concerns will remain partially unaddressed with the current pace of consumption because greenhouse gas emissions will continue to rise with economic growth. This paper discusses energy efficiency, steady integration of alternative sources, and increased use of best available technologies. Energy criteria developed for environmental labeling certification are presented. Our intention is to encourage manufacturers and service providers to supply consumers with less polluting and energy-consuming goods and services, inform consumers of the environmental and energy impacts, and thereby instill sustainable and responsible consumption. As several programs were initiated in developed countries, environmental labeling requirements created barriers to many exports manufactured in developing countries, affecting current world trade and putting more pressure on countries to meet those requirements. Defining an institutional and legal framework of environmental labeling is a key challenge in implementing such programs for critical economic sectors like tourism, textiles, and food production where energy needs are the most important aspect to control. A case study of Tunisia and its experience with eco-labeling is presented. PMID:25850743

  12. An Efficient Method for Detecting Misbehaving Zone Manager in MANET

    NASA Astrophysics Data System (ADS)

    Rafsanjani, Marjan Kuchaki; Pakzad, Farzaneh; Asadinia, Sanaz

    In recent years, one of the wireless technologies increased tremendously is mobile ad hoc networks (MANETs) in which mobile nodes organize themselves without the help of any predefined infrastructure. MANETs are highly vulnerable to attack due to the open medium, dynamically changing network topology, cooperative algorithms, lack of centralized monitoring, management point and lack of a clear defense line. In this paper, we report our progress in developing intrusion detection (ID) capabilities for MANET. In our proposed scheme, the network with distributed hierarchical architecture is partitioned into zones, so that in each of them there is one zone manager. The zone manager is responsible for monitoring the cluster heads in its zone and cluster heads are in charge of monitoring their members. However, the most important problem is how the trustworthiness of the zone manager can be recognized. So, we propose a scheme in which "honest neighbors" of zone manager specify the validation of their zone manager. These honest neighbors prevent false accusations and also allow manager if it is wrongly misbehaving. However, if the manger repeats its misbehavior, then it will lose its management degree. Therefore, our scheme will be improved intrusion detection and also provide a more reliable network.

  13. Parallel implementation of 3D FFT with volumetric decomposition schemes for efficient molecular dynamics simulations

    NASA Astrophysics Data System (ADS)

    Jung, Jaewoon; Kobayashi, Chigusa; Imamura, Toshiyuki; Sugita, Yuji

    2016-03-01

    Three-dimensional Fast Fourier Transform (3D FFT) plays an important role in a wide variety of computer simulations and data analyses, including molecular dynamics (MD) simulations. In this study, we develop hybrid (MPI+OpenMP) parallelization schemes of 3D FFT based on two new volumetric decompositions, mainly for the particle mesh Ewald (PME) calculation in MD simulations. In one scheme, (1d_Alltoall), five all-to-all communications in one dimension are carried out, and in the other, (2d_Alltoall), one two-dimensional all-to-all communication is combined with two all-to-all communications in one dimension. 2d_Alltoall is similar to the conventional volumetric decomposition scheme. We performed benchmark tests of 3D FFT for the systems with different grid sizes using a large number of processors on the K computer in RIKEN AICS. The two schemes show comparable performances, and are better than existing 3D FFTs. The performances of 1d_Alltoall and 2d_Alltoall depend on the supercomputer network system and number of processors in each dimension. There is enough leeway for users to optimize performance for their conditions. In the PME method, short-range real-space interactions as well as long-range reciprocal-space interactions are calculated. Our volumetric decomposition schemes are particularly useful when used in conjunction with the recently developed midpoint cell method for short-range interactions, due to the same decompositions of real and reciprocal spaces. The 1d_Alltoall scheme of 3D FFT takes 4.7 ms to simulate one MD cycle for a virus system containing more than 1 million atoms using 32,768 cores on the K computer.

  14. Adaptive control schemes for improving dynamic performance of efficiency-optimized induction motor drives.

    PubMed

    Kumar, Navneet; Raj Chelliah, Thanga; Srivastava, S P

    2015-07-01

    Model Based Control (MBC) is one of the energy optimal controllers used in vector-controlled Induction Motor (IM) for controlling the excitation of motor in accordance with torque and speed. MBC offers energy conservation especially at part-load operation, but it creates ripples in torque and speed during load transition, leading to poor dynamic performance of the drive. This study investigates the opportunity for improving dynamic performance of a three-phase IM operating with MBC and proposes three control schemes: (i) MBC with a low pass filter (ii) torque producing current (iqs) injection in the output of speed controller (iii) Variable Structure Speed Controller (VSSC). The pre and post operation of MBC during load transition is also analyzed. The dynamic performance of a 1-hp, three-phase squirrel-cage IM with mine-hoist load diagram is tested. Test results are provided for the conventional field-oriented (constant flux) control and MBC (adjustable excitation) with proposed schemes. The effectiveness of proposed schemes is also illustrated for parametric variations. The test results and subsequent analysis confer that the motor dynamics improves significantly with all three proposed schemes in terms of overshoot/undershoot peak amplitude of torque and DC link power in addition to energy saving during load transitions. PMID:25820090

  15. A biometric signcryption scheme without bilinear pairing

    NASA Astrophysics Data System (ADS)

    Wang, Mingwen; Ren, Zhiyuan; Cai, Jun; Zheng, Wentao

    2013-03-01

    How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis's fuzzy extractor method and Liu's original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.

  16. Comparison of Aircraft Models and Integration Schemes for Interval Management in the TRACON

    NASA Technical Reports Server (NTRS)

    Neogi, Natasha; Hagen, George E.; Herencia-Zapana, Heber

    2012-01-01

    Reusable models of common elements for communication, computation, decision and control in air traffic management are necessary in order to enable simulation, analysis and assurance of emergent properties, such as safety and stability, for a given operational concept. Uncertainties due to faults, such as dropped messages, along with non-linearities and sensor noise are an integral part of these models, and impact emergent system behavior. Flight control algorithms designed using a linearized version of the flight mechanics will exhibit error due to model uncertainty, and may not be stable outside a neighborhood of the given point of linearization. Moreover, the communication mechanism by which the sensed state of an aircraft is fed back to a flight control system (such as an ADS-B message) impacts the overall system behavior; both due to sensor noise as well as dropped messages (vacant samples). Additionally simulation of the flight controller system can exhibit further numerical instability, due to selection of the integration scheme and approximations made in the flight dynamics. We examine the theoretical and numerical stability of a speed controller under the Euler and Runge-Kutta schemes of integration, for the Maintain phase for a Mid-Term (2035-2045) Interval Management (IM) Operational Concept for descent and landing operations. We model uncertainties in communication due to missed ADS-B messages by vacant samples in the integration schemes, and compare the emergent behavior of the system, in terms of stability, via the boundedness of the final system state. Any bound on the errors incurred by these uncertainties will play an essential part in a composable assurance argument required for real-time, flight-deck guidance and control systems,. Thus, we believe that the creation of reusable models, which possess property guarantees, such as safety and stability, is an innovative and essential requirement to assessing the emergent properties of novel airspace

  17. Efficient scheme for hybrid teleportation via entangled coherent states in circuit quantum electrodynamics

    NASA Astrophysics Data System (ADS)

    Joo, Jaewoo; Ginossar, Eran

    2016-06-01

    We propose a deterministic scheme for teleporting an unknown qubit state through continuous-variable entangled states in superconducting circuits. The qubit is a superconducting two-level system and the bipartite quantum channel is a microwave photonic entangled coherent state between two cavities. A Bell-type measurement performed on the hybrid state of solid and photonic states transfers a discrete-variable unknown electronic state to a continuous-variable photonic cat state in a cavity mode. In order to facilitate the implementation of such complex protocols we propose a design for reducing the self-Kerr nonlinearity in the cavity. The teleporation scheme enables quantum information processing operations with circuit-QED based on entangled coherent states. These include state verification and single-qubit operations with entangled coherent states. These are shown to be experimentally feasible with the state of the art superconducting circuits.

  18. Efficient scheme for hybrid teleportation via entangled coherent states in circuit quantum electrodynamics

    PubMed Central

    Joo, Jaewoo; Ginossar, Eran

    2016-01-01

    We propose a deterministic scheme for teleporting an unknown qubit state through continuous-variable entangled states in superconducting circuits. The qubit is a superconducting two-level system and the bipartite quantum channel is a microwave photonic entangled coherent state between two cavities. A Bell-type measurement performed on the hybrid state of solid and photonic states transfers a discrete-variable unknown electronic state to a continuous-variable photonic cat state in a cavity mode. In order to facilitate the implementation of such complex protocols we propose a design for reducing the self-Kerr nonlinearity in the cavity. The teleporation scheme enables quantum information processing operations with circuit-QED based on entangled coherent states. These include state verification and single-qubit operations with entangled coherent states. These are shown to be experimentally feasible with the state of the art superconducting circuits. PMID:27245775

  19. Efficient scheme for hybrid teleportation via entangled coherent states in circuit quantum electrodynamics.

    PubMed

    Joo, Jaewoo; Ginossar, Eran

    2016-01-01

    We propose a deterministic scheme for teleporting an unknown qubit state through continuous-variable entangled states in superconducting circuits. The qubit is a superconducting two-level system and the bipartite quantum channel is a microwave photonic entangled coherent state between two cavities. A Bell-type measurement performed on the hybrid state of solid and photonic states transfers a discrete-variable unknown electronic state to a continuous-variable photonic cat state in a cavity mode. In order to facilitate the implementation of such complex protocols we propose a design for reducing the self-Kerr nonlinearity in the cavity. The teleporation scheme enables quantum information processing operations with circuit-QED based on entangled coherent states. These include state verification and single-qubit operations with entangled coherent states. These are shown to be experimentally feasible with the state of the art superconducting circuits. PMID:27245775

  20. An Efficient Scheme of Quantum Wireless Multi-hop Communication using Coefficient Matrix

    NASA Astrophysics Data System (ADS)

    Zhao, Bei; Zha, Xin-Wei; Duan, Ya-Jun; Sun, Xin-Mei

    2015-08-01

    By defining the coefficient matrix, a new quantum teleportation scheme in quantum wireless multi-hop network is proposed. With the help of intermediate nodes, an unknown qubit state can be teleported between two distant nodes which do not share entanglement in advance. Arbitrary Bell pairs and entanglement swapping are utilized for establishing quantum channel among intermediate nodes. Using collapsed matrix, the initial quantum state can be perfectly recovered at the destination.

