Science.gov

Sample records for multiple access schemes

  1. Multiple Access Schemes for Lunar Missions

    NASA Technical Reports Server (NTRS)

    Deutsch, Leslie; Hamkins, Jon; Stocklin, Frank J.

    2010-01-01

    Two years ago, the NASA Coding, Modulation, and Link Protocol (CMLP) study was completed. The study, led by the authors of this paper, recommended codes, modulation schemes, and desired attributes of link protocols for all space communication links in NASA's future space architecture. Portions of the NASA CMLP team were reassembled to resolve one open issue: the use of multiple access (MA) communication from the lunar surface. The CMLP-MA team analyzed and simulated two candidate multiple access schemes that were identified in the original CMLP study: Code Division MA (CDMA) and Frequency Division MA (FDMA) based on a bandwidth-efficient Continuous Phase Modulation (CPM) with a superimposed Pseudo-Noise (PN) ranging signal (CPM/PN). This paper summarizes the results of the analysis and simulation of the CMLP-MA study and describes the final recommendations.

  2. A Systematic Scheme for Multiple Access in Ethernet Passive Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Ma, Maode; Zhu, Yongqing; Hiang Cheng, Tee

    2005-11-01

    While backbone networks have experienced substantial changes in the last decade, access networks have not changed much. Recently, passive optical networks (PONs) seem to be ready for commercial deployment as access networks, due to the maturity of a number of enabling technologies. Among the PON technologies, Ethernet PON (EPON) standardized by the IEEE 802.3ah Ethernet in the First Mile (EFM) Task Force is the most attractive one because of its high speed, low cost, familiarity, interoperability, and low overhead. In this paper, we consider the issue of upstream channel sharing in the EPONs. We propose a novel multiple-access control scheme to provide bandwidth-guaranteed service for high-demand customers, while providing best effort service to low-demand customers according to the service level agreement (SLA). The analytical and simulation results prove that the proposed scheme performs best in what it is designed to do compared to another well-known scheme that has not considered providing differentiated services. With business customers preferring premium services with guaranteed bandwidth and residential users preferring low-cost best effort services, our scheme could benefit both groups of subscribers, as well as the operators.

  3. L-band and SHF multiple access schemes for the MSAT system

    NASA Technical Reports Server (NTRS)

    Razi, Michael; Shoamanesh, Alireza; Azarbar, Bahman

    1988-01-01

    The first generation of the Canadian Mobile Satellite (MSAT) system, planned to be operational in the early 1990s, will provide voice and data services to land, aeronautical, and maritime mobile terminals within the Canadian land mass and its territorial waters. The system will be managed by a centralized Demand Assignment Multiple Access (DAMA) control system. Users will request a communication channel by communicating with the DAMA Control System (DCS) via the appropriate signalling channels. Several access techniques for both L-band and SHF signalling channels have been investigated. For the L-band, Slotted Aloha (SA) and Reservation Aloha (RA), combined with a token scheme, are discussed here. The results of Telesat studies to date indicate that SA, when combined with token scheme, provides the most efficient access and resource management tool in a mobile propagation environment. For SHF signalling channels, slim time division multiple access (TDMA) and SA have been considered as the most suitable candidate schemes. In view of the operational environment of the SHF links, provision of a very short channel access delay and a relatively high packet success rate are highly desirable. Studies carried out generally favor slim-TDMA as the most suitable approach for SHF signalling channels.

  4. Color coded multiple access scheme for bidirectional multiuser visible light communications in smart home technologies

    NASA Astrophysics Data System (ADS)

    Tiwari, Samrat Vikramaditya; Sewaiwar, Atul; Chung, Yeon-Ho

    2015-10-01

    In optical wireless communications, multiple channel transmission is an attractive solution to enhancing capacity and system performance. A new modulation scheme called color coded multiple access (CCMA) for bidirectional multiuser visible light communications (VLC) is presented for smart home applications. The proposed scheme uses red, green and blue (RGB) light emitting diodes (LED) for downlink and phosphor based white LED (P-LED) for uplink to establish a bidirectional VLC and also employs orthogonal codes to support multiple users and devices. The downlink transmission for data user devices and smart home devices is provided using red and green colors from the RGB LEDs, respectively, while uplink transmission from both types of devices is performed using the blue color from P-LEDs. Simulations are conducted to verify the performance of the proposed scheme. It is found that the proposed bidirectional multiuser scheme is efficient in terms of data rate and performance. In addition, since the proposed scheme uses RGB signals for downlink data transmission, it provides flicker-free illumination that would lend itself to multiuser VLC system for smart home applications.

  5. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    NASA Astrophysics Data System (ADS)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  6. Polarization diversity scheme on spectral polarization coding optical code-division multiple-access network

    NASA Astrophysics Data System (ADS)

    Yen, Chih-Ta; Huang, Jen-Fa; Chang, Yao-Tang; Chen, Bo-Hau

    2010-12-01

    We present an experiment demonstrating the spectral-polarization coding optical code-division multiple-access system introduced with a nonideal state of polarization (SOP) matching conditions. In the proposed system, the encoding and double balanced-detection processes are implemented using a polarization-diversity scheme. Because of the quasiorthogonality of Hadamard codes combining with array waveguide grating routers and a polarization beam splitter, the proposed codec pair can encode-decode multiple code words of Hadamard code while retaining the ability for multiple-access interference cancellation. The experimental results demonstrate that when the system is maintained with an orthogonal SOP for each user, an effective reduction in the phase-induced intensity noise is obtained. The analytical SNR values are found to overstate the experimental results by around 2 dB when the received effective power is large. This is mainly limited by insertion losses of components and a nonflattened optical light source. Furthermore, the matching conditions can be improved by decreasing nonideal influences.

  7. Performance evaluation of modulation and multiple access schemes in ultraviolet optical wireless connections for two atmosphere thickness cases.

    PubMed

    Raptis, Nikos; Pikasis, Evangelos; Syvridis, Dimitris

    2016-08-01

    The exploitation of optical wireless communication channels in a non-line-of-sight regime is studied for point-to-point and networking configurations considering the use of light-emitting diodes. Two environments with different scattering center densities are considered, assuming operation at 265 nm. The bit error rate performance of both pulsed and multicarrier modulation schemes is examined, using numerical approaches. In the networking scenario, a central node only receives data, one node transmits useful data, and the rest of them act as interferers. The performance of the desirable node's transmissions is evaluated. The access to the medium is controlled by a code division multiple access scheme. PMID:27505663

  8. An integrated voice and data multiple-access scheme for a land-mobile satellite system

    NASA Technical Reports Server (NTRS)

    Li, V. O. K.; Yan, T.-Y.

    1984-01-01

    An analytical study is performed of the satellite requirements for a land mobile satellite system (LMSS). The spacecraft (MSAT-X) would be in GEO and would be compatible with multiple access by mobile radios and antennas and fixed stations. The FCC has received a petition from NASA to reserve the 821-825 and 866-870 MHz frequencies for the LMSS, while communications with fixed earth stations would be in the Ku band. MSAT-X transponders would alter the frequencies of signal and do no processing in the original configuration considered. Channel use would be governed by an integrated demand-assigned, multiple access protocol, which would divide channels into reservation and information channels, governed by a network management center. Further analyses will cover tradeoffs between data and voice users, probability of blocking, and the performance impacts of on-board switching and variable bandwidth assignment. Initial calculations indicate that a large traffic volume can be handled with acceptable delays and voice blocking probabilities.

  9. Performance analysis of multiple interference suppression over asynchronous/synchronous optical code-division multiple-access system based on complementary/prime/shifted coding scheme

    NASA Astrophysics Data System (ADS)

    Nieh, Ta-Chun; Yang, Chao-Chin; Huang, Jen-Fa

    2011-08-01

    A complete complementary/prime/shifted prime (CPS) code family for the optical code-division multiple-access (OCDMA) system is proposed. Based on the ability of complete complementary (CC) code, the multiple-access interference (MAI) can be suppressed and eliminated via spectral amplitude coding (SAC) OCDMA system under asynchronous/synchronous transmission. By utilizing the shifted prime (SP) code in the SAC scheme, the hardware implementation of encoder/decoder can be simplified with a reduced number of optical components, such as arrayed waveguide grating (AWG) and fiber Bragg grating (FBG). This system has a superior performance as compared to previous bipolar-bipolar coding OCDMA systems.

  10. Performance analysis of an adaptive multiple access scheme for the message service of a land mobile satellite experiment (MSAT-X)

    NASA Technical Reports Server (NTRS)

    Yan, T.-Y.; Li, V. O. K.

    1984-01-01

    This paper describes an Adaptive Mobile Access Protocol (AMAP) for the message service of MSAT-X., a proposed experimental mobile satellite communication network. Message lengths generated by the mobiles are assumed to be uniformly distributed. The mobiles are dispersed over a wide geographical area and the channel data rate is limited. AMAP is a reservation based multiple access scheme. The available bandwidth is divided into subchannels, which are divided into reservation and message channels. The ALOHA multiple access scheme is employed in the reservation channels, while the message channels are demand assigned. AMAP adaptively reallocates the reservation and message channels to optimize the total average message delay.

  11. Securing optical code-division multiple-access networks with a postswitching coding scheme of signature reconfiguration

    NASA Astrophysics Data System (ADS)

    Huang, Jen-Fa; Meng, Sheng-Hui; Lin, Ying-Chen

    2014-11-01

    The optical code-division multiple-access (OCDMA) technique is considered a good candidate for providing optical layer security. An enhanced OCDMA network security mechanism with a pseudonoise (PN) random digital signals type of maximal-length sequence (M-sequence) code switching to protect against eavesdropping is presented. Signature codes unique to individual OCDMA-network users are reconfigured according to the register state of the controlling electrical shift registers. Examples of signature reconfiguration following state switching of the controlling shift register for both the network user and the eavesdropper are numerically illustrated. Dynamically changing the PN state of the shift register to reconfigure the user signature sequence is shown; this hinders eavesdroppers' efforts to decode correct data sequences. The proposed scheme increases the probability of eavesdroppers committing errors in decoding and thereby substantially enhances the degree of an OCDMA network's confidentiality.

  12. Mixing stream and datagram traffic on satellite: A FIFO Order-based Demand Assignment (FODA) Time Division Multiple Access (TDMA) scheme

    NASA Astrophysics Data System (ADS)

    Beltrame, R.; Bonito, A. B.; Celandroni, N.; Ferro, E.

    1985-11-01

    A FIFO Order based Demand Assignment (FODA) access scheme was designed to handle packetized data and voice traffic in a multiple access satellite broadcast channel of Mbits band. The channel is shared by as many as 64 simultaneously active stations in a range of 255 addressable stations. A sophisticated traffic environment is assumed, including different types of service requirements and an arbitrary load distribution among the stations. The results of 2Mbit/sec simulation tests for an existing hardware environment are presented.

  13. Robust rate-adaptive hybrid ARQ scheme for frequency-hopped spread-spectrum multiple-access communication systems

    NASA Astrophysics Data System (ADS)

    Bigloo, Amir M. Y.; Gulliver, T. Aaron; Wang, Q.; Bhargava, Vijay K.

    1994-06-01

    This paper considers the application of rate-adaptive coding (RAC) to a spread spectrum multiple access (SSMA) communication system. Specifically, RAC using a variable rate Reed-Solomon (RS) code with a single decoder is applied to frequency-hopped SSMA. We show that this combination can accommodate a larger number of users compared to that with conventional fixed-rate coding. This increase is a result of a reduction in the channel interference from other users. The penalty for this improvement in most cases is a slight increase in the delay (composed of propagation and decoding delay). The throughput and the undetected error probability for a Q-ary symmetric channel are analyzed, and performance results are presented.

  14. Mobile multiple access study

    NASA Technical Reports Server (NTRS)

    1977-01-01

    Multiple access techniques (FDMA, CDMA, TDMA) for the mobile user and attempts to identify the current best technique are discussed. Traffic loading is considered as well as voice and data modulation and spacecraft and system design. Emphasis is placed on developing mobile terminal cost estimates for the selected design. In addition, design examples are presented for the alternative techniques of multiple access in order to compare with the selected technique.

  15. Multiple Access Trade Study

    NASA Technical Reports Server (NTRS)

    Motamedi, Masoud

    1990-01-01

    The Personal Access Satellite System (PASS) strawman design uses a hybrid Time Division Multiple Access (TDMA)/Frequency Division Multiple Access (FDMA) implementation. TDMA is used for the forward direction (from Suppliers to Users), and FDMA for the return direction (from Users to Suppliers). An alternative architecture is proposed that will require minimal real time coordination and yet provide a fast access method by using random access Code Division Multiple Access (CDMA). The CDMA system issues are addressed such as connecting suppliers and users, both of whom may be located anywhere in the CONUS, when the user terminals are constrained in size and weight; and providing efficient traffic routing under highly variable traffic requirements. It is assumed that bandwidth efficiency is not of paramount importance. CDMA or Spread Spectrum Multiple Access (SSMA) communication is a method in which a group of carriers operate at the same nominal center frequency but are separable from each other by the low cross correlation of the spreading codes used. Interference and multipath rejection capability, ease of selective addressing and message screening, low density power spectra for signal hiding and security, and high resolution ranging are among the benefits of spread spectrum communications.

  16. Fade detector for the FODA-TDMA access scheme

    NASA Astrophysics Data System (ADS)

    Celandroni, Nedo; Ferro, Erina; Marzoli, Antonio

    1989-05-01

    The First in first out Ordered Demand Assignment-Time Division Multiple Access (FODA-TDMA) satellite access scheme designed for simultaneous transmissions of real time data, like packetized voice and slow-scan images (stream traffic) and data coming from standard EDP applications, such as bulk data tansfer, interactive computer access, mailing, data base enquiry and updating (datagram traffic) is described. When deep fades are experienced due to rain attenuation, the system is able to counter the fade. Techniques to detect the fade are presented.

  17. Harmonic generation with multiple wiggler schemes

    SciTech Connect

    Bonifacio, R.; De Salvo, L.; Pierini, P.

    1995-02-01

    In this paper the authors give a simple theoretical description of the basic physics of the single pass high gain free electron laser (FEL), describing in some detail the FEL bunching properties and the harmonic generation technique with a multiple-wiggler scheme or a high gain optical klystron configuration.

  18. Multiple access capacity trade-offs for a Ka-band personal access satellite system

    NASA Technical Reports Server (NTRS)

    Dessouky, Khaled; Motamedi, Masoud

    1990-01-01

    System capability is critical to the economic viability of a personal satellite communication system. Ka band has significant potential to support a high capacity multiple access system because of the availability of bandwidth. System design tradeoffs are performed and multiple access schemes are compared with the design goal of achieving the highest capacity and efficiency. Conclusions regarding the efficiency of the different schemes and the achievable capacities are given.

  19. An authentication scheme for secure access to healthcare services.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS. PMID:23828650

  20. A New Neutron Multiplicity Deadtime Scheme

    SciTech Connect

    Croft, S.; Menaa, N.; Kirkpatrick, J.; Philips, S.; McElroy, R.D.

    2008-07-01

    Deadtime corrections for passive neutron coincidence counting are traditionally formulated in terms of the Totals counting rate. The deadtime correction is exponential in form with the effective deadtime being linear in terms of observed Totals rate. The deadtime coefficient for the Reals rate is traditionally fixed at four times that of the Totals rate parameter. When it comes to multiplicity counting, however, more complex expressions are typically used for the Doubles and Triples rates based on mathematical actions to the multiplicity histograms with the Singles (or Trigger) rate being treated rather simplistically. Since the Totals and Singles and Reals and Doubles, respectively, are effectively equivalent measures, the difference in deadtime treatment results is an inconsistency. Furthermore, additional empirical correction factors are often applied in the case of the multiplicity deadtime corrections and these do not follow from the underlying theoretical framework. The purpose of this paper is to re-examine the semi-empirical deadtime correction expressions from a fresh perspective. We propose to a scheme whereby Totals and Singles are treated equivalently with the correction having the transcendental form of the paralysable model. The impact of correlations on the Totals deadtime correction is shown to be modest. The deadtime correction factor for Reals and Doubles are again treated similarly also using an exponential form in terms of the corrected Total event rate but with a deadtime parameter which is not fixed ahead of time to be four times that used in the Totals correction. In the case of the Triples correction, which is evaluated from a composite expression, the deadtime corrections for the Singles and Doubles are used as appropriate but a new empirical correction, again given in terms of the corrected rate, is introduced. The new correction acts only on the part of the Triples expression which is does not represent the correlated-accidentals. The new

  1. Performance of Multiple Pulse Multiple Delay Modulated UWB Signals in a Multiple Access Indoor Wireless Channel

    SciTech Connect

    Nekoogar, F

    2003-06-12

    In this paper, the performance of a two user UWB multiple access (UWB-MA) system based on multiple-pulse multiple-delay (MPMD) modulation scheme in an indoor wireless channel is evaluated by computer simulations. The indoor multipath propagation channel model used in this study is based on the modified statistical Saleh-Valenzuela model proposed by Foerester and Li from Intel. The simulation results indicate that the multipath performance of MPMD modulated signals in a multiple access system outperforms the nonmultipath case as the number of autocorrelation function (ACF) sampling points increases for each user. This is an unusual but important result, since MPMD receiver exploits multipath phenomenon in indoor wireless channels to increase the BER performance, hence the transmission rate in a UWB-MA system.

  2. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  3. Ka-band geostationary satellite spacing requirements and access schemes

    NASA Technical Reports Server (NTRS)

    Caron, Mario; Hindson, Daniel J.

    1995-01-01

    Geostationary satellite systems for wideband personal communications applications have been proposed. This paper looks at the geostationary satellite spacing requirement to meet the ITU-R sharing criterion for FDMA and CDMA access schemes. CDMA capacity equation is first developed. Then the basis for the interference analysis between two systems with an overlapping coverage area is developed for the cases of identical and different access schemes and for bandwidth and power limited systems. An example of an interference analysis between two systems is fully carried out. The paper also points out the inherent problems when comparing systems with different access schemes. It is found that under certain scenarios, CDMA can allow a closer spacing between satellites.

  4. On board processing for future satellite communications systems: Comparison of FDM, TDM and hybrid accessing schemes

    NASA Technical Reports Server (NTRS)

    Berk, G.; Jean, P. N.; Rotholz, E.

    1982-01-01

    Several satellite uplink and downlink accessing schemes for customer premises service are compared. Four conceptual system designs are presented: satellite-routed frequency division multiple access (FDMA), satellite-switched time division multiple access (TDMA), processor-routed TDMA, and frequency-routed TDMA, operating in the 30/20 GHz band. The designs are compared on the basis of estimated satellite weight, system capacity, power consumption, and cost. The systems are analyzed for fixed multibeam coverage of the continental United States. Analysis shows that the system capacity is limited by the available satellite resources and by the terminal size and cost.

  5. An energy-efficient and elastic optical multiple access system based on coherent interleaved frequency division multiple access.

    PubMed

    Yoshida, Yuki; Maruta, Akihiro; Ishii, Kenji; Akiyama, Yuji; Yoshida, Tsuyoshi; Suzuki, Naoki; Koguchi, Kazuumi; Nakagawa, Junichi; Mizuochi, Takashi; Kitayama, Ken-ichi

    2013-05-20

    This paper proposes a novel bandwidth-elastic and energy-efficient passive optical network (PON) based on the coherent interleaved frequency division multiple access (IFDMA) scheme. We experimentally demonstrate the coherent IFDMA-PON uplink transmission up-to 30 Gbps over a 30 km standard single-mode fiber with 2 × optical network units (ONUs). A low-complexity digital carrier synchronization technique enables multiple access of the ONUs on the basis of 78.1 MHz narrow band orthogonal subcarriers without any guard-bands. PMID:23736447

  6. Multiple-Access Quantum-Classical Networks

    NASA Astrophysics Data System (ADS)

    Razavi, Mohsen

    2011-10-01

    A multi-user network that supports both classical and quantum communication is proposed. By relying on optical code-division multiple access techniques, this system offers simultaneous key exchange between multiple pairs of network users. A lower bound on the secure key generation rate will be derived for decoy-state quantum key distribution protocols.

  7. Distinguishing Schemes and Tasks in Children's Development of Multiplicative Reasoning

    ERIC Educational Resources Information Center

    Tzur, Ron; Johnson, Heather L.; McClintock, Evan; Kenney, Rachael H.; Xin, Yan P.; Si, Luo; Woordward, Jerry; Hord, Casey; Jin, Xianyan

    2013-01-01

    We present a synthesis of findings from constructivist teaching experiments regarding six schemes children construct for reasoning multiplicatively and tasks to promote them. We provide a task-generating platform game, depictions of each scheme, and supporting tasks. Tasks must be distinguished from children's thinking, and learning situations…

  8. A chaos secure communication scheme based on multiplication modulation

    NASA Astrophysics Data System (ADS)

    Fallahi, Kia; Leung, Henry

    2010-02-01

    A secure spread spectrum communication scheme using multiplication modulation is proposed. The proposed system multiplies the message by chaotic signal. The scheme does not need to know the initial condition of the chaotic signals and the receiver is based on an extended Kalman filter (EKF). This signal encryption scheme lends itself to cheap implementation and can therefore be used effectively for ensuring security and privacy in commercial consumer electronics products. To illustrate the effectiveness of the proposed scheme, a numerical example based on Genesio-Tesi system and also Chen dynamical system is presented and the results are compared.

  9. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems. PMID:23392626

  10. Space Station multiple access communications system

    NASA Technical Reports Server (NTRS)

    Olson, Nanci A.

    1986-01-01

    The development of a multiple access communications system (MACS) for the space-to-space communications on the Space Station is discussed. The communications capabilities of the FHMA, CDMA, TDMA, SDMA, and FDMA techniques are evaluated; FDMA was selected for the space-to-space communications on the Space Station because of its lower complexity and growth capability. The proposed space-to-space multiple access system for the Space Station is a digitally modulated Ku-band FDMA system with a distributed architecture; this system would transmit on frequencies between 13.4 and 13.7 GHz and receive on frequencies between 14.6 and 14.89 GHz, and the bandwidth will support seven high-data-rate users and 12 low-data-rate users. The IF components and antennas for the MACS are examined. A multiple access breadboard design is described.

  11. Quantum internet using code division multiple access.

    PubMed

    Zhang, Jing; Liu, Yu-xi; Ozdemir, Sahin Kaya; Wu, Re-Bing; Gao, Feifei; Wang, Xiang-Bin; Yang, Lan; Nori, Franco

    2013-01-01

    A crucial open problem inS large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels. PMID:23860488

  12. Quantum internet using code division multiple access

    NASA Astrophysics Data System (ADS)

    Zhang, Jing; Liu, Yu-Xi; Özdemir, Şahin Kaya; Wu, Re-Bing; Gao, Feifei; Wang, Xiang-Bin; Yang, Lan; Nori, Franco

    2013-07-01

    A crucial open problem inS large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels.

  13. Multiple-access channels without synchronization

    NASA Technical Reports Server (NTRS)

    Mceliece, R. J.; Posner, E. C.

    1977-01-01

    This paper discusses models for multiple-access communications which take into account the fact that the channel users may not be able to synchronize their transmissions. It is shown that for a broad class of such channels, the capacity region is the same as it would be with user synchronization. Some open problems are discussed.

  14. Nonorthogonal CSK/CDMA with Received-Power Adaptive Access Control Scheme

    NASA Astrophysics Data System (ADS)

    Komuro, Nobuyoshi; Habuchi, Hiromasa; Tsuboi, Toshinori

    The measurements for Multiple Access Interference (MAI) problems and the improvement of the data rate are key issues on the advanced wireless networks. In this paper, the nonorthogonal Code Shift Keying Code Division Multiple Access (CSK/CDMA) with received-power adaptive access control scheme is proposed. In our system, a user who is ready to send measures the received power from other users, and then the user decides whether to transmit or refrain from transmission according to the received power and a pre-decided threshold. Not only overcoming the MAI problems, but our system also improve the throughput performance. The throughput performance of the proposed system is evaluated by theoretical analysis. Consequently, the nonorthogonal CSK/CDMA system improves by applying received-power adaptive access control. It was also found that the throughput performance of the nonorthogonal CSK/CDMA system is better than that of the orthogonal CSK/CDMA system at any Eb/N0. We conclude that the nonorthogonal CSK/CDMA system with received-power adaptive access control scheme is expected to be effective in advanced wireless networks.

  15. Satellite multiple access systems for mobile communication

    NASA Technical Reports Server (NTRS)

    Lewis, J. L.

    1979-01-01

    This paper considers multiple access techniques for a mobile radio system which incorporates a geosynchronous orbiting satellite repeater through which mobile terminals communicate. The communication capacities of FDMA, TDMA and CDMA systems are examined for a 4 MHz bandwidth system to serve up to 10,000 users. An FDMA system with multibeam coverage is analyzed in detail. The system includes an order-wire network for demand-access control and reassignment of satellite channels. Satellite and terminal configurations are developed to a block diagram level and system costs and implementation requirements are discussed.

  16. A one-shot access scheme for a multicast switch

    NASA Astrophysics Data System (ADS)

    Chen, Xing; Hayes, Jeremiah F.; Ali, M. K. Mehmet

    The capability of handling multipoint connections is essential for many communication needs. Input port queueing along with a contention resolution algorithm is used to resolve output request conflict. A study of the performance of a one-shot access scheme for a multicast packet switch is presented. The analysis is based on an assumption of random traffic, modeled by a Bernoulli process of packet arrival and Bernoulli trials of copy distribution patterns. Input port queueing along with random-selection policy is used to resolve the output request conflict. The primary performance measurement is the packet delay. A key assumption is that all copies of the same packet must be switched in the same slot. This one-shot discipline is easier to implement than one which disperses transmission over several time slots in small or medium size switching. Simulation results agree almost perfectly with the analysis.

  17. Transparent data service with multiple wireless access

    NASA Technical Reports Server (NTRS)

    Dean, Richard A.; Levesque, Allen H.

    1993-01-01

    The rapid introduction of digital wireless networks is an important part of the emerging digital communications scene. The introduction of Digital Cellular, LEO and GEO Satellites, and Personal Communications Services poses both a challenge and an opportunity for the data user. On the one hand wireless access will introduce significant new portable data services such as personal notebooks, paging, E-mail, and fax that will put the information age in the user's pocket. On the other hand the challenge of creating a seamless and transparent environment for the user in multiple access environments and across multiple network connections is formidable. A summary of the issues associated with developing techniques and standards that can support transparent and seamless data services is presented. The introduction of data services into the radio world represents a unique mix of RF channel problems, data protocol issues, and network issues. These problems require that experts from each of these disciplines fuse the individual technologies to support these services.

  18. Suppression of multiple scattering with a CCD camera detection scheme

    NASA Astrophysics Data System (ADS)

    Zakharov, Pavel; Schurtenberger, Peter; Scheffold, Frank

    2005-06-01

    We introduce a CCD camera detection scheme in dynamic light scattering that provides information on the single-scattered auto-correlation function even for fairly turbid samples. Our approach allows access to the extensive range of systems that show low-order scattering by selective detection of the singly scattered light. Model experiments on slowly relaxing suspensions of latex spheres in glycerol were carried out to verify validity range of our approach.

  19. Quantum teleportation scheme by selecting one of multiple output ports

    NASA Astrophysics Data System (ADS)

    Ishizaka, Satoshi; Hiroshima, Tohya

    2009-04-01

    The scheme of quantum teleportation, where Bob has multiple (N) output ports and obtains the teleported state by simply selecting one of the N ports, is thoroughly studied. We consider both the deterministic version and probabilistic version of the teleportation scheme aiming to teleport an unknown state of a qubit. Moreover, we consider two cases for each version: (i) the state employed for the teleportation is fixed to a maximally entangled state and (ii) the state is also optimized as well as Alice’s measurement. We analytically determine the optimal protocols for all the four cases and show the corresponding optimal fidelity or optimal success probability. All these protocols can achieve the perfect teleportation in the asymptotic limit of N→∞ . The entanglement properties of the teleportation scheme are also discussed.

  20. Performance of code division multiple access systems

    NASA Technical Reports Server (NTRS)

    Weber, C. L.; Huth, G. K.; Batson, B. H.

    1980-01-01

    The performance of code division multiple-access (CDMA) systems is determined using direct sequence spectral spreading. Under relatively ideal conditions, the degradation in system performance as a function of the number of users is shown to have a threshold effect. This basic limitation in the number of users of the system is further limited if the powers are unequal. For two users, system performance as a function of their power ratio also has a threshold effect. System performance as a function of the amount of spectral spreading is determined. The performance of both coded and uncoded systems is predicted.

  1. Microgravity gradiometry measurement schemes with multiple-pathway atom interferometers

    NASA Astrophysics Data System (ADS)

    Ashwood, E.; Edwards, M.; Clark, C. W.

    2015-05-01

    We propose a new atom-interferometric scheme for measuring the value and derivatives of the gravitational field in the microgravity environment found in the Cold-Atom Laboratory to be deployed to the International Space Station. The operation of the proposed atom interferometer consists of splitting a harmonically confined Bose-Einstein condensate into multiple pieces using a sequence of laser pulses. In a perfect harmonic oscillator potential all of the condensate pieces will come to rest at the same time. At this point, the harmonic trap is turned off. The nearly motionless condensate clouds then accumulate different phases due to their respective accelerations at different points in space. The trap is then turned back on bringing all of the clouds together at the same time at which point they are again split producing multiple interference patterns. We have simulated some of these interferometric schemes using a Lagrangian variational approximation to the 3D time-dependent Gross-Pitaevskii equation. We have used this method to facilitate rapid interferometer design and to understand how these interference patterns can be used to measure the gravitational field and its derivatives. We also compare the sensitivity of the different interferometric schemes. Supported by NSF grants PHY-1068761 and ARO Atomtronics MURI.

  2. An axisymmetric multiple-relaxation-time lattice Boltzmann scheme

    NASA Astrophysics Data System (ADS)

    Xie, Wenjun

    2015-01-01

    A multiple-relaxation-time (MRT) lattice Boltzmann (LB) scheme developed for axisymmetric flows recovers the complete continuity and Navier-Stokes equations. This scheme follows the strategy of the standard D2Q9 model by using a single particle distribution function and a simple "collision-streaming" updating rule. The extra terms related to axisymmetry in the macroscopic equations are recovered by adding source terms into the LB equation, which are simple and involve no gradients. The compressible effect retained in the Navier-Stokes equations is recovered by introducing a term related to the reversed transformation matrix for MRT collision operator, so as to produce a correct bulk viscosity, making it suitable for compressible flows with high frequency and low Mach number. The validity of the scheme is demonstrated by testing the Hagen-Poiseuille flow and 3D Womersley flow, as well as the standing acoustic waves in a closed cylindrical chamber. The numerical experiments show desirable stability at low viscosities, enabling to simulate a standing ultrasound field in centimeters space.

  3. Dispersion-flattened-fiber based optical thresholder for multiple-access-interference suppression in OCDMA system.

    PubMed

    Wang, Xu; Hamanaka, Taro; Wada, Naoya; Kitayama, Ken-Ichi

    2005-07-11

    An optical thresholding technique based on super-continuum generation in dispersion flattened fiber is proposed and experimentally demonstrated to enable data-rate detection in optical code division multiple access networks. The proposed scheme exhibits an excellent discrimination between a desired signal and interference signals with features of pulse reshaping, low insertion loss, polarization independency as well as reasonable operation power. PMID:19498545

  4. Optical multiple access techniques for on-board routing

    NASA Technical Reports Server (NTRS)

    Mendez, Antonio J.; Park, Eugene; Gagliardi, Robert M.

    1992-01-01

    The purpose of this research contract was to design and analyze an optical multiple access system, based on Code Division Multiple Access (CDMA) techniques, for on board routing applications on a future communication satellite. The optical multiple access system was to effect the functions of a circuit switch under the control of an autonomous network controller and to serve eight (8) concurrent users at a point to point (port to port) data rate of 180 Mb/s. (At the start of this program, the bit error rate requirement (BER) was undefined, so it was treated as a design variable during the contract effort.) CDMA was selected over other multiple access techniques because it lends itself to bursty, asynchronous, concurrent communication and potentially can be implemented with off the shelf, reliable optical transceivers compatible with long term unattended operations. Temporal, temporal/spatial hybrids and single pulse per row (SPR, sometimes termed 'sonar matrices') matrix types of CDMA designs were considered. The design, analysis, and trade offs required by the statement of work selected a temporal/spatial CDMA scheme which has SPR properties as the preferred solution. This selected design can be implemented for feasibility demonstration with off the shelf components (which are identified in the bill of materials of the contract Final Report). The photonic network architecture of the selected design is based on M(8,4,4) matrix codes. The network requires eight multimode laser transmitters with laser pulses of 0.93 ns operating at 180 Mb/s and 9-13 dBm peak power, and 8 PIN diode receivers with sensitivity of -27 dBm for the 0.93 ns pulses. The wavelength is not critical, but 830 nm technology readily meets the requirements. The passive optical components of the photonic network are all multimode and off the shelf. Bit error rate (BER) computations, based on both electronic noise and intercode crosstalk, predict a raw BER of (10 exp -3) when all eight users are

  5. Performance analysis of electronic code division multiple access based virtual private networks over passive optical networks

    NASA Astrophysics Data System (ADS)

    Nadarajah, Nishaanthan; Nirmalathas, Ampalavanapillai

    2008-03-01

    A solution for implementing multiple secure virtual private networks over a passive optical network using electronic code division multiple access is proposed and experimentally demonstrated. The multiple virtual private networking capability is experimentally demonstrated with 40 Mb/s data multiplexed with a 640 Mb/s electronic code that is unique to each of the virtual private networks in the passive optical network, and the transmission of the electronically coded data is carried out using Fabry-Perot laser diodes. A theoretical scalability analysis for electronic code division multiple access based virtual private networks over a passive optical network is also carried out to identify the performance limits of the scheme. Several sources of noise such as optical beat interference and multiple access interference that are present in the receiver are considered with different operating system parameters such as transmitted optical power, spectral width of the broadband optical source, and processing gain to study the scalability of the network.