  1. Secure and efficient health data management through multiple watermarking on medical images.

    PubMed

    Giakoumaki, A; Pavlopoulos, S; Koutsouris, D

    2006-08-01

    The landscape of healthcare delivery and medical data management has significantly changed over the last years, as a result of the significant advancements in information and communication technologies. Complementary and/or alternative solutions are needed to meet the new challenges, especially regarding security of the widely distributed sensitive medical information. Digital watermarking is a recently established research area with many applications; nevertheless, the potential of this technology to contribute value-added services to medical information management systems has only recently started to be realized by the research community. The paper presents a review of research efforts in the area of medical-oriented watermarking and proposes a wavelet-based multiple watermarking scheme; this scheme aims to address critical health information management issues, including origin and data authentication, protection of sensitive data, and image archiving and retrieval. In accordance with the strict limitations applying to medical images, the scheme allows the definition of a region of interest (ROI) whose diagnostic value is protected, since the only additional information embedded therein aims at integrity control. The robustness of the method is enhanced through a form of hybrid coding, which includes repetitive embedding of BCH encoded watermarks. The experimental results on different medical imaging modalities demonstrate the efficiency and transparency of the watermarking scheme. PMID:16937204

  2. Efficient Schemes for Reducing Numerical Dispersion in ModelingMultiphase Transport through Porous and Fractured Media

    SciTech Connect

    Wu, Yu-Shu; Forsyth, Peter A.

    2006-04-13

    Numerical issues with modeling transport of chemicals or solute in realistic large-scale subsurface systems have been a serious concern, even with the continual progress made in both simulation algorithms and computer hardware in the past few decades. The problem remains and becomes even more difficult when dealing with chemical transport in a multiphase flow system using coarse, multidimensional regular or irregular grids, because of the known effects of numerical dispersion associated with moving plume fronts. We have investigated several total-variation-diminishing (TVD) or flux-limiter schemes by implementing and testing them in the T2R3D code, one of the TOUGH2 family of codes. The objectives of this paper are (1) to investigate the possibility of applying these TVD schemes, using multi-dimensional irregular unstructured grids, and (2) to help select more accurate spatial averaging methods for simulating chemical transport given a numerical grid or spatial discretization. We present an application example to show that such TVD schemes are able to effectively reduce numerical dispersion.

  3. An energy-efficient transmission scheme for real-time data in wireless sensor networks.

    PubMed

    Kim, Jin-Woo; Barrado, José Ramón Ramos; Jeon, Dong-Keun

    2015-01-01

    The Internet of things (IoT) is a novel paradigm where all things or objects in daily life can communicate with other devices and provide services over the Internet. Things or objects need identifying, sensing, networking and processing capabilities to make the IoT paradigm a reality. The IEEE 802.15.4 standard is one of the main communication protocols proposed for the IoT. The IEEE 802.15.4 standard provides the guaranteed time slot (GTS) mechanism that supports the quality of service (QoS) for the real-time data transmission. In spite of some QoS features in IEEE 802.15.4 standard, the problem of end-to-end delay still remains. In order to solve this problem, we propose a cooperative medium access scheme (MAC) protocol for real-time data transmission. We also evaluate the performance of the proposed scheme through simulation. The simulation results demonstrate that the proposed scheme can improve the network performance. PMID:26007722

  4. Efficient numerical schemes for viscoplastic avalanches. Part 1: The 1D case

    SciTech Connect

    Fernández-Nieto, Enrique D.

    2014-05-01

    This paper deals with the numerical resolution of a shallow water viscoplastic flow model. Viscoplastic materials are characterized by the existence of a yield stress: below a certain critical threshold in the imposed stress, there is no deformation and the material behaves like a rigid solid, but when that yield value is exceeded, the material flows like a fluid. In the context of avalanches, it means that after going down a slope, the material can stop and its free surface has a non-trivial shape, as opposed to the case of water (Newtonian fluid). The model involves variational inequalities associated with the yield threshold: finite-volume schemes are used together with duality methods (namely Augmented Lagrangian and Bermúdez–Moreno) to discretize the problem. To be able to accurately simulate the stopping behavior of the avalanche, new schemes need to be designed, involving the classical notion of well-balancing. In the present context, it needs to be extended to take into account the viscoplastic nature of the material as well as general bottoms with wet/dry fronts which are encountered in geophysical geometries. We derived such schemes and numerical experiments are presented to show their performances.

  5. An Energy-Efficient Transmission Scheme for Real-Time Data in Wireless Sensor Networks

    PubMed Central

    Kim, Jin-Woo; Barrado, José Ramón Ramos; Jeon, Dong-Keun

    2015-01-01

    The Internet of things (IoT) is a novel paradigm where all things or objects in daily life can communicate with other devices and provide services over the Internet. Things or objects need identifying, sensing, networking and processing capabilities to make the IoT paradigm a reality. The IEEE 802.15.4 standard is one of the main communication protocols proposed for the IoT. The IEEE 802.15.4 standard provides the guaranteed time slot (GTS) mechanism that supports the quality of service (QoS) for the real-time data transmission. In spite of some QoS features in IEEE 802.15.4 standard, the problem of end-to-end delay still remains. In order to solve this problem, we propose a cooperative medium access scheme (MAC) protocol for real-time data transmission. We also evaluate the performance of the proposed scheme through simulation. The simulation results demonstrate that the proposed scheme can improve the network performance. PMID:26007722

  6. Maximum likelihood algorithm using an efficient scheme for computing sensitivities and parameter confidence intervals

    NASA Technical Reports Server (NTRS)

    Murphy, P. C.; Klein, V.

    1984-01-01

    Improved techniques for estimating airplane stability and control derivatives and their standard errors are presented. A maximum likelihood estimation algorithm is developed which relies on an optimization scheme referred to as a modified Newton-Raphson scheme with estimated sensitivities (MNRES). MNRES determines sensitivities by using slope information from local surface approximations of each output variable in parameter space. The fitted surface allows sensitivity information to be updated at each iteration with a significant reduction in computational effort compared to integrating the analytically-determined sensitivity equations or using a finite difference scheme. An aircraft estimation problem is solved using real flight data to compare MNRES with the commonly used modified Newton-Raphson technique; MNRES is found to be faster and more generally applicable. Parameter standard errors are determined using a random search technique. The confidence intervals obtained are compared with Cramer-Rao lower bounds at the same confidence level. It is observed that the nonlinearity of the cost function is an important factor in the relationship between Cramer-Rao bounds and the error bounds determined by the search technique.

  7. An Efficience Scheme to Reduce Burst Loss Rate and Supporting Differentiated Services in All-Optical Networks

    NASA Astrophysics Data System (ADS)

    Garg, Amit Kumar

    2011-06-01

    Due to their one-way resource reservation mechanism, Optical Burst Switching (OBS) networks experience high bursts (thus packets) loss rate. In OBS networks, the contention is resolved either by dropping one of the contending bursts or more efficiently by dropping from one of the contending bursts only the parts that overlap with the other bursts. In both situations, only one data source will suffer the data loss in favor to the other. In this paper, an efficient scheme to reduce burst loss rate has been proposed in conjunction with an appropriate mechanism to provide differentiated service in order to support the quality of service (QoS) requirements of different applications. Simulation results show that the performance of the proposed scheme is better than existing mechanisms in terms of reducing burst (packets) loss. Numerical results show that the proposed scheme provides an accurate fit for the performance of the highest traffic class and lower bounds for the other traffic classes that are tighter than earlier known results.

  8. Designing Pay-As-You-Throw schemes in municipal waste management services: A holistic approach.

    PubMed

    Elia, Valerio; Gnoni, Maria Grazia; Tornese, Fabiana

    2015-10-01

    Pay-As-You-Throw (PAYT) strategies are becoming widely applied in solid waste management systems; the main purpose is to support a more sustainable - from economic, environmental and social points of view - management of waste flows. Adopting PAYT charging models increases the complexity level of the waste management service as new organizational issues have to be evaluated compared to flat charging models. In addition, innovative technological solutions could also be adopted to increase the overall efficiency of the service. Unit pricing, user identification and waste measurement represent the three most important processes to be defined in a PAYT system. The paper proposes a holistic framework to support an effective design and management process. The framework defines most critical processes and effective organizational and technological solutions for supporting waste managers as well as researchers. PMID:26235447

  9. Maximizing Thermal Efficiency and Optimizing Energy Management (Fact Sheet)

    SciTech Connect

    Not Available

    2012-03-01

    Researchers at the Thermal Test Facility (TTF) on the campus of the U.S. Department of Energy's National Renewable Energy Laboratory (NREL) in Golden, Colorado, are addressing maximizing thermal efficiency and optimizing energy management through analysis of efficient heating, ventilating, and air conditioning (HVAC) strategies, automated home energy management (AHEM), and energy storage systems.

  10. 24 CFR 1006.325 - Maintenance, management and efficient operation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... § 1006.325 Maintenance, management and efficient operation. (a) Written policies. The DHHL must develop... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Maintenance, management and efficient operation. 1006.325 Section 1006.325 Housing and Urban Development Regulations Relating to...

  11. A Classification Scheme for Analyzing Mobile Apps Used to Prevent and Manage Disease in Late Life

    PubMed Central

    Wang, Aiguo; Lu, Xin; Chen, Hongtu; Li, Changqun; Levkoff, Sue

    2014-01-01

    Background There are several mobile apps that offer tools for disease prevention and management among older adults, and promote health behaviors that could potentially reduce or delay the onset of disease. A classification scheme that categorizes apps could be useful to both older adult app users and app developers. Objective The objective of our study was to build and evaluate the effectiveness of a classification scheme that classifies mobile apps available for older adults in the “Health & Fitness” category of the iTunes App Store. Methods We constructed a classification scheme for mobile apps according to three dimensions: (1) the Precede-Proceed Model (PPM), which classifies mobile apps in terms of predisposing, enabling, and reinforcing factors for behavior change; (2) health care process, specifically prevention versus management of disease; and (3) health conditions, including physical health and mental health. Content analysis was conducted by the research team on health and fitness apps designed specifically for older adults, as well as those applicable to older adults, released during the months of June and August 2011 and August 2012. Face validity was assessed by a different group of individuals, who were not related to the study. A reliability analysis was conducted to confirm the accuracy of the coding scheme of the sample apps in this study. Results After applying sample inclusion and exclusion criteria, a total of 119 apps were included in the study sample, of which 26/119 (21.8%) were released in June 2011, 45/119 (37.8%) in August 2011, and 48/119 (40.3%) in August 2012. Face validity was determined by interviewing 11 people, who agreed that this scheme accurately reflected the nature of this application. The entire study sample was successfully coded, demonstrating satisfactory inter-rater reliability by two independent coders (95.8% initial concordance and 100% concordance after consensus was reached). The apps included in the study sample

  12. Efficient Evaluation System for Learning Management Systems

    ERIC Educational Resources Information Center

    Cavus, Nadire

    2009-01-01

    A learning management system (LMS) provides the platform for web-based learning environment by enabling the management, delivery, tracking of learning, testing, communication, registration process and scheduling. There are many LMS systems on the market that can be obtained for free or through payment. It has now become an important task to choose…

  13. Hierarchical adaptation scheme for multiagent data fusion and resource management in situation analysis

    NASA Astrophysics Data System (ADS)

    Benaskeur, Abder R.; Roy, Jean

    2001-08-01

    Sensor Management (SM) has to do with how to best manage, coordinate and organize the use of sensing resources in a manner that synergistically improves the process of data fusion. Based on the contextual information, SM develops options for collecting further information, allocates and directs the sensors towards the achievement of the mission goals and/or tunes the parameters for the realtime improvement of the effectiveness of the sensing process. Conscious of the important role that SM has to play in modern data fusion systems, we are currently studying advanced SM Concepts that would help increase the survivability of the current Halifax and Iroquois Class ships, as well as their possible future upgrades. For this purpose, a hierarchical scheme has been proposed for data fusion and resource management adaptation, based on the control theory and within the process refinement paradigm of the JDL data fusion model, and taking into account the multi-agent model put forward by the SASS Group for the situation analysis process. The novelty of this work lies in the unified framework that has been defined for tackling the adaptation of both the fusion process and the sensor/weapon management.