  6. Attitude determination using an adaptive multiple model filtering Scheme

    NASA Technical Reports Server (NTRS)

    Lam, Quang; Ray, Surendra N.

    1995-01-01

    Attitude determination has been considered as a permanent topic of active research and perhaps remaining as a forever-lasting interest for spacecraft system designers. Its role is to provide a reference for controls such as pointing the directional antennas or solar panels, stabilizing the spacecraft or maneuvering the spacecraft to a new orbit. Least Square Estimation (LSE) technique was utilized to provide attitude determination for the Nimbus 6 and G. Despite its poor performance (estimation accuracy consideration), LSE was considered as an effective and practical approach to meet the urgent need and requirement back in the 70's. One reason for this poor performance associated with the LSE scheme is the lack of dynamic filtering or 'compensation'. In other words, the scheme is based totally on the measurements and no attempts were made to model the dynamic equations of motion of the spacecraft. We propose an adaptive filtering approach which employs a bank of Kalman filters to perform robust attitude estimation. The proposed approach, whose architecture is depicted, is essentially based on the latest proof on the interactive multiple model design framework to handle the unknown of the system noise characteristics or statistics. The concept fundamentally employs a bank of Kalman filter or submodel, instead of using fixed values for the system noise statistics for each submodel (per operating condition) as the traditional multiple model approach does, we use an on-line dynamic system noise identifier to 'identify' the system noise level (statistics) and update the filter noise statistics using 'live' information from the sensor model. The advanced noise identifier, whose architecture is also shown, is implemented using an advanced system identifier. To insure the robust performance for the proposed advanced system identifier, it is also further reinforced by a learning system which is implemented (in the outer loop) using neural networks to identify other unknown

  7. Attitude determination using an adaptive multiple model filtering Scheme

    NASA Astrophysics Data System (ADS)

    Lam, Quang; Ray, Surendra N.

    1995-05-01

    Attitude determination has been considered as a permanent topic of active research and perhaps remaining as a forever-lasting interest for spacecraft system designers. Its role is to provide a reference for controls such as pointing the directional antennas or solar panels, stabilizing the spacecraft or maneuvering the spacecraft to a new orbit. Least Square Estimation (LSE) technique was utilized to provide attitude determination for the Nimbus 6 and G. Despite its poor performance (estimation accuracy consideration), LSE was considered as an effective and practical approach to meet the urgent need and requirement back in the 70's. One reason for this poor performance associated with the LSE scheme is the lack of dynamic filtering or 'compensation'. In other words, the scheme is based totally on the measurements and no attempts were made to model the dynamic equations of motion of the spacecraft. We propose an adaptive filtering approach which employs a bank of Kalman filters to perform robust attitude estimation. The proposed approach, whose architecture is depicted, is essentially based on the latest proof on the interactive multiple model design framework to handle the unknown of the system noise characteristics or statistics. The concept fundamentally employs a bank of Kalman filter or submodel, instead of using fixed values for the system noise statistics for each submodel (per operating condition) as the traditional multiple model approach does, we use an on-line dynamic system noise identifier to 'identify' the system noise level (statistics) and update the filter noise statistics using 'live' information from the sensor model. The advanced noise identifier, whose architecture is also shown, is implemented using an advanced system identifier. To insure the robust performance for the proposed advanced system identifier, it is also further reinforced by a learning system which is implemented (in the outer loop) using neural networks to identify other unknown

  8. Code Division Multiple Access system candidate for integrated modular avionics

    NASA Astrophysics Data System (ADS)

    Mendez, Antonio J.; Gagliardi, Robert M.

    1991-02-01

    There are government and industry trends towards avionics modularity and integrated avionics. Key requirements implicit in these trends are suitable data communication concepts compatible with the integration concept. In this paper we explore the use ofCode Division Multiple Access (CDMA) techniques as an alternative to collision detection and collision avoidance multiple access techniques.

  9. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    NASA Astrophysics Data System (ADS)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  10. Mitigation of multiple access interference using two-dimensional modified double weight codes for optical code division multiple access systems

    NASA Astrophysics Data System (ADS)

    Jamil Abdullah, Amir Razif Arief; Aljunid, Syed Alwee; Safar, Anuar Mat; Nordin, Junita Mohd; Ahmad, R. Badlishah

    2012-06-01

    We proposed newly two-dimensional (2-D) spectral amplitude coding optical code division multiple access (OCDMA) scheme using modified double weight (MDW) code capable of suppressing phase-induced intensity noise (PIIN). The architecture of the spectral/spatial MDW OCDMA system with the property of multi-access interference cancellation is presented. The proposed code exhibits good cross-correlation property. At the optimized data transmission rate of 0.745 Gbps, 2-D MDW, M=63, N=3, reaches maximum cardinality of 200% increases compared to 2-D perfect difference code, M=57, N=3. The performance is severely deteriorated if the data rate further increases above 0.745 Gbps. The proposed code meets the optical transmission requirements at 10-9 bit error rate error floor, with lowest effective transmitted power (Psr), -17.5 dBm, in comparison to the others through minimizing interference noise that result in PIIN suppression. The proposed system reaches optimum requirements performance in terms of cardinality, data transmission rate, and low effective transmitted power.

  11. An efficient and secure attribute based signcryption scheme with LSSS access structure.

    PubMed

    Hong, Hanshu; Sun, Zhixin

    2016-01-01

    Attribute based encryption (ABE) and attribute based signature (ABS) provide flexible access control with authentication for data sharing between users, but realizing both functions will bring about too much computation burden. In this paper, we combine the advantages of CP-ABE with ABS and propose a ciphertext policy attribute based signcryption scheme. In our scheme, only legal receivers can decrypt the ciphertext and verify the signature signed by data owner. Furthermore, we use linear secret sharing scheme instead of tree structure to avoid the frequent calls of recursive algorithm. By security and performance analysis, we prove that our scheme is secure as well as gains higher efficiency. PMID:27330910

  12. Multiple anisotropic collisions for advection-diffusion Lattice Boltzmann schemes

    NASA Astrophysics Data System (ADS)

    Ginzburg, Irina

    2013-01-01

    This paper develops a symmetrized framework for the analysis of the anisotropic advection-diffusion Lattice Boltzmann schemes. Two main approaches build the anisotropic diffusion coefficients either from the anisotropic anti-symmetric collision matrix or from the anisotropic symmetric equilibrium distribution. We combine and extend existing approaches for all commonly used velocity sets, prescribe most general equilibrium and build the diffusion and numerical-diffusion forms, then derive and compare solvability conditions, examine available anisotropy and stable velocity magnitudes in the presence of advection. Besides the deterioration of accuracy, the numerical diffusion dictates the stable velocity range. Three techniques are proposed for its elimination: (i) velocity-dependent relaxation entries; (ii) their combination with the coordinate-link equilibrium correction; and (iii) equilibrium correction for all links. Two first techniques are also available for the minimal (coordinate) velocity sets. Even then, the two-relaxation-times model with the isotropic rates often gains in effective stability and accuracy. The key point is that the symmetric collision mode does not modify the modeled diffusion tensor but it controls the effective accuracy and stability, via eigenvalue combinations of the opposite parity eigenmodes. We propose to reduce the eigenvalue spectrum by properly combining different anisotropic collision elements. The stability role of the symmetric, multiple-relaxation-times component, is further investigated with the exact von Neumann stability analysis developed in diffusion-dominant limit.

  13. Contemplation on marking scheme for Type X multiple choice questions, and an illustration of a practically applicable scheme.

    PubMed

    Siddiqui, Nazeem Ishrat; Bhavsar, Vinayak H; Bhavsar, Arnav V; Bose, Sukhwant

    2016-01-01

    Ever since its inception 100 years back, multiple choice items have been widely used as a method of assessment. It has certain inherent limitations such as inability to test higher cognitive skills, element of guesswork while answering, and issues related with marking schemes. Various marking schemes have been proposed in the past but they are not balanced, skewed, and complex, which are based on mathematical calculations which are typically not within the grasp of medical personnel. Type X questions has many advantages being easy to construct, can test multiple concepts/application/facets of a topic, cognitive skill of various level of hierarchy can be tested, and unlike Type K items, they are free from complicated coding. In spite of these advantages, they are not in common use due to complicated marking schemes. This is the reason we explored the aspects of methods of evaluation of multiple correct options multiple choice questions and came up with the simple, practically applicable, nonstringent but logical scoring system for the same. The rationale of the illustrated marking scheme is that it takes into consideration the distracter recognition ability of the examinee rather than relying on the ability only to select the correct response. Thus, examinee's true knowledge is tested, and he is rewarded accordingly for selecting a correct answer and omitting a distracter. The scheme also penalizes for not recognizing a distracter thus controlling guessing behavior. It is emphasized that if the illustrated scoring scheme is adopted, then Type X questions would come in common practice. PMID:27127312

  14. Contemplation on marking scheme for Type X multiple choice questions, and an illustration of a practically applicable scheme

    PubMed Central

    Siddiqui, Nazeem Ishrat; Bhavsar, Vinayak H.; Bhavsar, Arnav V.; Bose, Sukhwant

    2016-01-01

    Ever since its inception 100 years back, multiple choice items have been widely used as a method of assessment. It has certain inherent limitations such as inability to test higher cognitive skills, element of guesswork while answering, and issues related with marking schemes. Various marking schemes have been proposed in the past but they are not balanced, skewed, and complex, which are based on mathematical calculations which are typically not within the grasp of medical personnel. Type X questions has many advantages being easy to construct, can test multiple concepts/application/facets of a topic, cognitive skill of various level of hierarchy can be tested, and unlike Type K items, they are free from complicated coding. In spite of these advantages, they are not in common use due to complicated marking schemes. This is the reason we explored the aspects of methods of evaluation of multiple correct options multiple choice questions and came up with the simple, practically applicable, nonstringent but logical scoring system for the same. The rationale of the illustrated marking scheme is that it takes into consideration the distracter recognition ability of the examinee rather than relying on the ability only to select the correct response. Thus, examinee's true knowledge is tested, and he is rewarded accordingly for selecting a correct answer and omitting a distracter. The scheme also penalizes for not recognizing a distracter thus controlling guessing behavior. It is emphasized that if the illustrated scoring scheme is adopted, then Type X questions would come in common practice. PMID:27127312

  15. Advanced multiple access concepts in mobile satellite systems

    NASA Technical Reports Server (NTRS)

    Ananasso, Fulvio

    1990-01-01

    Some multiple access strategies for Mobile Satellite Systems (MSS) are discussed. These strategies were investigated in the context of three separate studies conducted for the International Maritime Satellite Organization (INMARSAT) and the European Space Agency (ESA). Satellite-Switched Frequency Division Multiple Access (SS-FDMA), Code Division Multiple Access (CDMA), and Frequency-Addressable Beam architectures are addressed, discussing both system and technology aspects and outlining advantages and drawbacks of either solution with associated relevant hardware issues. An attempt is made to compare the considered option from the standpoint of user terminal/space segment complexity, synchronization requirements, spectral efficiency, and interference rejection.

  16. One electron-controlled multiple-valued dynamic random-access-memory

    NASA Astrophysics Data System (ADS)

    Kye, H. W.; Song, B. N.; Lee, S. E.; Kim, J. S.; Shin, S. J.; Choi, J. B.; Yu, Y.-S.; Takahashi, Y.

    2016-02-01

    We propose a new architecture for a dynamic random-access-memory (DRAM) capable of storing multiple values by using a single-electron transistor (SET). The gate of a SET is designed to be connected to a plurality of DRAM unit cells that are arrayed at intersections of word lines and bitlines. In this SET-DRAM hybrid scheme, the multiple switching characteristics of SET enables multiple value data stored in a DRAM unit cell, and this increases the storage functionality of the device. Moreover, since refreshing data requires only a small amount of SET driving current, this enables device operating with low standby power consumption.

  17. Parallel implementation of WRF double moment 5-class cloud microphysics scheme on multiple GPUs

    NASA Astrophysics Data System (ADS)

    Huang, Melin; Huang, Bormin; Huang, Allen H.-L.

    2015-05-01

    The Weather Research and Forecast (WRF) Double Moment 5-class (WDM5) mixed ice microphysics scheme predicts the mixing ratio of hydrometeors and their number concentrations for warm rain species including clouds and rain. WDM5 can be computed in parallel in the horizontal domain using multi-core GPUs. In order to obtain a better GPU performance, we manually rewrite the original WDM5 Fortran module into a highly parallel CUDA C program. We explore the usage of coalesced memory access and asynchronous data transfer. Our GPU-based WDM5 module is scalable to run on multiple GPUs. By employing one NVIDIA Tesla K40 GPU, our GPU optimization effort on this scheme achieves a speedup of 252x with respect to its CPU counterpart Fortran code running on one CPU core of Intel Xeon E5-2603, whereas the speedup for one CPU socket (4 cores) with respect to one CPU core is only 4.2x. We can even boost the speedup of this scheme to 468x with respect to one CPU core when two NVIDIA Tesla K40 GPUs are applied.

  18. Optical code division multiple access secure communications systems with rapid reconfigurable polarization shift key user code

    NASA Astrophysics Data System (ADS)

    Gao, Kaiqiang; Wu, Chongqing; Sheng, Xinzhi; Shang, Chao; Liu, Lanlan; Wang, Jian

    2015-09-01

    An optical code division multiple access (OCDMA) secure communications system scheme with rapid reconfigurable polarization shift key (Pol-SK) bipolar user code is proposed and demonstrated. Compared to fix code OCDMA, by constantly changing the user code, the performance of anti-eavesdropping is greatly improved. The Pol-SK OCDMA experiment with a 10 Gchip/s user code and a 1.25 Gb/s user data of payload has been realized, which means this scheme has better tolerance and could be easily realized.

  19. Assessment methodology of protection schemes for next generation optical access networks

    NASA Astrophysics Data System (ADS)

    Mas Machuca, Carmen; Wosinska, Lena; Chen, Jiajia

    2015-12-01

    Optical access networks are evolving towards next generation solutions offering much higher bandwidth per end point. Moreover, the uninterrupted access to the network services is becoming crucial and therefore operators are now considering protecting their access networks. However, the cost factor is still very important due to the relatively low cost sharing in access segment. For this purpose, this paper proposes an assessment methodology that can be used to compare different protection schemes and help to identify the suitable solution for a given scenario. The assessment criteria includes some reliability measures such as Failure Impact Factor (FIF) and connection availability, as well as cost parameters such as the investment required in greenfield and brownfield scenarios and the increase in power consumption compared to the unprotected network. The proposed criteria have been used to compare 7 representative protection schemes shown in literature, which differ mainly in the number of protected network elements and the technology used for protection (fiber, wireless, etc.). The considered protection schemes have been applied to a hybrid wavelength division multiplexing/time division multiplexing Passive Optical Network (Hybrid PON) architecture in an urban area. It has been shown that it is difficult to identify the absolute best scheme with respect to all the considered criteria. However, depending on the requirements from the operator regarding the targeted reliability performance in the network, an appropriate protection scheme can be recommended for either a greenfield or a brownfield scenario.

  20. Novel MDM-PON scheme utilizing self-homodyne detection for high-speed/capacity access networks.

    PubMed

    Chen, Yuanxiang; Li, Juhao; Zhu, Paikun; Wu, Zhongying; Zhou, Peng; Tian, Yu; Ren, Fang; Yu, Jinyi; Ge, Dawei; Chen, Jingbiao; He, Yongqi; Chen, Zhangyuan

    2015-12-14

    In this paper, we propose a cost-effective, energy-saving mode-division-multiplexing passive optical network (MDM-PON) scheme utilizing self-homodyne detection for high-speed/capacity access network based on low modal-crosstalk few-mode fiber (FMF) and all-fiber mode multiplexer/demultiplexer (MUX/DEMUX). In the proposed scheme, one of the spatial modes is used to transmit a portion of signal carrier (namely pilot-tone) as the local oscillator (LO), while the others are used for signal-bearing channels. At the receiver, the pilot-tone and the signal can be separated without strong crosstalk and sent to the receiver for coherent detection. The spectral efficiency (SE) is significantly enhanced when multiple spatial channels are used. Meanwhile, the self-homodyne detection scheme can effectively suppress laser phase noise, which relaxes the requirement for the lasers line-width at the optical line terminal or optical network units (OLT/ONUs). The digital signal processing (DSP) at the receiver is also simplified since it removes the need for frequency offset compensation and complex phase correction, which reduces the computational complexity and energy consumption. Polarization division multiplexing (PDM) that offers doubled SE is also supported by the scheme. The proposed scheme is scalable to multi-wavelength application when wavelength MUX/DEMUX is utilized. Utilizing the proposed scheme, we demonstrate a proof of concept 4 × 40-Gb/s orthogonal frequency division multiplexing (OFDM) transmission over 55-km FMF using low modal-crosstalk two-mode FMF and MUX/DEMUX with error free operation. Compared with back to back case, less than 1-dB Q-factor penalty is observed after 55-km FMF of the four channels. Signal power and pilot-tone power are also optimized to achieve the optimal transmission performance. PMID:26698996

  1. High data rate modem simulation for the space station multiple-access communications system

    NASA Technical Reports Server (NTRS)

    Horan, Stephen

    1987-01-01

    The communications system for the space station will require a space based multiple access component to provide communications between the space based program elements and the station. A study was undertaken to investigate two of the concerns of this multiple access system, namely, the issues related to the frequency spectrum utilization and the possibilities for higher order (than QPSK) modulation schemes for use in possible modulators and demodulators (modems). As a result of the investigation, many key questions about the frequency spectrum utilization were raised. At this point, frequency spectrum utilization is seen as an area requiring further work. Simulations were conducted using a computer aided communications system design package to provide a straw man modem structure to be used for both QPSK and 8-PSK channels.

  2. Forward error correcting codes in fiber-optic synchronous code-division multiple access networks

    NASA Astrophysics Data System (ADS)

    Srivastava, Anand; Kar, Subrat; Jain, V. K.

    2002-02-01

    In optical code-division multiple access (OCDMA) networks, the performance is limited by optical multiple access interference (OMAI), amplified spontaneous emission (ASE) noise and receiver noise. To reduce OMAI and noise effects, use of forward error correcting (FEC) (18880, 18865) and (2370, 2358) Hamming codes are explored for STM-1 (155 Mbps) bit stream. The encoding is carried out at the multiplex-section layer. The check bits are embedded in the unused bytes of multiplex section overhead (MSOH). The expression for probability of error is derived taking into consideration OMAI, various sources of noise and effect of group velocity dispersion (GVD). It is observed that for a BER of 10 -9, use of FEC gives a coding gain of 1.4-2.1 dB depending upon the type of coding scheme used. It is also seen that there is a sensitivity improvement of about 3 dB if the source is suitably pre-chirped.

  3. Access to Treatment for Diabetes and Hypertension in Rural Cambodia: Performance of Existing Social Health Protection Schemes

    PubMed Central

    Bigdeli, Maryam; Jacobs, Bart; Men, Chean Rithy; Nilsen, Kristine; Van Damme, Wim

    2016-01-01

    Background Non-communicable diseases (NCD) pose challenges to Cambodia’s health system. Medicines for NCD are on the National Essential Medicines List but no clinical guidelines support their utilization. Two social health protection schemes aimed at the informal sector population exist (Health Equity Funds and Insurance) together with two disease-specific interventions (a Peer Educator Network and Chronic Diseases Clinics) targeted at NCD patients. This study examines performance of these various schemes in relation to NCD. Methods Cross-sectional household survey among 709 individuals self-reporting diabetes and/or hypertension in three geographical locations in rural Cambodia using a structured questionnaire investigating diagnostic and treatment pathways, health seeking behaviour, health expenditures, and financial coping mechanisms. Results Two third of respondents with NCD were female and 55% did not belong to any scheme. The majority (59%) were diagnosed in the private sector and only 56% were on allopathic treatment that was mainly sought in the private sector (49%). Outpatient treatment cost was higher in the private sector and when using multiple providers of care. The majority were indebted, 11% due to health-related expenses. Contrary to social health protection schemes, disease-specific interventions offered better access to allopathic treatment and provided medicines in accordance with NEML. Conclusion The benefit packages of existing social health protection schemes and services in the public health sector should be adjusted to cater for the needs of people living with NCD in rural Cambodia. Initiatives that offer active disease management strategies and promote patients and community participation appear more successful in increasing treatment adherence and decreasing the risk of financial hardship. PMID:26815916

  4. Distributed magnetic field positioning system using code division multiple access

    NASA Technical Reports Server (NTRS)

    Prigge, Eric A. (Inventor)

    2003-01-01

    An apparatus and methods for a magnetic field positioning system use a fundamentally different, and advantageous, signal structure and multiple access method, known as Code Division Multiple Access (CDMA). This signal architecture, when combined with processing methods, leads to advantages over the existing technologies, especially when applied to a system with a large number of magnetic field generators (beacons). Beacons at known positions generate coded magnetic fields, and a magnetic sensor measures a sum field and decomposes it into component fields to determine the sensor position and orientation. The apparatus and methods can have a large `building-sized` coverage area. The system allows for numerous beacons to be distributed throughout an area at a number of different locations. A method to estimate position and attitude, with no prior knowledge, uses dipole fields produced by these beacons in different locations.

  5. Unifications and extensions of the multiple access communications problem

    NASA Astrophysics Data System (ADS)

    Molle, M. L.

    1981-08-01

    Multiple access protocols permit a broadcast communications channel to be shared by a large number of stations under distributed control. It is assumed that only one message at a time can be transmitted successfully over the common channel. A local optimality condition for synchronous multiple access protocols was derived and it is shown that many known protocols are special cases of this condition. A survey of much of the recent work on infinite population tree algorithms that use the history of channel activity to carry out short-range dynamic scheduling is included. An approach is presented for deriving upper bounds on the maximum stable throughput with finite average delay for infinite population protocols.

  6. Alternative multiple-access techniques for mobile satellite systems

    NASA Technical Reports Server (NTRS)

    Smith, Patrick O.; Geraniotis, Evaggelos

    1989-01-01

    The use of Code Division Multiple Access (CDMA) to satisfy the diverse requirements of a generic (land, maritime, aeronautical) mobile satellite system (MSS) network design is discussed. Comparisons between CDMA and Frequency Division Multiple Access (FDMA) show that a CDMA network design can support significantly more voice channel allocations than FDMA when relatively simple CDMA correlation receivers are employed, provided that there is sufficient space segment equivalent isotropically radiated power (EIRP). The use of more advanced CDMA receivers can improve the spectral and power efficiency. Although the use of CDMA may not gain immediate and widespread support in the international MSS community, provision for the use of CDMA for a domestic system in the U.S., and possibly for a regional system throughout North America, is likely.

  7. Code division multiple access signaling for modulated reflector technology

    DOEpatents

    Briles, Scott D.

    2012-05-01

    A method and apparatus for utilizing code division multiple access in modulated reflectance transmissions comprises the steps of generating a phase-modulated reflectance data bit stream; modifying the modulated reflectance data bit stream; providing the modified modulated reflectance data bit stream to a switch that connects an antenna to an infinite impedance in the event a "+1" is to be sent, or connects the antenna to ground in the event a "0" or a "-1" is to be sent.

  8. Next generation communications satellites: Multiple access and network studies

    NASA Technical Reports Server (NTRS)

    Stern, T. E.; Schwartz, M.; Meadows, H. E.; Ahmadi, H. K.; Gadre, J. G.; Gopal, I. S.; Matsmo, K.

    1980-01-01

    Following an overview of issues involved in the choice of promising system architectures for efficient communication with multiple small inexpensive Earth stations serving hetergeneous user populations, performance evaluation via analysis and simulation for six SS/TDMA (satellite-switched/time-division multiple access) system architectures is discussed. These configurations are chosen to exemplify the essential alternatives available in system design. Although the performance evaluation analyses are of fairly general applicability, whenever possible they are considered in the context of NASA's 30/20 GHz studies. Packet switched systems are considered, with the assumption that only a part of transponder capacit is devoted to packets, the integration of circuit and packet switched traffic being reserved for further study. Three types of station access are distinguished: fixed (FA), demand (DA), and random access (RA). Similarly, switching in the satellite can be assigned on a fixed (FS) or demand (DS) basis, or replaced by a buffered store-and-forward system (SF) onboard the satellite. Since not all access/switching combinations are practical, six systems are analyzed in detail: three FS SYSTEMS, FA/FS, DA/ES, RA/FS; one DS system, DA/DS; and two SF systems, FA/SF, DA/SF. Results are presented primarily in terms of delay-throughput characteristics.

  9. A novel interacting multiple model based network intrusion detection scheme

    NASA Astrophysics Data System (ADS)

    Xin, Ruichi; Venkatasubramanian, Vijay; Leung, Henry

    2006-04-01

    In today's information age, information and network security are of primary importance to any organization. Network intrusion is a serious threat to security of computers and data networks. In internet protocol (IP) based network, intrusions originate in different kinds of packets/messages contained in the open system interconnection (OSI) layer 3 or higher layers. Network intrusion detection and prevention systems observe the layer 3 packets (or layer 4 to 7 messages) to screen for intrusions and security threats. Signature based methods use a pre-existing database that document intrusion patterns as perceived in the layer 3 to 7 protocol traffics and match the incoming traffic for potential intrusion attacks. Alternately, network traffic data can be modeled and any huge anomaly from the established traffic pattern can be detected as network intrusion. The latter method, also known as anomaly based detection is gaining popularity for its versatility in learning new patterns and discovering new attacks. It is apparent that for a reliable performance, an accurate model of the network data needs to be established. In this paper, we illustrate using collected data that network traffic is seldom stationary. We propose the use of multiple models to accurately represent the traffic data. The improvement in reliability of the proposed model is verified by measuring the detection and false alarm rates on several datasets.

  10. Improvement of a quantum broadcasting multiple blind signature scheme based on quantum teleportation

    NASA Astrophysics Data System (ADS)

    Zhang, Wei; Qiu, Daowen; Zou, Xiangfu

    2016-06-01

    Recently, a broadcasting multiple blind signature scheme based on quantum teleportation has been proposed for the first time. It is claimed to have unconditional security and properties of quantum multiple signature and quantum blind signature. In this paper, we analyze the security of the protocol and show that each signatory can learn the signed message by a single-particle measurement and the signed message can be modified at random by any attacker according to the scheme. Furthermore, there are some participant attacks and external attacks existing in the scheme. Finally, we present an improved scheme and show that it can resist all of the mentioned attacks. Additionally, the secret keys can be used again and again, making it more efficient and practical.

  11. Improvement of a quantum broadcasting multiple blind signature scheme based on quantum teleportation

    NASA Astrophysics Data System (ADS)

    Zhang, Wei; Qiu, Daowen; Zou, Xiangfu

    2016-03-01

    Recently, a broadcasting multiple blind signature scheme based on quantum teleportation has been proposed for the first time. It is claimed to have unconditional security and properties of quantum multiple signature and quantum blind signature. In this paper, we analyze the security of the protocol and show that each signatory can learn the signed message by a single-particle measurement and the signed message can be modified at random by any attacker according to the scheme. Furthermore, there are some participant attacks and external attacks existing in the scheme. Finally, we present an improved scheme and show that it can resist all of the mentioned attacks. Additionally, the secret keys can be used again and again, making it more efficient and practical.

  12. Heterodyne detection using spectral line pairing for spectral phase encoding optical code division multiple access and dynamic dispersion compensation.

    PubMed

    Yang, Yi; Foster, Mark; Khurgin, Jacob B; Cooper, A Brinton

    2012-07-30

    A novel coherent optical code-division multiple access (OCDMA) scheme is proposed that uses spectral line pairing to generate signals suitable for heterodyne decoding. Both signal and local reference are transmitted via a single optical fiber and a simple balanced receiver performs sourceless heterodyne detection, canceling speckle noise and multiple-access interference (MAI). To validate the idea, a 16 user fully loaded phase encoded system is simulated. Effects of fiber dispersion on system performance are studied as well. Both second and third order dispersion management is achieved by using a spectral phase encoder to adjust phase shifts of spectral components at the optical network unit (ONU). PMID:23038313

  13. Isolated user security enhancement in optical code division multiple access network against eavesdropping

    NASA Astrophysics Data System (ADS)

    Jyoti, Vishav; Kaler, Rajinder Singh

    2012-09-01

    A novel virtual user system is modeled for enhancing the security of an optical code division multiple access (OCDMA) network. Although the OCDMA system implementing code shift keying (CSK) is secure against a conventional power detector, it is susceptible to differential eavesdropping. An analytical framework is developed for the CSK-OCDMA system to show eavesdropper's code interception performance for a single transmitting user in the presence of a virtual user. It is shown that the eavesdropper's probability of correct bit interception decreases from 7.1×10-1 to 1.85×10-5 with the inclusion of the virtual user. Furthermore, the results confirm that the proposed virtual user scheme increases the confidentiality of the CSK-OCDMA system and outperforms the conventional OCDMA scheme in terms of security.

  14. Analysis of an FBMC/OQAM scheme for asynchronous access in wireless communications

    NASA Astrophysics Data System (ADS)

    Mattera, Davide; Tanda, Mario; Bellanger, Maurice

    2015-12-01

    The OFDM/OQAM transceiver belongs to the filter-bank-based multicarrier (FBMC) family and, unlike OFDM schemes, it is particularly able to meet the requirements of the physical layer of cognitive radio networks such as high level of adjacent channel leakage ratio and asynchronous communications. The paper proposes and analyzes a new implementation structure, named frequency spreading, for the OFDM/OQAM transceiver. On flat channels, it is equivalent to the standard one in terms of input-output relations, though more complex. On multipath channels, it offers a crucial advantage in terms of equalization, which is performed in the frequency domain, leading to high performance and no additional delay. With its flexibility and level of performance, the analyzed scheme has the potential to outperform OFDM in the asynchronous access context and in cognitive radio networks.

  15. The FODA-TDMA satellite access scheme - Presentation, study of the system, and results

    NASA Astrophysics Data System (ADS)

    Celandroni, Nedo; Ferro, Erina

    1991-12-01

    A description is given of FODA-TDMA, a satellite access scheme designed for mixed traffic. The study of the system is presented and the choice of some parameters is justified. A simplified analytic solution is found, describing the steady-state behavior of the system. Some results of the simulation tests for an already existing hardware environment are also presented for the channel speeds of 2 and 8 Mb/s, considering both the stationary and the transient cases. The results of the experimentation at 2 Mb/s on the satellite Eutelsat-F2 are also presented and compared with the results of the simulation.

  16. A Comparative Study of Multiplexing Schemes for Next Generation Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Imtiaz, Waqas A.; Khan, Yousaf; Shah, Pir Mehar Ali; Zeeshan, M.

    2014-09-01

    Passive optical network (PON) is a high bandwidth, economical solution which can provide the necessary bandwidth to end-users. Wavelength division multiplexed passive optical networks (WDM PONs) and time division multiplexed passive optical networks (TDM PONs) are considered as an evolutionary step for next-generation optical access (NGOA) networks. However they fail to provide highest transmission capacity, efficient bandwidth access, and robust dispersion tolerance. Thus future PONs are considered on simpler, efficient and potentially scalable, optical code division multiplexed (OCDM) PONs. This paper compares the performance of existing PONs with OCDM PON to determine a suitable scheme for NGOA networks. Two system parameter are used in this paper: fiber length, and bit rate. Performance analysis using Optisystem shows that; for a sufficient system performance parameters i.e. bit error rate (BER) ≤ 10-9, and maximum quality factor (Q) ≥ 6, OCDMA PON efficiently performs upto 50 km with 10 Gbit/s per ONU.

  17. Multitasking for flows about multiple body configurations using the chimera grid scheme

    NASA Technical Reports Server (NTRS)

    Dougherty, F. C.; Morgan, R. L.

    1987-01-01

    The multitasking of a finite-difference scheme using multiple overset meshes is described. In this chimera, or multiple overset mesh approach, a multiple body configuration is mapped using a major grid about the main component of the configuration, with minor overset meshes used to map each additional component. This type of code is well suited to multitasking. Both steady and unsteady two dimensional computations are run on parallel processors on a CRAY-X/MP 48, usually with one mesh per processor. Flow field results are compared with single processor results to demonstrate the feasibility of running multiple mesh codes on parallel processors and to show the increase in efficiency.

  18. Guideline model for the bias-scheme-dependent power consumption of a resistive random access memory crossbar array

    NASA Astrophysics Data System (ADS)

    Sun, Wookyung; Choi, Sujin; Lim, Hyein; Shin, Hyungsoon

    2016-04-01

    The 1/2 and 1/3 bias schemes are commonly used to select a cell in a resistive random access memory (ReRAM) crossbar array. The 1/3 bias scheme is advantageous in terms of its write margin but typically requires a higher power consumption than the 1/2 bias scheme. The power consumption of ReRAM can vary according to the nonlinearity of the selector device. In this paper, we propose a power guideline model that suggests selector nonlinearity requirements to guarantee a lower power consumption for the 1/3 bias scheme than for the 1/2 bias scheme. Therefore, the selector nonlinearity requirements for the low power consumption of the 1/3 bias scheme can be immediately obtained using this guideline model without simulation.

  19. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    NASA Astrophysics Data System (ADS)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  20. Chip-interleaved optical code division multiple access relying on a photon-counting iterative successive interference canceller for free-space optical channels.

    PubMed

    Zhou, Xiaolin; Zheng, Xiaowei; Zhang, Rong; Hanzo, Lajos

    2013-07-01

    In this paper, we design a novel Poisson photon-counting based iterative successive interference cancellation (SIC) scheme for transmission over free-space optical (FSO) channels in the presence of both multiple access interference (MAI) as well as Gamma-Gamma atmospheric turbulence fading, shot-noise and background light. Our simulation results demonstrate that the proposed scheme exhibits a strong MAI suppression capability. Importantly, an order of magnitude of BER improvements may be achieved compared to the conventional chip-level optical code-division multiple-access (OCDMA) photon-counting detector. PMID:23842379

  1. Diffuse optical tomography based on multiple access coding

    NASA Astrophysics Data System (ADS)

    Wang, Xuefeng; Wang, Yuanqing; Su, Jinshan; Xu, Fan

    2016-04-01

    Diffuse optical tomography (DOT) has the advantages of being a non-invasive, non-radiation emitting and low-cost biological tissue imaging method, and many recent studies have employed this technology. By improving the spatial resolution and developing a new method for constantly improving the flexibility of the experimental device, the system can perform data acquisition rapidly and conveniently. We propose a method for rapid data acquisition based on multiple access coding; it can acquire data in parallel, and the system can greatly improve the temporal resolution of the data acquisition step in diffuse optical tomography thereafter. We simulate the encoding and decoding process of the source-detector pair and successfully isolate the source signal from mixed signals. The DOT image reconstruction highlight the effectiveness of the system.

  2. Survey of USSR contributions to random multiple-access communications

    NASA Astrophysics Data System (ADS)

    Tsybakov, B. S.

    1985-03-01

    It is pointed out that random multiple access (RMA) is one of the most efficient tools for channel sharing by a number of users. The theory of RMA has been significantly extended in the past few years. The present review provides most of the principal results on RMA which were obtained in the USSR up to the end of 1983. Aspects of general notation and definitions are discussed, and a description is given of subjects related to the Aloha algorithm. A mathematical analysis of the slotted Aloha algorithm is considered along with the generalization of the slotted Aloha algorithm to communication networks, studies related to unslotted Aloha, and the investigation of unslotted Aloha in networks. Other topics explored are concerned with the definition of an RMA algorithm and its parameters, the stack algorithm, the part-and-try algorithm, and upper bounds to capacity.

  3. S-band multiple-access interference study for advanced tracking and data relay satellite systems

    NASA Technical Reports Server (NTRS)

    Peng, Wei-Chung; Yang, Chau-Chin

    1990-01-01

    The results of a study on the effect of mutual interference among S-band multiple access (SMA) system users of advanced tracking and data relay satellite system (ATDRSS) are presented. In the ATDRSS era, the SMA system is required to support data rates ranging from 10 kb/s to 3 Mb/s. The system will consist of four advanced tracking and data relay satellites (ATDRS) each supporting up to five telemetry links. All users have 10 MHz bandwidth with their carrier frequency equal to 2.2875 GHz. A hybrid SDMA/CDMA scheme is used to mitigate the effect of the interference among system users. SMA system interference probability is evaluated with CLASS software. User link margin degradation due to mutual interference between two users is evaluated. System interference probability is evaluated for the projected 1996 mission model, a reference mission model, and a modified reference mission model.

  4. Asynchronous detection of optical code division multiple access signals using a bandwidth-efficient and wavelength-aware receiver.

    PubMed

    Fok, Mable P; Deng, Yanhua; Prucnal, Paul R

    2010-04-01

    We experimentally demonstrate what we believe to be a novel detection scheme for interfacing asynchronous optical code division multiple access (CDMA) signals with an electronic clock and data recovery system that operates only at the baseband bandwidth. This allows using a large optical bandwidth expansion factor in which the optical chip rate is much larger than the bandwidth of the optoelectronic receiver. The received optical CDMA signal is launched into a four-wave-mixing-based wavelength-aware all-optical front end that rejects multiaccess interference, followed by an amplitude-noise suppression stage comprised of a semiconductor optical amplifier. The clean signal is then converted into a non-return-to-zero-like signal by a baseband receiver. Using the proposed detection scheme, asynchronous transmission and detection of optical CDMA signals is implemented. With the novel detection scheme, the classic CDMA near-far problem is mitigated, and error-free detection is easily obtained. PMID:20364229

  5. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  6. Origin of barley accessions with multiple disease resistance determined by SSR analysis.

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Although only 1% of accessions of cultivated barley (Hordeum vulgare subsp. vulgare L.) in the USDA National Small Grains Collection (NSGC) are of unknown origin, these accessions represent 20% of the accessions with multiple disease resistance (MR). These accessions were originally obtained in 1930...

  7. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    NASA Astrophysics Data System (ADS)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol

  8. Generalized schemes for access and alignment of data in parallel processors with self-routing interconnection networks

    SciTech Connect

    Boppana, R.V.; Raghavendra, C.S. )

    1991-02-01

    In this paper the authors give a generalized solution to the problem of conflict-free access of various templates of data of a matrix, when they are stored in memory units in a parallel processor. The important features of the method are: compact representation of a skewing scheme, simple address computation, use of self- routing schemes to set up the interconnection network, and a general framework for the study of skewing schemes. In the method, each template access of interest will be a linear permutation on the processor address. The linear permutation involved determines the types of templates accessible. For parallel access of the most important templates, namely, row, column, main diagonal, and square blocks, the interconnection network needs to realize only the class of linear-complement permutations. It is known that with Benes or Omega as the interconnection network, one can efficiently self-route these permutations; this compares favorably with the schemes proposed by other researchers who assume that a cross bar is available for processor-memory interconnections. Hence, the approach given in the paper can be used to solve the data alignment problem for the existing parallel machines such as IBM RP3, Cedar multiprocessor, and NYU Ultracomputer. This is a generalized solution to the data skewing problem and encompasses the previous efforts by other researchers as special cases.

  9. Confined turbulent fluid-particle flow modeling using multiple-realization particle trajectory schemes

    NASA Astrophysics Data System (ADS)

    Adeniji-Fashola, A. A.

    1988-07-01

    A multiple-realization particle trajectory scheme has been developed and applied to the numerical prediction of confined turbulent fluid-particle flows. The example flows investigated include the vertical pipe upflow experimental data of Tsuji et al. and the experimental data of Leavitt for a coaxial jet flow, comprising a particle-laden central jet and a clean annular jet, into a large recirculation chamber. The results obtained from the numerical scheme agree well with the experimental data, lending confidence to the modeling approach. The multiple-realization particle trajectory turbulent flow modeling scheme is believed to be a more elegant and accurate approach to the extension of single-particle hydrodynamics to dilute multi-particle systems than the more commonly employed two-fluid modeling approach. It is also better able to incorporate additional force items such as lift, virtual mass and Bassett history terms directly into the particle equation of motion as appropriate. This makes it a suitable candidate for particle migration studies and an extension to situations involving liquid particulate phases with possible propulsion applications, such as in spray combustion, follows naturally.

  10. Confined turbulent fluid-particle flow modeling using multiple-realization particle trajectory schemes

    NASA Technical Reports Server (NTRS)

    Adeniji-Fashola, A. A.

    1988-01-01

    A multiple-realization particle trajectory scheme has been developed and applied to the numerical prediction of confined turbulent fluid-particle flows. The example flows investigated include the vertical pipe upflow experimental data of Tsuji et al. and the experimental data of Leavitt for a coaxial jet flow, comprising a particle-laden central jet and a clean annular jet, into a large recirculation chamber. The results obtained from the numerical scheme agree well with the experimental data, lending confidence to the modeling approach. The multiple-realization particle trajectory turbulent flow modeling scheme is believed to be a more elegant and accurate approach to the extension of single-particle hydrodynamics to dilute multi-particle systems than the more commonly employed two-fluid modeling approach. It is also better able to incorporate additional force items such as lift, virtual mass and Bassett history terms directly into the particle equation of motion as appropriate. This makes it a suitable candidate for particle migration studies and an extension to situations involving liquid particulate phases with possible propulsion applications, such as in spray combustion, follows naturally.

  11. Fourth Annual International Acquisitions Workshop: Access to Multiple Media Worldwide

    NASA Technical Reports Server (NTRS)

    1994-01-01

    Topics discussed during the workshop include: (1) Multinational-Multiple media collections and activities spanning many countries; (2) Multiple media in North American trade and commerce; (3) African spotlight; (4) Europe-Multiple media in national libraries and services; (5) Scandinavian spotlight; (6) Internet update; (7) Multiple media in US federal agencies; (8) Open-source multiple media in US federal agencies; and (9) Multiple media at US federal technical agencies-NIST and NOAA.

  12. HiCoDG: A Hierarchical Data-Gathering Scheme Using Cooperative Multiple Mobile Elements †

    PubMed Central

    Van Le, Duc; Oh, Hoon; Yoon, Seokhoon

    2014-01-01

    In this paper, we study mobile element (ME)-based data-gathering schemes in wireless sensor networks. Due to the physical speed limits of mobile elements, the existing data-gathering schemes that use mobile elements can suffer from high data-gathering latency. In order to address this problem, this paper proposes a new hierarchical and cooperative data-gathering (HiCoDG) scheme that enables multiple mobile elements to cooperate with each other to collect and relay data. In HiCoDG, two types of mobile elements are used: the mobile collector (MC) and the mobile relay (MR). MCs collect data from sensors and forward them to the MR, which will deliver them to the sink. In this work, we also formulated an integer linear programming (ILP) optimization problem to find the optimal trajectories for MCs and the MR, such that the traveling distance of MEs is minimized. Two variants of HiCoDG, intermediate station (IS)-based and cooperative movement scheduling (CMS)-based, are proposed to facilitate cooperative data forwarding from MCs to the MR. An analytical model for estimating the average data-gathering latency in HiCoDG was also designed. Simulations were performed to compare the performance of the IS and CMS variants, as well as a multiple traveling salesman problem (mTSP)-based approach. The simulation results show that HiCoDG outperforms mTSP in terms of latency. The results also show that CMS can achieve the lowest latency with low energy consumption. PMID:25526356

  13. Multiwavelength optical code-division-multiple-access communication systems

    NASA Astrophysics Data System (ADS)

    Lam, Cedric Fung

    1999-10-01

    There has been tremendous interest in applying spread spectrum and code division multiple access (CDMA) techniques to fiber optic communication systems. In this dissertation, we review the previous work on optical CDMA systems, and we propose and then demonstrate new optical CDMA system designs. The explosive growth in bandwidth demand during the recent years have compelled engineers to achieve one bit per hertz or more bandwidth utilization in optical fibers. We point out that in order to achieve efficient bandwidth utilization, full orthogonality is required in optical CDMA system. At the same time, one would like to avoid having an optical local oscillator, which significantly increases the system complexity. We have studied two spectrally encoded optical CDMA systems, both of which give us full orthogonality. A balanced optical detector, which `computes' the difference between two photodetectors signals, is used to obtain negative outputs from positive-only optical intensity signals, thus achieving full orthogonality in both systems. The first system, complementary spectral intensity encoding, is a fully non-coherent. A novel balanced transmitter has been invented for this system. Unfortunately, the performance of this system is limited by beat noise interference, sometimes called speckle noise. In the second system, spectral phase encoding, a multi-wavelength mode-locked laser source is employed. Spectral phase encoding is applied to various frequency components. By sending the unmodulated carrier along the optical fiber to the receiver, we can achieve the effect of coherent demodulation without using an optical local oscillator. While this system can avoid speckle noise, it is eventually limited by cumulative shot noise. We will show in this dissertation, that cumulative shot noise is unavoidable in all optical CDMA systems. Therefore the ultimate achievable performance of optical CDMA systems under shot noise limitation will be analyzed in this work. Lastly

  14. Proceedings of the Mobile Satellite System Architectures and Multiple Access Techniques Workshop

    NASA Technical Reports Server (NTRS)

    Dessouky, Khaled

    1989-01-01

    The Mobile Satellite System Architectures and Multiple Access Techniques Workshop served as a forum for the debate of system and network architecture issues. Particular emphasis was on those issues relating to the choice of multiple access technique(s) for the Mobile Satellite Service (MSS). These proceedings contain articles that expand upon the 12 presentations given in the workshop. Contrasting views on Frequency Division Multiple Access (FDMA), Code Division Multiple Access (CDMA), and Time Division Multiple Access (TDMA)-based architectures are presented, and system issues relating to signaling, spacecraft design, and network management constraints are addressed. An overview article that summarizes the issues raised in the numerous discussion periods of the workshop is also included.

  15. Has the Rajiv Aarogyasri Community Health Insurance Scheme of Andhra Pradesh Addressed the Educational Divide in Accessing Health Care?

    PubMed Central

    Rao, Mala; Singh, Prabal Vikram; Katyal, Anuradha; Samarth, Amit; Bergkvist, Sofi; Renton, Adrian; Netuveli, Gopalakrishnan

    2016-01-01

    Background Equity of access to healthcare remains a major challenge with families continuing to face financial and non-financial barriers to services. Lack of education has been shown to be a key risk factor for 'catastrophic' health expenditure (CHE), in many countries including India. Consequently, ways to address the education divide need to be explored. We aimed to assess whether the innovative state-funded Rajiv Aarogyasri Community Health Insurance Scheme of Andhra Pradesh state launched in 2007, has achieved equity of access to hospital inpatient care among households with varying levels of education. Methods We used the National Sample Survey Organization 2004 survey as our baseline and the same survey design to collect post-intervention data from 8623 households in the state in 2012. Two outcomes, hospitalisation and CHE for inpatient care, were estimated using education as a measure of socio-economic status and transforming levels of education into ridit scores. We derived relative indices of inequality by regressing the outcome measures on education, transformed as a ridit score, using logistic regression models with appropriate weights and accounting for the complex survey design. Findings Between 2004 and 2012, there was a 39% reduction in the likelihood of the most educated person being hospitalised compared to the least educated, with reductions observed in all households as well as those that had used the Aarogyasri. For CHE the inequality disappeared in 2012 in both groups. Sub-group analyses by economic status, social groups and rural-urban residence showed a decrease in relative indices of inequality in most groups. Nevertheless, inequalities in hospitalisation and CHE persisted across most groups. Conclusion During the time of the Aarogyasri scheme implementation inequalities in access to hospital care were substantially reduced but not eliminated across the education divide. Universal access to education and schemes such as Aarogyasri have the

  16. Design of an image encryption scheme based on a multiple chaotic map

    NASA Astrophysics Data System (ADS)

    Tong, Xiao-Jun

    2013-07-01

    In order to solve the problem that chaos is degenerated in limited computer precision and Cat map is the small key space, this paper presents a chaotic map based on topological conjugacy and the chaotic characteristics are proved by Devaney definition. In order to produce a large key space, a Cat map named block Cat map is also designed for permutation process based on multiple-dimensional chaotic maps. The image encryption algorithm is based on permutation-substitution, and each key is controlled by different chaotic maps. The entropy analysis, differential analysis, weak-keys analysis, statistical analysis, cipher random analysis, and cipher sensibility analysis depending on key and plaintext are introduced to test the security of the new image encryption scheme. Through the comparison to the proposed scheme with AES, DES and Logistic encryption methods, we come to the conclusion that the image encryption method solves the problem of low precision of one dimensional chaotic function and has higher speed and higher security.

  17. Optical Multiple Access Network (OMAN) for advanced processing satellite applications

    NASA Technical Reports Server (NTRS)

    Mendez, Antonio J.; Gagliardi, Robert M.; Park, Eugene; Ivancic, William D.; Sherman, Bradley D.

    1991-01-01

    An OMAN breadboard for exploring advanced processing satellite circuit switch applications is introduced. Network architecture, hardware trade offs, and multiple user interference issues are presented. The breadboard test set up and experimental results are discussed.

  18. A double-moment multiple-phase four-class bulk ice scheme, Part 1: Description

    NASA Technical Reports Server (NTRS)

    Ferrier, Brad Shoenberg

    1994-01-01

    A detailed ice-phase bulk microphysical scheme has been developed for simulating the hydrometeor distributions of convective and stratiform precipitation in different large-scale environmental conditions. The proposed scheme involves 90 distinct microphysical processes, which predict the mixing ratios and the number concentrations of small ice crystals, snow, graupel, and frozen drops/hail, as well as the mixing ratios of liquid water on wet precipitation ice (snow, graupel, frozen drops). The number of adjustable coefficients has been significantly reduced in comparison with other bulk schemes. Additional improvements have been made to the parameterization in the following areas: (1) representing small ice crystals with nonzero terminal fall velocities and dispersive size distributions, (2) accurate and computationally efficient calculations of precipitation collection processes, (3) reformulating the collection equation to prevent unrealistically large accretion rates, (4) more realistic conversion by riming between different classes of precipitation ice, (5) preventing unrealistically large rates of raindrop freezing and freezing of liquid water on ice, (6) detailed treatment of various rime-splintering ice multiplication mechanisms, (7) a simple representation of the Hobbs-Rangno ice enhancement process, (8) aggregation of small ice crystals and snow, and (9) allowing explicit competition between cloud water condensation and ice deposition rates rather than using saturation adjustment techniques. For the purposes of conserving the higher moments of the particle distributions, preserving the spectral widths (or slopes) of the particle spectra is shown to be more important than strict conservation of particle number concentration when parameterizing changes in ice-particle number concentrations due to melting, vapor transfer processes (sublimation of dry ice, evaporation from wet ice), and conversion between different hydrometeor species. The microphysical scheme

  19. Novel Scheme of Carrier Tri-reuse and Distribution Fiber Protection Based on Round Shift Method in Optical Access Network

    NASA Astrophysics Data System (ADS)

    Chen, Haibin; Gan, Chaoqin; Yin, Maojun; Ni, Cuiping

    2015-06-01

    A novel architecture of optical access network based on round shift method is proposed. Round shift method is composed by round service mode of carriers and cycle characteristic of 2×N arrayed waveguide grating (AWG). By utilizing the round service mode, every carrier is tri-reused to provide service for three different optical network units. Besides, in remote node, the 2×3N AWG can be replaced by three 2×N AWGs and AWGs' channel spacing is increased. So, the demand on RN's AWGs is decreased. Furthermore, based on the cycle characteristic of 2×N AWG, a 1+1 protection scheme is presented to provide independent protection for distribution fibers. Simulation and analysis show the proposed scheme works well.

  20. Concept for Multiple-Access Free-Space Laser Communications

    NASA Technical Reports Server (NTRS)

    Wilson, Keith

    2004-01-01

    A design concept for a proposed airborne or spaceborne free-space optical-communication terminal provides for simultaneous reception of signals from multiple other opticalcommunication terminals aboard aircraft or spacecraft that carry scientific instruments and fly at lower altitudes. The concept reflects the need for rapid acquisition and tracking of the signals coming from the lower-altitude terminals as they move across the field of view.

  1. An Integrated Approach for Accessing Multiple Datasets through LANCE

    NASA Astrophysics Data System (ADS)

    Murphy, K. J.; Teague, M.; Conover, H.; Regner, K.; Beaumont, B.; Masuoka, E.; Vollmer, B.; Theobald, M.; Durbin, P.; Michael, K.; Boller, R. A.; Schmaltz, J. E.; Davies, D.; Horricks, K.; Ilavajhala, S.; Thompson, C. K.; Bingham, A.

    2011-12-01

    The NASA/GSFC Land Atmospheres Near-real time Capability for EOS (LANCE) provides imagery for approximately 40 data products from MODIS, AIRS, AMSR-E and OMI to support the applications community in the study of a variety of phenomena. Thirty-six of these products are available within 2.5 hours of observation at the spacecraft. The data set includes the population density data provided by the EOSDIS Socio-Economic Data and Applications Center (SEDAC). The purpose of this paper is to describe the variety of tools that have been developed by LANCE to support user access to the imagery. The long-standing Rapid Response system has been integrated into LANCE and is a major vehicle for the distribution of the imagery to end users. There are presently approximately 10,000 anonymous users per month accessing these imagery. The products are grouped into 14 applications categories such as Smoke Plumes, Pollution, Fires, Agriculture and the selection of any category will make relevant subsets of the 40 products available as possible overlays in an interactive Web Client utilizing Web Mapping Service (WMS) to support user investigations (http://lance2.modaps.eosdis.nasa.gov/wms/). For example, selecting Severe Storms will include 6 products for MODIS, OMI, AIRS, and AMSR-E plus the SEDAC population density data. The client and WMS were developed using open-source technologies such as OpenLayers and MapServer and provides a uniform, browser-based access to data products. All overlays are downloadable in PNG, JPEG, or GeoTiff form up to 200MB per request. The WMS was beta-tested with the user community and substantial performance improvements were made through the use of such techniques as tile-caching. LANCE established a partnership with Physical Oceanography Distributed Active Archive Center (PO DAAC) to develop an alternative presentation for the 40 data products known as the State of the Earth (SOTE). This provides a Google Earth-based interface to the products grouped in

  2. Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.

    PubMed

    Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei

    2016-05-01

    This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration. PMID:27010391

  3. Next generation communications satellites: multiple access and network studies

    NASA Technical Reports Server (NTRS)

    Meadows, H. E.; Schwartz, M.; Stern, T. E.; Ganguly, S.; Kraimeche, B.; Matsuo, K.; Gopal, I.

    1982-01-01

    Efficient resource allocation and network design for satellite systems serving heterogeneous user populations with large numbers of small direct-to-user Earth stations are discussed. Focus is on TDMA systems involving a high degree of frequency reuse by means of satellite-switched multiple beams (SSMB) with varying degrees of onboard processing. Algorithms for the efficient utilization of the satellite resources were developed. The effect of skewed traffic, overlapping beams and batched arrivals in packet-switched SSMB systems, integration of stream and bursty traffic, and optimal circuit scheduling in SSMB systems: performance bounds and computational complexity are discussed.

  4. Mof-Tree: A Spatial Access Method To Manipulate Multiple Overlapping Features.

    ERIC Educational Resources Information Center

    Manolopoulos, Yannis; Nardelli, Enrico; Papadopoulos, Apostolos; Proietti, Guido

    1997-01-01

    Investigates the manipulation of large sets of two-dimensional data representing multiple overlapping features, and presents a new access method, the MOF-tree. Analyzes storage requirements and time with respect to window query operations involving multiple features. Examines both the pointer-based and pointerless MOF-tree representations.…

  5. Measuring spatial accessibility to healthcare for populations with multiple transportation modes.

    PubMed

    Mao, Liang; Nekorchuk, Dawn

    2013-11-01

    Few measures of healthcare accessibility have considered multiple transportation modes when people seek healthcare. Based on the framework of the 2 Step Floating Catchment Area Method (2SFCAM), we proposed an innovative method to incorporate transportation modes into the accessibility estimation. Taking Florida, USA, as a study area, we illustrated the implementation of the multi-mode 2SFCAM, and compared the accessibility estimates with those from the traditional single-mode 2SFCAM. The results suggest that the multi-modal method, by accounting for heterogeneity in populations, provides more realistic accessibility estimations, and thus offers a better guidance for policy makers to mitigate health inequity issues. PMID:24077335

  6. Improving access to drugs by poor households through a cost sharing drug scheme: a wealth ranking approach.

    PubMed

    Karkee, Shiba Bahadur; Tamang, Asha Lal; Gurung, Yam Bahadur; Mishra, Gokul; Banez-Ockelford, Jane; Saunders, Philippa; Rai, Chanda

    2005-06-01

    In Nepal lack of drugs in government health institutions has markedly reduced access to essential drugs by poor patients. Despite the implementation of a drug scheme with adequate availability of drugs and with provision of fee exemption for the poor, the poorest people still had no access to drugs. We carried out a wealth ranking process to identify poorest of the poor households in a village. Each of the poorest household was provided with a free treatment card and information about the availability of free service at the local health post. Baseline and post intervention data on service utilisation and prescribing practices were collected using carbon copies of prescriptions. Data were also collected about the attitude of patients, using qualitative interviews. About 1.8% of the total annual patient visits to the Health Post were from cardholder households. The annual health post utilization rate for the poor patients was about 1.2, whereas among other patients it was 0.7. On average, about 2.4 drugs were prescribed to any of the cardholder patients, and 50.8% of prescriptions included at least one antibiotic drug. No injection was prescribed. Within 18 months, the total fee exemption provided to a poorest household was equivalent to about US dollars 1.6. Since the method is valued by local people, and is also feasible to implement through the communities' efforts, it is recommended to initiate it in other drug scheme areas as well. PMID:16295717

  7. The impact of alternative cost recovery schemes on access and equity in Niger.

    PubMed

    Diop, F; Yazbeck, A; Bitrán, R

    1995-09-01

    The authors examine accessibility and the sustainability of quality health care in a rural setting under two alternative cost recovery methods, a fee-for-service method and a type of social financing (risk-sharing) strategy based on an annual tax+fee-for-service. Both methods were accompanied by similar interventions aimed at improving the quality of primary health services. Based on pilot tests of cost recovery in the non-hospital sector in Niger, the article presents results from baseline and final survey data, as well as from facility utilization, cost, and revenue data collected in two test districts and a control district. Cost recovery accompanied by quality improvements increases equity and access to health care and the type of cost recovery method used can make a difference. In Niger, higher access for women, children, and the poor resulted from the tax+fee method, than from the pure fee-for-service method. Moreover, revenue generation per capita under the tax+fee method was two times higher than under the fee-for-service method, suggesting that the prospects of sustainability were better under the social financing strategy. However, sustainability under cost recovery and improved quality depends as much on policy measures aimed at cost containment, particularly for drugs, as on specific cost recovery methods. PMID:10151841

  8. A comparison of Frequency Domain Multiple Access (FDMA) and Time Domain Multiple Access (TDMA) approaches to satellite service for low data rate Earth stations

    NASA Technical Reports Server (NTRS)

    Stevens, G.

    1983-01-01

    A technological and economic assessment is made of providing low data rate service to small earth stations by satellite at Ka-band. Various Frequency Domain Multiple Access (FDMA) and Time Domain Multiple Access (TDMA) scenarios are examined and compared on the basis of cost to the end user. Very small stations (1 to 2 meters in diameter) are found not to be viable alternatives to available terrestrial services. However, medium size (3 to 5 meters) earth stations appear to be very competitive if a minimum throughput of about 1.5 Mbs is maintained. This constrains the use of such terminals to large users and shared use by smaller users. No advantage was found to the use of FDMA. TDMA had a slight advantage from a total system viewpoint and a very significant advantage in the space segment (about 1/3 the required payload weight for an equivalent capacity).

  9. Implementation of an optimal stomatal conductance scheme in the Australian Community Climate Earth Systems Simulator (ACCESS1.3b)

    NASA Astrophysics Data System (ADS)

    Kala, J.; De Kauwe, M. G.; Pitman, A. J.; Lorenz, R.; Medlyn, B. E.; Wang, Y.-P.; Lin, Y.-S.; Abramowitz, G.

    2015-12-01

    We implement a new stomatal conductance scheme, based on the optimality approach, within the Community Atmosphere Biosphere Land Exchange (CABLEv2.0.1) land surface model. Coupled land-atmosphere simulations are then performed using CABLEv2.0.1 within the Australian Community Climate and Earth Systems Simulator (ACCESSv1.3b) with prescribed sea surface temperatures. As in most land surface models, the default stomatal conductance scheme only accounts for differences in model parameters in relation to the photosynthetic pathway but not in relation to plant functional types. The new scheme allows model parameters to vary by plant functional type, based on a global synthesis of observations of stomatal conductance under different climate regimes over a wide range of species. We show that the new scheme reduces the latent heat flux from the land surface over the boreal forests during the Northern Hemisphere summer by 0.5-1.0 mm day-1. This leads to warmer daily maximum and minimum temperatures by up to 1.0 °C and warmer extreme maximum temperatures by up to 1.5 °C. These changes generally improve the climate model's climatology of warm extremes and improve existing biases by 10-20 %. The bias in minimum temperatures is however degraded but, overall, this is outweighed by the improvement in maximum temperatures as there is a net improvement in the diurnal temperature range in this region. In other regions such as parts of South and North America where ACCESSv1.3b has known large positive biases in both maximum and minimum temperatures (~ 5 to 10 °C), the new scheme degrades this bias by up to 1 °C. We conclude that, although several large biases remain in ACCESSv1.3b for temperature extremes, the improvements in the global climate model over large parts of the boreal forests during the Northern Hemisphere summer which result from the new stomatal scheme, constrained by a global synthesis of experimental data, provide a valuable advance in the long-term development

  10. Optical and electronic error correction schemes for highly parallel access memories

    NASA Astrophysics Data System (ADS)

    Neifeld, Mark A.; Hayes, Jerry D.

    1993-11-01

    We have fabricated and tested an optically addressed, parallel electronic Reed-Solomon decoder for use with parallel access optical memories. A comparison with various serial implementations has demonstrated that for many instances of code block size and error correction capability, the parallel approach is superior from the perspectives of VLSI layout area and decoding latency. The demonstrated Reed-Solomon parallel pipeline decoder operates on 60 bit input words and has been demonstrated at a clock rate of 5 MHz yielding a demonstrated data rate of 300 Mbps.

  11. Cometary cores with multiple structure from the oort cloud and the general scheme of origin of unusually active comets

    SciTech Connect

    Davydov, V.D.

    1986-03-01

    A newly conceived scheme is constructed which synthesizes consistent solutions to several principal problems concerning multiple-core comets: a power mechanism, a place and epoch of formation of the multiple core structure, the qualitative differences between current structure and younger structure, the origin of two types of cometary orbits, and a trigger mechanism for recent ignition of cometary activity of a multiple core. This scheme uses a new explanation of the ejection of dust (including icy dust) from various cometary cores as evidence that the material of multiple-core comets may be collisionally ablated at the expense of the comet-centered orbital energy of a multitude of massive boulders (see Kosm. Issled., No. 6 (1984)). Natural mechanisms are shown which preserve this important feature of multiple cores. The concept consists of the following elements: evolution of a system of satellites of the core toward a colli sionless structure; preservation of internal kinetic energy in the collisionless system over astro nomically lengthy time scales; tidal initiation of a collisional mechanism with the first revolution of the ancient multiple core in the zone of visibility. It is possible that such revoltions correspond to the existence of especially active comets in nearly parabolic orbits. Multiple structure in the core of active short-period comets might be descended from a nearly parabolic comet (if the theory holds on perturbational multistage transformation of near-parabolic orbits into contemporary short-period orbits).

  12. Students' Whole Number Multiplicative Concepts: A Critical Constructive Resource for Fraction Composition Schemes

    ERIC Educational Resources Information Center

    Hackenberg, Amy J.; Tillema, Erik S.

    2009-01-01

    This article reports on the activity of two pairs of sixth grade students who participated in an 8-month teaching experiment that investigated the students' construction of fraction composition schemes. A fraction composition scheme consists of the operations and concepts used to determine, for example, the size of 1/3 of 1/5 of a whole in…

  13. Employing optical code division multiple access technology in the all fiber loop vibration sensor system

    NASA Astrophysics Data System (ADS)

    Tseng, Shin-Pin; Yen, Chih-Ta; Syu, Rong-Shun; Cheng, Hsu-Chih

    2013-12-01

    This study proposes a spectral amplitude coding-optical code division multiple access (SAC-OCDMA) framework to access the vibration frequency of a test object on the all fiber loop vibration sensor (AFLVS). Each user possesses an individual SAC, and fiber Bragg grating (FBG) encoders/decoders using multiple FBG arrays were adopted, providing excellent orthogonal properties in the frequency domain. The system also mitigates multiple access interference (MAI) among users. When an optical fiber is bent to a point exceeding the critical radius, the fiber loop sensor becomes sensitive to external physical parameters (e.g., temperature, strain, and vibration). The AFLVS involves placing a fiber loop with a specific radius on a designed vibration platform.