  14. Management and protection of digital content with the flexible IPMP scheme: MPEG-21 IPMP

    NASA Astrophysics Data System (ADS)

    Huang, Zhongyang; Shen, Shengmei; Ji, Ming; Senoh, Takanori

    2005-07-01

    To ensure secure digital content delivery, MPEG has dedicated significant effort to DRM (Digital Rights Management) issues. The IPMP (Intellectual Property Management and Protection) components, the fourth part of the new MPEG standard project-MPEG-21 (Multimedia Framework) is one of the most important parts of this standardization activity. It defines an interoperable framework for IPMP. Fairly soon after MPEG-4, with its IPMP hooks became an International Standard, MPEG decided to start a new project named "MPEG-4 IPMP Extensions" on more interoperable IPMP systems and tools. The project includes standardized ways of retrieving IPMP tools from remote locations, standardized messages exchanged among IPMP tools and the terminal. It also addresses authentication of IPMP tools, and has provisions for integrating Rights Expressions according to the Rights Data Dictionary and the Rights Expression Language. After MPEG-2/4 IPMP standardization work is finished, efforts are currently ongoing to define the similar mechanism for the management and protection of intellectual property in the various parts of the MPEG-21 standard currently under development. The present paper describes the technologies that are now included in MPEG-21 IPMP Components Committee Draft to effectively manage and protect the digital content with the flexible IPMP scheme, which specifies how protection is applied to Digital Items and facilitates the exchange of governed content declared by a standard constructor MPEG-21 DID (Digital Item Declaration) between MPEG-21 Peers.

  15. Efficient configuration selection scheme for vibrational second-order perturbation theory

    NASA Astrophysics Data System (ADS)

    Yagi, Kiyoshi; Hirata, So; Hirao, Kimihiko

    2007-07-01

    A fast algorithm of vibrational second-order Møller-Plesset perturbation theory is proposed, enabling a substantial reduction in the number of vibrational self-consistent-field (VSCF) configurations that need to be summed in the calculations. Important configurations are identified a priori by assuming that a reference VSCF wave function is approximated well by harmonic oscillator wave functions and that fifth- and higher-order anharmonicities are negligible. The proposed scheme has reduced the number of VSCF configurations by more than 100 times for formaldehyde, ethylene, and furazan with an error in computed frequencies being not more than a few cm-1.

  16. Efficient configuration selection scheme for vibrational second-order perturbation theory.

    PubMed

    Yagi, Kiyoshi; Hirata, So; Hirao, Kimihiko

    2007-07-21

    A fast algorithm of vibrational second-order Moller-Plesset perturbation theory is proposed, enabling a substantial reduction in the number of vibrational self-consistent-field (VSCF) configurations that need to be summed in the calculations. Important configurations are identified a priori by assuming that a reference VSCF wave function is approximated well by harmonic oscillator wave functions and that fifth- and higher-order anharmonicities are negligible. The proposed scheme has reduced the number of VSCF configurations by more than 100 times for formaldehyde, ethylene, and furazan with an error in computed frequencies being not more than a few cm(-1). PMID:17655435

  17. Online fault adaptive control for efficient resource management in Advanced Life Support Systems.

    PubMed

    Abdelwahed, Sherif; Wu, Jian; Biswas, Gautam; Ramirez, John; Manders, Eric-J

    2005-01-01

    This article presents the design and implementation of a controller scheme for efficient resource management in Advanced Life Support Systems. In the proposed approach, a switching hybrid system model is used to represent the dynamics of the system components and their interactions. The operational specifications for the controller are represented by utility functions, and the corresponding resource management problem is formulated as a safety control problem. The controller is designed as a limited-horizon online supervisory controller that performs a limited forward search on the state-space of the system at each time step, and uses the utility functions to decide on the best action. The feasibility and accuracy of the online algorithm can be assessed at design time. We demonstrate the effectiveness of the scheme by running a set of experiments on the Reverse Osmosis (RO) subsystem of the Water Recovery System (WRS). PMID:15742536

  18. Online fault adaptive control for efficient resource management in Advanced Life Support Systems

    NASA Technical Reports Server (NTRS)

    Abdelwahed, Sherif; Wu, Jian; Biswas, Gautam; Ramirez, John; Manders, Eric-J

    2005-01-01

    This article presents the design and implementation of a controller scheme for efficient resource management in Advanced Life Support Systems. In the proposed approach, a switching hybrid system model is used to represent the dynamics of the system components and their interactions. The operational specifications for the controller are represented by utility functions, and the corresponding resource management problem is formulated as a safety control problem. The controller is designed as a limited-horizon online supervisory controller that performs a limited forward search on the state-space of the system at each time step, and uses the utility functions to decide on the best action. The feasibility and accuracy of the online algorithm can be assessed at design time. We demonstrate the effectiveness of the scheme by running a set of experiments on the Reverse Osmosis (RO) subsystem of the Water Recovery System (WRS).

  19. Study on the energy-efficient scheme based on the interconnection of optical-network-units for next generation optical access network

    NASA Astrophysics Data System (ADS)

    Lv, Yunxin; Jiang, Ning; Qiu, Kun; Xue, Chenpeng

    2014-12-01

    An energy-efficient scheme based on the interconnection of optical network unit (ONU) is introduced, which can significantly reduce the energy consumption of the low-traffic operation. The energy consumption model for the ONU-interconnected optical access network (OAN) based on the electronic switch (ES) technology is established, and the energy efficiency of the proposed scheme is analyzed and compared with that of the OAN using optical switch (OS). The simulation results demonstrate that the ONU-interconnected scheme can efficiently reduce the energy consumption of OAN, and it shows a good energy consumption performance under daily traffic model.

  20. A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method.

    PubMed

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Chen, Wei

    2016-01-01

    With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment. Current key management researches pay less attention to the security of sensor networks with MS. This paper proposes a hybrid key management schemes based on a Polynomial Pool-based key pre-distribution and Basic Random key pre-distribution (PPBR) to be used in WSNs with MS. The scheme takes full advantages of these two kinds of methods to improve the cracking difficulty of the key system. The storage effectiveness and the network resilience can be significantly enhanced as well. The tree-based path key establishment method is introduced to effectively solve the problem of communication link connectivity. Simulation clearly shows that the proposed scheme performs better in terms of network resilience, connectivity and storage effectiveness compared to other widely used schemes. PMID:27070624

  1. A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method

    PubMed Central

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Chen, Wei

    2016-01-01

    With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment. Current key management researches pay less attention to the security of sensor networks with MS. This paper proposes a hybrid key management schemes based on a Polynomial Pool-based key pre-distribution and Basic Random key pre-distribution (PPBR) to be used in WSNs with MS. The scheme takes full advantages of these two kinds of methods to improve the cracking difficulty of the key system. The storage effectiveness and the network resilience can be significantly enhanced as well. The tree-based path key establishment method is introduced to effectively solve the problem of communication link connectivity. Simulation clearly shows that the proposed scheme performs better in terms of network resilience, connectivity and storage effectiveness compared to other widely used schemes. PMID:27070624

  2. Efficient quantum calculations of vibrational states of vinylidene in full dimensionality: a scheme with combination of methods.

    PubMed

    Li, Bin; Bian, Wensheng

    2008-07-14

    Full-dimensional quantum calculations of vibrational states of C(2)H(2) and C(2)D(2) are performed in the high-energy region (above 20,400 cm(-1) relative to the acetylene minimum). The theoretical scheme is a combination of several methods. To exploit the full parity and permutation symmetry, the CC-HH diatom-diatom Jacobi coordinates are chosen; phase space optimization in combination with physical considerations is used to obtain an efficient radial discrete variable representation, whereas a basis contraction scheme is applied for angular coordinates. The preconditioned inexact spectral transform method combined with an efficient preconditioner is employed to compute eigenstates within a desired spectral window. The computation is efficient. More definite assignments on vinylidene states than previous studies are acquired using the normal mode projection; in particular, a consistent analysis of the nu(1) (symmetric CH stretch) state is provided. The computed vinylidene vibrational energy levels are in general good agreement with experiment, and several vinylidene states are reported for the first time. PMID:18624520

  3. Management development. The MESOL (Management Education Scheme by Open Learning) experience.

    PubMed

    Wellman, N

    1994-01-01

    Explores and attempts to reconcile some of the differences between traditional professional and academic management qualifications and those based on the NVQ competence model. Based on the experience of Universities and Higher Education institutions delivering open learning MESOL materials to the UK health and social care sector, focuses on the different assessment methodologies used by each. Concludes that it is necessary to differentiate clearly between the traditional input/knowledge-based model and the competence-based approach of the NVQ. This will allow candidates to contextualize and consolidate learning in the workplace prior to revisiting their performance at a later date. PMID:10134589

  4. D-MSR: A Distributed Network Management Scheme for Real-Time Monitoring and Process Control Applications in Wireless Industrial Automation

    PubMed Central

    Zand, Pouria; Dilo, Arta; Havinga, Paul

    2013-01-01

    Current wireless technologies for industrial applications, such as WirelessHART and ISA100.11a, use a centralized management approach where a central network manager handles the requirements of the static network. However, such a centralized approach has several drawbacks. For example, it cannot cope with dynamicity/disturbance in large-scale networks in a real-time manner and it incurs a high communication overhead and latency for exchanging management traffic. In this paper, we therefore propose a distributed network management scheme, D-MSR. It enables the network devices to join the network, schedule their communications, establish end-to-end connections by reserving the communication resources for addressing real-time requirements, and cope with network dynamicity (e.g., node/edge failures) in a distributed manner. According to our knowledge, this is the first distributed management scheme based on IEEE 802.15.4e standard, which guides the nodes in different phases from joining until publishing their sensor data in the network. We demonstrate via simulation that D-MSR can address real-time and reliable communication as well as the high throughput requirements of industrial automation wireless networks, while also achieving higher efficiency in network management than WirelessHART, in terms of delay and overhead. PMID:23807687

  5. DMMFast: a complexity reduction scheme for three-dimensional high-efficiency video coding intraframe depth map coding

    NASA Astrophysics Data System (ADS)

    Sanchez, Gustavo; Saldanha, Mário; Balota, Gabriel; Zatt, Bruno; Porto, Marcelo; Agostini, Luciano

    2015-03-01

    We present a complexity reduction scheme for the depth map intraprediction of three-dimensional high-efficiency video coding (3-D-HEVC). The 3-D-HEVC introduces a new set of specific tools for depth map coding, inserting additional complexity to intraprediction, which results in new challenges in terms of complexity reduction. Therefore, we present the DMMFast (depth modeling modes fast prediction), a scheme composed of two new algorithms: the simplified edge detector (SED) and the gradient-based mode one filter (GMOF). The SED anticipates the blocks that are likely to be better predicted by the traditional intramodes, avoiding the evaluation of DMMs. The GMOF applies a gradient-based filter in the borders of the block and predicts the best positions to evaluate the DMM 1. Software evaluations showed that DMMFast is capable of achieving a time saving of 11.9% on depth map intraprediction, considering the random access mode, without affecting the quality of the synthesized views. Considering the all intraconfigurations, the proposed scheme is capable of achieving, on average, a time saving of 35% considering the whole encoder. Subjective quality assessment was also performed, showing that the proposed technique inserts minimal quality losses in the final encoded video.

  6. A novel power-efficient scheme asymmetrically and symmetrically clipping optical (ASCO)-OFDM for IM/DD optical systems

    NASA Astrophysics Data System (ADS)

    Wu, Nan; Bar-Ness, Yeheskel

    2015-12-01

    In this paper, we propose a novel scheme of orthogonal frequency division multiplexing (OFDM) for intensity modulation direct detection (IM/DD) optical systems. By using this novel scheme of an OFDM optical system, not only odd subcarriers but also even subcarriers can be modulated to transmit a clipping optical signal. A conventional asymmetrically clipping optical (ACO)-OFDM is applied to modulate odd subcarriers while even subcarriers are modulated by a novel technique called a symmetrically clipping optical (SCO)-OFDM. Although both the asymmetrically clipping noise caused by ACO-OFDM and the symmetrically clipping noise caused by SCO-OFDM fall onto the even subcarriers, the former interference can be estimated and removed at the receiver. Thus, SCO-OFDM symbols carried on the even subcarriers can be recovered by subtracting the estimated ACO-OFDM clipping noise from the received signal. Then the SCO-OFDM clipping noise can be removed by subtraction due to its special transmission format. Note that no DC bias added on all subcarriers makes this novel scheme achieve better performance in terms of both power efficiency and symbol error rate (SER).

  7. Spin-torque resonant expulsion of the vortex core for an efficient radiofrequency detection scheme

    NASA Astrophysics Data System (ADS)

    Jenkins, A. S.; Lebrun, R.; Grimaldi, E.; Tsunegi, S.; Bortolotti, P.; Kubota, H.; Yakushiji, K.; Fukushima, A.; de Loubens, G.; Klein, O.; Yuasa, S.; Cros, V.

    2016-04-01

    It has been proposed that high-frequency detectors based on the so-called spin-torque diode effect in spin transfer oscillators could eventually replace conventional Schottky diodes due to their nanoscale size, frequency tunability and large output sensitivity. Although a promising candidate for information and communications technology applications, the output voltage generated from this effect has still to be improved and, more pertinently, reduces drastically with decreasing radiofrequency (RF) current. Here we present a scheme for a new type of spintronics-based high-frequency detector based on the expulsion of the vortex core in a magnetic tunnel junction (MTJ). The resonant expulsion of the core leads to a large and sharp change in resistance associated with the difference in magnetoresistance between the vortex ground state and the final C-state configuration. Interestingly, this reversible effect is independent of the incoming RF current amplitude, offering a fast real-time RF threshold detector.

  8. Spin-torque resonant expulsion of the vortex core for an efficient radiofrequency detection scheme.

    PubMed

    Jenkins, A S; Lebrun, R; Grimaldi, E; Tsunegi, S; Bortolotti, P; Kubota, H; Yakushiji, K; Fukushima, A; de Loubens, G; Klein, O; Yuasa, S; Cros, V

    2016-04-01

    It has been proposed that high-frequency detectors based on the so-called spin-torque diode effect in spin transfer oscillators could eventually replace conventional Schottky diodes due to their nanoscale size, frequency tunability and large output sensitivity. Although a promising candidate for information and communications technology applications, the output voltage generated from this effect has still to be improved and, more pertinently, reduces drastically with decreasing radiofrequency (RF) current. Here we present a scheme for a new type of spintronics-based high-frequency detector based on the expulsion of the vortex core in a magnetic tunnel junction (MTJ). The resonant expulsion of the core leads to a large and sharp change in resistance associated with the difference in magnetoresistance between the vortex ground state and the final C-state configuration. Interestingly, this reversible effect is independent of the incoming RF current amplitude, offering a fast real-time RF threshold detector. PMID:26727200

  9. A memory and MHZ efficient EDMA transfer scheme for video encoding algorithms on TI TMS320DM642

    NASA Astrophysics Data System (ADS)

    El-Yamany, Noha A.

    2008-02-01

    Video encoding algorithms require processing of data arranged in blocks of pixels. For efficient computation, pixel blocks are expected to be stored contiguously in memory, and within each block, pixels are to be arranged in a raster scan (left to right, top to bottom order). Since data captured from the video port is linearly arranged in memory (one line after the other), it is necessary to arrange the data in the two-dimensional form before processing for encoding. A common approach to achieve the two-dimensional arrangement is through optimized functions (in C or Assembly) to arrange the captured data, which is stored in an intermediate buffer, into an input buffer from which it is ready for encoding. However, this approach has two main drawbacks. First, a portion of the CPU MHZ budget is consumed only on data arrangement. Second, an intermediate data buffer is required to hold the data before the arrangement into the input buffer takes place, and hence increasing the memory requirements. In this paper, a memory and MHZ efficient EDMA transfer scheme is introduced for simultaneous data transfer and two-dimensional arrangement from the video port to the DSP memory. The proposed scheme is described in details for TI TMS320DM642 TM.

  10. An efficient locally one-dimensional finite-difference time-domain method based on the conformal scheme

    NASA Astrophysics Data System (ADS)

    Wei, Xiao-Kun; Shao, Wei; Shi, Sheng-Bing; Zhang, Yong; Wang, Bing-Zhong

    2015-07-01

    An efficient conformal locally one-dimensional finite-difference time-domain (LOD-CFDTD) method is presented for solving two-dimensional (2D) electromagnetic (EM) scattering problems. The formulation for the 2D transverse-electric (TE) case is presented and its stability property and numerical dispersion relationship are theoretically investigated. It is shown that the introduction of irregular grids will not damage the numerical stability. Instead of the staircasing approximation, the conformal scheme is only employed to model the curve boundaries, whereas the standard Yee grids are used for the remaining regions. As the irregular grids account for a very small percentage of the total space grids, the conformal scheme has little effect on the numerical dispersion. Moreover, the proposed method, which requires fewer arithmetic operations than the alternating-direction-implicit (ADI) CFDTD method, leads to a further reduction of the CPU time. With the total-field/scattered-field (TF/SF) boundary and the perfectly matched layer (PML), the radar cross section (RCS) of two 2D structures is calculated. The numerical examples verify the accuracy and efficiency of the proposed method. Project supported by the National Natural Science Foundation of China (Grant Nos. 61331007 and 61471105).

  11. Efficient High Order Central Schemes for Multi-Dimensional Hamilton-Jacobi Equations: Talk Slides

    NASA Technical Reports Server (NTRS)

    Bryson, Steve; Levy, Doron; Biegel, Brian R. (Technical Monitor)

    2002-01-01

    This viewgraph presentation presents information on the attempt to produce high-order, efficient, central methods that scale well to high dimension. The central philosophy is that the equations should evolve to the point where the data is smooth. This is accomplished by a cyclic pattern of reconstruction, evolution, and re-projection. One dimensional and two dimensional representational methods are detailed, as well.

  12. Fuzzy logic to improve efficiency of finite element and finite difference schemes

    SciTech Connect

    Garcia, M.D.; Heger, A.S.

    1994-05-01

    This paper explores possible applications of logic in the areas of finite element and finite difference methods applied to engineering design problems. The application of fuzzy logic to both front-end selection of computational options and within the numerical computation itself are proposed. Further, possible methods of overcoming these limitations through the application of methods are explored. Decision strategy is a fundamental limitation in performing finite element calculations, such as selecting the optimum coarseness of the grid, numerical integration algorithm, element type, implicit versus explicit schemes, and the like. This is particularly true of novice analysts who are confronted with a myriad of choices in performing a calculation. The advantage of having the myriad of options available to the analyst is, however, that it improves and optimizes the design process if the appropriate ones are selected. Unfortunately, the optimum choices are not always apparent and only through the process of elimination or prior extensive experience can the optimum choices or combination of choices be selected. The knowledge of expert analysts could be integrated into a fuzzy ``front-end`` rule-based package to optimize the design process. The use of logic to capture the heuristic and human knowledge for selecting optimum solution strategies sets the framework for these proposed strategies.

  13. Spin torque resonant vortex core expulsion for an efficient radio-frequency detection scheme

    NASA Astrophysics Data System (ADS)

    Cros, V.; Jenkins, A. S.; Lebrun, R.; Bortolotti, P.; Grimaldi, E.; Tsunegi, S.; Kubota, H.; Yakushiji, K.; Fukushima, A.; Yuasa, S.

    It has been proposed by Tulaparkur et al.[1ref] that a high frequency detector based on the so called spin-diode effect in spin transfer oscillators could eventually replace conventional Schottky diodes, due to their nanoscale size, frequency tunability, and large output sensitivity. Although a promising candidate for ICT applications, the output voltage generated from this effect is consistently low. Here we present a scheme for a new type of spintronics-based high frequency detector based on the expulsion of the vortex core of a magnetic tunnel junction. The resonant expulsion of the core leads to a large and sharp change in resistance associated with the difference in magnetoresistance between the vortex ground state and the final C-state, which is predominantly in either the parallel or anti-parallel direction relative to the polariser layer. Interestingly, this reversible effect is independent of the incoming rf current amplitude, offering a compelling perspective for a fast real-time rf threshold detector. REF : EU FP7 Grant (MOSAIC No. ICT-FP7-317950 is acknowledged.