  14. Joint Power and Multiple Access Control for Wireless Mesh Network with Rose Projection Method

    PubMed Central

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches. PMID:24883384

  15. Slotted Aloha multiple access and error control coding for land mobile satellite networks

    NASA Astrophysics Data System (ADS)

    Lutz, Erich

    1992-10-01

    This paper considers a satellite network with data messages being transmitted by land mobile users according to slotted Aloha multiple access. The mobile communication links suffering from multipath fading and signal shadowing are modelled as Gilbert-Elliott channels. FEC block coding is used to correct transmission errors. The maximum achievable information throughput and the mean packet delay are derived from a combined analysis of the multiple access and FEC/ARQ protocol. The results show that the additional overhead necessary for FEC is outweighed by the benefit in throughput and delay. Finally, the capture effect and its consequences are discussed.

  16. Analysis of a multi-access scheme and asynchronous transmit-only UWB for wireless body area networks.

    PubMed

    Keong, Ho Chee; Yuce, Mehmet R

    2009-01-01

    Ultra Wideband (UWB) has many favorable factors for use in a wireless body area network application. The major drawback is the high power consumption of an UWB receiver. One solution to address this problem is to use a transmit-only UWB sensor node. In this paper, we propose a multi-access scheme that is suitable for asynchronous transmit-only UWB wireless body area networks (UWB-WBAN). Each sensor attached on the patient under monitoring is assigned a unique number of UWB pulses per data bit. The number of UWB pulses assigned to the sensors is optimized to improve the bit error rate and system reliability. Simulation shows that through careful selection of the number of pulses for the sensors, it is possible to maintain almost similar bit error probability, regardless of the distance from the receiver. PMID:19964453

  17. Multiple spindles and cellularization during microsporogenesis in an artificially induced tetraploid accession of Brachiaria ruziziensis (Gramineae).

    PubMed

    Risso-Pascotto, Claudicéia; Pagliarini, Maria Suely; do Valle, Cacilda Borges

    2005-01-01

    The genus Brachiaria is characterized by a majority of polyploid accessions--mainly tetraploid--and apomictic reproduction. Sexuality is found among diploids. To overcome incompatibility barriers, accessions with the same ploidy level are necessarily used in hybridization. Thus, sexual diploid accessions were tetraploidized to be used as female genitors. This paper reports microsporogenesis in an artificially induced tetraploid accession of Brachiaria ruziziensis. Chromosome pairing at diakinesis ranged from univalents to tetravalents, with predominance of bivalents. Irregular chromosome segregation was frequent in both meiotic divisions. During the first division, multiple spindles showing different arrangements were recorded. The spindle position determined the plane of first cytokinesis and the number of chromosomes determined the size of the cell. Meiotic products were characterized by polyads with spores of different sizes. Pollen sterility was estimated at 61.38%. The limitations of using this accession in the breeding program are discussed. PMID:15365762

  18. QoS differentiation scheme with multiple burst transmission and virtual resource reservation for optical burst switching networks

    NASA Astrophysics Data System (ADS)

    Arakawa, Yutaka; Yamanaka, Naoaki

    2007-08-01

    We propose what we believe to be a new scheme to provide basic quality of service (QoS) in optical burst switching networks. Our proposal consists of multiple burst transmission (MBT) and virtual resource reservation (VRR). With MBT, consecutive bursts headed to the same destination are serially transmitted, and, at the transmission of high-priority bursts, the wavelength resource reserved by the head burst is kept reserving for the following bursts. We call it VRR. Computer simulations show that our proposal offers a larger differentiation of burst loss than the conventional offset-based QoS differentiation scheme. Also, it can improve the burst loss rate of both high-priority and low-priority bursts. Moreover, it can minimize the burst loss rate of high-priority bursts even when the high-priority traffic occupies a large percentage of the network traffic. The proposed scheme can be applied to the future multiservice optical network architecture.

  19. The index of multiple deprivation 2000 access domain: a useful indicator for public health?

    PubMed

    Niggebrugge, Aphrodite; Haynes, Robin; Jones, Andrew; Lovett, Andrew; Harvey, Ian

    2005-06-01

    The access domain of the UK index of multiple deprivation (IMD) 2000 was designed to identify populations in small areas with poor geographical access to certain local key services. The measure is a composite of straight line distances to post offices, large food shops, primary schools and general practice surgeries for population sub-groups. Using the region of East Anglia as a case study area, this research evaluated the utility of the IMD2000 as an indicator of access to primary care. IMD2000 access scores for electoral wards were compared with a range of more detailed indicators of travel times and bus availability for visiting a general practitioner generated in a geographical information system (GIS). A range of easy-to-calculate surrogate variables was developed and tested as possible candidates to improve the explanatory power of the IMD2000 access score. The access domain was negatively correlated with the other five deprivation domains that comprise the overall index, suggesting that access should not be combined with the other measures of deprivation into a composite single score. The access domain was also found to predict access to primary care only with moderate accuracy. Two additional indicators of accessibility calculated in a GIS (road kilometres per thousand population and the presence of a major road in each ward) were found to add slightly to the power of the index. The predictive power of the index was best in urban areas, although it is in rural areas that access to primary care is a more important public health issue. The IMD2000 should be therefore used with caution as a measure of health service accessibility in rural areas. PMID:15820584

  20. Channel access schemes and fiber optic configurations for integrated-services local area networks. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Nassehi, M. Mehdi

    1987-01-01

    Local Area Networks are in common use for data communications and have enjoyed great success. Recently, there is a growing interest in using a single network to support many applications in addition to traditional data traffic. These additional applications introduce new requirements in terms of volume of traffic and real-time delivery of data which are not met by existing networks. To satisfy these requirements, a high-bandwidth tranmission medium, such as fiber optics, and a distributed channel access scheme for the efficient sharing of the bandwidth among the various applications are needed. As far as the throughput-delay requirements of the various application are concerned, a network structure along with a distributed channel access are proposed which incorporate appropriate scheduling policies for the transmission of outstanding messages on the network. A dynamic scheduling policy was devised which outperforms all existing policies in terms of minimizing the expected cost per message. A broadcast mechanism was devised for the efficient dissemination of all relevant information. Fiber optic technology is considered for the high-bandwidth transmisison medium.

  1. Multi-pulse multi-delay (MPMD) multiple access modulation for UWB

    DOEpatents

    Dowla, Farid U.; Nekoogar, Faranak

    2007-03-20

    A new modulation scheme in UWB communications is introduced. This modulation technique utilizes multiple orthogonal transmitted-reference pulses for UWB channelization. The proposed UWB receiver samples the second order statistical function at both zero and non-zero lags and matches the samples to stored second order statistical functions, thus sampling and matching the shape of second order statistical functions rather than just the shape of the received pulses.

  2. Optical receiver sensitivity analysis for electronic code division multiple access over passive optical network

    NASA Astrophysics Data System (ADS)

    Han, Yamei; Liang, Siyuan; Wang, Liqian; Chen, Xue

    2010-12-01

    Optical receiver sensitivity for electronic code division multiple access over a passive optical network (ECDMA-PON) is analyzed theoretically. Compared with TDM system, ECDMA-PON offers better receiver sensitivity due to coding gain. Fundamental simulation results are provided to show its validity.

  3. Free-space optical mesh-connected bus networks using wavelength-division multiple access.

    PubMed

    Li, Y; Lohmann, A W; Rao, S B

    1993-11-10

    A novel optical free-space mesh-connected bus interconnect network architecture is proposed. A mesh-connected bus [IEEE Trans. Comput. C-30, 264-273 (1981)] is known to have the capability of interconnecting, with a three-stage switching, N nodes with a power distribution loss proportional to √N and is therefore advantageous for networking a large number, say over 1000, of communicating ports. Based on conventional space-invariant optical components in a compact and efficient geometry, the proposed optical mesh-connected bus system concept can be used to build either free-space optical interconnect links for parallel processing applications or central switching systems for local or global lightwave communication networks. The proposed architecture lends itself to networking under both the wavelength-division multiple access and other multiple-access environments. In this paper, based on the wavelength-division multiple-access environment, various optical system implementation and performance issues are discused and parameters are analyzed. It was found that by use of a reasonably compact three-dimensional free-space volume, more than 100,000 dispersion-limited communication nodes at a uniform channel spacing of 0.75 nm can be linked with a moderate power distribution loss of 28 dB. Some preliminary optical wavelength-division multiple-access mesh-connected bus experiments based on a 27 × 27 panchromatic optical source array were performed to confirm the operational principle of the proposed concept. PMID:20856480

  4. Study on the energy-efficient scheme based on the interconnection of optical-network-units for next generation optical access network

    NASA Astrophysics Data System (ADS)

    Lv, Yunxin; Jiang, Ning; Qiu, Kun; Xue, Chenpeng

    2014-12-01

    An energy-efficient scheme based on the interconnection of optical network unit (ONU) is introduced, which can significantly reduce the energy consumption of the low-traffic operation. The energy consumption model for the ONU-interconnected optical access network (OAN) based on the electronic switch (ES) technology is established, and the energy efficiency of the proposed scheme is analyzed and compared with that of the OAN using optical switch (OS). The simulation results demonstrate that the ONU-interconnected scheme can efficiently reduce the energy consumption of OAN, and it shows a good energy consumption performance under daily traffic model.

  5. Dynamical downscaling of regional climate over eastern China using RSM with multiple physics scheme ensembles

    NASA Astrophysics Data System (ADS)

    Peishu, Zong; Jianping, Tang; Shuyu, Wang; Lingyun, Xie; Jianwei, Yu; Yunqian, Zhu; Xiaorui, Niu; Chao, Li

    2016-06-01

    The parameterization of physical processes is one of the critical elements to properly simulate the regional climate over eastern China. It is essential to conduct detailed analyses on the effect of physical parameterization schemes on regional climate simulation, to provide more reliable regional climate change information. In this paper, we evaluate the 25-year (1983-2007) summer monsoon climate characteristics of precipitation and surface air temperature by using the regional spectral model (RSM) with different physical schemes. The ensemble results using the reliability ensemble averaging (REA) method are also assessed. The result shows that the RSM model has the capacity to reproduce the spatial patterns, the variations, and the temporal tendency of surface air temperature and precipitation over eastern China. And it tends to predict better climatology characteristics over the Yangtze River basin and the South China. The impact of different physical schemes on RSM simulations is also investigated. Generally, the CLD3 cloud water prediction scheme tends to produce larger precipitation because of its overestimation of the low-level moisture. The systematic biases derived from the KF2 cumulus scheme are larger than those from the RAS scheme. The scale-selective bias correction (SSBC) method improves the simulation of the temporal and spatial characteristics of surface air temperature and precipitation and advances the circulation simulation capacity. The REA ensemble results show significant improvement in simulating temperature and precipitation distribution, which have much higher correlation coefficient and lower root mean square error. The REA result of selected experiments is better than that of nonselected experiments, indicating the necessity of choosing better ensemble samples for ensemble.

  6. Lexical access changes in patients with multiple sclerosis: a two-year follow-up study.

    PubMed

    Sepulcre, Jorge; Peraita, Herminia; Goni, Joaquin; Arrondo, Gonzalo; Martincorena, Inigo; Duque, Beatriz; Velez de Mendizabal, Nieves; Masdeu, Joseph C; Villoslada, Pablo

    2011-02-01

    The aim of the study was to analyze lexical access strategies in patients with multiple sclerosis (MS) and their changes over time. We studied lexical access strategies during semantic and phonemic verbal fluency tests and also confrontation naming in a 2-year prospective cohort of 45 MS patients and 20 healthy controls. At baseline, switching lexical access strategy (both in semantic and in phonemic verbal fluency tests) and confrontation naming were significantly impaired in MS patients compared with controls. After 2 years follow-up, switching score decreased, and cluster size increased over time in semantic verbal fluency tasks, suggesting a failure in the retrieval of lexical information rather than an impairment of the lexical pool. In conclusion, these findings underline the significant presence of lexical access problems in patients with MS and could point out their key role in the alterations of high-level communications abilities in MS. PMID:20835944

  7. System performances of optical space code-division multiple-access-based fiber-optic two-dimensional parallel data link.

    PubMed

    Nakamura, M; Kitayama, K

    1998-05-10

    Optical space code-division multiple access is a scheme to multiplex and link data between two-dimensional processors such as smart pixels and spatial light modulators or arrays of optical sources like vertical-cavity surface-emitting lasers. We examine the multiplexing characteristics of optical space code-division multiple access by using optical orthogonal signature patterns. The probability density function of interference noise in interfering optical orthogonal signature patterns is calculated. The bit-error rate is derived from the result and plotted as a function of receiver threshold, code length, code weight, and number of users. Furthermore, we propose a prethresholding method to suppress the interference noise, and we experimentally verify that the method works effectively in improving system performance. PMID:18273237

  8. Electro-optical time gating based on Mach-Zehnder modulator for multiple access interference elimination in optical code-division multiple access networks

    NASA Astrophysics Data System (ADS)

    Chen, Yinfang; Wang, Rong; Fang, Tao; Pu, Tao; Xiang, Peng; Zheng, Jilin; Zhu, Huatao

    2014-05-01

    An electro-optical time gating technique, which is based on an electrical return-to-zero (RZ) pulse driven Mach-Zehnder modulator (MZM) for eliminating multiple access interference (MAI) in optical code-division multiple access (OCDMA) networks is proposed. This technique is successfully simulated in an eight-user two-dimensional wavelength-hopping time-spreading system, as well as in a three-user temporal phase encoding system. Results show that in both systems the MAI noise is efficiently removed and the average received power penalty improved. Both achieve error-free transmissions at a bit rate of 2.5 Gb/s. In addition, we also individually discuss effects of parameters in two systems, such as the extinction ratio of the MZM, the duty cycle of the driven RZ pulse, and the time misalignment between the driven pulse and the decoded autocorrelation peak, on the output bit error rate performance. Our work shows that employing a common MZM as a thresholder provides another probability and an interesting cost-effective choice for a smart size, low energy, and less complex thresholding technique for integrated detection in OCDMA networks.

  9. An Innovative Approach to Scheme Learning Map Considering Tradeoff Multiple Objectives

    ERIC Educational Resources Information Center

    Lin, Yu-Shih; Chang, Yi-Chun; Chu, Chih-Ping

    2016-01-01

    An important issue in personalized learning is to provide learners with customized learning according to their learning characteristics. This paper focused attention on scheming learning map as follows. The learning goal can be achieved via different pathways based on alternative materials, which have the relationships of prerequisite, dependence,…

  10. Analysis of a stack algorithm for random multiple-access communication

    NASA Astrophysics Data System (ADS)

    Fayolle, G.; Flajolet, P.; Jacquet, P.; Hofri, M.

    1985-03-01

    The present investigation is concerned with the performance of a protocol for managing the use of a single-channel packet switching communications network such as the one employed in the Aloha network. The conducted analysis is mainly concerned with the Capetanakis-Tsybakov-Mikhailov (CTM) access protocols and collision resolution algorithms (CRA), coupled with free, or continuous, access of newly arriving packets into the contention. The considered scheme proves ergodic as long as the rate of generation of new packets is below a certain bound. Attention is given to the basic equation and the collision resolution interval (CRI) duration, the direct evaluation of the mean delay, the distribution of the states of the top of stack, the moments of packet delay time, and the numerical results.

  11. Study of spread spectrum multiple access systems for satellite communications with overlay on current services

    NASA Technical Reports Server (NTRS)

    Ha, Tri T.; Pratt, Timothy

    1989-01-01

    The feasibility of using spread spectrum techniques to provide a low-cost multiple access system for a very large number of low data terminals was investigated. Two applications of spread spectrum technology to very small aperture terminal (VSAT) satellite communication networks are presented. Two spread spectrum multiple access systems which use a form of noncoherent M-ary FSK (MFSK) as the primary modulation are described and the throughput analyzed. The analysis considers such factors as satellite power constraints and adjacent satellite interference. Also considered is the effect of on-board processing on the multiple access efficiency and the feasibility of overlaying low data rate spread spectrum signals on existing satellite traffic as a form of frequency reuse is investigated. The use of chirp is examined for spread spectrum communications. In a chirp communication system, each data bit is converted into one or more up or down sweeps of frequency, which spread the RF energy across a broad range of frequencies. Several different forms of chirp communication systems are considered, and a multiple-chirp coded system is proposed for overlay service. The mutual interference problem is examined in detail and a performance analysis undertaken for the case of a chirp data channel overlaid on a video channel.

  12. Accessibility

    MedlinePlus

    ... www.nlm.nih.gov/medlineplus/accessibility.html MedlinePlus Accessibility To use the sharing features on this page, ... Subscribe to RSS Follow us Disclaimers Copyright Privacy Accessibility Quality Guidelines Viewers & Players MedlinePlus Connect for EHRs ...

  13. Universal optical line terminal encoding and decoding architecture in two-code keying for noncoherent spectral amplitude coding optical code division multiple access systems

    NASA Astrophysics Data System (ADS)

    Yeh, Bih-Chyun; Lin, Cheing-Hong; Yang, De-Nian

    2014-01-01

    We propose a new code family, called extended shifted prime codes, and the universal encoding architecture for spectral amplitude coding optical code division multiple access systems using a two-code keying scheme. The proposed system can eliminate multiuser interference and suppress phase-induced intensity noise. In addition, we design the ESP codes to be an encoding/decoding architecture based on the array waveguide grating architecture and reduce the power loss and the complexity of the optical line terminal. The numerical results demonstrate that the proposed system with ESP codes outperforms the existing one-dimensional shifted prime codes system.

  14. Multiple-access phased array antenna simulator for a digital beam-forming system investigation

    NASA Technical Reports Server (NTRS)

    Kerczewski, Robert J.; Yu, John; Walton, Joanne C.; Perl, Thomas D.; Andro, Monty; Alexovich, Robert E.

    1992-01-01

    Future versions of data relay satellite systems are currently being planned by NASA. Being given consideration for implementation are on-board digital beamforming techniques which will allow multiple users to simultaneously access a single S-band phased array antenna system. To investigate the potential performance of such a system, a laboratory simulator has been developed at NASA's Lewis Research Center. This paper describes the system simulator, and in particular, the requirements, design and performance of a key subsystem, the phased array antenna simulator, which provides realistic inputs to the digital processor including multiple signals, noise, and nonlinearities.

  15. Fairness for Non-Orthogonal Multiple Access in 5G Systems

    NASA Astrophysics Data System (ADS)

    Timotheou, Stelios; Krikidis, Ioannis

    2015-10-01

    In non-orthogonal multiple access (NOMA) downlink, multiple data flows are superimposed in the power domain and user decoding is based on successive interference cancellation. NOMA's performance highly depends on the power split among the data flows and the associated power allocation (PA) problem. In this letter, we study NOMA from a fairness standpoint and we investigate PA techniques that ensure fairness for the downlink users under i) instantaneous channel state information (CSI) at the transmitter, and ii) average CSI. Although the formulated problems are non-convex, we have developed low-complexity polynomial algorithms that yield the optimal solution in both cases considered.

  16. Multiple-access phased array antenna simulator for a digital beam forming system investigation

    NASA Technical Reports Server (NTRS)

    Kerczewski, Robert J.; Yu, John; Walton, Joanne C.; Perl, Thomas D.; Andro, Monty; Alexovich, Robert E.

    1992-01-01

    Future versions of data relay satellite systems are currently being planned by NASA. Being given consideration for implementation are on-board digital beamforming techniques which will allow multiple users to simultaneously access a single S-band phased array antenna system. To investigate the potential performance of such a system, a laboratory simulator has been developed at NASA's Lewis Research Center. This paper describes the system simulator, and in particular, the requirements, design, and performance of a key subsystem, the phased array antenna simulator, which provides realistic inputs to the digital processor including multiple signals, noise, and nonlinearities.

  17. Error correction coding for frequency-hopping multiple-access spread spectrum communication systems

    NASA Technical Reports Server (NTRS)

    Healy, T. J.

    1982-01-01

    A communication system which would effect channel coding for frequency-hopped multiple-access is described. It is shown that in theory coding can increase the spectrum utilization efficiency of a system with mutual interference to 100 percent. Various coding strategies are discussed and some initial comparisons are given. Some of the problems associated with implementing the type of system described here are discussed.

  18. Study of optoelectronic switch for satellite-switched time-division multiple access

    NASA Technical Reports Server (NTRS)

    Su, Shing-Fong; Jou, Liz; Lenart, Joe

    1987-01-01

    The use of optoelectronic switching for satellite switched time division multiple access will improve the isolation and reduce the crosstalk of an IF switch matrix. The results are presented of a study on optoelectronic switching. Tasks include literature search, system requirements study, candidate switching architecture analysis, and switch model optimization. The results show that the power divided and crossbar switching architectures are good candidates for an IF switch matrix.

  19. Coherent direct sequence optical code multiple access encoding-decoding efficiency versus wavelength detuning.

    PubMed

    Pastor, D; Amaya, W; García-Olcina, R; Sales, S

    2007-07-01

    We present a simple theoretical model of and the experimental verification for vanishing of the autocorrelation peak due to wavelength detuning on the coding-decoding process of coherent direct sequence optical code multiple access systems based on a superstructured fiber Bragg grating. Moreover, the detuning vanishing effect has been explored to take advantage of this effect and to provide an additional degree of multiplexing and/or optical code tuning. PMID:17603606

  20. Active microdisk resonators in an optical code division multiple access system

    NASA Astrophysics Data System (ADS)

    Akhavan, Hooman

    2013-02-01

    An optical code division multiple access design consisting of a set of active microdisks coupled to a waveguide bus for both encoder and decoder is presented. This integrated design is beneficial for secure transmission of data through an optical fiber channel. Device optimization and performance analysis shows dependence of the output signal quality on number of users and necessity of proper adjustment of quality factor of the resonators considering intended transmitted data rate.

  1. Cascaded holographic polymer reflection grating filters for optical-code-division multiple-access applications.

    PubMed

    Kostuk, Raymond K; Maeda, Wendi; Chen, Chia-Hung; Djordjevic, Ivan; Vasic, Bane

    2005-12-10

    We evaluate the use of edge-illuminated holographic Bragg filters formed in phenanthrenequinone-doped poly(methyl methacrylate) for optical-code-division multiple-access (OCDMA) coding and decoding applications. Experimental cascaded Bragg filters are formed to select two different wavelengths with a fixed distance between the gratings and are directly coupled to a fiber-measurement system. The configuration and tolerances of the cascaded gratings are shown to be practical for time-wavelength OCDMA applications. PMID:16363782

  2. Strict optical orthogonal codes for purely asynchronous code-division multiple-access applications.

    PubMed

    Zhang, J G

    1996-12-10

    Strict optical orthogonal codes are presented for purely asynchronous optical code-division multiple-access (CDMA) applications. The proposed code can strictly guarantee the peaks of its cross-correlation functions and the sidelobes of any of its autocorrelation functions to have a value of 1 in purely asynchronous data communications. The basic theory of the proposed codes is given. An experiment on optical CDMA systems is also demonstrated to verify the characteristics of the proposed code. PMID:21151299

  3. Persons with Multiple Disabilities Exercise Adaptive Response Schemes with the Help of Technology-Based Programs: Three Single-Case Studies

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Oliva, Doretta; Campodonico, Francesca; Lang, Russell

    2012-01-01

    The present three single-case studies assessed the effectiveness of technology-based programs to help three persons with multiple disabilities exercise adaptive response schemes independently. The response schemes included (a) left and right head movements for a man who kept his head increasingly static on his wheelchair's headrest (Study I), (b)…

  4. Pentagraph image fusion scheme for motion blur prevention using multiple monochromatic images.

    PubMed

    Volfman, Alon A; Mendlovic, David; Raz, Ariel

    2016-04-10

    This paper introduces the pentagraph image fusion (PIF) scheme for motion-related blur prevention in images. The PIF algorithm processes five monochromatic images into a single, low-noise, no-blur color image. The images are acquired using a new photography scheme, sequential filter photography (SFP), where instead of using a stationary Bayer pattern color filter array in front of the image sensor, a tunable color filter array is used. Using this approach, several monochromatic images are captured one by one and later fused into one color image. The SFP introduces various advantages such as higher resolution, better SNR, and the ability to control both exposure time and color filter separately for each image. The PIF algorithm harnesses all the advantages of SFP for the first time, to the best of our knowledge, in the field of blur-free image acquisition. Five images are taken with controllable exposure time and color filter, three images for the color bands, and two high-signal panchromatic images. These images are fused together to be a single, low-noise, no-blur color image. The algorithm presents a generic approach of dealing with both local and global motion blur and does not require any user intervention. PMID:27139880

  5. Optimization schemes for efficient multiple exciton generation and extraction in colloidal quantum dots

    NASA Astrophysics Data System (ADS)

    Damtie, Fikeraddis A.; Karki, Khadga J.; Pullerits, Tõnu; Wacker, Andreas

    2016-08-01

    Multiple exciton generation (MEG) is a process in which more than one electron hole pair is generated per absorbed photon. It allows us to increase the efficiency of solar energy harvesting. Experimental studies have shown the multiple exciton generation yield of 1.2 in isolated colloidal quantum dots. However real photoelectric devices require the extraction of electron hole pairs to electric contacts. We provide a systematic study of the corresponding quantum coherent processes including extraction and injection and show that a proper design of extraction and injection rates enhances the yield significantly up to values around 1.6.

  6. The rigorous stochastic matrix multiplication scheme for the calculations of reduced equilibrium density matrices of open multilevel quantum systems

    NASA Astrophysics Data System (ADS)

    Chen, Xin

    2014-04-01

    Understanding the roles of the temporary and spatial structures of quantum functional noise in open multilevel quantum molecular systems attracts a lot of theoretical interests. I want to establish a rigorous and general framework for functional quantum noises from the constructive and computational perspectives, i.e., how to generate the random trajectories to reproduce the kernel and path ordering of the influence functional with effective Monte Carlo methods for arbitrary spectral densities. This construction approach aims to unify the existing stochastic models to rigorously describe the temporary and spatial structure of Gaussian quantum noises. In this paper, I review the Euclidean imaginary time influence functional and propose the stochastic matrix multiplication scheme to calculate reduced equilibrium density matrices (REDM). In addition, I review and discuss the Feynman-Vernon influence functional according to the Gaussian quadratic integral, particularly its imaginary part which is critical to the rigorous description of the quantum detailed balance. As a result, I establish the conditions under which the influence functional can be interpreted as the average of exponential functional operator over real-valued Gaussian processes for open multilevel quantum systems. I also show the difference between the local and nonlocal phonons within this framework. With the stochastic matrix multiplication scheme, I compare the normalized REDM with the Boltzmann equilibrium distribution for open multilevel quantum systems.

  7. The rigorous stochastic matrix multiplication scheme for the calculations of reduced equilibrium density matrices of open multilevel quantum systems

    SciTech Connect

    Chen, Xin

    2014-04-21

    Understanding the roles of the temporary and spatial structures of quantum functional noise in open multilevel quantum molecular systems attracts a lot of theoretical interests. I want to establish a rigorous and general framework for functional quantum noises from the constructive and computational perspectives, i.e., how to generate the random trajectories to reproduce the kernel and path ordering of the influence functional with effective Monte Carlo methods for arbitrary spectral densities. This construction approach aims to unify the existing stochastic models to rigorously describe the temporary and spatial structure of Gaussian quantum noises. In this paper, I review the Euclidean imaginary time influence functional and propose the stochastic matrix multiplication scheme to calculate reduced equilibrium density matrices (REDM). In addition, I review and discuss the Feynman-Vernon influence functional according to the Gaussian quadratic integral, particularly its imaginary part which is critical to the rigorous description of the quantum detailed balance. As a result, I establish the conditions under which the influence functional can be interpreted as the average of exponential functional operator over real-valued Gaussian processes for open multilevel quantum systems. I also show the difference between the local and nonlocal phonons within this framework. With the stochastic matrix multiplication scheme, I compare the normalized REDM with the Boltzmann equilibrium distribution for open multilevel quantum systems.

  8. Optimization of remedial pumping schemes for a ground-water site with multiple contaminants

    SciTech Connect

    Xiang, Y.; Sykes, J.F.; Thomson, N.R.

    1996-01-01

    This paper presents an optimization analysis of the remedial pumping design for a contaminated aquifer located in Elmira, Ontario, Canada. The remediation task presented in the paper is to remove two ground-water contaminant species, NDMA (N-nitrosodimethylamine) and chlorobenzene, to such extent that the specified ground-water quality standards are met. The contaminants, NDMA and chlorobenzene, have different initial plume configurations and retardation characteristics. The required quality standard for NDMA is five orders of magnitude smaller than the initial peak concentration. The objective is to minimize total pumping, and the constraints incorporate ground-water quality requirements on the maximum and the spatially averaged residual concentrations, with contaminant source control being considered. On the combination of simulation and optimization, the results of this study indicate that the performance of an optimization algorithm based on gradient search is controlled by the specified cleanup levels, and that contaminant concentrations can be nonconvex and nonsmooth for some pumping schemes.

  9. Above the nominal limit performance evaluation of multiwavelength optical code-division multiple-access systems

    NASA Astrophysics Data System (ADS)

    Inaty, Elie; Raad, Robert; Fortier, Paul; Shalaby, Hossam M. H.

    2009-03-01

    We provide an analysis for the performance of a multiwavelength optical code-division multiple-access (MW-OCDMA) network when the system is working above the nominal transmission rate limit imposed by passive encoding-decoding operation. We address the problem of overlapping in such a system and how it can directly affect the bit error rate (BER). A unified mathematical framework is presented under the assumption of one-coincidence sequences with nonrepeating wavelengths. A closed form expression of the multiple access interference limited BER is provided as a function of different system parameters. Results show that the performance of the MW-OCDMA system can be critically affected when working above the nominal limit, an event that can happen when the network operates at a high transmission rate. In addition, the impact of the derived error probability on the performance of two newly proposed medium access control (MAC) protocols, the S-ALOHA and the R3T, is also investigated. It is shown that for low transmission rates, the S-ALOHA is better than the R3T, while the R3T is better at very high transmission rates. In general, it is postulated that the R3T protocol suffers a higher delay mainly because of the presence of additional modes.

  10. Impact of optical hard limiter on the performance of an optical overlapped-code division multiple access system

    NASA Astrophysics Data System (ADS)

    Inaty, Elie; Raad, Robert; Tablieh, Nicole

    2011-08-01

    Throughout this paper, a closed form expression of the multiple access interference (MAI) limited bit error rate (BER) is provided for the multiwavelength optical code-division multiple-access system when the system is working above the nominal transmission rate limit imposed by the passive encoding-decoding operation. This system is known in literature as the optical overlapped code division multiple access (OV-CDMA) system. A unified analytical framework is presented emphasizing the impact of optical hard limiter (OHL) on the BER performance of such a system. Results show that the performance of the OV-CDMA system may be highly improved when using OHL preprocessing at the receiver side.

  11. Investigation of in-band transmission of both spectral amplitude coding/optical code division multiple-access and wavelength division multiplexing signals

    NASA Astrophysics Data System (ADS)

    Ashour, Isaac A. M.; Shaari, Sahbudin; Shalaby, Hossam M. H.; Menon, P. Susthitha

    2011-06-01

    The transmission of both optical code division multiple-access (OCDMA) and wavelength division multiplexing (WDM) users on the same band is investigated. Code pulses of spectral amplitude coding (SAC)/optical code division multiple-access (CDMA) are overlaid onto a multichannel WDM system. Notch filters are utilized in order to suppress the WDM interference signals for detection of optical broadband CDMA signals. Modified quadratic congruence (MQC) codes are used as the signature codes for the SAC/OCDMA system. The proposed system is simulated and its performance in terms of both the bit-error rate and Q-factor are determined. In addition, eavesdropper probability of error-free code detection is evaluated. Our results are compared to traditional nonhybrid systems. It is concluded that the proposed hybrid scheme still achieves acceptable performance. In addition, it provides enhanced data confidentiality as compared to the scheme with SAC/OCDMA only. It is also shown that the performance of the proposed system is limited by the interference of the WDM signals. Furthermore, the simulation illustrates the tradeoff between the performance and confidentiality for authorized users.

  12. Signaling system for multiple-access laser communications and interference protection.

    PubMed

    Riza, N A; Hershey, J E; Hassan, A A

    1993-04-10

    Signaling by spatial coding is proposed for asynchronous multiple-access free-space optical communications and interference mitigation. The large spatial bandwidth (e.g., 10(6) pixels) of each laser transmitter aperture is utilized for user coding, while the transmitter temporal bandwidth is preserved for information signals. Signal recovery is based on incoherent optical detection, spatial sampling, and electronic or optical matched filtering of the remotely received transmit optical beam Fresnel or Fraunhofer diffraction pattern. The proposed signaling method is appropriate for multiple-access free-space laser links involving multiple transmitters that use a common receiver. With electronic filtering, low-to-medium (e.g., 3 Mbits/s) data-rate users are appropriate. With a lenslet-array-based incoherent optical correlator, higher (e.g., 100 Mbits/s) data rates can be achieved. Improved interference protection is achieved cby spatially distributed bit-duration-based processing. Preliminary simulation results are carried out to demonstrate operating principles. PMID:20820331

  13. An efficient sparse matrix multiplication scheme for the CYBER 205 computer

    NASA Technical Reports Server (NTRS)

    Lambiotte, Jules J., Jr.

    1988-01-01

    This paper describes the development of an efficient algorithm for computing the product of a matrix and vector on a CYBER 205 vector computer. The desire to provide software which allows the user to choose between the often conflicting goals of minimizing central processing unit (CPU) time or storage requirements has led to a diagonal-based algorithm in which one of four types of storage is selected for each diagonal. The candidate storage types employed were chosen to be efficient on the CYBER 205 for diagonals which have nonzero structure which is dense, moderately sparse, very sparse and short, or very sparse and long; however, for many densities, no diagonal type is most efficient with respect to both resource requirements, and a trade-off must be made. For each diagonal, an initialization subroutine estimates the CPU time and storage required for each storage type based on results from previously performed numerical experimentation. These requirements are adjusted by weights provided by the user which reflect the relative importance the user places on the two resources. The adjusted resource requirements are then compared to select the most efficient storage and computational scheme.

  14. Access to Preventive Health Care in Severely Disabled Women with Multiple Sclerosis

    PubMed Central

    Dobos, Katharine; Healy, Brian

    2015-01-01

    Background: Nonambulatory patients may be at risk for poor access to preventive health screening. Few studies have reported on this access in severely disabled women with multiple sclerosis (MS). We sought to describe preventive medical care in the most disabled women with MS and to identify factors that may influence access to care. Methods: Patient records from the Partners MS Center database were reviewed. Women with Expanded Disability Status Scale scores of 7 or greater were selected. Proportions of patients with preventive-care visits were compared with 2012 Centers for Disease Control and Prevention (CDC) guidelines and normative data. Logistic regression was used to assess demographic and disease effects on receiving services. Results: Forty-eight percent of patients had annual mammograms versus 72% of healthy women and the CDC target of 81%; 41.8% had Papanicolaou smears within 3 years compared with 82% of healthy women and the target of 93%; and 61.2% aged 50 years and older ever had a colonoscopy compared with the target of 70%. Younger age predicted lower rates of colonoscopy (P < .002) and mammography (P < .004), and shorter disease duration predicted lower rates of mammography (P < .004). Obesity was associated with a lower likelihood of colonoscopy (P = .007) and bone density screening (P = .02). Conclusions: Women with severe MS disability are vulnerable to significantly decreased access to preventive care. The influence of patient and physician factors and the possible consequent delays in cancer diagnosis should be further clarified. PMID:26300706

  15. Gigabit Ethernet signal transmission using asynchronous optical code division multiple access.

    PubMed

    Ma, Philip Y; Fok, Mable P; Shastri, Bhavin J; Wu, Ben; Prucnal, Paul R

    2015-12-15

    We propose and experimentally demonstrate a novel architecture for interfacing and transmitting a Gigabit Ethernet (GbE) signal using asynchronous incoherent optical code division multiple access (OCDMA). This is the first such asynchronous incoherent OCDMA system carrying GbE data being demonstrated to be working among multi-users where each user is operating with an independent clock/data rate and is granted random access to the network. Three major components, the GbE interface, the OCDMA transmitter, and the OCDMA receiver are discussed in detail. The performance of the system is studied and characterized through measuring eye diagrams, bit-error rate and packet loss rate in real-time file transfer. Our Letter also addresses the near-far problem and realizes asynchronous transmission and detection of signal. PMID:26670529

  16. Spatial-phase code-division multiple-access system with multiplexed Fourier holography switching for reconfigurable optical interconnection.

    PubMed

    Takasago, K; Takekawa, M; Shirakawa, A; Kannari, F

    2000-05-10

    A new, to our knowledge, space-variant optical interconnection system based on a spatial-phase code-division multiple-access technique with multiplexed Fourier holography is described. In this technique a signal beam is spread over wide spatial frequencies by an M-sequence pseudorandom phase code. At a receiver side a selected signal beam is properly decoded, and at the same time its spatial pattern is shaped with a Fourier hologram, which is recorded by light that is encoded with the same M-sequence phase mask as the desired signal beam and by light whose spatial beam pattern is shaped to a signal routing pattern. Using the multiplexed holography, we can simultaneously route multisignal flows into individually specified receiver elements. The routing pattern can also be varied by means of switching the encoding phase code or replacing the hologram. We demonstrated a proof-of-principle experiment with a doubly multiplexed hologram that enables simultaneous routing of two signal beams. Using a numerical model, we showed that the proposed scheme can manage more than 250 routing patterns for one signal flow with one multiplexed hologram at a signal-to-noise ratio of ~5. PMID:18345134

  17. Design and performance evaluation of a wideband FM spread-spectrum multiple-access system

    NASA Technical Reports Server (NTRS)

    Wachsman, R. H.; Ghais, A. F.

    1971-01-01

    The system described performs the tracking and communications functions of a tracking and data relay satellite system (TDRS). The spread-spectrum signal format is achieved through wide deviation FM by a sinusoidal subcarrier unique to each multiple-access user. A compound phase-locked loop tracks carrier and subcarrier and demodulates data and ranging signals. Design parameters of user and ground terminals for TDRS are given. Acquisition procedures are described. Performance analyses are presented including the effects of noise, RFI, multipath and other users.

  18. A Code Phase Division Multiple Access (CPDMA) technique for VSAT satellite communications

    NASA Technical Reports Server (NTRS)

    Bruno, R.; Mcomber, R.; Weinberg, A.

    1991-01-01

    A reference concept and implementation relevant to the application of Code Phase Division Multiple Access (CPDMA) to a high capacity satellite communication system providing 16 Kbps single hop channels between Very Small Aperture Terminals (VSAT's) is described. The description includes a potential implementation of an onboard CPDMA bulk demodulator/converter utilizing programmable charge coupled device (CCD) technology projected to be available in the early 1990's. A high level description of the system architecture and operations, identification of key functional and performance requirements of the system elements, and analysis results of end-to-end system performance relative to key figures of merit such as spectral efficiency are also provided.

  19. Analysis of multiple access techniques in multi-satellite and multi-spot mobile satellite systems

    NASA Technical Reports Server (NTRS)

    Corazza, Giovanni E.; Ferrarelli, Carlo; Vatalaro, Francesco

    1995-01-01

    In this paper the analysis of mobile satellite systems adopting constellations of multi-spot satellites over non-geostationary orbits is addressed. A link design procedure is outlined, taking into account system spectrum efficiency, probability of bit error and outage probability. A semi-analytic approach to the evaluation of outage probability in the presence of fading and imperfect power control is described, and applied to single channel per carrier (SCPC) and code division multiple access (CDMA) techniques. Some results are shown for the Globalstar, Iridium and Odyssey orbital configurations.

  20. Code extraction from encoded signal in time-spreading optical code division multiple access.

    PubMed

    Si, Zhijian; Yin, Feifei; Xin, Ming; Chen, Hongwei; Chen, Minghua; Xie, Shizhong

    2010-01-15

    A vulnerability that allows eavesdroppers to extract the code from the waveform of the noiselike encoded signal of an isolated user in a standard time-spreading optical code division multiple access communication system using bipolar phase code is experimentally demonstrated. The principle is based on fine structure in the encoded signal. Each dip in the waveform corresponds to a transition of the bipolar code. Eavesdroppers can get the code by analyzing the chip numbers between any two transitions; then a decoder identical to the legal user's can be fabricated, and they can get the properly decoded signal. PMID:20081977

  1. Quantum superadditivity in linear optics networks: Sending bits via multiple-access Gaussian channels

    SciTech Connect

    Czekaj, L.; Horodecki, P.; Korbicz, J. K.; Chhajlany, R. W.

    2010-08-15

    Superadditivity effects of communication capacities are known in the case of discrete variable quantum channels. We describe the continuous variable analog of one of these effects in the framework of Gaussian multiple access channels (MACs). Classically, superadditivity-type effects are strongly restricted: For example, adding resources to one sender is never advantageous to other senders in sending their respective information to the receiver. We show that this rule can be surpassed using quantum resources, giving rise to a type of truly quantum superadditivity. This is illustrated here for two examples of experimentally feasible Gaussian MACs.

  2. A high capacity multiple watermarking scheme based on Fourier descriptor and Sudoku

    NASA Astrophysics Data System (ADS)

    Zhang, Li; Zheng, Huimin

    2015-12-01

    Digital watermark is a type of technology to hide some significant information which is mainly used to protect digital data. A high capacity multiple watermarking method is proposed, which adapts the Fourier descriptor to pre-process the watermarks, while a Sudoku puzzle is used as a reference matrix in embedding process and a key in extraction process. It can dramatically reduce the required capacity by applying Fourier descriptor. Meanwhile, the security of watermarks can be guaranteed due to the Sudoku puzzle. Unlike previous algorithms applying Sudoku puzzle in spatial domain, the proposed algorithm works in transformed domain by applying LWT2.In addition, the proposed algorithm can detect the temper location accurately. The experimental results demonstrated that the goals mentioned above have been achieved.

  3. Distributed Power Control with Multiple Agents in a Distributed Base Station Scheme Using Macrodiversity

    NASA Astrophysics Data System (ADS)

    Leroux, Philippe; Roy, Sébastien

    Power management in wireless networks has been thoroughly studied and applied in many different contexts. However, the problem has not been tackled from a multiple-agent perspective (MA). This paper intends to do so in the context of a wireless network comprised of distributed base stations using macrodiversity. The proposed design is shown to provide efficient use of macrodiversity resources and high energy efficiency when compared with more traditional algorithms. Moreover, the power control mechanism is completely decentralized, while avoiding direct information exchange or excessive signaling, which makes it highly scalable. Its auto-configuration property, stemming from its MA basis, offers high adaptivity when experiencing high or low interference levels. This leads to a naturally balanced resource usage, while also maintaining nearly full efficiency with only a reduced set of discrete power levels, thus making low-cost electronic implementation practical.

  4. Frequency-hopped multiple access communications with coding and side information

    NASA Astrophysics Data System (ADS)

    Wang, Qiang; Chao, Yuying

    1992-02-01

    The authors consider frequency-hopped spread-spectrum multiple-access communications using M-ary modulation and error-correction coding. The major concerns are multiple-access interference and the network capacity in terms of the number of users that can transmit simultaneously for a given level of codeword error probability. Block coding is studied in detail. The authors first consider the use of Q-ary Reed-Solomon (RS) codes in combination with M-ary modulation with mismatched alphabets so that Q is greater than M. It is shown that the network capacity is drastically reduced in comparison with the system with matched alphabets. As a remedy, the use of matched M-ary BCH codes is proposed as an alternative to mismatched RS codes. It is shown that when the number of users in the system is large, a BCH code outperforms an RX code with a comparable code rate and decoding complexity. The authors consider the use of a robust technique for generation of reliable side information based on a ratio-threshold test. They analyze its performance in conjunction with MFSK and error-erasure correction decoding. It is shown that this nonideal ratio-threshold method can increase the network capacity in comparison with the system with perfect side information.

  5. Diagonal Eigenvalue Unity (DEU) code for spectral amplitude coding-optical code division multiple access

    NASA Astrophysics Data System (ADS)

    Ahmed, Hassan Yousif; Nisar, K. S.

    2013-08-01

    Code with ideal in-phase cross correlation (CC) and practical code length to support high number of users are required in spectral amplitude coding-optical code division multiple access (SAC-OCDMA) systems. SAC systems are getting more attractive in the field of OCDMA because of its ability to eliminate the influence of multiple access interference (MAI) and also suppress the effect of phase induced intensity noise (PIIN). In this paper, we have proposed new Diagonal Eigenvalue Unity (DEU) code families with ideal in-phase CC based on Jordan block matrix with simple algebraic ways. Four sets of DEU code families based on the code weight W and number of users N for the combination (even, even), (even, odd), (odd, odd) and (odd, even) are constructed. This combination gives DEU code more flexibility in selection of code weight and number of users. These features made this code a compelling candidate for future optical communication systems. Numerical results show that the proposed DEU system outperforms reported codes. In addition, simulation results taken from a commercial optical systems simulator, Virtual Photonic Instrument (VPI™) shown that, using point to multipoint transmission in passive optical network (PON), DEU has better performance and could support long span with high data rate.

  6. 39% access time improvement, 11% energy reduction, 32 kbit 1-read/1-write 2-port static random-access memory using two-stage read boost and write-boost after read sensing scheme

    NASA Astrophysics Data System (ADS)

    Yamamoto, Yasue; Moriwaki, Shinichi; Kawasumi, Atsushi; Miyano, Shinji; Shinohara, Hirofumi

    2016-04-01

    We propose novel circuit techniques for 1 clock (1CLK) 1 read/1 write (1R/1W) 2-port static random-access memories (SRAMs) to improve read access time (tAC) and write margins at low voltages. Two-stage read boost (TSR-BST) and write word line boost (WWL-BST) after the read sensing schemes have been proposed. TSR-BST reduces the worst read bit line (RBL) delay by 61% and RBL amplitude by 10% at V DD = 0.5 V, which improves tAC by 39% and reduces energy dissipation by 11% at V DD = 0.55 V. WWL-BST after read sensing scheme improves minimum operating voltage (V min) by 140 mV. A 32 kbit 1CLK 1R/1W 2-port SRAM with TSR-BST and WWL-BST has been developed using a 40 nm CMOS.

  7. Efficient traffic grooming with dynamic ONU grouping for multiple-OLT-based access network

    NASA Astrophysics Data System (ADS)

    Zhang, Shizong; Gu, Rentao; Ji, Yuefeng; Wang, Hongxiang

    2015-12-01

    Fast bandwidth growth urges large-scale high-density access scenarios, where the multiple Passive Optical Networking (PON) system clustered deployment can be adopted as an appropriate solution to fulfill the huge bandwidth demands, especially for a future 5G mobile network. However, the lack of interaction between different optical line terminals (OLTs) results in part of the bandwidth resources waste. To increase the bandwidth efficiency, as well as reduce bandwidth pressure at the edge of a network, we propose a centralized flexible PON architecture based on Time- and Wavelength-Division Multiplexing PON (TWDM PON). It can provide flexible affiliation for optical network units (ONUs) and different OLTs to support access network traffic localization. Specifically, a dynamic ONU grouping algorithm (DGA) is provided to obtain the minimal OLT outbound traffic. Simulation results show that DGA obtains an average 25.23% traffic gain increment under different OLT numbers within a small ONU number situation, and the traffic gain will increase dramatically with the increment of the ONU number. As the DGA can be deployed easily as an application running above the centralized control plane, the proposed architecture can be helpful to improve the network efficiency for future traffic-intensive access scenarios.

  8. A carrier sensed multiple access protocol for high data base rate ring networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank

    1990-01-01

    The results of the study of a simple but effective media access protocol for high data rate networks are presented. The protocol is based on the fact that at high data rates networks can contain multiple messages simultaneously over their span, and that in a ring, nodes used to detect the presence of a message arriving from the immediate upstream neighbor. When an incoming signal is detected, the node must either abort or truncate a message it is presently sending. Thus, the protocol with local carrier sensing and multiple access is designated CSMA/RN. The performance of CSMA/RN with TTattempt and truncate is studied using analytic and simulation models. Three performance factors, wait or access time, service time and response or end-to-end travel time are presented. The service time is basically a function of the network rate, it changes by a factor of 1 between no load and full load. Wait time, which is zero for no load, remains small for load factors up to 70 percent of full load. Response time, which adds travel time while on the network to wait and service time, is mainly a function of network length, especially for longer distance networks. Simulation results are shown for CSMA/RN where messages are removed at the destination. A wide range of local and metropolitan area network parameters including variations in message size, network length, and node count are studied. Finally, a scaling factor based upon the ratio of message to network length demonstrates that the results, and hence, the CSMA/RN protocol, are applicable to wide area networks.

  9. Adaptation of AMO-FBMC-OQAM in optical access network for accommodating asynchronous multiple access in OFDM-based uplink transmission

    NASA Astrophysics Data System (ADS)

    Jung, Sun-Young; Jung, Sang-Min; Han, Sang-Kook

    2015-01-01

    Exponentially expanding various applications in company with proliferation of mobile devices make mobile traffic exploded annually. For future access network, bandwidth efficient and asynchronous signals converged transmission technique is required in optical network to meet a huge bandwidth demand, while integrating various services and satisfying multiple access in perceived network resource. Orthogonal frequency division multiplexing (OFDM) is highly bandwidth efficient parallel transmission technique based on orthogonal subcarriers. OFDM has been widely studied in wired-/wireless communication and became a Long term evolution (LTE) standard. Consequently, OFDM also has been actively researched in optical network. However, OFDM is vulnerable frequency and phase offset essentially because of its sinc-shaped side lobes, therefore tight synchronism is necessary to maintain orthogonality. Moreover, redundant cyclic prefix (CP) is required in dispersive channel. Additionally, side lobes act as interference among users in multiple access. Thus, it practically hinders from supporting integration of various services and multiple access based on OFDM optical transmission In this paper, adaptively modulated optical filter bank multicarrier system with offset QAM (AMO-FBMC-OQAM) is introduced and experimentally investigated in uplink optical transmission to relax multiple access interference (MAI), while improving bandwidth efficiency. Side lobes are effectively suppressed by using FBMC, therefore the system becomes robust to path difference and imbalance among optical network units (ONUs), which increase bandwidth efficiency by reducing redundancy. In comparison with OFDM, a signal performance and an efficiency of frequency utilization are improved in the same experimental condition. It enables optical network to effectively support heterogeneous services and multiple access.

  10. Multiple fiber Bragg grating sensor network with a rapid response and wide spectral dynamic range using code division multiple access

    NASA Astrophysics Data System (ADS)

    Kim, Youngbok; Jeon, Sie-Wook; Park, Chang-Soo

    2011-05-01

    Fiber Bragg grating (FBG) sensor networks have been intensively researched in optical sensor area and it developed in wavelength division multiplexing (WDM) and time division multiplexing (TDM) technologies which was adopted for its interrogating many optical sensors. In particular, WDM technology can be easily employed to interrogate FBG sensor however, the number of FBG sensors is limited. On the other hand, the TDM technique can extremely expand the number of sensor because the FBG sensors have same center wavelength. However, it suffers from a reduced sensor output power due to low reflectivity of FBG sensor. In this paper, we proposed and demonstrated the FBG sensor network based on code division multiple access (CDMA) with a rapid response and wide spectral dynamic range. The reflected semiconductor optical amplifier (RSOA) as a light source was directly modulated by the generated pseudorandom binary sequence (PRBS) code and the modulated signal is amplified and goes through FBG sensors via circulator. When the modulated optical signal experienced FBG sensor array, the optical signal which was consistent with center wavelength of FBGs is reflected and added from each sensors. The added signal goes into dispersion compensating fiber (DCF) as a dispersion medium. After through the DCF, the optical signal is converted into electrical signal by using photodetector (PD). For separate individual reflected sensor signal, the sliding correlation method was used. The proposed method improves the code interference and it also has advantages such as a large number of sensors, continuously measuring individual sensors, and decreasing the complexity of the sensor network.

  11. On the statistical dependence of hits in frequency-hop multiple access

    NASA Astrophysics Data System (ADS)

    Frank, Colin D.; Pursley, Michael B.

    1990-09-01

    The statistical dependence of hits due to multiple-access interference in an asynchronous slow-frequency-hop packet radio network in which the radios employ memoryless hopping patterns is described. Models in which hits are conditionally independent given the number of interfering packets are investigated. It is shown that, if the conditional probability of a hit is chosen appropriately, the distribution function for the number of hits in a packet for these models can be used to compute upper and lower bounds on the true distribution function for the number of hits. Conditions are described for which these models can be used to compute upper and lower bounds on the codeword and packet error probabilities. If the ratio of the number of interfering packets to the number of frequency slots is held constant, hits in the asynchronous frequency-hop network are asymptotically independent in the limit as the number of frequency slots increases.

  12. System and method for integrating and accessing multiple data sources within a data warehouse architecture

    DOEpatents

    Musick, Charles R.; Critchlow, Terence; Ganesh, Madhaven; Slezak, Tom; Fidelis, Krzysztof

    2006-12-19

    A system and method is disclosed for integrating and accessing multiple data sources within a data warehouse architecture. The metadata formed by the present method provide a way to declaratively present domain specific knowledge, obtained by analyzing data sources, in a consistent and useable way. Four types of information are represented by the metadata: abstract concepts, databases, transformations and mappings. A mediator generator automatically generates data management computer code based on the metadata. The resulting code defines a translation library and a mediator class. The translation library provides a data representation for domain specific knowledge represented in a data warehouse, including "get" and "set" methods for attributes that call transformation methods and derive a value of an attribute if it is missing. The mediator class defines methods that take "distinguished" high-level objects as input and traverse their data structures and enter information into the data warehouse.

  13. Multiple user access and testing for PreNotiS: a fast mobile event reporting solution

    NASA Astrophysics Data System (ADS)

    Chan, Michael; Kumar, Abhinav; Akopian, David; Agaian, Sos S.

    2011-06-01

    The PreNotiS (preventive notification system) was proposed to address the current lack in consumer prevention and disaster informatics systems. The underscore of this letter is to propose PreNotiS as a provision of trusted proxies of information sourcing to be integral to the disaster informatics framework. To promote loose coupling among subsystems, PreNotiS has evolved into a model-view-controller (MVC) architecture via object-oriented incremental prototyping. The MVC specifies how all subsystems and how they interact with each other. A testing framework is also proposed for the PreNotiS to verify multiple concurrent user access which might be observable during disasters. The framework relies on conceptually similar self-test modules to help with serviceability.

  14. Code-division multiple-access multiuser demodulator by using quantum fluctuations

    NASA Astrophysics Data System (ADS)

    Otsubo, Yosuke; Inoue, Jun-ichi; Nagata, Kenji; Okada, Masato

    2014-07-01

    We examine the average-case performance of a code-division multiple-access (CDMA) multiuser demodulator in which quantum fluctuations are utilized to demodulate the original message within the context of Bayesian inference. The quantum fluctuations are built into the system as a transverse field in the infinite-range Ising spin glass model. We evaluate the performance measurements by using statistical mechanics. We confirm that the CDMA multiuser modulator using quantum fluctuations achieve roughly the same performance as the conventional CDMA multiuser modulator through thermal fluctuations on average. We also find that the relationship between the quality of the original information retrieval and the amplitude of the transverse field is somehow a "universal feature" in typical probabilistic information processing, viz., in image restoration, error-correcting codes, and CDMA multiuser demodulation.

  15. Code-division multiple-access multiuser demodulator by using quantum fluctuations.

    PubMed

    Otsubo, Yosuke; Inoue, Jun-Ichi; Nagata, Kenji; Okada, Masato

    2014-07-01

    We examine the average-case performance of a code-division multiple-access (CDMA) multiuser demodulator in which quantum fluctuations are utilized to demodulate the original message within the context of Bayesian inference. The quantum fluctuations are built into the system as a transverse field in the infinite-range Ising spin glass model. We evaluate the performance measurements by using statistical mechanics. We confirm that the CDMA multiuser modulator using quantum fluctuations achieve roughly the same performance as the conventional CDMA multiuser modulator through thermal fluctuations on average. We also find that the relationship between the quality of the original information retrieval and the amplitude of the transverse field is somehow a "universal feature" in typical probabilistic information processing, viz., in image restoration, error-correcting codes, and CDMA multiuser demodulation. PMID:25122270

  16. Analysis of the TDRS multiple access system for possible use as an attitude control system sensor

    NASA Technical Reports Server (NTRS)

    Blevins, Bruce Allyn; Sank, Victor J.

    1993-01-01

    A member of the constellation of TDR satellites (TDRS) has experienced a failure of its prime earth sensor. Failure of the remaining earth sensor could result in the inability of the satellite to control its attitude and provide user services. Loss of the satellite would be a serious event. The multiple access (MA) antenna array on the TDRS has been proposed for use as a backup sensor for the attitude control system. This paper describes our analysis of the performance of the MA array as an interferometer used for accurate attitude determination. A least squares fit of a plane to the MA phase information appears to represent the TDRS body roll and pitch within about 0.1 deg. This is sufficient for SGL pointing and MA and SSA user services. Analytic improvements that include ionospheric correction may yield sufficient accuracy for KSA user services.

  17. Filter multiplexing by use of spatial Code Division Multiple Access approach.

    PubMed

    Solomon, Jonathan; Zalevsky, Zeev; Mendlovic, David; Monreal, Javier Garcia

    2003-02-10

    The increasing popularity of optical communication has also brought a demand for a broader bandwidth. The trend, naturally, was to implement methods from traditional electronic communication. One of the most effective traditional methods is Code Division Multiple Access. In this research, we suggest the use of this approach for spatial coding applied to images. The approach is to multiplex several filters into one plane while keeping their mutual orthogonality. It is shown that if the filters are limited by their bandwidth, the output of all the filters can be sampled in the original image resolution and fully recovered through an all-optical setup. The theoretical analysis of such a setup is verified in an experimental demonstration. PMID:12593478

  18. All-optical code-division multiple-access applications: 2(n) extended-prime codes.

    PubMed

    Zhang, J G; Kwong, W C; Mann, S

    1997-09-10

    A new family of 2(n) codes, called 2(n) extended-prime codes, is proposed for all-optical code-division multiple-access networks. Such 2(n) codes are derived from so-called extended-prime codes so that their cross-correlation functions are not greater than 1, as opposed to 2 for recently proposed 2(n) prime codes. As a result, a larger number of active users can now be supported by the new codes for a given bit-error rate than can be by 2(n) prime codes, while power-efficient, waveguide-integrable all-serial coding and correlating configurations proposed for the 2(n) prime codes can still be employed. PMID:18259529

  19. Satellite-matrix-switched, time-division-multiple-access network simulator

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Andro, Monty; Nagy, Lawrence A.; Budinger, James M.; Shalkhauser, Mary JO

    1989-01-01

    A versatile experimental Ka-band network simulator has been implemented at the NASA Lewis Research Center to demonstrate and evaluate a satellite-matrix-switched, time-division-multiple-access (SMS-TDMA) network and to evaluate future digital ground terminals and radiofrequency (RF) components. The simulator was implemented by using proof-of-concept RF components developed under NASA contracts and digital ground terminal and link simulation hardware developed at Lewis. This simulator provides many unique capabilities such as satellite range delay and variation simulation and rain fade simulation. All network parameters (e.g., signal-to-noise ratio, satellite range variation rate, burst density, and rain fade) are controlled and monitored by a central computer. The simulator is presently configured as a three-ground-terminal SMS-TDMA network.

  20. Outline of a multiple-access communication network based on adaptive arrays

    NASA Technical Reports Server (NTRS)

    Zohar, S.

    1982-01-01

    Attention is given to a narrow-band communication system consisting of a central station trying to receive signals simultaneously from K spatially distinct mobile users sharing the same frequencies. One example of such a system is a group of aircraft and ships transmitting messages to a communication satellite. A reasonable approach to such a multiple access system may be based on equipping the central station with an n-element antenna array where n is equal to or greater than K. The array employs K sets of n weights to segregate the signals received from the K users. The weights are determined by direct computation based on position information transmitted by the users. A description is presented of an improved technique which makes it possible to reduce significantly the number of required computer operations in comparison to currently known techniques.

  1. Satellite-matrix-switched, time-division-multiple-access network simulator

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Andro, Monty; Nagy, Lawrence A.; Budinger, James M.; Shalkhauser, Mary JO

    1990-01-01

    A versatile experimental Ka-band network simulator has been implemented at the NASA Lewis Research Center to demonstrate and evaluate a satellite-matrix-switched, time-division-multiple-access (SMS-TDMA) network and to evaluate future digital ground terminals and radiofrequency (RF) components. The simulator was implemented by using proof-of-concept RF components developed under NASA contracts and digital ground terminal and link simulation hardware developed at Lewis. This simulator provides many unique capabilities such as satellite range delay and variation simulation and rain fade simulation. All network parameters (e.g., signal-to-noise ratio, satellite range variation rate, burst density, and rain fade) are controlled and monitored by a central computer. The simulator is presently configured as a three-ground-terminal SMS-TDMA network.

  2. Multiple access interference rejection in OCDMA using a two-photon absorption based semiconductor device

    NASA Astrophysics Data System (ADS)

    Dexter, K. J.; Reid, D. A.; Maguire, P. J.; Barry, L. P.; Tian, Chun; Ibsen, Morten; Petropoulos, Periklis; Richardson, David J.

    2009-04-01

    An experimental demonstration of a two-channel OCDMA system with detection performed using standard linear detection or a TPA-based nonlinear detector is presented. These results show an improvement in the extinction ratio of the decoded signal by ˜5 dB using TPA detection. A simulation model of the TPA detector used during the experiments was created and used in a four-channel OCDMA system simulation using both linear and nonlinear detection methods. The simulation results show that error-free performance is achievable for a 4-user system using the nonlinear TPA detector while the OCDMA system employing linear detection is severely limited by the effects of noise generated by adjacent optical channels (multiple access interference).

  3. Optical Shared Memory Computing and Multiple Access Protocols for Photonic Networks

    NASA Astrophysics Data System (ADS)

    Li, Kuang-Yu.

    In this research we investigate potential applications of optics in massively parallel computer systems, especially focusing on design issues in three-dimensional optical data storage and free-space photonic networks. An optical implementation of a shared memory uses a single photorefractive crystal and can realize the set of memory modules in a digital shared memory computer. A complete instruction set consists of R sc EAD, W sc RITE, S sc ELECTIVE E sc RASE, and R sc EFRESH, which can be applied to any memory module independent of (and in parallel with) instructions to the other memory modules. In addition, a memory module can execute a sequence of R sc EAD operations simultaneously with the execution of a W sc RITE operation to accommodate differences in optical recording and readout times common to optical volume storage media. An experimental shared memory system is demonstrated and its projected performance is analyzed. A multiplexing technique is presented to significantly reduce both grating- and beam-degeneracy crosstalk in volume holographic systems, by incorporating space, angle, and wavelength as the multiplexing parameters. In this approach, each hologram, which results from the interference between a single input node and an object array, partially overlaps with the other holograms in its neighborhood. This technique can offer improved interconnection density, optical throughput, signal fidelity, and space-bandwidth product utilization. Design principles and numerical simulation results are presented. A free-space photonic cellular hypercube parallel computer, with emphasis on the design of a collisionless multiple access protocol, is presented. This design incorporates wavelength-, space-, and time-multiplexing to achieve multiple access, wavelength reuse, dense connectivity, collisionless communications, and a simple control mechanism. Analytic models based on semi-Markov processes are employed to analyze this protocol. The performance of the

  4. Multiple Coaxial Catheter System for Reliable Access in Interventional Stroke Therapy

    SciTech Connect

    Kulcsar, Zsolt Yilmaz, Hasan; Bonvin, Christophe; Lovblad, Karl O.; Ruefenacht, Daniel A.

    2010-12-15

    In some patients with acute cerebral vessel occlusion, navigating mechanical thrombectomy systems is difficult due to tortuous anatomy of the aortic arch, carotid arteries, or vertebral arteries. Our purpose was to describe a multiple coaxial catheter system used for mechanical revascularization that helps navigation and manipulations in tortuous vessels. A triple or quadruple coaxial catheter system was built in 28 consecutive cases presenting with acute ischemic stroke. All cases were treated by mechanical thrombectomy with the Penumbra System. In cases of unsuccessful thrombo-aspiration, additional thrombolysis or angioplasty with stent placement was used for improving recanalization. The catheter system consisted of an outermost 8-Fr and an intermediate 6-Fr guiding catheter, containing the inner Penumbra reperfusion catheters. The largest, 4.1-Fr, reperfusion catheter was navigated over a Prowler Select Plus microcatheter. The catheter system provided access to reach the cerebral lesions and provided stability for the mechanically demanding manipulations of thromboaspiration and stent navigation in all cases. Apart from their mechanical role, the specific parts of the system could also provide access to different types of interventions, like carotid stenting through the 8-Fr guiding catheter and intracranial stenting and thrombolysis through the Prowler Select Plus microcatheter. In this series, there were no complications related to the catheter system. In conclusion, building up a triple or quadruple coaxial system proved to be safe and efficient in our experience for the mechanical thrombectomy treatment of acute ischemic stroke.