  14. Efficient checkpointing schemes for depletion perturbation solutions on memory-limited architectures

    SciTech Connect

    Stripling, H. F.; Adams, M. L.; Hawkins, W. D.

    2013-07-01

    We describe a methodology for decreasing the memory footprint and machine I/O load associated with the need to access a forward solution during an adjoint solve. Specifically, we are interested in the depletion perturbation equations, where terms in the adjoint Bateman and transport equations depend on the forward flux solution. Checkpointing is the procedure of storing snapshots of the forward solution to disk and using these snapshots to recompute the parts of the forward solution that are necessary for the adjoint solve. For large problems, however, the storage cost of just a few copies of an angular flux vector can exceed the available RAM on the host machine. We propose a methodology that does not checkpoint the angular flux vector; instead, we write and store converged source moments, which are typically of a much lower dimension than the angular flux solution. This reduces the memory footprint and I/O load of the problem, but requires that we perform single sweeps to reconstruct flux vectors on demand. We argue that this trade-off is exactly the kind of algorithm that will scale on advanced, memory-limited architectures. We analyze the cost, in terms of FLOPS and memory footprint, of five checkpointing schemes. We also provide computational results that support the analysis and show that the memory-for-work trade off does improve time to solution. (authors)

  15. The Millennium Dome "Watercycle" experiment: to evaluate water efficiency and customer perception at a recycling scheme for 6 million visitors.

    PubMed

    Hills, S; Birks, R; McKenzie, B

    2002-01-01

    Thames Water's "Watercycle" project at the Millennium Dome was one of the largest in-building recycling schemes in Europe, designed to supply up to 500 m3/d of reclaimed water for WC and urinal flushing. It catered for over 6 million visitors in the year 2000. Overall, 55% of the water demand at the Dome was met by reclaimed water. The site was also one of the most comprehensive studies ever carried out of water conservation in a public environment, evaluating a range of water efficient appliances and researching visitor perceptions of reclaimed water. Within the Dome there were six identical core buildings housing the washrooms, which were equipped with a variety of different water-efficient devices for comparison. Water usage by the different appliances was monitored using a sophisticated metering and telemetry system. The importance of correct installation and maintenance of "high tech" water efficient devices was highlighted during the research programme, as some water wastage occurred due to poor installation. The results prove that metering should complement any large-scale water efficient system, so that any faults with the appliances can be quickly identified. The visitor survey showed very positive attitudes to the use of reclaimed water for non-potable uses. PMID:12380996

  16. Thermal management concepts for higher efficiency heavy vehicles.

    SciTech Connect

    Wambsganss, M. W.

    1999-05-19

    Thermal management is a cross-cutting technology that directly or indirectly affects engine performance, fuel economy, safety and reliability, aerodynamics, driver/passenger comfort, materials selection, emissions, maintenance, and component life. This review paper provides an assessment of thermal management for large trucks, particularly as it impacts these features. Observations arrived at from a review of the state of the art for thermal management for over-the-road trucks are highlighted and commented on. Trends in the large truck industry, pertinent engine truck design and performance objectives, and the implications of these relative to thermal management, are presented. Finally, new thermal management concepts for high efficiency vehicles are described.

  17. Efficient control schemes with limited computation complexity for Tomographic AO systems on VLTs and ELTs

    NASA Astrophysics Data System (ADS)

    Petit, C.; Le Louarn, M.; Fusco, T.; Madec, P.-Y.

    2011-09-01

    Various tomographic control solutions have been proposed during the last decades to ensure efficient or even optimal closed-loop correction to tomographic Adaptive Optics (AO) concepts such as Laser Tomographic AO (LTAO), Multi-Conjugate AO (MCAO). The optimal solution, based on Linear Quadratic Gaussian (LQG) approach, as well as suboptimal but efficient solutions such as Pseudo-Open Loop Control (POLC) require multiple Matrix Vector Multiplications (MVM). Disregarding their respective performance, these efficient control solutions thus exhibit strong increase of on-line complexity and their implementation may become difficult in demanding cases. Among them, two cases are of particular interest. First, the system Real-Time Computer architecture and implementation is derived from past or present solutions and does not support multiple MVM. This is the case of the AO Facility which RTC architecture is derived from the SPARTA platform and inherits its simple MVM architecture, which does not fit with LTAO control solutions for instance. Second, considering future systems such as Extremely Large Telescopes, the number of degrees of freedom is twenty to one hundred times bigger than present systems. In these conditions, tomographic control solutions can hardly be used in their standard form and optimized implementation shall be considered. Single MVM tomographic control solutions represent a potential solution, and straightforward solutions such as Virtual Deformable Mirrors have been already proposed for LTAO but with tuning issues. We investigate in this paper the possibility to derive from tomographic control solutions, such as POLC or LQG, simplified control solutions ensuring simple MVM architecture and that could be thus implemented on nowadays systems or future complex systems. We theoretically derive various solutions and analyze their respective performance on various systems thanks to numerical simulation. We discuss the optimization of their performance and

  18. Implicit approximate-factorization schemes for the efficient solution of steady transonic flow problems

    NASA Technical Reports Server (NTRS)

    Ballhaus, W. F.; Jameson, A.; Albert, J.

    1977-01-01

    Implicit approximate-factorization algorithms (AF) are developed for the solution of steady-state transonic flow problems. The performance of the AF solution method is evaluated relative to that of the standard solution method for transonic flow problems, successive line over-relaxation (SLOR). Both methods are applied to the solution of the nonlinear, two-dimensional transonic small-disturbance equation. Results indicate that the AF method requires substantially less computer time than SLOR to solve the nonlinear finite-difference matrix equation for a transonic flow field. This increase in computational efficiency is achieved with no appreciable increase in computer storage or coding complexity.

  19. Optimization schemes for efficient multiple exciton generation and extraction in colloidal quantum dots

    NASA Astrophysics Data System (ADS)

    Damtie, Fikeraddis A.; Karki, Khadga J.; Pullerits, Tõnu; Wacker, Andreas

    2016-08-01

    Multiple exciton generation (MEG) is a process in which more than one electron hole pair is generated per absorbed photon. It allows us to increase the efficiency of solar energy harvesting. Experimental studies have shown the multiple exciton generation yield of 1.2 in isolated colloidal quantum dots. However real photoelectric devices require the extraction of electron hole pairs to electric contacts. We provide a systematic study of the corresponding quantum coherent processes including extraction and injection and show that a proper design of extraction and injection rates enhances the yield significantly up to values around 1.6.

  20. Managed care and the scale efficiency of US hospitals.

    PubMed

    Brown, H Shelton; Pagán, José A

    2006-12-01

    Managed care penetration has been partly responsible for slowing down increases in health care costs in recent years. This study uses a 1992-1996 Health Care Utilization Project sample of hospitals to analyze the relationship between managed care penetration in local insurance markets and hospital scale efficiency. After controlling for hospital and market area variables, we find that managed care insurance, particularly the preferred provider type, is associated with increases in hospital scale efficiency in tertiary cases. The results presented here are consistent with the view that managed care can lead to reductions in health cost inflation by controlling the diffusion of technology via improvements in the scale efficiency of hospitals. PMID:17111213

  1. Color Image Watermarking Scheme Based on Efficient Preprocessing and Support Vector Machines

    NASA Astrophysics Data System (ADS)

    Fındık, Oğuz; Bayrak, Mehmet; Babaoğlu, Ismail; Çomak, Emre

    This paper suggests a new block based watermarking technique utilizing preprocessing and support vector machine (PPSVMW) to protect color image's intellectual property rights. Binary test set is employed here to train support vector machine (SVM). Before adding binary data into the original image, blocks have been separated into two parts to train SVM for better accuracy. Watermark's 1 valued bits were randomly added into the first block part and 0 into the second block part. Watermark is embedded by modifying the blue channel pixel value in the middle of each block so that watermarked image could be composed. SVM was trained with set-bits and three other features which are averages of the differences of pixels in three distinct shapes extracted from each block, and hence without the need of original image, it could be extracted. The results of PPSVMW technique proposed in this study were compared with those of the Tsai's technique. Our technique was proved to be more efficient.

  2. An Efficient Time-Stepping Scheme for Ab Initio Molecular Dynamics Simulations

    NASA Astrophysics Data System (ADS)

    Tsuchida, Eiji

    2016-08-01

    In ab initio molecular dynamics simulations of real-world problems, the simple Verlet method is still widely used for integrating the equations of motion, while more efficient algorithms are routinely used in classical molecular dynamics. We show that if the Verlet method is used in conjunction with pre- and postprocessing, the accuracy of the time integration is significantly improved with only a small computational overhead. We also propose several extensions of the algorithm required for use in ab initio molecular dynamics. The validity of the processed Verlet method is demonstrated in several examples including ab initio molecular dynamics simulations of liquid water. The structural properties obtained from the processed Verlet method are found to be sufficiently accurate even for large time steps close to the stability limit. This approach results in a 2× performance gain over the standard Verlet method for a given accuracy. We also show how to generate a canonical ensemble within this approach.

  3. An Efficient Image Encryption Scheme Based on a Peter De Jong Chaotic Map and a RC4 Stream Cipher

    NASA Astrophysics Data System (ADS)

    Hanchinamani, Gururaj; Kulkarni, Linganagouda

    2015-09-01

    Security is a vital issue in communication and storage of the images and encryption is one of the ways to ensure the security. This paper proposes an efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. A Peter De Jong map is employed to determine the initial keys for the RC4 stream generator and also during permutation stage. The RC4 stream generator is utilized to generate the pseudo random numbers for the pixel value rotation and diffusion operations. Each encryption round is comprised of three stages: permutation, pixel value rotation and diffusion. The permutation is based on scrambling the rows and columns, in addition, circular rotations of the rows and columns in alternate orientations. The second stage circularly rotates each and every pixel value by utilizing M × N pseudo random numbers. The last stage carries out the diffusion twice by scanning the image in two different ways. Each of the two diffusions accomplishes the diffusion in two orientations (forward and backward) with two previously diffused pixels and two pseudo random numbers. The security and performance of the proposed method is assessed thoroughly by using key space, statistical, differential, entropy and performance analysis. Moreover, two rounds of the call to the encrypt function provide the sufficient security. The experimental results show that the proposed encryption scheme is computationally fast with high security.

  4. Developing a computationally efficient dynamic multilevel hybrid optimization scheme using multifidelity model interactions.