  5. Numerical framework and performance of the new multiple-phase cloud microphysics scheme in RegCM4.5: precipitation, cloud microphysics, and cloud radiative effects

    NASA Astrophysics Data System (ADS)

    Nogherotto, Rita; Tompkins, Adrian Mark; Giuliani, Graziano; Coppola, Erika; Giorgi, Filippo

    2016-07-01

    We implement and evaluate a new parameterization scheme for stratiform cloud microphysics and precipitation within regional climate model RegCM4. This new parameterization is based on a multiple-phase one-moment cloud microphysics scheme built upon the implicit numerical framework recently developed and implemented in the ECMWF operational forecasting model. The parameterization solves five prognostic equations for water vapour, cloud liquid water, rain, cloud ice, and snow mixing ratios. Compared to the pre-existing scheme, it allows a proper treatment of mixed-phase clouds and a more physically realistic representation of cloud microphysics and precipitation. Various fields from a 10-year long integration of RegCM4 run in tropical band mode with the new scheme are compared with their counterparts using the previous cloud scheme and are evaluated against satellite observations. In addition, an assessment using the Cloud Feedback Model Intercomparison Project (CFMIP) Observational Simulator Package (COSP) for a 1-year sub-period provides additional information for evaluating the cloud optical properties against satellite data. The new microphysics parameterization yields an improved simulation of cloud fields, and in particular it removes the overestimation of upper level cloud characteristics of the previous scheme, increasing the agreement with observations and leading to an amelioration of a long-standing problem in the RegCM system. The vertical cloud profile produced by the new scheme leads to a considerably improvement of the representation of the longwave and shortwave components of the cloud radiative forcing.

  6. Suppression of optical beat interference-noise in orthogonal frequency division multiple access-passive optical network link using self-homodyne balanced detection

    NASA Astrophysics Data System (ADS)

    Won, Yong-Yuk; Jung, Sang-Min; Han, Sang-Kook

    2014-08-01

    A new technique, which reduces optical beat interference (OBI) noise in orthogonal frequency division multiple access-passive optical network (OFDMA-PON) links, is proposed. A self-homodyne balanced detection, which uses a single laser for the optical line terminal (OLT) as well as for the optical network unit (ONU), reduces OBI noise and also improves the signal to noise ratio (SNR) of the discrete multi-tone (DMT) signal. The proposed scheme is verified by transmitting quadrature phase shift keying (QPSK)-modulated DMT signal over a 20-km single mode fiber. The optical signal to noise ratio (OSNR), that is required for BER of 10-5, is reduced by 2 dB in the balanced detection compared with a single channel due to the cancellation of OBI noise in conjunction with the local laser.

  7. An Ultrasonic Multiple-Access Ranging Core Based on Frequency Shift Keying Towards Indoor Localization

    PubMed Central

    Segers, Laurent; Van Bavegem, David; De Winne, Sam; Braeken, An; Touhafi, Abdellah; Steenhaut, Kris

    2015-01-01

    This paper describes a new approach and implementation methodology for indoor ranging based on the time difference of arrival using code division multiple access with ultrasound signals. A novel implementation based on a field programmable gate array using finite impulse response filters and an optimized correlation demodulator implementation for ultrasound orthogonal signals is developed. Orthogonal codes are modulated onto ultrasound signals using frequency shift keying with carrier frequencies of 24.5 kHz and 26 kHz. This implementation enhances the possibilities for real-time, embedded and low-power tracking of several simultaneous transmitters. Due to the high degree of parallelism offered by field programmable gate arrays, up to four transmitters can be tracked simultaneously. The implementation requires at most 30% of the available logic gates of a Spartan-6 XC6SLX45 device and is evaluated on accuracy and precision through several ranging topologies. In the first topology, the distance between one transmitter and one receiver is evaluated. Afterwards, ranging analyses are applied between two simultaneous transmitters and one receiver. Ultimately, the position of the receiver against four transmitters using trilateration is also demonstrated. Results show enhanced distance measurements with distances ranging from a few centimeters up to 17 m, while keeping a centimeter-level accuracy. PMID:26263986

  8. Transparent mediation-based access to multiple yeast data sources using an ontology driven interface

    PubMed Central

    2012-01-01

    Background Saccharomyces cerevisiae is recognized as a model system representing a simple eukaryote whose genome can be easily manipulated. Information solicited by scientists on its biological entities (Proteins, Genes, RNAs...) is scattered within several data sources like SGD, Yeastract, CYGD-MIPS, BioGrid, PhosphoGrid, etc. Because of the heterogeneity of these sources, querying them separately and then manually combining the returned results is a complex and time-consuming task for biologists most of whom are not bioinformatics expert. It also reduces and limits the use that can be made on the available data. Results To provide transparent and simultaneous access to yeast sources, we have developed YeastMed: an XML and mediator-based system. In this paper, we present our approach in developing this system which takes advantage of SB-KOM to perform the query transformation needed and a set of Data Services to reach the integrated data sources. The system is composed of a set of modules that depend heavily on XML and Semantic Web technologies. User queries are expressed in terms of a domain ontology through a simple form-based web interface. Conclusions YeastMed is the first mediation-based system specific for integrating yeast data sources. It was conceived mainly to help biologists to find simultaneously relevant data from multiple data sources. It has a biologist-friendly interface easy to use. The system is available at http://www.khaos.uma.es/yeastmed/. PMID:22372975

  9. An Ultrasonic Multiple-Access Ranging Core Based on Frequency Shift Keying Towards Indoor Localization.

    PubMed

    Segers, Laurent; Van Bavegem, David; De Winne, Sam; Braeken, An; Touhafi, Abdellah; Steenhaut, Kris

    2015-01-01

    This paper describes a new approach and implementation methodology for indoor ranging based on the time difference of arrival using code division multiple access with ultrasound signals. A novel implementation based on a field programmable gate array using finite impulse response filters and an optimized correlation demodulator implementation for ultrasound orthogonal signals is developed. Orthogonal codes are modulated onto ultrasound signals using frequency shift keying with carrier frequencies of 24.5 kHz and 26 kHz. This implementation enhances the possibilities for real-time, embedded and low-power tracking of several simultaneous transmitters. Due to the high degree of parallelism offered by field programmable gate arrays, up to four transmitters can be tracked simultaneously. The implementation requires at most 30% of the available logic gates of a Spartan-6 XC6SLX45 device and is evaluated on accuracy and precision through several ranging topologies. In the first topology, the distance between one transmitter and one receiver is evaluated. Afterwards, ranging analyses are applied between two simultaneous transmitters and one receiver. Ultimately, the position of the receiver against four transmitters using trilateration is also demonstrated. Results show enhanced distance measurements with distances ranging from a few centimeters up to 17 m, while keeping a centimeter-level accuracy. PMID:26263986

  10. Entanglement distribution over quantum code-division multiple-access networks

    NASA Astrophysics Data System (ADS)

    Zhu, Chang-long; Yang, Nan; Liu, Yu-xi; Nori, Franco; Zhang, Jing

    2015-10-01

    We present a method for quantum entanglement distribution over a so-called code-division multiple-access network, in which two pairs of users share the same quantum channel to transmit information. The main idea of this method is to use different broadband chaotic phase shifts, generated by electro-optic modulators and chaotic Colpitts circuits, to encode the information-bearing quantum signals coming from different users and then recover the masked quantum signals at the receiver side by imposing opposite chaotic phase shifts. The chaotic phase shifts given to different pairs of users are almost uncorrelated due to the randomness of chaos and thus the quantum signals from different pair of users can be distinguished even when they are sent via the same quantum channel. It is shown that two maximally entangled states can be generated between two pairs of users by our method mediated by bright coherent lights, which can be more easily implemented in experiments compared with single-photon lights. Our method is robust under the channel noises if only the decay rates of the information-bearing fields induced by the channel noises are not quite high. Our study opens up new perspectives for addressing and transmitting quantum information in future quantum networks.

  11. Carrier Estimation Using Classic Spectral Estimation Techniques for the Proposed Demand Assignment Multiple Access Service

    NASA Technical Reports Server (NTRS)

    Scaife, Bradley James

    1999-01-01

    In any satellite communication, the Doppler shift associated with the satellite's position and velocity must be calculated in order to determine the carrier frequency. If the satellite state vector is unknown then some estimate must be formed of the Doppler-shifted carrier frequency. One elementary technique is to examine the signal spectrum and base the estimate on the dominant spectral component. If, however, the carrier is spread (as in most satellite communications) this technique may fail unless the chip rate-to-data rate ratio (processing gain) associated with the carrier is small. In this case, there may be enough spectral energy to allow peak detection against a noise background. In this thesis, we present a method to estimate the frequency (without knowledge of the Doppler shift) of a spread-spectrum carrier assuming a small processing gain and binary-phase shift keying (BPSK) modulation. Our method relies on an averaged discrete Fourier transform along with peak detection on spectral match filtered data. We provide theory and simulation results indicating the accuracy of this method. In addition, we will describe an all-digital hardware design based around a Motorola DSP56303 and high-speed A/D which implements this technique in real-time. The hardware design is to be used in NMSU's implementation of NASA's demand assignment, multiple access (DAMA) service.

  12. Negotiating multiple barriers: health workers' access to counselling, testing and treatment in Malawi.

    PubMed

    Namakhoma, Ireen; Bongololo, Grace; Bello, George; Nyirenda, Lot; Phoya, Anne; Phiri, Sam; Theobald, Sally; Obermeyer, Carla Makhlouf

    2010-01-01

    Malawi is facing a severe HIV and AIDS epidemic with an estimated 12% of its population living with the virus. Health workers are on the front lines of the HIV epidemic and they face the risk of HIV infection in both their personal and professional lives. This mixed method study aimed to explore the enablers and barriers to HIV counselling and testing and antiretroviral therapy by health workers in Malawi. After qualitative data were collected through in-depth interviews with health workers in the Mchinji and Nsanje districts, a survey questionnaire was constructed and administered to 906 health workers in eight districts in Malawi. A majority (76%) of health workers surveyed reported having undergone HIV testing and counselling, of whom 74% reported repeat testing. A striking result of the study is that 22% of health workers reported testing after occupational exposure to HIV. The proportions of respondents reporting that they tested after experiencing symptoms, or self-testing for HIV were 11% each. The in-depth interviews and the survey revealed multiple challenges that health workers face to accessing HIV testing, counselling and treatment, including fear of a positive result, fear of stigma and lack of confidentiality. Additional barriers included health workers' personal acquaintance with those conducting testing, along with their perception of being "role models" which could exacerbate their fears about confidentiality. Given health workers' critical role in HIV delivery in Malawi, there is need to develop solutions to help health workers overcome these barriers. PMID:20680862

  13. Satellite range delay simulator for a matrix-switched time division multiple-access network simulator

    NASA Technical Reports Server (NTRS)

    Nagy, Lawrence A.

    1989-01-01

    The Systems Integration, Test, and Evaluation (SITE) facility at NASA Lewis Research Center is presently configured as a satellite-switched time division multiple access (SS-TDMA) network simulator. The purpose of SITE is to demonstrate and evaluate advanced communication satellite technologies, presently embodied by POC components developed under NASA contracts in addition to other hardware, such as ground terminals, designed and built in-house at NASA Lewis. Each ground terminal in a satellite communications system will experience a different aspect of the satellite's motion due mainly to daily tidal effects and station keeping, hence a different duration and rate of variation in the range delay. As a result of this and other effects such as local oscillator instability, each ground terminal must constantly adjust its transmit burst timing so that data bursts from separate ground terminals arrive at the satellite in their assigned time slots, preventing overlap and keeping the system in synchronism. On the receiving end, ground terminals must synchronize their local clocks using reference transmissions received through the satellite link. A feature of the SITE facility is its capability to simulate the varying propagation delays and associated Doppler frequency shifts that the ground terminals in the network have to cope with. Delay is achieved by means of two NASA Lewis designed and built range delay simulator (RDS) systems, each independently controlled locally with front panel switches or remotely by an experiment control and monitor (EC/M) computer.

  14. 47 CFR 76.2000 - Exclusive access to multiple dwelling units generally.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Access to MDUs § 76.2000 Exclusive access... the exclusive right to provide any video programming service (alone or in combination with...

  15. 47 CFR 76.2000 - Exclusive access to multiple dwelling units generally.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Access to MDUs § 76.2000 Exclusive access... the exclusive right to provide any video programming service (alone or in combination with...

  16. 47 CFR 76.2000 - Exclusive access to multiple dwelling units generally.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Access to MDUs § 76.2000 Exclusive access... the exclusive right to provide any video programming service (alone or in combination with...

  17. Students with Multiple Disabilities Using Technology-Based Programs to Choose and Access Stimulus Events Alone or with Caregiver Participation

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Oliva, Doretta; Cingolani, Eleonora

    2009-01-01

    The first of these two studies extended preliminary evidence on the use of technology-based programs for enabling students with severe and profound multiple disabilities to choose and access environmental stimuli on their own. Each of the three participants had two microswitches linked to specific sets of stimuli through a computer system. The…

  18. Persons with Multiple Disabilities Use Forehead and Smile Responses to Access or Choose among Technology-Aided Stimulation Events

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Alberti, Gloria; Bellini, Domencio; Oliva, Doretta; Boccasini, Adele; La Martire, Maria L.; Signorino, Mario

    2013-01-01

    A variety of technology-aided programs have been developed to help persons with congenital or acquired multiple disabilities access preferred stimuli or choose among stimulus options. The application of those programs may pose problems when the participants have very limited behavior repertoires and are unable to use conventional responses and…

  19. Multiple Intimate Partner Violence Experiences: Knowledge, Access, Utilization and Barriers to Utilization of Resources by Women of the African Diaspora

    PubMed Central

    Sabri, Bushra; Huerta, Julia; Alexander, Kamila A.; St.Vil, Noelle M.; Campbell, Jacquelyn C.; Callwood, Gloria B.

    2016-01-01

    Objective This study examined knowledge, access, utilization, and barriers to use of resources among Black women exposed to multiple types of intimate partner violence in Baltimore, Maryland and the U.S. Virgin Islands (USVI). Methods We analyzed quantitative survey data collected by 163 women recruited from primary care, prenatal or family planning clinics in Baltimore and the USVI. In addition we analyzed qualitative data from in-depth interviews with 11 women. Quantitative data were analyzed using descriptive statistics and qualitative data were analyzed using thematic analysis. Results A substantial proportion of Black women with multiple types of violence experiences lacked knowledge of, did not have access to, and did not use resources. Barriers to resource use were identified at the individual, relationship, and community levels. Conclusion There is need for programs to develop awareness, promote access and utilization of resources, and eliminate barriers to resource use among abused Black women. PMID:26548679

  20. Multiple-Site Hemodynamic Analysis of Doppler Ultrasound with an Adaptive Color Relation Classifier for Arteriovenous Access Occlusion Evaluation

    PubMed Central

    Wu, Jian-Xing; Du, Yi-Chun; Wu, Ming-Jui; Li, Chien-Ming; Lin, Chia-Hung; Chen, Tainsong

    2014-01-01

    This study proposes multiple-site hemodynamic analysis of Doppler ultrasound with an adaptive color relation classifier for arteriovenous access occlusion evaluation in routine examinations. The hemodynamic analysis is used to express the properties of blood flow through a vital access or a tube, using dimensionless numbers. An acoustic measurement is carried out to detect the peak-systolic and peak-diastolic velocities of blood flow from the arterial anastomosis sites (A) to the venous anastomosis sites (V). The ratio of the supracritical Reynolds (Resupra) number and the resistive (Res) index quantitates the degrees of stenosis (DOS) at multiple measurement sites. Then, an adaptive color relation classifier is designed as a nonlinear estimate model to survey the occlusion level in monthly examinations. For 30 long-term follow-up patients, the experimental results show the proposed screening model efficiently evaluates access occlusion. PMID:24892039

  1. Does China's new cooperative medical scheme promote rural elders' access to healthcare services in relation to chronic conditions?

    PubMed Central

    Dai, Baozhen

    2015-01-01

    Background This study examined use of healthcare services by elderly people with a long-term condition living in rural China and participating in that country's New Cooperative Medical Scheme (NCMS). Methods Data were taken from the 2009 China Health and Nutrition Survey. Results The study results showed that education level and annual income were low among rural elders (aged ≥65 years); the illiteracy rate was 58.0% (200/345) and 67.6% (92/136) had an annual income of less than 5000 Chinese yuan renminbi. The elders had low rates of treatment and use of preventive healthcare services while the prevalence of chronic disease was highest among them when compared to other age groups. Among the few elders who received preventive healthcare, most received it at village clinics. Conclusions Preventive healthcare services and chronic disease management are urgently needed by rural elders in China. NCMS should initiate payments to township health centers to enable them to undertake community outreach and education campaigns among rural residents, and train village doctors in standard chronic condition management and prevention, with prioritization of the provision of prevention and management of chronic conditions by village clinics. PMID:25091022

  2. An MRI-based classification scheme to predict passive access of 5 to 50-nm large nanoparticles to tumors.

    PubMed

    Karageorgis, Anastassia; Dufort, Sandrine; Sancey, Lucie; Henry, Maxime; Hirsjärvi, Samuli; Passirani, Catherine; Benoit, Jean-Pierre; Gravier, Julien; Texier, Isabelle; Montigon, Olivier; Benmerad, Mériem; Siroux, Valérie; Barbier, Emmanuel L; Coll, Jean-Luc

    2016-01-01

    Nanoparticles are useful tools in oncology because of their capacity to passively accumulate in tumors in particular via the enhanced permeability and retention (EPR) effect. However, the importance and reliability of this effect remains controversial and quite often unpredictable. In this preclinical study, we used optical imaging to detect the accumulation of three types of fluorescent nanoparticles in eight different subcutaneous and orthotopic tumor models, and dynamic contrast-enhanced and vessel size index Magnetic Resonance Imaging (MRI) to measure the functional parameters of these tumors. The results demonstrate that the permeability and blood volume fraction determined by MRI are useful parameters for predicting the capacity of a tumor to accumulate nanoparticles. Translated to a clinical situation, this strategy could help anticipate the EPR effect of a particular tumor and thus its accessibility to nanomedicines. PMID:26892874

  3. An MRI-based classification scheme to predict passive access of 5 to 50-nm large nanoparticles to tumors

    PubMed Central

    Karageorgis, Anastassia; Dufort, Sandrine; Sancey, Lucie; Henry, Maxime; Hirsjärvi, Samuli; Passirani, Catherine; Benoit, Jean-Pierre; Gravier, Julien; Texier, Isabelle; Montigon, Olivier; Benmerad, Mériem; Siroux, Valérie; Barbier, Emmanuel L.; Coll, Jean-Luc

    2016-01-01

    Nanoparticles are useful tools in oncology because of their capacity to passively accumulate in tumors in particular via the enhanced permeability and retention (EPR) effect. However, the importance and reliability of this effect remains controversial and quite often unpredictable. In this preclinical study, we used optical imaging to detect the accumulation of three types of fluorescent nanoparticles in eight different subcutaneous and orthotopic tumor models, and dynamic contrast-enhanced and vessel size index Magnetic Resonance Imaging (MRI) to measure the functional parameters of these tumors. The results demonstrate that the permeability and blood volume fraction determined by MRI are useful parameters for predicting the capacity of a tumor to accumulate nanoparticles. Translated to a clinical situation, this strategy could help anticipate the EPR effect of a particular tumor and thus its accessibility to nanomedicines. PMID:26892874

  4. Persons with multiple disabilities exercise adaptive response schemes with the help of technology-based programs: three single-case studies.

    PubMed

    Lancioni, Giulio E; Singh, Nirbhay N; O'Reilly, Mark F; Sigafoos, Jeff; Oliva, Doretta; Campodonico, Francesca; Lang, Russell

    2012-01-01

    The present three single-case studies assessed the effectiveness of technology-based programs to help three persons with multiple disabilities exercise adaptive response schemes independently. The response schemes included (a) left and right head movements for a man who kept his head increasingly static on his wheelchair's headrest (Study I), (b) left- and right-arm movements for a woman who tended to hold both arms/hands tight against her body (Study II), and (c) touching object cues on a computer screen for a girl who rarely used her residual vision for orienting/guiding her hand responses. The technology involved microswitches/sensors to detect the response schemes and a computer/control system to record their occurrences and activate preferred stimuli contingent on them. Results showed large increases in the response schemes targeted for each of the three participants during the intervention phases of the studies. The importance of using technology-based programs as tools for enabling persons with profound and multiple disabilities to practice relevant responses independently was discussed. PMID:22240142

  5. Approaches to optimization of SS/TDMA time slot assignment. [satellite switched time division multiple access

    NASA Technical Reports Server (NTRS)

    Wade, T. O.

    1984-01-01

    Reduction techniques for traffic matrices are explored in some detail. These matrices arise in satellite switched time-division multiple access (SS/TDMA) techniques whereby switching of uplink and downlink beams is required to facilitate interconnectivity of beam zones. A traffic matrix is given to represent that traffic to be transmitted from n uplink beams to n downlink beams within a TDMA frame typically of 1 ms duration. The frame is divided into segments of time and during each segment a portion of the traffic is represented by a switching mode. This time slot assignment is characterized by a mode matrix in which there is not more than a single non-zero entry on each line (row or column) of the matrix. Investigation is confined to decomposition of an n x n traffic matrix by mode matrices with a requirement that the decomposition be 100 percent efficient or, equivalently, that the line(s) in the original traffic matrix whose sum is maximal (called critical line(s)) remain maximal as mode matrices are subtracted throughout the decomposition process. A method of decomposition of an n x n traffic matrix by mode matrices results in a number of steps that is bounded by n(2) - 2n + 2. It is shown that this upper bound exists for an n x n matrix wherein all the lines are maximal (called a quasi doubly stochastic (QDS) matrix) or for an n x n matrix that is completely arbitrary. That is, the fact that no method can exist with a lower upper bound is shown for both QDS and arbitrary matrices, in an elementary and straightforward manner.

  6. Constructing a two bands optical code-division multiple-access network of bipolar optical access codecs using Walsh-coded liquid crystal modulators

    NASA Astrophysics Data System (ADS)

    Yen, Chih-Ta; Huang, Jen-Fa; Chih, Ping-En

    2014-08-01

    We propose and experimentally demonstrated the two bands optical code-division multiple-access (OCDMA) network over bipolar Walsh-coded liquid-crystal modulators (LCMs) and driven by green light and red light lasers. Achieving system performance depends on the construction of a decoder that implements a true bipolar correlation using only unipolar signals and intensity detection for each band. We took advantage of the phase delay characteristics of LCMs to construct a prototype optical coder/decoder (codec). Matched and unmatched Walsh signature codes were evaluated to detect correlations among multiuser data in the access network. By using LCMs, a red and green laser light source was spectrally encoded and the summed light dots were complementary decoded. Favorable contrast on auto- and cross-correlations indicates that binary information symbols can be properly recovered using a balanced photodetector.

  7. A Seamless Handoff Scheme with Access Point Load Balance for Real-Time Services Support in 802.11 Wireless LANs

    NASA Astrophysics Data System (ADS)

    Manodham, Thavisak; Loyola, Luis; Miki, Tetsuya

    IEEE 802.11 wirelesses LANs (WLANs) have been rapidly deployed in enterprises, public areas, and households. Voice-over-IP (VoIP) and similar applications are now commonly used in mobile devices over wireless networks. Recent works have improved the quality of service (QoS) offering higher data rates to support various kinds of real-time applications. However, besides the need for higher data rates, seamless handoff and load balancing among APs are key issues that must be addressed in order to continue supporting real-time services across wireless LANs and providing fair services to all users. In this paper, we introduce a novel access point (AP) with two transceivers that improves network efficiency by supporting seamless handoff and traffic load balancing in a wireless network. In our proposed scheme, the novel AP uses the second transceiver to scan and find neighboring STAs in the transmission range and then sends the results to neighboring APs, which compare and analyze whether or not the STA should perform a handoff. The initial results from our simulations show that the novel AP module is more effective than the conventional scheme and a related work in terms of providing a handoff process with low latency and sharing traffic load with neighbor APs.

  8. Improved Iterative Decoding of Network-Channel Codes for Multiple-Access Relay Channel

    PubMed Central

    Majumder, Saikat; Verma, Shrish

    2015-01-01

    Cooperative communication using relay nodes is one of the most effective means of exploiting space diversity for low cost nodes in wireless network. In cooperative communication, users, besides communicating their own information, also relay the information of other users. In this paper we investigate a scheme where cooperation is achieved using a common relay node which performs network coding to provide space diversity for two information nodes transmitting to a base station. We propose a scheme which uses Reed-Solomon error correcting code for encoding the information bit at the user nodes and convolutional code as network code, instead of XOR based network coding. Based on this encoder, we propose iterative soft decoding of joint network-channel code by treating it as a concatenated Reed-Solomon convolutional code. Simulation results show significant improvement in performance compared to existing scheme based on compound codes. PMID:27347526

  9. Data Management for Flexible Access - Implementation and Lessons Learned from work with Multiple User Communities

    NASA Astrophysics Data System (ADS)

    Benedict, K. K.; Scott, S.; Hudspeth, W. B.

    2012-12-01

    There is no shortage of community-specific and generic data discovery and download platforms and protocols (e.g. CUAHSI HIS, DataONE, GeoNetwork Open Source, GeoPortal, OGC CSW, OAI PMH), documentation standards (e.g. FGDC, ISO 19115, EML, Dublin Core), data access and visualization standards and models (e.g. OGC WxS, OpenDAP), and general-purpose web service models (i.e. REST & SOAP) upon which Geo-informatics cyberinfrastructure (CI) may be built. When attempting to develop a robust platform that may service a wide variety of users and use cases the challenge is one of identifying which existing platform (if any) may support those current needs while also allowing for future expansion for additional capabilities. In the case of the implementation of a data storage, discovery and delivery platform to support the multiple projects at the Earth Data Analysis Center at UNM, no single platform or protocol met the joint requirements of two initial applications (the New Mexico Resource Geographic Information System [http://rgis.unm.edu] and the New Mexico EPSCoR Data Portal [http://nmepscor.org/dataportal]) and furthermore none met anticipated additional requirements as new applications of the platform emerged. As a result of this assessment three years ago EDAC embarked on the development of the Geographic Storage, Transformation, and Retrieval Engine (GSToRE) platform as a general purpose platform upon which n-tiered geospatially enabled data intensive applications could be built. When initially released in 2010 the focus was on the publication of dynamically generated Open Geospatial Consortium services based upon a PostgreSQL/PostGIS backend database. The identification of additional service interface requirements (implementation of the DataONE API and CUAHSI WaterML services), use cases provided by the NM EPSCoR education working group, and expanded metadata publication needs have led to a significant update to the underlying data management tier for GSToRE - the

  10. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    SciTech Connect

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors, as

  11. A satellite mobile communication system based on Band-Limited Quasi-Synchronous Code Division Multiple Access (BLQS-CDMA)

    NASA Technical Reports Server (NTRS)

    Degaudenzi, R.; Elia, C.; Viola, R.

    1990-01-01

    Discussed here is a new approach to code division multiple access applied to a mobile system for voice (and data) services based on Band Limited Quasi Synchronous Code Division Multiple Access (BLQS-CDMA). The system requires users to be chip synchronized to reduce the contribution of self-interference and to make use of voice activation in order to increase the satellite power efficiency. In order to achieve spectral efficiency, Nyquist chip pulse shaping is used with no detection performance impairment. The synchronization problems are solved in the forward link by distributing a master code, whereas carrier forced activation and closed loop control techniques have been adopted in the return link. System performance sensitivity to nonlinear amplification and timing/frequency synchronization errors are analyzed.

  12. Reducing BER of spectral-amplitude coding optical code-division multiple-access systems by single photodiode detection technique

    NASA Astrophysics Data System (ADS)

    Al-Khafaji, H. M. R.; Aljunid, S. A.; Amphawan, A.; Fadhil, H. A.; Safar, A. M.

    2013-03-01

    In this paper, we present a single photodiode detection (SPD) technique for spectral-amplitude coding optical code-division multiple-access (SAC-OCDMA) systems. The proposed technique eliminates both phase-induced intensity noise (PIIN) and multiple-access interference (MAI) in the optical domain. Analytical results show that for 35 simultaneous users transmitting at data rate of 622 Mbps, the bit-error rate (BER) = 1.4x10^-28 for SPD technique is much better compared to 9.3x10^-6 and 9.6x10^-3 for the modified-AND as well as the AND detection techniques, respectively. Moreover, we verified the improved performance afforded by the proposed technique using data transmission simulations.

  13. Minimizing correlation effect using zero cross correlation code in spectral amplitude coding optical code division multiple access

    NASA Astrophysics Data System (ADS)

    Safar, Anuar Mat; Aljunid, Syed Alwee; Arief, Amir Razif; Nordin, Junita; Saad, Naufal

    2012-01-01

    The use of minimal multiple access interference (MAI) in code design is investigated. Applying a projection and mapping techniques, a code that has a zero cross correlation (ZCC) between users in optical code division multiple access (OCDMA) is presented in this paper. The system is based on an incoherent light source—LED, spectral amplitude coding (SAC), and direct detection techniques at the receiver. Using power spectral density (PSD) function and Gaussian approximation, we obtain the signal-to-noise ratio (SNR) and the bit-error rate (BER) to measure the code performance. Making a comparison with other existing codes, e.g., Hadamard, MFH and MDW codes, we show that our code performs better at BER 10-9 in terms of number of simultaneous users. We also demonstrate the comparison between the theoretical and simulation analyses, where the results are close to one another.

  14. Performance analysis of 2D asynchronous hard-limiting optical code-division multiple access system through atmospheric scattering channel

    NASA Astrophysics Data System (ADS)

    Zhao, Yaqin; Zhong, Xin; Wu, Di; Zhang, Ye; Ren, Guanghui; Wu, Zhilu

    2013-09-01

    Optical code-division multiple access (OCDMA) systems usually allocate orthogonal or quasi-orthogonal codes to the active users. When transmitting through atmospheric scattering channel, the coding pulses are broadened and the orthogonality of the codes is worsened. In truly asynchronous case, namely both the chips and the bits are asynchronous among each active user, the pulse broadening affects the system performance a lot. In this paper, we evaluate the performance of a 2D asynchronous hard-limiting wireless OCDMA system through atmospheric scattering channel. The probability density function of multiple access interference in truly asynchronous case is given. The bit error rate decreases as the ratio of the chip period to the root mean square delay spread increases and the channel limits the bit rate to different levels when the chip period varies.

  15. Nonadditivity of quantum and classical capacities for entanglement breaking multiple-access channels and the butterfly network

    SciTech Connect

    Grudka, Andrzej; Horodecki, Pawel

    2010-06-15

    We analyze quantum network primitives which are entanglement breaking. We show superadditivity of quantum and classical capacity regions for quantum multiple-access channels and the quantum butterfly network. Since the effects are especially visible at high noise they suggest that quantum information effects may be particularly helpful in the case of the networks with occasional high noise rates. The present effects provide a qualitative borderline between superadditivities of bipartite and multipartite systems.

  16. Integrated photonic decoder with complementary code processing and balanced detection for two-dimensional optical code division multiple access.

    PubMed

    Takiguchi, K; Okuno, M; Takahashi, H; Moriwaki, O

    2007-04-01

    We propose a novel integrated photonic decoder for two-dimensional (time spreading, wavelength hopping) optical code division multiple access. The decoder is composed of multiplexers-demultiplexers, variable delay lines, and a coupler, which processes complementary codes and utilizes balanced detection to reduce unwanted cross-correlation interference. We successfully carried out a 10 Gbit/s transmission that demonstrated its effectiveness. PMID:17339936

  17. MSA-PAD: DNA multiple sequence alignment framework based on PFAM accessed domain information.

    PubMed

    Balech, Bachir; Vicario, Saverio; Donvito, Giacinto; Monaco, Alfonso; Notarangelo, Pasquale; Pesole, Graziano

    2015-08-01

    Here we present the MSA-PAD application, a DNA multiple sequence alignment framework that uses PFAM protein domain information to align DNA sequences encoding either single or multiple protein domains. MSA-PAD has two alignment options: gene and genome mode. PMID:25819080

  18. A chimera grid scheme. [multiple overset body-conforming mesh system for finite difference adaptation to complex aircraft configurations

    NASA Technical Reports Server (NTRS)

    Steger, J. L.; Dougherty, F. C.; Benek, J. A.

    1983-01-01

    A mesh system composed of multiple overset body-conforming grids is described for adapting finite-difference procedures to complex aircraft configurations. In this so-called 'chimera mesh,' a major grid is generated about a main component of the configuration and overset minor grids are used to resolve all other features. Methods for connecting overset multiple grids and modifications of flow-simulation algorithms are discussed. Computational tests in two dimensions indicate that the use of multiple overset grids can simplify the task of grid generation without an adverse effect on flow-field algorithms and computer code complexity.

  19. Multiple Perspectives on the Accessibility of E-Learning in Canadian Colleges and Universities

    ERIC Educational Resources Information Center

    Asuncion, Jennison V.; Fichten, Catherine S.; Ferraro, Vittoria; Chwojka, Caroline; Barile, Maria; Nguyen, Mai Nhu; Wolforth, Joan

    2010-01-01

    An exploratory study identified and compared the views of 77 campus disability service providers, 38 professors, and 45 e-learning professionals from Canadian colleges and universities regarding their experiences with e-learning and its accessibility to students with disabilities. Findings indicate that all groups saw benefit in having someone who…

  20. Multi-pulse frequency shifted (MPFS) multiple access modulation for ultra wideband

    DOEpatents

    Nekoogar, Faranak; Dowla, Farid U.

    2012-01-24

    The multi-pulse frequency shifted technique uses mutually orthogonal short duration pulses o transmit and receive information in a UWB multiuser communication system. The multiuser system uses the same pulse shape with different frequencies for the reference and data for each user. Different users have a different pulse shape (mutually orthogonal to each other) and different transmit and reference frequencies. At the receiver, the reference pulse is frequency shifted to match the data pulse and a correlation scheme followed by a hard decision block detects the data.

  1. Hybrid bidirectional radio-over-fiber-based orthogonal frequency division multiple access-passive optical network supporting 60/120 GHz using offset quadrate phase shift keying

    NASA Astrophysics Data System (ADS)

    Zhang, Chongfu; Chen, Chen; Qiu, Kun

    2015-09-01

    A hybrid bidirectional orthogonal frequency division multiple access-passive optical network (OFDMA-PON) based on offset quadrate phase shift keying (OQPSK) to support 60- and 120-GHz radio-over-fiber system is proposed. The system can support wired/wireless applications and enable the dynamic bandwidth allocation according to a subscriber's application. It is successfully achieved by using the millimeter waves (MMWs) generation and the carrier-reuse technique. In the proposed scheme, the MMW bands used for downlink (DL) and uplink transmissions are generated at the optical line terminal by the dual-arm Mach-Zehnder modulators. Both 60- and 120-GHz MMWs are obtained for the transmission of the high bit-rate services in source-free optical network units (ONUs), only using a single 15-GHz sinusoidal wave source. The Rayleigh backscattering effect is considered in the proposed OQPSK-based OFDMA-PON. For DL transmission over a 30-km single-mode fiber, the power penalties are less than 0.8 and 1 dB for the OQPSK-OFDM wired data at 10 Gb/s and the OQPSK-OFDM wireless data at 5 Gb/s, respectively.

  2. Proportional Data Rate Fairness Resource Allocation for MIMO-OFDM Multiple Access Channel by Considering the Correlation Effect of Line of Sight and Non Line of Sight Channel Conditions

    NASA Astrophysics Data System (ADS)

    Maung, Sann Maw; Sasase, Iwao

    In the MIMO-OFDM multiple access channel (MIMO-OFDM-MAC) uplink scenario, the base station decides the uplink parameters for multiple users based on channel state information (CSI) from each user in the system. The performance of MIMO-OFDM-MAC systems can be significantly improved by using an adaptive transmission and resource allocation schemes which consider the correlation effect of line of sight (LOS) and non line of sight (NLOS) channel conditions for different users in the system. A lot of papers have been published on resource allocation schemes for MIMO-OFDM systems. However, most of these resource allocation schemes have been considered for MIMO-OFDMA systems, where users are separated in the frequency domain and each user uses the same uplink and downlink channels in the same channel conditions. On the other hand, in the mulituser MIMO-OFDM systems, more than one user can be assigned the same frequency and channel conditions for the MIMO-OFDM broadcast channel (downlink) and MIMO-OFDM-MAC channel (uplink) are not the same. Therefore, the same resource allocation schemes for the conventional MIMO-OFDM systems can not be applied to multiuser MIMO-OFDM systems with different uplink and downlink channel conditions. Until now, most of the resource allocation schemes have been considered only for downlink MIMO-OFDM broadcast (MIMO-OFDM-BC) channel and very few papers tackle the fairness among users. Moreover, no paper considers a scheme to realize proportional data rate fairness among users in the MIMO-OFDM-MAC condition. In this paper, we propose a proportional data rate fairness resource allocation scheme with adaptive bit loading for MIMO-ODFM-MAC systems by considering the correlation effects of LOS and NLOS channel conditions in both spatial and frequency domains. Computer simulation results show that the proposed scheme can give larger system capacity while maintaining the proportional data rate fairness requirements among users in the system under the

  3. Increasing Access to Clinical Trials and Innovative Therapy for Teenagers and Young Adults with Cancer - A Multiple Stakeholders and Multiple Steps Process.

    PubMed

    Gaspar, Nathalie; Fern, Lorna

    2016-01-01

    The inclusion of teenagers and young adults (TYAs) in cancer clinical trials is focal point for many countries with a specific TYA program. This objective has arisen from data which suggests that lower trial entry may, in part, contribute to lesser survival gains observed in this group when compared to children and some older adult cancers. In this chapter, we discuss obstacles to clinical trials and innovative therapies for TYA. Limited clinical trial availability is discussed in the context of the rarity of TYA cancers and our limited understanding of cancer biology in this group, other obstacles include inappropriate age eligibility criteria, limited accessibility to available trials, a lack of physicians and patients awareness and poor acceptability of trial design. We propose several strategies which could be applied to overcome these obstacles, some ready for implementation and others which require further exploration. Strengthening pediatric and adult oncology collaboration at the individual level and through oncology societies will undoubtedly positively impact accrual to trials for TYA, as will abolishing the use of age as a barrier to drug and trial access. This will allow us to create biologically driven trials and facilitate early new drug access and the creation of biobank collections to drive our understanding of the biology of cancers in this age group. Involving multiple stakeholders in trial design will facilitate acceptable trials to both healthcare professionals and young people themselves. The support of the multidisciplinary TYA team and a culture of research embedded within this are the keys to improving access and participation of TYA in cancer trials. PMID:27595355

  4. BioZone Exploting Source-Capability Information for Integrated Access to Multiple Bioinformatics Data Sources

    SciTech Connect

    Liu, L; Buttler, D; Paques, H; Pu, C; Critchlow

    2002-01-28

    Modern Bioinformatics data sources are widely used by molecular biologists for homology searching and new drug discovery. User-friendly and yet responsive access is one of the most desirable properties for integrated access to the rapidly growing, heterogeneous, and distributed collection of data sources. The increasing volume and diversity of digital information related to bioinformatics (such as genomes, protein sequences, protein structures, etc.) have led to a growing problem that conventional data management systems do not have, namely finding which information sources out of many candidate choices are the most relevant and most accessible to answer a given user query. We refer to this problem as the query routing problem. In this paper we introduce the notation and issues of query routing, and present a practical solution for designing a scalable query routing system based on multi-level progressive pruning strategies. The key idea is to create and maintain source-capability profiles independently, and to provide algorithms that can dynamically discover relevant information sources for a given query through the smart use of source profiles. Compared to the keyword-based indexing techniques adopted in most of the search engines and software, our approach offers fine-granularity of interest matching, thus it is more powerful and effective for handling queries with complex conditions.

  5. BioZoom: Exploiting Source-Capability Information for Integrated Access to Multiple Bioinformatics Data Sources

    SciTech Connect

    Liu, L; Buttler, D; Critchlow, T J; Han, W; Paques, H; Pu, C; Rocco, D

    2003-01-09

    Modern Bioinformatics data sources are widely used by molecular biologists for homology searching and new drug discovery. User-friendly and yet responsive access is one of the most desirable properties for integrated access to the rapidly growing, heterogeneous, and distributed collection of data sources. The increasing volume and diversity of digital information related to bioinformatics (such as genomes, protein sequences, protein structures, etc.) have led to a growing problem that conventional data management systems do not have, namely finding which information sources out of many candidate choices are the most relevant and most accessible to answer a given user query. We refer to this problem as the query routing problem. In this paper we introduce the notation and issues of query routing, and present a practical solution for designing a scalable query routing system based on multi-level progressive pruning strategies. The key idea is to create and maintain source-capability profiles independently, and to provide algorithms that can dynamically discover relevant information sources for a given query through the smart use of source profiles. Compared to the keyword-based indexing techniques adopted in most of the search engines and software, our approach offers fine-granularity of interest matching, thus it is more powerful and effective for handling queries with complex conditions.

  6. On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users

    NASA Astrophysics Data System (ADS)

    Ding, Zhiguo; Yang, Zheng; Fan, Pingzhi; Poor, H. Vincent

    2014-12-01

    In this letter, the performance of non-orthogonal multiple access (NOMA) is investigated in a cellular downlink scenario with randomly deployed users. The developed analytical results show that NOMA can achieve superior performance in terms of ergodic sum rates; however, the outage performance of NOMA depends critically on the choices of the users' targeted data rates and allocated power. In particular, a wrong choice of the targeted data rates and allocated power can lead to a situation in which the user's outage probability is always one, i.e. the user's targeted quality of service will never be met.

  7. Ancestral state reconstruction reveals multiple independent evolution of diagnostic morphological characters in the "Higher Oribatida" (Acari), conflicting with current classification schemes

    PubMed Central

    2010-01-01

    Background The use of molecular genetic data in phylogenetic systematics has revolutionized this field of research in that several taxonomic groupings defined by traditional taxonomic approaches have been rejected by molecular data. The taxonomic classification of the oribatid mite group Circumdehiscentiae ("Higher Oribatida") is largely based on morphological characters and several different classification schemes, all based upon the validity of diagnostic morphological characters, have been proposed by various authors. The aims of this study were to test the appropriateness of the current taxonomic classification schemes for the Circumdehiscentiae and to trace the evolution of the main diagnostic traits (the four nymphal traits scalps, centrodorsal setae, sclerits and wrinkled cuticle plus octotaxic system and pteromorphs both in adults) on the basis of a molecular phylogenetic hypothesis by means of parsimony, likelihood and Bayesian approaches. Results The molecular phylogeny based on three nuclear markers (28S rDNA, ef-1α, hsp82) revealed considerable discrepancies to the traditional classification of the five "circumdehiscent" subdivisions, suggesting paraphyly of the three families Scutoverticidae, Ameronothridae, Cymbaeremaeidae and also of the genus Achipteria. Ancestral state reconstructions of six common diagnostic characters and statistical evaluation of alternative phylogenetic hypotheses also partially rejected the current morphology-based classification and suggested multiple convergent evolution (both gain and loss) of some traits, after a period of rapid cladogenesis, rendering several subgroups paraphyletic. Conclusions Phylogenetic studies revealed non-monophyly of three families and one genus as a result of a lack of adequate synapomorphic morphological characters, calling for further detailed investigations in a framework of integrative taxonomy. Character histories of six morphological traits indicate that their evolution followed a rather

  8. Source coherence impairments in a direct detection direct sequence optical code-division multiple-access system.

    PubMed

    Fsaifes, Ihsan; Lepers, Catherine; Lourdiane, Mounia; Gallion, Philippe; Beugin, Vincent; Guignard, Philippe

    2007-02-01

    We demonstrate that direct sequence optical code- division multiple-access (DS-OCDMA) encoders and decoders using sampled fiber Bragg gratings (S-FBGs) behave as multipath interferometers. In that case, chip pulses of the prime sequence codes generated by spreading in time-coherent data pulses can result from multiple reflections in the interferometers that can superimpose within a chip time duration. We show that the autocorrelation function has to be considered as the sum of complex amplitudes of the combined chip as the laser source coherence time is much greater than the integration time of the photodetector. To reduce the sensitivity of the DS-OCDMA system to the coherence time of the laser source, we analyze the use of sparse and nonperiodic quadratic congruence and extended quadratic congruence codes. PMID:17230236

  9. Cache oblivious storage and access heuristics for blocked matrix-matrix multiplication

    SciTech Connect

    Bock, Nicolas; Rubensson, Emanuel H; Niklasson, Anders M N; Challacombe, Matt; Salek, Pawel

    2008-01-01

    The authors investigate effects of ordering in blocked matrix-matrix multiplication. They find that submatrices do not have to be stored contiguously in memory in order to achieve near optimal performance. They also find a good choice of execution order of submatrix operations can lead to a speedup of up to four times for small block sizes.

  10. Performance of asynchronous fiber-optic code division multiple access system based on three-dimensional wavelength/time/space codes and its link analysis.

    PubMed

    Singh, Jaswinder

    2010-03-10

    A novel family of three-dimensional (3-D) wavelength/time/space codes for asynchronous optical code-division-multiple-access (CDMA) systems with "zero" off-peak autocorrelation and "unity" cross correlation is reported. Antipodal signaling and differential detection is employed in the system. A maximum of [(W x T+1) x W] codes are generated for unity cross correlation, where W and T are the number of wavelengths and time chips used in the code and are prime. The conditions for violation of the cross-correlation constraint are discussed. The expressions for number of generated codes are determined for various code dimensions. It is found that the maximum number of codes are generated for S < or = min(W,T), where W and T are prime and S is the number of space channels. The performance of these codes is compared to the earlier reported two-dimensional (2-D)/3-D codes for asynchronous systems. The codes have a code-set-size to code-size ratio greater than W/S. For instance, with a code size of 2065 (59 x 7 x 5), a total of 12,213 users can be supported, and 130 simultaneous users at a bit-error rate (BER) of 10(-9). An arrayed-waveguide-grating-based reconfigurable encoder/decoder design for 2-D implementation for the 3-D codes is presented so that the need for multiple star couplers and fiber ribbons is eliminated. The hardware requirements of the coders used for various modulation/detection schemes are given. The effect of insertion loss in the coders is shown to be significantly reduced with loss compensation by using an amplifier after encoding. An optical CDMA system for four users is simulated and the results presented show the improvement in performance with the use of loss compensation. PMID:20220892

  11. Tools for Accessing Cloud Properties From Multiple Heterogeneous A-Train Sensors

    NASA Astrophysics Data System (ADS)

    Kempler, S.; Smith, P.; Savtchenko, A.; Leptoukh, G.

    2008-05-01

    To perform multi-satellite research with A-Train data originating from heterogeneous missions, scientists must discover, access, subset, visualize, and analyze user specified datasets, in ways unique to each dataset. Then, the datasets need to be co-registered. Specifically, scientists attempting to retrieve cloud data and extract information that supports their science research, each must perform these laborious steps. The A-Train Data Depot (ATDD), http://disc.gsfc.nasa.gov/atdd, has been developed to save each scientist the effort and expense of developing the functions to perform these tasks individually. The ATDD, operational for over a year, successfully serves co-registered data, as spatially and temporally specified (dynamically) by the researcher, from the Cloudsat, CALIOP, AIRS, MODIS, OMI, and now POLDER instruments. This paper will demonstrate the value of the ATDD in easily and efficiently acquiring the data and information that would allow scientists to just focus on their science research, and not the access to the data. A significant step implemented in the ATDD, concerns overlaying OMI, POLDER, MODIS, and AIRS 2-D cloud pressure data on the vertical profiles that follow the A-Train track. Once parameters of interest for cloud studies are visualized, various collocated and subsetted data sets as well as PNG image files can be downloaded. This user specified visualization of A-Train data greatly aids researchers by conveniently availing them of specific data of interest, while affording more time for research.

  12. Ultrasonic Multiple-Access Ranging System Using Spread Spectrum and MEMS Technology for Indoor Localization

    PubMed Central

    Segers, Laurent; Tiete, Jelmer; Braeken, An; Touhafi, Abdellah

    2014-01-01

    Indoor localization of persons and objects poses a great engineering challenge. Previously developed localization systems demonstrate the use of wideband techniques in ultrasound ranging systems. Direct sequence and frequency hopping spread spectrum ultrasound signals have been proven to achieve a high level of accuracy. A novel ranging method using the frequency hopping spread spectrum with finite impulse response filtering will be investigated and compared against the direct sequence spread spectrum. In the first setup, distances are estimated in a single-access environment, while in the second setup, two senders and one receiver are used. During the experiments, the micro-electromechanical systems are used as ultrasonic sensors, while the senders were implemented using field programmable gate arrays. Results show that in a single-access environment, the direct sequence spread spectrum method offers slightly better accuracy and precision performance compared to the frequency hopping spread spectrum. When two senders are used, measurements point out that the frequency hopping spread spectrum is more robust to near-far effects than the direct sequence spread spectrum. PMID:24553084

  13. Piwi Modulates Chromatin Accessibility by Regulating Multiple Factors Including Histone H1 to Repress Transposons.

    PubMed

    Iwasaki, Yuka W; Murano, Kensaku; Ishizu, Hirotsugu; Shibuya, Aoi; Iyoda, Yumiko; Siomi, Mikiko C; Siomi, Haruhiko; Saito, Kuniaki

    2016-08-01

    PIWI-interacting RNAs (piRNAs) mediate transcriptional and post-transcriptional silencing of transposable element (TE) in animal gonads. In Drosophila ovaries, Piwi-piRNA complexes (Piwi-piRISCs) repress TE transcription by modifying the chromatin state, such as by H3K9 trimethylation. Here, we demonstrate that Piwi physically interacts with linker histone H1. Depletion of Piwi decreases H1 density at a subset of TEs, leading to their derepression. Silencing at these loci separately requires H1 and H3K9me3 and heterochromatin protein 1a (HP1a). Loss of H1 increases target loci chromatin accessibility without affecting H3K9me3 density at these loci, while loss of HP1a does not impact H1 density. Thus, Piwi-piRISCs require both H1 and HP1a to repress TEs, and the silencing is correlated with the chromatin state rather than H3K9me3 marks. These findings suggest that Piwi-piRISCs regulate the interaction of chromatin components with target loci to maintain silencing of TEs through the modulation of chromatin accessibility. PMID:27425411

  14. Theoretical study of use of optical orthogonal codes for compressed video transmission in optical code division multiple access (OCDMA) system

    NASA Astrophysics Data System (ADS)

    Ghosh, Shila; Chatterji, B. N.

    2007-09-01

    A theoretical investigation to evaluate the performance of optical code division multiple access (OCDMA) for compressed video transmission is shown. OCDMA has many advantages than a typical synchronous protocol time division multiple access (TDMA). A pulsed laser transmission of multi channel digital video can be done using various techniques depending on whether the multi channel data are to be synchronous or asynchronous. A typical form of asynchronous digital operation is wavelength division multiplexing (WDM) in which the digital data of each video source are assigned a specific and separate wavelength. A sophisticated hardware such as accurate wavelength control of all lasers and tunable narrow band optical filters at the receivers is required in this case. A major disadvantage with CDMA is the reduction in per channel data rate (relative to the speeds available in the laser itself) that occurs in the insertion of code addressing. Hence optical CDMA for the video transmission application is meaningful when individual channel video bit rates can be significantly reduced and that can be done by compression of video data. In our work for compression of video image standard JPEG is implemented where a compression ratio of about 60 % is obtained without noticeable image degradation. Compared to the other existing techniques JPEG standard achieves higher compression ration with high S/N ratio. Here we demonstrated the auto and cross correlation properties of the codes. We have shown the implementation of bipolar Walsh coding in OCDMA system and their use in transmission of image/video.

  15. Bit-to-bit error dependence in direct-sequence spread-spectrum multiple-access packet radio systems

    NASA Astrophysics Data System (ADS)

    Morrow, Robert K., Jr.

    1988-05-01

    Slotted direct-sequence spread-spectrum multiple-access (DS/SSMA) packet broadcasting systems with random signature sequences are analyzed within the framework of the lower three layers of the International Standards Organization Reference Model of Open Systems Interconnection. At the physical layer, we show that a widely-used Gaussian approximation (which we call the Standard Gaussian Approximation) for the probability of data bit error in a chip and phase asynchronous system is accurate only when there are a large number of simultaneous users on the channel; otherwise, this approximation can be optimistic by several orders of magnitude. For interfering signals with fixed delays and phases relative to the desired signal, however, the Standard Gaussian Approximation is quite accurate for any number of simultaneous users. To obtain a closer approximation to the probability of data bit error for an asynchronous system, we introduce the Improved Gaussian Approximation, which involves finding the distribution of the multiple-access interference variance over all possible delay and phase values and then taking a Gaussian approximation over the support of the distribution and averaging the results. To accurately analyze packet performance at the data link layer, we first use the theory of moment spaces to gain insight on the effect of bit-to-bit error dependence caused by the constant relative delays and (possibly) phases of the interfering signals over the duration of a desired packet.

  16. A Unified Framework of the Performance Evaluation of Optical Time-Wavelength Code-Division Multiple-Access Systems

    NASA Astrophysics Data System (ADS)

    Inaty, Elie

    In this paper, we provide an analysis to the performance of optical time-wavelength code-division multiple-access (OTW-CDMA) network when the system is working above the nominal transmission rate limit imposed by the passive encoding-decoding operation. We address the problem of overlapping in such a system and how it can directly affect the bit error rate (BER). A unified mathematical framework is presented under the assumption of one coincidence sequences with non-repeating wavelengths. A closed form expression of the multiple access interference limited BER is provided as a function of different system parameters. Results show that the performance of OTW-CDMA system may be critically affected when working above the nominal limit; an event that may happen when the network operates at high transmission rate. In addition, the impact of the derived error probability on the performance of two newly proposed MAC protocols, the S-ALOHA and the R3T, is also investigated. It is shown that for low transmission rates, the S-ALOHA is better than the R3T; while the R3T is better at very high transmission rates. However, in general it is postulated that the R3T protocol suffers a higher delay mainly because of the presence of additional modes.

  17. Performance of a Frequency-Hopped Real-Time Remote Control System in a Multiple Access Scenario

    NASA Astrophysics Data System (ADS)

    Cervantes, Frank

    A recent trend is observed in the context of the radio-controlled aircrafts and automobiles within the hobby grade category and Unmanned Aerial Vehicles (UAV) applications moving to the well-known Industrial, Scientific and Medical (ISM) band. Based on this technological fact, the present thesis evaluates an individual user performance by featuring a multiple-user scenario where several point-to-point co-located real-time Remote Control (RC) applications operate using Frequency Hopping Spread Spectrum (FHSS) as a medium access technique in order to handle interference efficiently. Commercial-off-the-shelf wireless transceivers ready to operate in the ISM band are considered as the operational platform supporting the above-mentioned applications. The impact of channel impairments and of different critical system engineering issues, such as working with real clock oscillators and variable packet duty cycle, are considered. Based on the previous, simulation results allowed us to evaluate the range of variation for those parameters for an acceptable system performance under Multiple Access (MA) environments.

  18. A licence to vape: Is it time to trial of a nicotine licensing scheme to allow Australian adults controlled access to electronic cigarettes devices and refill solutions containing nicotine?

    PubMed

    Gartner, Coral; Hall, Wayne

    2015-06-01

    Australia has some of the most restrictive laws concerning use of nicotine in e-cigarettes. The only current legal option for Australians to legally possess and use nicotine for vaping is with a medical prescription and domestic supply is limited to compounding pharmacies that prepare medicines for specific patients. An alternative regulatory option that could be implemented under current drugs and poisons regulations is a 'nicotine licensing' scheme utilising current provisions for 'dangerous poisons'. This commentary discusses how such a scheme could be used to trial access to nicotine solutions for vaping outside of a 'medicines framework' in Australia. PMID:25817484

  19. GLONASS-R: GNSS reflectometry with a Frequency Division Multiple Access-based satellite navigation system

    NASA Astrophysics Data System (ADS)

    Hobiger, T.; Haas, R.; Löfgren, J. S.

    2014-04-01

    The information from reflected Global Navigation Satellite System (GNSS) signals can become a valuable data source, from which geophysical properties can be deduced. This approach, called GNSS Reflectometry (GNSS-R), can be used to develop instruments that act like an altimeter when arrival times of direct and reflected signals are compared. Current GNSS-R systems usually entirely rely on signals from the Global Positioning Service (GPS), and field experiments could demonstrate that information from such systems can measure sea level with an accuracy of a few centimeters. However, the usage of the Russian GLONASS system has the potential to simplify the processing scheme and to allow handling of direct and reflected signals like a bistatic radar. Thus, such a system has been developed and deployed for test purposes at the Onsala Space Observatory, Sweden, that has an operational GPS-based GNSS-R system. Over a period of 2 weeks in October 2013, GPS-based GNSS-R sea level monitoring and measurements with the newly developed GLONASS-R system were carried out in parallel. In addition, data from colocated tide gauge measurements were available for comparison. It can be shown that precision and accuracy of the GLONASS-based GNSS-R system is comparable to, or even better than, conventional GPS-based GNSS-R solutions. Moreover, the simplicity of the newly developed GLONASS-R system allows to make it a cheap and valuable tool for various remote sensing applications.

  20. ECR Browser: A Tool For Visualizing And Accessing Data From Comparisons Of Multiple Vertebrate Genomes

    SciTech Connect

    Loots, G G; Ovcharenko, I; Stubbs, L; Nobrega, M A

    2004-01-06

    The increasing number of vertebrate genomes being sequenced in draft or finished form provide a unique opportunity to study and decode the language of DNA sequence through comparative genome alignments. However, novel tools and strategies are required to accommodate this increasing volume of genomic information and to facilitate experimental annotation of genome function. Here we present the ECR Browser, a tool that provides an easy and dynamic access to whole genome alignments of human, mouse, rat and fish sequences. This web-based tool (http://ecrbrowser.dcode.org) provides the starting point for discovery of novel genes, identification of distant gene regulatory elements and prediction of transcription factor binding sites. The genome alignment portal of the ECR Browser also permits fast and automated alignment of any user-submitted sequence to the genome of choice. The interconnection of the ECR browser with other DNA sequence analysis tools creates a unique portal for studying and exploring vertebrate genomes.

  1. Access to Care for Multiple Sclerosis in Times of Economic Crisis in Greece – the HOPE II Study

    PubMed Central

    Souliotis, Kyriakos; Alexopoulou, Elena; Papageorgiou, Manto; Politi, Anastasia; Litsa, Panagiota; Contiades, Xenophon

    2016-01-01

    Background: While there is currently no cure for multiple sclerosis (MS), treatment with biologic disease-modifying drugs (bDMDs) can reduce the impact of the condition on the lives of patients. In Greece, the regulatory change in the distribution system of bDMDs, limited their administration through the designated pharmacies of the National Organization for Healthcare Services Provision (EOPYY) or the National Health System (ESY) hospitals, thus potentially impacting access to MS treatment. In this context, the aim of this paper was to assess the barriers to bDMDs, by recording MS patients’ experiences. Methods: A survey research was conducted between January and February 2014 in Athens and 5 other major Greek cities with the methods of personal and telephone interview. A structured questionnaire was used to elicit socio-economic and medical information, information related to obstacles in accessing bDMDs and medical treatment, from MS patients that visited EOPYY pharmacies during the study period. Results: During the last year 69% of 179 participants reported that the distribution system of bDMDs has improved. Thirteen percent of participants encountered problems in accessing their medication, and 16.9% of participants in accessing their physician, with the obstacles being more pronounced for non-Athens residents. Frequent obstacles to bDMDs were the distance from EOPYY pharmacies and difficulties in obtaining a diagnosis from an EOPYY/ESY physician, while obstacles to medical care were delays in appointment booking and travel difficulties. Conclusion: Even though the major weaknesses of the distribution system of bDMDs have improved, further amelioration of the system could be achieved through the home delivery of medicines to patients living in remote areas, and through the development of a national MS registry. PMID:26927393

  2. Post-Coma Persons with Extensive Multiple Disabilities Use Microswitch Technology to Access Selected Stimulus Events or Operate a Radio Device

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Alberti, Gloria; Oliva, Doretta; Megna, Gianfranco; Iliceto, Carla; Damiani, Sabino; Ricci, Irene; Spica, Antonella

    2011-01-01

    The present two studies extended research evidence on the use of microswitch technology by post-coma persons with multiple disabilities. Specifically, Study I examined whether three adults with a diagnosis of minimally conscious state and multiple disabilities could use microswitches as tools to access brief, selected stimulus events. Study II…

  3. Locally accessible conformations of proteins: multiple molecular dynamics simulations of crambin.

    PubMed Central

    Caves, L. S.; Evanseck, J. D.; Karplus, M.

    1998-01-01

    Multiple molecular dynamics (MD) simulations of crambin with different initial atomic velocities are used to sample conformations in the vicinity of the native structure. Individual trajectories of length up to 5 ns sample only a fraction of the conformational distribution generated by ten independent 120 ps trajectories at 300 K. The backbone atom conformational space distribution is analyzed using principal components analysis (PCA). Four different major conformational regions are found. In general, a trajectory samples only one region and few transitions between the regions are observed. Consequently, the averages of structural and dynamic properties over the ten trajectories differ significantly from those obtained from individual trajectories. The nature of the conformational sampling has important consequences for the utilization of MD simulations for a wide range of problems, such as comparisons with X-ray or NMR data. The overall average structure is significantly closer to the X-ray structure than any of the individual trajectory average structures. The high frequency (less than 10 ps) atomic fluctuations from the ten trajectories tend to be similar, but the lower frequency (100 ps) motions are different. To improve conformational sampling in molecular dynamics simulations of proteins, as in nucleic acids, multiple trajectories with different initial conditions should be used rather than a single long trajectory. PMID:9541397

  4. Radiances simulated in the presence of clouds by use of a fast radiative transfer model and a multiple-scattering scheme.

    PubMed

    Amorati, Roberta; Rizzi, Rolando

    2002-03-20

    A fast-forward radiative transfer (RTF) model is presented that includes cloud-radiation interaction for any number of cloud layers. Layer cloud fraction and transmittance are treated separately and combined with that of gaseous transmittances. RTF is tested against a reference procedure that uses line-by-line gaseous transmittances and solves the radiative transfer equation by use of the adding-doubling method to handle multiple-scattering conditions properly. The comparison is carried out for channels 8, 12, and 14 of the High Resolution Infrared Radiation Sounder (HIRS/2) and for the geostationary satellite METEOSAT thermal infrared and water vapor channels. Fairly large differences in simulated radiances by the two schemes are found in clear conditions for upper- and mid-tropospheric channels; the cause of the differences is discussed. For cloudy situations an improved layer source function is shown to be required when rapid changes in atmospheric transmission are experienced within the model layers. The roles of scattering processes are discussed; results with and without scattering, both obtained by use of a reference code, are compared. Overall, the presented results show that the fast model is capable of reproducing the cloudy results of the much more complex and time-consuming reference scheme. PMID:11921787

  5. Host choice and multiple blood feeding behaviour of malaria vectors and other anophelines in Mwea rice scheme, Kenya

    PubMed Central

    Muriu, Simon M; Muturi, Ephantus J; Shililu, Josephat I; Mbogo, Charles M; Mwangangi, Joseph M; Jacob, Benjamin G; Irungu, Lucy W; Mukabana, Richard W; Githure, John I; Novak, Robert J

    2008-01-01

    Background Studies were conducted between April 2004 and February 2006 to determine the blood-feeding pattern of Anopheles mosquitoes in Mwea Kenya. Methods Samples were collected indoors by pyrethrum spay catch and outdoors by Centers for Disease Control light traps and processed for blood meal analysis by an Enzyme-linked Immunosorbent Assay. Results A total of 3,333 blood-fed Anopheles mosquitoes representing four Anopheles species were collected and 2,796 of the samples were assayed, with Anopheles arabiensis comprising 76.2% (n = 2,542) followed in decreasing order by Anopheles coustani 8.9% (n = 297), Anopheles pharoensis 8.2% (n = 272) and Anopheles funestus 6.7% (n = 222). All mosquito species had a high preference for bovine (range 56.3–71.4%) over human (range 1.1–23.9%) or goat (0.1–2.2%) blood meals. Some individuals from all the four species were found to contain mixed blood meals. The bovine blood index (BBI) for An. arabiensis was significantly higher for populations collected indoors (71.8%), than populations collected outdoors (41.3%), but the human blood index (HBI) did not differ significantly between the two populations. In contrast, BBI for indoor collected An. funestus (51.4%) was significantly lower than for outdoor collected populations (78.0%) and the HBI was significantly higher indoors (28.7%) than outdoors (2.4%). Anthropophily of An. funestus was lowest within the rice scheme, moderate in unplanned rice agro-ecosystem, and highest within the non-irrigated agro-ecosystem. Anthropophily of An. arabiensis was significantly higher in the non-irrigated agro-ecosystem than in the other agro-ecosystems. Conclusion These findings suggest that rice cultivation has an effect on host choice by Anopheles mosquitoes. The study further indicate that zooprophylaxis may be a potential strategy for malaria control, but there is need to assess how domestic animals may influence arboviruses epidemiology before adapting the strategy. PMID:18312667

  6. IPAT: a freely accessible software tool for analyzing multiple patent documents with inbuilt landscape visualizer.

    PubMed

    Ajay, Dara; Gangwal, Rahul P; Sangamwar, Abhay T

    2015-01-01

    Intelligent Patent Analysis Tool (IPAT) is an online data retrieval tool, operated based on text mining algorithm to extract specific patent information in a predetermined pattern into an Excel sheet. The software is designed and developed to retrieve and analyze technology information from multiple patent documents and generate various patent landscape graphs and charts. The software is C# coded in visual studio 2010, which extracts the publicly available patent information from the web pages like Google Patent and simultaneously study the various technology trends based on user-defined parameters. In other words, IPAT combined with the manual categorization will act as an excellent technology assessment tool in competitive intelligence and due diligence for predicting the future R&D forecast. PMID:26452016

  7. Using multiple hydrogen bonding cross-linkers to access reversibly responsive three dimensional graphene oxide architecture

    NASA Astrophysics Data System (ADS)

    Han, Junkai; Shen, Yongtao; Feng, Wei

    2016-07-01

    Three-dimensional (3D) graphene materials have attracted a lot of attention for efficiently utilizing inherent properties of graphene sheets. However, 3D graphene materials reported in the previous literature are constructed through covalent or weak non-covalent interactions, causing permanent structure/property changes. In this paper, a novel 3D graphene material of dynamic interactions between lamellas with 2-ureido-4[1H]-pyrimidinone as a supra-molecular motif has been synthesized. This 3D graphene material shows enhanced sheet interactions while the cross-linking takes place. With proper solvent stimulation, the integrated 3D graphene material can disassemble as isolated sheets. The driving force for the 3D structure assembly or disassembly is considered to be the forming or breaking of the multiple hydrogen bonding pairs. Furthermore, the 3D material is used as an intelligent dye adsorber to adsorb methylene blue and release it. The controllable and reversible characteristic of this 3D graphene material may open an avenue to the synthesis and application of novel intelligent materials.Three-dimensional (3D) graphene materials have attracted a lot of attention for efficiently utilizing inherent properties of graphene sheets. However, 3D graphene materials reported in the previous literature are constructed through covalent or weak non-covalent interactions, causing permanent structure/property changes. In this paper, a novel 3D graphene material of dynamic interactions between lamellas with 2-ureido-4[1H]-pyrimidinone as a supra-molecular motif has been synthesized. This 3D graphene material shows enhanced sheet interactions while the cross-linking takes place. With proper solvent stimulation, the integrated 3D graphene material can disassemble as isolated sheets. The driving force for the 3D structure assembly or disassembly is considered to be the forming or breaking of the multiple hydrogen bonding pairs. Furthermore, the 3D material is used as an

  8. Optimum rate Reed-Solomon codes for frequency-hopped spread-spectrum multiple-access communication systems

    NASA Astrophysics Data System (ADS)

    Kim, Sang W.; Stark, Wayne

    1989-02-01

    The authors consider a multiple-access frequency-hopped spread-spectrum communication system with Reed-Solomon codes. The performance measures of interest are an achieveable region and the channel throughput. The achieveable rate region is the set of all pairs of code rate and number of users for which communication is possible with error probability below a fixed value. The throughput measures the expected number of successful codeword transmissions per unit bandwidth. Two models of interference are considered. For these two models, the authors determine the optimal number of users for a given bandwidth and the optimal rate Reed-Solomon code that maximize the throughput. They also determine the achieveable region for these models.