    SciTech Connect

    Hough, Patricia Diane (Sandia National Laboratories, Livermore, CA); Gray, Genetha Anne (Sandia National Laboratories, Livermore, CA); Castro, Joseph Pete Jr.; Giunta, Anthony Andrew

    2006-01-01

    Many engineering application problems use optimization algorithms in conjunction with numerical simulators to search for solutions. The formulation of relevant objective functions and constraints dictate possible optimization algorithms. Often, a gradient based approach is not possible since objective functions and constraints can be nonlinear, nonconvex, non-differentiable, or even discontinuous and the simulations involved can be computationally expensive. Moreover, computational efficiency and accuracy are desirable and also influence the choice of solution method. With the advent and increasing availability of massively parallel computers, computational speed has increased tremendously. Unfortunately, the numerical and model complexities of many problems still demand significant computational resources. Moreover, in optimization, these expenses can be a limiting factor since obtaining solutions often requires the completion of numerous computationally intensive simulations. Therefore, we propose a multifidelity optimization algorithm (MFO) designed to improve the computational efficiency of an optimization method for a wide range of applications. In developing the MFO algorithm, we take advantage of the interactions between multi fidelity models to develop a dynamic and computational time saving optimization algorithm. First, a direct search method is applied to the high fidelity model over a reduced design space. In conjunction with this search, a specialized oracle is employed to map the design space of this high fidelity model to that of a computationally cheaper low fidelity model using space mapping techniques. Then, in the low fidelity space, an optimum is obtained using gradient or non-gradient based optimization, and it is mapped back to the high fidelity space. In this paper, we describe the theory and implementation details of our MFO algorithm. We also demonstrate our MFO method on some example problems and on two applications: earth penetrators and

  5. Systematic review of the effectiveness of weight management schemes for the under fives.

    PubMed

    Bond, M; Wyatt, K; Lloyd, J; Taylor, R

    2011-04-01

    Overweight and obesity in pre-school children are an increasing problem, with poor diet and exercise habits laying the foundation for serious health risks in later life. Yet most research into childhood obesity has focused on school-age children. Two previous systematic reviews of pre-school children have included uncontrolled designs and self-report outcomes potentially biasing the results in favour of the interventions. We have conducted a systematic review of the effectiveness and cost-effectiveness of weight management schemes for the under fives restricting the inclusion criteria to controlled trials with objective measures. We found four effectiveness randomized controlled trials of prevention. No treatment or cost-effectiveness studies were found. Only one study in a Latino community showed a statistically significant advantage from the intervention in a slower rate of increase in body mass index. However, trends in decrease in body mass index and weight loss favoured the intervention groups in other studies. From the studies characteristics we hypothesize that important features to include in future interventions may be; cultural sensitivity, sustained moderate to vigorous exercise, active engagement of the parents in the programme and as role models of healthy living and active engagement of the children in nutrition education. Further randomized controlled trials are needed in this population. PMID:20149120

  6. Efficient projection and backprojection scheme for spherically symmetric basis functions in divergent beam geometry

    SciTech Connect

    Ziegler, Andy; Koehler, Thomas; Nielsen, Tim; Proksa, Roland

    2006-12-15

    In cone-beam transmission tomography the measurements are performed with a divergent beam of x-rays. The reconstruction with iterative methods is an approach that offers the possibility to reconstruct the corresponding images directly from these measurements. Another approach based on spherically symmetric basis functions (blobs) has been reported with results demonstrating a better image quality for iterative reconstruction algorithms. When combining the two approaches (i.e., using blobs in iterative cone-beam reconstruction of divergent rays) the problem of blob sampling without introducing aliasing must be addressed. One solution to this problem is to select a blob size large enough to ensure a sufficient sampling, but this prevents a high resolution reconstruction, which is not desired. Another solution is a heuristic low-pass filtering, which removes this aliasing, but neglects the different contributions of blobs to the absorption depending on the spatial position in the volume and, therefore, cannot achieve the best image quality. This article presents a model of sampling the blobs which is motivated by the beam geometry. It can be used for high resolution reconstruction and can be implemented efficiently.

  7. An efficient liner cooling scheme for advanced small gas turbine combustors

    NASA Technical Reports Server (NTRS)

    Paskin, Marc D.; Mongia, Hukam C.; Acosta, Waldo A.

    1993-01-01

    A joint Army/NASA program was conducted to design, fabricate, and test an advanced, small gas turbine, reverse-flow combustor utilizing a compliant metal/ceramic (CMC) wall cooling concept. The objectives of this effort were to develop a design method (basic design data base and analysis) for the CMC cooling technique and then demonstrate its application to an advanced cycle, small, reverse-flow combustor with 3000 F burner outlet temperature. The CMC concept offers significant improvements in wall cooling effectiveness resulting in a large reduction in cooling air requirements. Therefore, more air is available for control of burner outlet temperature pattern in addition to the benefits of improved efficiency, reduced emissions, and lower smoke levels. The program was divided into four tasks. Task 1 defined component materials and localized design of the composite wall structure in conjunction with development of basic design models for the analysis of flow and heat transfer through the wall. Task 2 included implementation of the selected materials and validated design models during combustor preliminary design. Detail design of the selected combustor concept and its refinement with 3D aerothermal analysis were completed in Task 3. Task 4 covered detail drawings, process development and fabrication, and a series of burner rig tests. The purpose of this paper is to provide details of the investigation into the fundamental flow and heat transfer characteristics of the CMC wall structure as well as implementation of the fundamental analysis method for full-scale combustor design.

  8. The role of agri-environment schemes in conservation and environmental management

    PubMed Central

    Batáry, Péter; Dicks, Lynn V; Kleijn, David; Sutherland, William J

    2015-01-01

    Over half of the European landscape is under agricultural management and has been for millennia. Many species and ecosystems of conservation concern in Europe depend on agricultural management and are showing ongoing declines. Agri-environment schemes (AES) are designed partly to address this. They are a major source of nature conservation funding within the European Union (EU) and the highest conservation expenditure in Europe. We reviewed the structure of current AES across Europe. Since a 2003 review questioned the overall effectiveness of AES for biodiversity, there has been a plethora of case studies and meta-analyses examining their effectiveness. Most syntheses demonstrate general increases in farmland biodiversity in response to AES, with the size of the effect depending on the structure and management of the surrounding landscape. This is important in the light of successive EU enlargement and ongoing reforms of AES. We examined the change in effect size over time by merging the data sets of 3 recent meta-analyses and found that schemes implemented after revision of the EU's agri-environmental programs in 2007 were not more effective than schemes implemented before revision. Furthermore, schemes aimed at areas out of production (such as field margins and hedgerows) are more effective at enhancing species richness than those aimed at productive areas (such as arable crops or grasslands). Outstanding research questions include whether AES enhance ecosystem services, whether they are more effective in agriculturally marginal areas than in intensively farmed areas, whether they are more or less cost-effective for farmland biodiversity than protected areas, and how much their effectiveness is influenced by farmer training and advice? The general lesson from the European experience is that AES can be effective for conserving wildlife on farmland, but they are expensive and need to be carefully designed and targeted. El Papel de los Esquemas Agro-Ambientales en

  9. Breeding scheme and maternal small RNAs affect the efficiency of transgenerational inheritance of a paramutation in mice.

    PubMed

    Yuan, Shuiqiao; Oliver, Daniel; Schuster, Andrew; Zheng, Huili; Yan, Wei

    2015-01-01

    Paramutations result from interactions between two alleles at a single locus, whereby one induces a heritable change in the other. Although common in plants, paramutations are rarely studied in animals. Here, we report a new paramutation mouse model, in which the paramutant allele was induced by an insertional mutation and displayed the "white-tail-tip" (WTT) phenotype. The paramutation phenotype could be transmitted across multiple generations, and the breeding scheme (intercrossing vs. outcrossing) drastically affected the transmission efficiency. Paternal (i.e., sperm-borne) RNAs isolated from paramutant mice could induce the paramutation phenotype, which, however, failed to be transmitted to subsequent generations. Maternal miRNAs and piRNAs appeared to have an inhibitory effect on the efficiency of germline transmission of the paramutation. This paramutation mouse model represents an important tool for dissecting the underlying mechanism, which should be applicable to the phenomenon of epigenetic transgenerational inheritance (ETI) in general. Mechanistic insights of ETI will help us understand how organisms establish new heritable epigenetic states during development, or in times of environmental or nutritional stress. PMID:25783852

  10. Breeding scheme and maternal small RNAs affect the efficiency of transgenerational inheritance of a paramutation in mice

    PubMed Central

    Yuan, Shuiqiao; Oliver, Daniel; Schuster, Andrew; Zheng, Huili; Yan, Wei

    2015-01-01

    Paramutations result from interactions between two alleles at a single locus, whereby one induces a heritable change in the other. Although common in plants, paramutations are rarely studied in animals. Here, we report a new paramutation mouse model, in which the paramutant allele was induced by an insertional mutation and displayed the “white-tail-tip” (WTT) phenotype. The paramutation phenotype could be transmitted across multiple generations, and the breeding scheme (intercrossing vs. outcrossing) drastically affected the transmission efficiency. Paternal (i.e., sperm-borne) RNAs isolated from paramutant mice could induce the paramutation phenotype, which, however, failed to be transmitted to subsequent generations. Maternal miRNAs and piRNAs appeared to have an inhibitory effect on the efficiency of germline transmission of the paramutation. This paramutation mouse model represents an important tool for dissecting the underlying mechanism, which should be applicable to the phenomenon of epigenetic transgenerational inheritance (ETI) in general. Mechanistic insights of ETI will help us understand how organisms establish new heritable epigenetic states during development, or in times of environmental or nutritional stress. PMID:25783852

  11. Managing Sustainable Development Conflicts: The Impact of Stakeholders in Small-Scale Hydropower Schemes

    NASA Astrophysics Data System (ADS)

    Watkin, Laura Jane; Kemp, Paul S.; Williams, Ian D.; Harwood, Ian A.

    2012-06-01

    The growing importance of the environment and its management has simultaneously emphasized the benefits of hydroelectric power and its environmental costs. In a changing policy climate, giving importance to renewable energy development and environmental protection, conflict potential between stakeholders is considerable. Navigation of conflict determines the scheme constructed, making sustainable hydropower a function of human choice. To meet the needs of practitioners, greater understanding of stakeholder conflict is needed. This paper presents an approach to illustrate the challenges that face small-scale hydropower development as perceived by the stakeholders involved, and how they influence decision-making. Using Gordleton Mill, Hampshire (UK), as an illustrative case, soft systems methodology, a systems modeling approach, was adopted. Through individual interviews, a range of problems were identified and conceptually modeled. Stakeholder bias towards favoring economic appraisal over intangible social and environmental aspects was identified; costs appeared more influential than profit. Conceptual evaluation of the requirements to meet a stakeholder-approved solution suggested a complex linear systems approach, considerably different from the real-life situation. The stakeholders introduced bias to problem definition by transferring self-perceived issues onto the project owner. Application of soft systems methodology caused a shift in project goals away from further investigation towards consideration of project suitability. The challenge of sustainable hydropower is global, with a need to balance environmental, economic, and social concerns. It is clear that in this type of conflict, an individual can significantly influence outcomes; highlighting the need for more structured approaches to deal with stakeholder conflicts in sustainable hydropower development.

  12. Managing sustainable development conflicts: the impact of stakeholders in small-scale hydropower schemes.

    PubMed

    Watkin, Laura Jane; Kemp, Paul S; Williams, Ian D; Harwood, Ian A

    2012-06-01

    The growing importance of the environment and its management has simultaneously emphasized the benefits of hydroelectric power and its environmental costs. In a changing policy climate, giving importance to renewable energy development and environmental protection, conflict potential between stakeholders is considerable. Navigation of conflict determines the scheme constructed, making sustainable hydropower a function of human choice. To meet the needs of practitioners, greater understanding of stakeholder conflict is needed. This paper presents an approach to illustrate the challenges that face small-scale hydropower development as perceived by the stakeholders involved, and how they influence decision-making. Using Gordleton Mill, Hampshire (UK), as an illustrative case, soft systems methodology, a systems modeling approach, was adopted. Through individual interviews, a range of problems were identified and conceptually modeled. Stakeholder bias towards favoring economic appraisal over intangible social and environmental aspects was identified; costs appeared more influential than profit. Conceptual evaluation of the requirements to meet a stakeholder-approved solution suggested a complex linear systems approach, considerably different from the real-life situation. The stakeholders introduced bias to problem definition by transferring self-perceived issues onto the project owner. Application of soft systems methodology caused a shift in project goals away from further investigation towards consideration of project suitability. The challenge of sustainable hydropower is global, with a need to balance environmental, economic, and social concerns. It is clear that in this type of conflict, an individual can significantly influence outcomes; highlighting the need for more structured approaches to deal with stakeholder conflicts in sustainable hydropower development. PMID:22525992

  13. Strategies for Energy Efficient Resource Management of Hybrid Programming Models

    SciTech Connect

    Li, Dong; Supinski, Bronis de; Schulz, Martin; Nikolopoulos, Dimitrios S; Cameron, Kirk W.

    2013-01-01

    Many scientific applications are programmed using hybrid programming models that use both message-passing and shared-memory, due to the increasing prevalence of large-scale systems with multicore, multisocket nodes. Previous work has shown that energy efficiency can be improved using software-controlled execution schemes that consider both the programming model and the power-aware execution capabilities of the system. However, such approaches have focused on identifying optimal resource utilization for one programming model, either shared-memory or message-passing, in isolation. The potential solution space, thus the challenge, increases substantially when optimizing hybrid models since the possible resource configurations increase exponentially. Nonetheless, with the accelerating adoption of hybrid programming models, we increasingly need improved energy efficiency in hybrid parallel applications on large-scale systems. In this work, we present new software-controlled execution schemes that consider the effects of dynamic concurrency throttling (DCT) and dynamic voltage and frequency scaling (DVFS) in the context of hybrid programming models. Specifically, we present predictive models and novel algorithms based on statistical analysis that anticipate application power and time requirements under different concurrency and frequency configurations. We apply our models and methods to the NPB MZ benchmarks and selected applications from the ASC Sequoia codes. Overall, we achieve substantial energy savings (8.74% on average and up to 13.8%) with some performance gain (up to 7.5%) or negligible performance loss.

  14. Manure Management to Improve Nutrient Use Efficiency and Environmental Quality

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Manure from livestock operations can be a valuable source of N, P, K, and micronutrients for crop production, but careful management is important to maximize nutrient use efficiency and minimize N and P losses that can adversely impact the environment. Volatilization of NH3-N, the largest N loss pot...

  15. How do skilled nursing rehabilitation managers track efficiency and costs?

    PubMed

    Harrison, F G; Kuhlemeier, K A

    2001-01-01

    Financial and efficiency indicators have not been used extensively by skilled nursing (SNF) rehabilitation managers, but may prove useful in the prospective payment system (PPS)-dominated long-term care (LTC) environment. The purpose of this pilot study was to demonstrate a method for measuring the extent of SNF rehabilitation managers' use of volume, revenue, cost, and manpower indicators; and whether usages differ among occupational, physical, and speech therapy managers. The subjects were 74 occupational, 75 physical, and 72 speech therapy managers employed by a multinational health care corporation. A total of 221 Likert scale surveys were mailed to SNF rehabilitation managers to obtain data on use of 32 efficiency and financial indicators. The 32 indicators were in four categories: visit volume, revenue, costs, and manpower utilization. Twelve indicators were used regularly by at least 60% and three were used regularly by 85-100% of respondents. The response rate was 17.89%. Chi-square analyses were performed for therapy discipline and response frequency. None was significant at 0.05. Three of the payermix indicators demonstrated post-hoc significance in "regular" or "sometimes" use by the physical therapy managers. The results show discipline-specific differences among LTC rehabilitation managers in the extents of efficiency and financial indicator usage for decision making. Suggestions for future use of the survey instrument are provided. The method proved useful for demonstrating differences in the combinations and degrees of use of the 32 indicators. The results point to a need to educate SNF rehabilitation managers in cost-monitoring techniques. Recommendations for cost monitoring are provided. PMID:11265273

  16. Search for efficient laser resonance ionization schemes of tantalum using a newly developed time-of-flight mass-spectrometer in KISS

    NASA Astrophysics Data System (ADS)

    Mukai, M.; Hirayama, Y.; Ishiyama, H.; Jung, H. S.; Miyatake, H.; Oyaizu, M.; Watanabe, Y. X.; Kimura, S.; Ozawa, A.; Jeong, S. C.; Sonoda, T.

    2016-06-01

    The technique of laser resonance ionization is employed for an element-selective ionization of multi-nucleon transfer reaction products which are stopped and neutralized in a gas cell filled with argon gas at 50 kPa. We have been searching for efficient laser ionization schemes for refractory elements of Z = 73-78 using a time-of-flight mass-spectrometer (TOF-MS) chamber. To evaluate the isotope shift and ionization efficiency for each candidate of the ionization scheme, isotope separation using the TOF-MS was devised. The TOF-MS was designed to separate the isotopes using two-stage linear acceleration with a mass resolving power M / ΔM of >350. A mass resolving power of 250 was experimentally confirmed by measuring the TOF of laser-ionized tantalum (Z = 73) ions with mass number 181. We searched for a laser resonance ionization scheme of tantalum using the TOF-MS.

  17. Master-oscillator power-amplifier scheme for efficient green-light generation in a planar MgO:PPLN waveguide.

    PubMed

    Sakai, Kiyohide; Koyata, Yasuharu; Shimada, Naoyuki; Shibata, Kimitaka; Hanamaki, Yoshihiko; Itakura, Shigetaka; Yagi, Tetsuya; Hirano, Yoshihito

    2008-03-01

    We developed a new master-oscillator power-amplifier scheme consisting of a tapered semiconductor amplifier and a fiber-grating-stabilized laser diode for efficient green-light generation in a planar MgO:PPLN waveguide, and demonstrated cw green-light generation of 346 mW. PMID:18311282

  18. Efficient scheme for implementing an N-qubit Toffoli gate by a single resonant interaction with cavity quantum electrodynamics

    SciTech Connect

    Shao, Xiao-Qiang; Zhu, Ai-Dong; Zhang, Shou; Chung, Jean-Soo; Yeon, Kyu-Hwang

    2007-03-15

    A scheme for implementing a three-qubit Toffoli gate with atoms sent through a microwave cavity is proposed by choosing nonidentical coupling constants between the atoms and cavity. The scheme can be generalized to implement an N-qubit Toffoli gate and the gating time does not change with an increase of the number of qubits.

  19. An efficient management system for wireless sensor networks.

    PubMed

    Ma, Yi-Wei; Chen, Jiann-Liang; Huang, Yueh-Min; Lee, Mei-Yu

    2010-01-01

    Wireless sensor networks have garnered considerable attention recently. Networks typically have many sensor nodes, and are used in commercial, medical, scientific, and military applications for sensing and monitoring the physical world. Many researchers have attempted to improve wireless sensor network management efficiency. A Simple Network Management Protocol (SNMP)-based sensor network management system was developed that is a convenient and effective way for managers to monitor and control sensor network operations. This paper proposes a novel WSNManagement system that can show the connections stated of relationships among sensor nodes and can be used for monitoring, collecting, and analyzing information obtained by wireless sensor networks. The proposed network management system uses collected information for system configuration. The function of performance analysis facilitates convenient management of sensors. Experimental results show that the proposed method enhances the alive rate of an overall sensor node system, reduces the packet lost rate by roughly 5%, and reduces delay time by roughly 0.2 seconds. Performance analysis demonstrates that the proposed system is effective for wireless sensor network management. PMID:22163534

  20. Efficient, adaptive energy stable schemes for the incompressible Cahn-Hilliard Navier-Stokes phase-field models

    NASA Astrophysics Data System (ADS)

    Chen, Ying; Shen, Jie

    2016-03-01

    In this paper we develop a fully adaptive energy stable scheme for Cahn-Hilliard Navier-Stokes system, which is a phase-field model for two-phase incompressible flows, consisting a Cahn-Hilliard-type diffusion equation and a Navier-Stokes equation. This scheme, which is decoupled and unconditionally energy stable based on stabilization, involves adaptive mesh, adaptive time and a nonlinear multigrid finite difference method. Numerical experiments are carried out to validate the scheme for problems with matched density and non-matched density, and also demonstrate that CPU time can be significantly reduced with our adaptive approach.

  1. Long-term mortality of chest pain patients managed according to a decision scheme that aims to avoid inappropriate hospitalisations

    PubMed Central

    de Torbal, A.; Grijseels, E.W.M.; van Domburg, R.T.; Hartman, J.A.M.; Simoons, M.L.; Boersma, E.

    2003-01-01

    Objective A triage decision scheme was developed to avoid unnecessary hospitalisations for suspected acute coronary syndromes. The current investigation aimed at evaluating the long-term survival of patients who were managed according to this scheme. Subjects Patients (n=964) with symptoms suggestive of acute cardiac pathology, who were seen by a general practitioner, and for whom a pre-hospital ECG was recorded by the ambulance service in 1993-1994. Methods During the year 2000 a follow-up of the entire cohort was performed, and the vital status of patients was determined via the civil registry office. Cox's multivariable regression analyses were performed to evaluate the relation between final (hospital discharge) diagnosis and long-term outcome. Results The median follow-up was 6.0 years (4.6-6.6). Six-year mortality of the entire cohort was 30%. Long-term mortality was significantly lower in patients identified to be at low risk, who are not hospitalised, than in hospitalised patients (six-year mortality 7.5% versus 33.1%; p<0.0001). Longterm outcome was strongly associated with the final hospital discharge diagnosis. Conclusion Our data support the usefulness and appropriateness of the applied diagnostic scheme that aims to avoid unjustified hospital and CCU admissions in patients with acute chest pain. ImagesFigure 2 PMID:25696234

  2. Dynamic ocean management increases the efficiency and efficacy of fisheries management

    PubMed Central

    Maxwell, Sara M.; Halpin, Patrick N.

    2016-01-01

    In response to the inherent dynamic nature of the oceans and continuing difficulty in managing ecosystem impacts of fisheries, interest in the concept of dynamic ocean management, or real-time management of ocean resources, has accelerated in the last several years. However, scientists have yet to quantitatively assess the efficiency of dynamic management over static management. Of particular interest is how scale influences effectiveness, both in terms of how it reflects underlying ecological processes and how this relates to potential efficiency gains. Here, we address the empirical evidence gap and further the ecological theory underpinning dynamic management. We illustrate, through the simulation of closures across a range of spatiotemporal scales, that dynamic ocean management can address previously intractable problems at scales associated with coactive and social patterns (e.g., competition, predation, niche partitioning, parasitism, and social aggregations). Furthermore, it can significantly improve the efficiency of management: as the resolution of the closures used increases (i.e., as the closures become more targeted), the percentage of target catch forgone or displaced decreases, the reduction ratio (bycatch/catch) increases, and the total time–area required to achieve the desired bycatch reduction decreases. In the scenario examined, coarser scale management measures (annual time–area closures and monthly full-fishery closures) would displace up to four to five times the target catch and require 100–200 times more square kilometer-days of closure than dynamic measures (grid-based closures and move-on rules). To achieve similar reductions in juvenile bycatch, the fishery would forgo or displace between USD 15–52 million in landings using a static approach over a dynamic management approach. PMID:26729885

  3. Dynamic ocean management increases the efficiency and efficacy of fisheries management.

    PubMed

    Dunn, Daniel C; Maxwell, Sara M; Boustany, Andre M; Halpin, Patrick N

    2016-01-19

    In response to the inherent dynamic nature of the oceans and continuing difficulty in managing ecosystem impacts of fisheries, interest in the concept of dynamic ocean management, or real-time management of ocean resources, has accelerated in the last several years. However, scientists have yet to quantitatively assess the efficiency of dynamic management over static management. Of particular interest is how scale influences effectiveness, both in terms of how it reflects underlying ecological processes and how this relates to potential efficiency gains. Here, we address the empirical evidence gap and further the ecological theory underpinning dynamic management. We illustrate, through the simulation of closures across a range of spatiotemporal scales, that dynamic ocean management can address previously intractable problems at scales associated with coactive and social patterns (e.g., competition, predation, niche partitioning, parasitism, and social aggregations). Furthermore, it can significantly improve the efficiency of management: as the resolution of the closures used increases (i.e., as the closures become more targeted), the percentage of target catch forgone or displaced decreases, the reduction ratio (bycatch/catch) increases, and the total time-area required to achieve the desired bycatch reduction decreases. In the scenario examined, coarser scale management measures (annual time-area closures and monthly full-fishery closures) would displace up to four to five times the target catch and require 100-200 times more square kilometer-days of closure than dynamic measures (grid-based closures and move-on rules). To achieve similar reductions in juvenile bycatch, the fishery would forgo or displace between USD 15-52 million in landings using a static approach over a dynamic management approach. PMID:26729885

  4. Comparing Nitrous Oxide Emissions from Three Residential Landscapes under Different Management Schemes Following Natural Rainfall Events

    EPA Science Inventory

    Cultural lawn management practices that produce aesthetically appealing landscapes may also create environmental conditions that stimulate soil nitrous oxide (N2O) emissions. The purpose of this study is to investigate the effects of lawn management practices on N2O fluxes from ...

  5. Efficient Management of Complex Striped Files in Active Storage

    SciTech Connect

    Piernas Canovas, Juan; Nieplocha, Jaroslaw

    2008-08-25

    Active Storage provides an opportunity for reducing the band- width requirements between the storage and compute elements of cur- rent supercomputing systems, and leveraging the processing power of the storage nodes used by some modern file systems. To achieve both objec- tives, Active Storage allows certain processing tasks to be performed directly on the storage nodes, near the data they manage. However, Active Storage must also support key requirements of scientific applications. In particular, Active Storage must be able to support striped files and files with complex formats (e.g., netCDF). In this paper, we describe how these important requirements can be addressed. The experimental results on a Lustre file system not only show that our proposal can re- duce the network traffic to near zero and scale the performance with the number of storage nodes, but also that it provides an efficient treatment of striped files and can manage files with complex data structures.

  6. EM modelling of arbitrary shaped anisotropic dielectric objects using an efficient 3D leapfrog scheme on unstructured meshes

    NASA Astrophysics Data System (ADS)

    Gansen, A.; Hachemi, M. El; Belouettar, S.; Hassan, O.; Morgan, K.

    2016-09-01

    The standard Yee algorithm is widely used in computational electromagnetics because of its simplicity and divergence free nature. A generalization of the classical Yee scheme to 3D unstructured meshes is adopted, based on the use of a Delaunay primal mesh and its high quality Voronoi dual. This allows the problem of accuracy losses, which are normally associated with the use of the standard Yee scheme and a staircased representation of curved material interfaces, to be circumvented. The 3D dual mesh leapfrog-scheme which is presented has the ability to model both electric and magnetic anisotropic lossy materials. This approach enables the modelling of problems, of current practical interest, involving structured composites and metamaterials.

  7. Leveraging performance measurement and management: the quality and efficiency edge.

    PubMed

    Cerese, J

    2001-11-01

    The University HealthSystem Consortium (UHC) is a mission-based, member driven alliance of academic health centers. UHC's objectives are to pool resources, create economies of scale, improve clinical and operating efficiencies, and influence the direction and delivery of health care. To assist our members in developing these strategies, UHC conducted concurrent clinical and operational cardiology benchmarking projects. The goals of the cardiology-benchmarking project were to: Identify successful organizational structures and operational processes used by members to provide cardiology service. Identify methods to maximize productivity, and manage supply and equipment costs. Share methods of measuring and reporting outcomes (report cards, databases). PMID:11761795

  8. BlueDetect: An iBeacon-Enabled Scheme for Accurate and Energy-Efficient Indoor-Outdoor Detection and Seamless Location-Based Service

    PubMed Central

    Zou, Han; Jiang, Hao; Luo, Yiwen; Zhu, Jianjie; Lu, Xiaoxuan; Xie, Lihua

    2016-01-01

    The location and contextual status (indoor or outdoor) is fundamental and critical information for upper-layer applications, such as activity recognition and location-based services (LBS) for individuals. In addition, optimizations of building management systems (BMS), such as the pre-cooling or heating process of the air-conditioning system according to the human traffic entering or exiting a building, can utilize the information, as well. The emerging mobile devices, which are equipped with various sensors, become a feasible and flexible platform to perform indoor-outdoor (IO) detection. However, power-hungry sensors, such as GPS and WiFi, should be used with caution due to the constrained battery storage on mobile device. We propose BlueDetect: an accurate, fast response and energy-efficient scheme for IO detection and seamless LBS running on the mobile device based on the emerging low-power iBeacon technology. By leveraging the on-broad Bluetooth module and our proposed algorithms, BlueDetect provides a precise IO detection service that can turn on/off on-board power-hungry sensors smartly and automatically, optimize their performances and reduce the power consumption of mobile devices simultaneously. Moreover, seamless positioning and navigation services can be realized by it, especially in a semi-outdoor environment, which cannot be achieved by GPS or an indoor positioning system (IPS) easily. We prototype BlueDetect on Android mobile devices and evaluate its performance comprehensively. The experimental results have validated the superiority of BlueDetect in terms of IO detection accuracy, localization accuracy and energy consumption. PMID:26907295

  9. BlueDetect: An iBeacon-Enabled Scheme for Accurate and Energy-Efficient Indoor-Outdoor Detection and Seamless Location-Based Service.

    PubMed

    Zou, Han; Jiang, Hao; Luo, Yiwen; Zhu, Jianjie; Lu, Xiaoxuan; Xie, Lihua

    2016-01-01

    The location and contextual status (indoor or outdoor) is fundamental and critical information for upper-layer applications, such as activity recognition and location-based services (LBS) for individuals. In addition, optimizations of building management systems (BMS), such as the pre-cooling or heating process of the air-conditioning system according to the human traffic entering or exiting a building, can utilize the information, as well. The emerging mobile devices, which are equipped with various sensors, become a feasible and flexible platform to perform indoor-outdoor (IO) detection. However, power-hungry sensors, such as GPS and WiFi, should be used with caution due to the constrained battery storage on mobile device. We propose BlueDetect: an accurate, fast response and energy-efficient scheme for IO detection and seamless LBS running on the mobile device based on the emerging low-power iBeacon technology. By leveraging the on-broad Bluetooth module and our proposed algorithms, BlueDetect provides a precise IO detection service that can turn on/off on-board power-hungry sensors smartly and automatically, optimize their performances and reduce the power consumption of mobile devices simultaneously. Moreover, seamless positioning and navigation services can be realized by it, especially in a semi-outdoor environment, which cannot be achieved by GPS or an indoor positioning system (IPS) easily. We prototype BlueDetect on Android mobile devices and evaluate its performance comprehensively. The experimental results have validated the superiority of BlueDetect in terms of IO detection accuracy, localization accuracy and energy consumption. PMID:26907295

  10. A computationally efficient scheme for the inversion of large scale potential field data: Application to synthetic and real data

    NASA Astrophysics Data System (ADS)

    Wang, Jun; Meng, Xiaohong; Li, Fang

    2015-12-01

    Three dimensional (3D) inversion of potential field data from large scale surveys attempts to recover density or magnetic susceptibility distribution in the subspace for geological interpretation. It is computationally challenging and is not feasible on desktop computers. We propose an integrated scheme to address this problem. We adopt adaptive sampling to compress the dataset, and the cross curve of the data compression ratio and correlation coefficient between the initial and sampled data is used to choose the damping factor for adaptive sampling. Then, the conventional inversion algorithm in model space is transformed to data space, using the identity relationship between different matrices, which greatly reduces the memory requirement. Finally, parallel computation is employed to accelerate calculation of the kernel function. We use the conjugate gradient method to minimize the objective function and a damping factor is introduced to stabilize the iterative process. A wide variety of constraint options are also considered, such as depth weighing, sparseness, and boundary limits. We design a synthetic magnetic model with three prismatic susceptibility causative bodies to demonstrate the effectiveness of the proposed scheme. Tests on synthetic data show that the proposed scheme provides significant reduction in memory and time consumption, and the inversion result is reliable. These advantages hold true for practical field magnetic data from the Hawsons mining area in Australia, verifying the effectiveness of the proposed scheme.