  9. Demonstration of a novel optical code-division multiple-access system at 800 megachips per second.

    PubMed

    Vethanayagam, N; Macdonald, R I

    1991-07-01

    A novel optical code-division multiple-access system using Alberta codes and complementary correlation is demonstrated at 800 megachips per second. Completely passive optical multiplexing and demultiplexing is performed throughout the process. Complementary correlation permits code orthogonality because bipolar electrical signals are generated from unipolar optical ones. The correlator is implemented optoelectronically with an array of metal-semiconductor-metal photodiodes. We show that the bit-error-rate performance of the system is not degraded by interfering signals and that zero cross talk is nominally achieved. An unusual property of such systems is confirmed: The bit error rate on a channel can be reduced by the presence of an interfering channel if the two transmitters are not chip asynchronous. PMID:19776859

  10. Replica Analysis of Multiuser Detection for Code Division Multiple Access with M-Ary Phase-Shift Keying

    NASA Astrophysics Data System (ADS)

    Kato, Hiroyuki; Okada, Masato; Miyoshi, Seiji

    2013-07-01

    We analyze the performance of the maximizer of the posterior marginals (MPM) detector for code division multiple access (CDMA) multiuser detection with M-ary phase shift keying (M-ary PSK) in the large system limit by the replica method. The obtained theory agrees with computer simulation reasonably well. We also derive the theory in the case of the large M limit and discuss the dependence of the properties of M-ary PSK CDMA communication on M. We show that the waterfall phenomenon occurs for both the finite and infinite values of M. We also show that a value of M for which the decoded phase information on the original user symbol becomes minimum exists. Furthermore, we discuss the relationship between the theory based on the replica method and that based on self-consistent signal-to-noise analysis (SCSNA).

  11. Using multiple hydrogen bonding cross-linkers to access reversibly responsive three dimensional graphene oxide architecture.

    PubMed

    Han, Junkai; Shen, Yongtao; Feng, Wei

    2016-08-01

    Three-dimensional (3D) graphene materials have attracted a lot of attention for efficiently utilizing inherent properties of graphene sheets. However, 3D graphene materials reported in the previous literature are constructed through covalent or weak non-covalent interactions, causing permanent structure/property changes. In this paper, a novel 3D graphene material of dynamic interactions between lamellas with 2-ureido-4[1H]-pyrimidinone as a supra-molecular motif has been synthesized. This 3D graphene material shows enhanced sheet interactions while the cross-linking takes place. With proper solvent stimulation, the integrated 3D graphene material can disassemble as isolated sheets. The driving force for the 3D structure assembly or disassembly is considered to be the forming or breaking of the multiple hydrogen bonding pairs. Furthermore, the 3D material is used as an intelligent dye adsorber to adsorb methylene blue and release it. The controllable and reversible characteristic of this 3D graphene material may open an avenue to the synthesis and application of novel intelligent materials. PMID:27378190

  12. Performance Analysis of Direct-Sequence Code-Division Multiple-Access Communications with Asymmetric Quadrature Phase-Shift-Keying Modulation

    NASA Technical Reports Server (NTRS)

    Wang, C.-W.; Stark, W.

    2005-01-01

    This article considers a quaternary direct-sequence code-division multiple-access (DS-CDMA) communication system with asymmetric quadrature phase-shift-keying (AQPSK) modulation for unequal error protection (UEP) capability. Both time synchronous and asynchronous cases are investigated. An expression for the probability distribution of the multiple-access interference is derived. The exact bit-error performance and the approximate performance using a Gaussian approximation and random signature sequences are evaluated by extending the techniques used for uniform quadrature phase-shift-keying (QPSK) and binary phase-shift-keying (BPSK) DS-CDMA systems. Finally, a general system model with unequal user power and the near-far problem is considered and analyzed. The results show that, for a system with UEP capability, the less protected data bits are more sensitive to the near-far effect that occurs in a multiple-access environment than are the more protected bits.

  13. A secure double-image sharing scheme based on Shamir's three-pass protocol and 2D Sine Logistic modulation map in discrete multiple-parameter fractional angular transform domain

    NASA Astrophysics Data System (ADS)

    Sui, Liansheng; Duan, Kuaikuai; Liang, Junli

    2016-05-01

    A secure double-image sharing scheme is proposed by using the Shamir's three-pass protocol in the discrete multiple-parameter fractional angular transform domain. First, an enlarged image is formed by assembling two plain images successively in the horizontal direction and scrambled in the chaotic permutation process, in which the sequences of chaotic pairs are generated by the two-dimensional Sine Logistic modulation map. Second, the scrambled image is divided into two components which are used to constitute a complex image. One component is normalized and regarded as the phase part of the complex image as well as other is considered as the amplitude part. Finally, the complex image is shared between the sender and the receiver by using the Shamir's three-pass protocol, in which the discrete multiple-parameter fractional angular transform is used as the encryption function due to its commutative property. The proposed double-image sharing scheme has an obvious advantage that the key management is convenient without distributing the random phase mask keys in advance. Moreover, the security of the image sharing scheme is enhanced with the help of extra parameters of the discrete multiple-parameter fractional angular transform. To the best of our knowledge, this is the first report on integrating the Shamir's three-pass protocol with double-image sharing scheme in the information security field. Simulation results and security analysis verify the feasibility and effectiveness of the proposed scheme.

  14. PWM-switching pattern-based diagnosis scheme for single and multiple open-switch damages in VSI-fed induction motor drives.

    PubMed

    Trabelsi, Mohamed; Boussak, Mohamed; Gossa, Moncef

    2012-03-01

    This paper deals with a fault detection technique for insulated-gate bipolar transistors (IGBTs) open-circuit faults in voltage source inverter (VSI)-fed induction motor drives. The novelty of this idea consists in analyzing the pulse-width modulation (PWM) switching signals and the line-to-line voltage levels during the switching times, under both healthy and faulty operating conditions. The proposed method requires line-to-line voltage measurement, which provides information about switching states and is not affected by the load. The fault diagnosis scheme is achieved using simple hardware and can be included in the existing inverter system without any difficulty. In addition, it allows not only accurate single and multiple faults diagnosis but also minimization of the fault detection time to a maximum of one switching period (T(c)). Simulated and experimental results on a 3-kW squirrel-cage induction motor drive are displayed to validate the feasibility and the effectiveness of the proposed strategy. PMID:22153956

  15. Comparison of nutrient intakes from two selected diet plans considered healthful versus the cutoff points for green lights as defined by the UK's multiple traffic light scheme.

    PubMed

    Green, H; Fern, E

    2016-02-01

    This study compared nutrient intakes from 7-day menus for the US MyPlate and DASH Eating Plan versus the cutoff points for green lights defined by the UK's multiple traffic light (MTL) scheme. For both diets, the foods achieved green lights for saturated fat and salt, and for beverages for total fat, saturated fat and salt. The other nutrients achieved amber lights but were within the range of the two diets. By contrast, the MTL threshold for salt in beverages was outside the range of the diets. The values for salt in beverages in the MyPlate and Dash diet plans were 0.06±0.07 and 0.19±0.01 (s.d.) g/100 ml, which are both considerably lower compared with the cutoff of 0.3 g/100 ml for an MTL green light. Adjusting the green MTL threshold values to the median values for a healthful diet could help make MTL labelling a more valid way of helping consumers choose a healthful diet. PMID:26242724

  16. Libraries and the Pickle (PCLE) of Content Management Schemes: Survey of Pending Copyright Policy Battles and Their Implications for School Libraries, Free Speech, Access to Information, and Democracy.

    ERIC Educational Resources Information Center

    Minow, Mary; Wilson, Cicely Reed

    2003-01-01

    Explains the copyright policy battles now pending in Congress and the courts, with a discussion of what they mean for free speech, access to information, and democratic culture in school libraries. (MES)

  17. Satellite range delay simulator for a matrix-switched time division multiple-access network simulation system

    NASA Technical Reports Server (NTRS)

    Nagy, Lawrence A.

    1990-01-01

    The Systems Integration, Test, and Evaluation (SITE) facility at NASA Lewis Research Center is presently configured as a satellite-switched time division multiple access (SS-TDMA) network simulator. The purpose of SITE is to demonstrate and evaluate advanced communication satellite technologies, presently embodied by POC components developed under NASA contracts in addition to other hardware, such as ground terminals, designed and built in-house at NASA Lewis. Each ground terminal in a satellite communications system will experience a different aspect of the satellite's motion due mainly to daily tidal effects and station keeping, hence a different duration and rate of variation in the range delay. As a result of this and other effects such as local oscillator instability, each ground terminal must constantly adjust its transmit burst timing so that data bursts from separate ground terminals arrive at the satellite in their assigned time slots, preventing overlap and keeping the system in synchronism. On the receiving end, ground terminals must synchronize their local clocks using reference transmissions received through the satellite link. A feature of the SITE facility is its capability to simulate the varying propagation delays and associated Doppler frequency shifts that the ground terminals in the network have to cope with. Delay is ahcieved by means of two NASA Lewis designed and built range delay simulator (RDS) systems, each independently controlled locally with front panel switches or remotely by an experiment control and monitor (EC/M) computer.

  18. Effects of concurrent access to multiple ethanol concentrations and repeated deprivations on alcohol intake of high-alcohol-drinking (HAD) rats

    PubMed Central

    Rodd, Zachary A.; Bell, Richard L.; Kuc, Kelly A.; Murphy, James M.; Lumeng, Lawrence; McBride, William J.

    2010-01-01

    High-alcohol-drinking rats, given access to 10% ethanol, expressed an alcohol deprivation effect (ADE) only after multiple deprivations. In alcohol-preferring (P) rats, concurrent access to multiple ethanol concentrations combined with repeated cycles of EtOH access and deprivation produced excessive ethanol drinking. The current study was undertaken to examine the effects of repeated alcohol deprivations with concurrent access to multiple concentrations of ethanol on ethanol intake of HAD replicate lines of rats. HAD-1 and HAD-2 rats received access to 10, 20 and 30% (v/v) ethanol for 6 weeks. Rats from each replicate line were assigned to: (1) a non-deprived group; (2) a group initially deprived of ethanol for 2 weeks; or (3) a group initially deprived for 8 weeks. Following the restoration of the ethanol solutions, cycle of 2 weeks of ethanol exposure and 2 weeks of alcohol deprivation was repeated three times for a total of four deprivations. Following the initial ethanol deprivation period, deprived groups significantly increased ethanol intakes during the initial 24-hour re-exposure period. Multiple deprivations increased ethanol intakes, shifted preference to higher ethanol concentrations and prolonged the duration of the elevated ethanol intakes for up to 5 days. In addition, repeated deprivations increased ethanol intake in the first 2-hour re-exposure period as high as 5–7 g/kg (which are equivalent to amounts consumed in 24 hours by HAD rats), and produced blood ethanol levels in excess of 150 mg%. The results indicate that HAD rats exhibit ‘loss-of-control’ of alcohol drinking with repeated deprivations when multiple ethanol concentrations are available. PMID:19076927

  19. Analysis of tumor template from multiple compartments in a blood sample provides complementary access to peripheral tumor biomarkers.

    PubMed

    Strauss, William M; Carter, Chris; Simmons, Jill; Klem, Erich; Goodman, Nathan; Vahidi, Behrad; Romero, Juan; Masterman-Smith, Michael; O'Regan, Ruth; Gogineni, Keerthi; Schwartzberg, Lee; Austin, Laura K; Dempsey, Paul W; Cristofanilli, Massimo

    2016-05-01

    Targeted cancer therapeutics are promised to have a major impact on cancer treatment and survival. Successful application of these novel treatments requires a molecular definition of a patient's disease typically achieved through the use of tissue biopsies. Alternatively, allowing longitudinal monitoring, biomarkers derived from blood, isolated either from circulating tumor cell derived DNA (ctcDNA) or circulating cell-free tumor DNA (ccfDNA) may be evaluated. In order to use blood derived templates for mutational profiling in clinical decisions, it is essential to understand the different template qualities and how they compare to biopsy derived template DNA as both blood-based templates are rare and distinct from the gold-standard. Using a next generation re-sequencing strategy, concordance of the mutational spectrum was evaluated in 32 patient-matched ctcDNA and ccfDNA templates with comparison to tissue biopsy derived DNA template. Different CTC antibody capture systems for DNA isolation from patient blood samples were also compared. Significant overlap was observed between ctcDNA, ccfDNA and tissue derived templates. Interestingly, if the results of ctcDNA and ccfDNA template sequencing were combined, productive samples showed similar detection frequency (56% vs 58%), were temporally flexible, and were complementary both to each other and the gold standard. These observations justify the use of a multiple template approach to the liquid biopsy, where germline, ctcDNA, and ccfDNA templates are employed for clinical diagnostic purposes and open a path to comprehensive blood derived biomarker access. PMID:27049831

  20. Strategies for Improving Access.

    ERIC Educational Resources Information Center

    Hore, Terry; Barwood, Bryan

    1989-01-01

    The development of the varied strategies that have been introduced in order to improve access for disadvantaged groups at Monash University is discussed. The Junior University Programme, the Monash Orientation Scheme for Aborigines, the Mature Age Special Admission Scheme, Special Entry Scheme, and the Schools Link Programme are described. (MLW)

  1. Household trends in access to improved water sources and sanitation facilities in Vietnam and associated factors: findings from the Multiple Indicator Cluster Surveys, 2000–2011

    PubMed Central

    Tuyet-Hanh, Tran Thi; Lee, Jong-Koo; Oh, Juhwan; Van Minh, Hoang; Ou Lee, Chul; Hoan, Le Thi; Nam, You-Seon; Long, Tran Khanh

    2016-01-01

    Background Despite progress made by the Millennium Development Goal (MDG) number 7.C, Vietnam still faces challenges with regard to the provision of access to safe drinking water and basic sanitation. Objective This paper describes household trends in access to improved water sources and sanitation facilities separately, and analyses factors associated with access to improved water sources and sanitation facilities in combination. Design Secondary data from the Vietnam Multiple Indicator Cluster Survey in 2000, 2006, and 2011 were analyzed. Descriptive statistics and tests of significance describe trends over time in access to water and sanitation by location, demographic and socio-economic factors. Binary logistic regressions (2000, 2006, and 2011) describe associations between access to water and sanitation, and geographic, demographic, and socio-economic factors. Results There have been some outstanding developments in access to improved water sources and sanitation facilities from 2000 to 2011. In 2011, the proportion of households with access to improved water sources and sanitation facilities reached 90% and 77%, respectively, meeting the 2015 MDG targets for safe drinking water and basic sanitation set at 88% and 75%, respectively. However, despite these achievements, in 2011, only 74% of households overall had access to combined improved drinking water and sanitation facilities. There were also stark differences between regions. In 2011, only 47% of households had access to both improved water and sanitation facilities in the Mekong River Delta compared with 94% in the Red River Delta. In 2011, households in urban compared to rural areas were more than twice as likely (odds ratio [OR]: 2.2; 95% confidence interval [CI]: 1.9–2.5) to have access to improved water and sanitation facilities in combination, and households in the highest compared with the lowest wealth quintile were over 40 times more likely (OR: 42.3; 95% CI: 29.8–60.0). Conclusions More

  2. CELLS v1.0: updated and parallelized version of an electrical scheme to simulate multiple electrified clouds and flashes over large domains

    NASA Astrophysics Data System (ADS)

    Barthe, C.; Chong, M.; Pinty, J.-P.; Bovalo, C.; Escobar, J.

    2012-01-01

    The paper describes the fully parallelized electrical scheme CELLS which is suitable to simulate explicitly electrified storm systems on parallel computers. Our motivation here is to show that a cloud electricity scheme can be developed for use on large grids with complex terrain. Large computational domains are needed to perform real case meteorological simulations with many independent convective cells. The scheme computes the bulk electric charge attached to each cloud particle and hydrometeor. Positive and negative ions are also taken into account. Several parametrizations of the dominant non-inductive charging process are included and an inductive charging process as well. The electric field is obtained by inverting the Gauss equation with an extension to terrain-following coordinates. The new feature concerns the lightning flash scheme which is a simplified version of an older detailed sequential scheme. Flashes are composed of a bidirectional leader phase (vertical extension from the triggering point) and a phase obeying a fractal law (with horizontal extension on electrically charged zones). The originality of the scheme lies in the way the branching phase is treated to get a parallel code. The complete electrification scheme is tested for the 10 July 1996 STERAO case and for the 21 July 1998 EULINOX case. Flash characteristics are analysed in detail and additional sensitivity experiments are performed for the STERAO case. Although the simulations were run for flat terrain conditions, they show that the model behaves well on multiprocessor computers. This opens a wide area of application for this electrical scheme with the next objective of running real meterological case on large domains.

  3. CELLS v1.0: updated and parallelized version of an electrical scheme to simulate multiple electrified clouds and flashes over large domains

    NASA Astrophysics Data System (ADS)

    Barthe, C.; Chong, M.; Pinty, J.-P.; Bovalo, C.; Escobar, J.

    2011-10-01

    The paper describes the fully parallelized electrical scheme CELLS which is suitable to simulate explicitly electrified storm systems on parallel computers. Our motivation here is to show that a cloud electricity scheme can be developed for use on large grids with complex terrain. Large computational domains are needed to perform real case meteorological simulations with many independent convective cells. The scheme computes the bulk electric charge attached to each cloud particle. Positive and negative ions are also taken into account. Several parametrizations of the dominant non-inductive charging process are included and an inductive charging process as well. The electric field is obtained by inverting the Gauss equation with an extension to terrain-following coordinates. The new feature concerns the lightning flash scheme which is a simplified version of an older detailed sequential scheme. Flashes are composed of a bidirectional leader phase (vertical extension from the triggering point) and a phase obeying a fractal law (with horizontal extension on electrically charged zones). The originality of the scheme lies in the way the branching phase is treated to get a parallel code. The complete electrification scheme is tested for the 10 July 1996 STERAO case and for the 21 July 1998 EULINOX case. Flash characteristics are analysed in detail and additional sensitivity experiments are performed for the STERAO case. Although the simulations were run for flat terrain conditions, they show that the model behaves well on multiprocessor computers. This opens a wide area of application for this electrical scheme with the next objective of running real meteorological case on large domains.

  4. Structuring waveguide-grating-based wavelength-division multiplexing/optical code division multiple access network codecs over topology of concentric circles

    NASA Astrophysics Data System (ADS)

    Huang, Jen-Fa; Nieh, Ta-Chun; Chen, Kai-Sheng

    2013-01-01

    The cyclic period and free spectral range of arrayed-waveguide gratings (AWG) in a wavelength-division multiplexing/optical code division multiple access optical code division multiple access network are exploited. The total optical network unit (ONU) of network capacity is partitioned into groups of different wavelength in accordance with the geographical location of subscribers based on the radial distance of the ONU to the optical line terminal. Combining concentric circles round by round for ONU groups enables a fixed round-trip time in the data transmission and a significant increase in system performance. Using AWG router, the proposed topology of concentric circles retains signature orthogonality and minimizes wavelength collisions on the photo-detector. Furthermore, the adoption of extended M-sequence codes corresponding to the AWG codec provides a simpler, more efficient coding procedure and accommodates more users in a single group.

  5. An energy-efficient SIMD DSP with multiple VLIW configurations and an advanced memory access unit for LTE-A modem LSIs

    NASA Astrophysics Data System (ADS)

    Tomono, Mitsuru; Ito, Makiko; Nomura, Yoshitaka; Mouri, Makoto; Hirose, Yoshio

    2015-12-01

    Energy efficiency is the most important factor in the design of wireless modem LSIs for mobile handset systems. We have developed an energy-efficient SIMD DSP for LTE-A modem LSIs. Our DSP has mainly two hardware features in order to reduce energy consumption. The first one is multiple VLIW configurations to minimize accesses to instruction memories. The second one is an advanced memory access unit to realize complex memory accesses required for wireless baseband processing. With these features, performance of our DSP is about 1.7 times faster than a base DSP on average for standard LTE-A Libraries. Our DSP achieves about 20% improvement in energy efficiency compared to a base DSP for LTE-A modem LSIs.

  6. Wavelength-encoding/temporal-spreading optical code division multiple-access system with in-fiber chirped moiré gratings.

    PubMed

    Chen, L R; Smith, P W; de Sterke, C M

    1999-07-20

    We propose an optical code division multiple-access (OCDMA) system that uses in-fiber chirped moiré gratings (CMG's) for encoding and decoding of broadband pulses. In reflection the wavelength-selective and dispersive nature of CMG's can be used to implement wavelength-encoding/temporal-spreading OCDMA. We give examples of codes designed around the constraints imposed by the encoding devices and present numerical simulations that demonstrate the proposed concept. PMID:18323934

  7. Recirculating photonic filter: a wavelength-selective time delay for phased-array antennas and wavelength code-division multiple access.

    PubMed

    Yegnanarayanan, S; Trinh, P D; Jalali, B

    1996-05-15

    A novel wavelength-selective photonic time-delay filter is proposed and demonstrated. The device consists of an optical phased-array waveguide grating in a recirculating feedback configuration. It can function as a true-time-delay generator for squint-free beam steering in optically controlled phased-array antennas and as an encoding-decoding filter for wavelength code-division multiple access. PMID:19876143

  8. SkyDOT: a publicly accessible variability database, containing multiple sky surveys and real-time data

    SciTech Connect

    Starr, D. L.; Wozniak, P. R.; Vestrand, W. T.

    2002-01-01

    SkyDOT (Sky Database for Objects in Time-Domain) is a Virtual Observatory currently comprised of data from the RAPTOR, ROTSE I, and OGLE I1 survey projects. This makes it a very large time domain database. In addition, the RAPTOR project provides SkyDOT with real-time variability data as well as stereoscopic information. With its web interface, we believe SkyDOT will be a very useful tool for both astronomers, and the public. Our main task has been to construct an efficient relational database containing all existing data, while handling a real-time inflow of data. We also provide a useful web interface allowing easy access to both astronomers and the public. Initially, this server will allow common searches, specific queries, and access to light curves. In the future we will include machine learning classification tools and access to spectral information.

  9. Multiple Motives, Conflicting Conceptions: Parsing the Contexts of Differentiated Access to Scientific Information in the Federal Government

    ERIC Educational Resources Information Center

    Oltmann, Shannon M.

    2012-01-01

    Scientific information, used by the U.S. federal government to formulate public policy in many arenas, is frequently contested and sometimes altered, blocked from publication, deleted from reports, or restricted in some way. This dissertation examines how and why restricted access to science policy (RASP) occurs through a comparative case study.…

  10. Design and Evaluation of a Virtual Quadrant Receiver for 4-ary Pulse Position Modulation/Optical Code Division Multiple Access (4-ary PPM/O-CDMA)

    SciTech Connect

    Mendez, A J; Hernandez, V J; Gagliardi, R M; Bennett, C V

    2006-12-29

    M-ary pulse position modulation (M-ary PPM) is an alternative to on-off-keying (OOK) that transmits multiple bits as a single symbol occupying a frame of M slots. PPM does not require thresholding as in OOK signaling, instead performing a comparison test among all slots in a frame to make the slot decision. Combining PPM with optical code division multiple access (PPM/O-CDMA) adds the benefit of supporting multiple concurrent, asynchronous bursty PPM users. While the advantages of PPM/O-CDMA are well known, implementing a receiver that performs comparison test can be difficult. This paper describes the design of a novel array receiver for M-ary PPM/O-CDMA (M = 4) where the received signal is mapped onto an xy-plane whose quadrants define the PPM slot decision by means of an associated control law. The receiver does not require buffering or nonlinear operations. In this paper we describe a planar lightwave circuit (PLCs) implementation of the receiver. We give detailed numerical simulations that test the concept and investigate the effects of multi-access interference (MAI) and optical beat interference (OBI) on the slot decisions. These simulations provide guidelines for subsequent experimental measurements that will be described.

  11. Novel wavelength division multiplex-radio over fiber-passive optical network architecture for multiple access points based on multitone generation and triple sextupling frequency

    NASA Astrophysics Data System (ADS)

    Cheng, Guangming; Guo, Banghong; Liu, Songhao; Huang, Xuguang

    2014-01-01

    An innovative wavelength division multiplex-radio over fiber-passive optical network architecture for multiple access points (AP) based on multitone generation and triple sextupling frequency is proposed and demonstrated. A dual-drive Mach-Zehnder modulator (DD-MZM) is utilized to realize the multitone generation. Even sidebands are suppressed to make the adjacent frequency separation twice the frequency of the local oscillator by adjusting the modulation voltage of the DD-MZM. Due to adopting three fiber Bragg gratings to reflect the unmodulated sidebands for uplink communications source free at optical network unit (ONU), is achieved. The system can support at least three APs at one ONU simultaneously with a 30 km single-mode fiber (SMF) transmission and 5 Gb/s data rate both for uplink and downlink communications. The theoretical analysis and simulation results show the architecture has an excellent performance and will be a promising candidate in future hybrid access networks.

  12. An application of the edge effect in measuring accessibility to multiple food retailer types in Southwestern Ontario, Canada

    PubMed Central

    2011-01-01

    Background Trends in food retailing associated with the consolidation of smaller-format retailers into fewer, larger-format supercentres have left some rural areas with fewer sources of nutritious, affordable food. Access to nutritious, affordable food is essential for good dietary habits and combating health issues such as type-2 diabetes, obesity, and cardiovascular disease. Many studies on food environments use inaccurate or incomplete methods for locating food retailers, which may be responsible for mischaracterising food deserts. This study uses databases of every residence in and every food retailer in and around Middlesex County, Ontario, Canada. Residences were geocoded to their precise address, and network analysis techniques were performed in a geographic information system (GIS) to determine distances between every residence and different types of food retailers (grocery stores, fast food, fruit and vegetable sources, grocery stores plus fruit and vegetable sources, variety stores), both when considering and neglecting facilities outside the area of study, to account for a deficiency in analysis termed the 'edge effect'. Results Analysis of household accessibility to food outlets by neighbourhood socioeconomic distress level indicated that residents in the most distressed neighbourhoods tended to have better accessibility to all types of food retailers. In the most distressed neighbourhoods, 79 percent of residences were within walking distance of a grocery store, compared to only 10 percent in the least distressed neighbourhoods. When the edge effect was neglected, 37 percent of distance estimates proved inaccurate. Average accessibility to all food retailer types improved dramatically when food outlets adjacent to the study area were considered, thereby controlling for the edge effect. Conclusion By neglecting to consider food retailers just outside study area boundaries, previous studies may significantly over-report the actual distance necessary to

  13. Compact Spreader Schemes

    SciTech Connect

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  14. A Review on Successive Interference Cancellation Scheme Based on Optical CDMA Network

    NASA Astrophysics Data System (ADS)

    Alsowaidi, N.; Eltaif, T.; Mokhtar, M. R.

    2014-12-01

    Due to various desirable features of optical code division multiple access (OCDMA), it is believed this technique once developed and commercially available will be an integral part of optical access networks. Optical CDMA system suffers from a problem called multiple access interference (MAI) which limits the number of active users, it occurs when number of active users share the same carriers. The aim of this paper is to review successive interference cancellation (SIC) scheme based on optical CDMA system. The paper also reviews the system performance in presence of shot noise, thermal noise, and phase-induced intensity noise (PIIN). A comprehensive review on the mathematical model of SIC scheme using direct detection (DS) and spectral amplitude coding (SAC) were presented in this article.

  15. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    PubMed Central

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  16. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    PubMed

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  17. Tunable optical frequency comb enabled scalable and cost-effective multiuser orthogonal frequency-division multiple access passive optical network with source-free optical network units.

    PubMed

    Chen, Chen; Zhang, Chongfu; Liu, Deming; Qiu, Kun; Liu, Shuang

    2012-10-01

    We propose and experimentally demonstrate a multiuser orthogonal frequency-division multiple access passive optical network (OFDMA-PON) with source-free optical network units (ONUs), enabled by tunable optical frequency comb generation technology. By cascading a phase modulator (PM) and an intensity modulator and dynamically controlling the peak-to-peak voltage of a PM driven signal, a tunable optical frequency comb source can be generated. It is utilized to assist the configuration of a multiple source-free ONUs enhanced OFDMA-PON where simultaneous and interference-free multiuser upstream transmission over a single wavelength can be efficiently supported. The proposed multiuser OFDMA-PON is scalable and cost effective, and its feasibility is successfully verified by experiment. PMID:23027243

  18. Complementary, Alternative, and Mainstream Service use Among Families with Young Children with Multiple Disabilities: Family Costs to Access Choices.

    PubMed

    Bourke-Taylor, Helen; Cotter, Claire; Stephan, Rebecca

    2014-11-01

    ABSTRACT Families raising a young child with multiple disabilities are charged with significant responsibilities such as learning about their child's condition and navigating mainstream and alternative services. Aim: Describe service choices, costs, out of pocket expenses, and the impact on families. Methods: Survey design using a custom questionnaire was used to collect extensive retrospective and current data. Purposive sampling (N = 29) occurred from one early intervention facility specialized in servicing children with cerebral palsy (CP) and, or multiple disabilities in Australia. Descriptive statistics were used for analysis of data. Results: Twenty-three (79%) families reported caring for a child with CP. Twenty-three families reported using at least one complementary/alternative intervention. Out-of-pocket amounts were reported including: chiropractic services (10 families); naturopathy (9 families); point percussion therapy (7 families), and Chinese medicine (6 families). Expenses resulted in families reporting forgoing clothing items, family entertainment, recreation/hobbies for parents (55%); family holidays (59%); time for parents alone (66%); and health services for parents (38%). Conclusions: Families of young children with multiple disabilities select a wide range of services for their child, with consequential out of pocket expenses. Early intervention professionals can be an important resource for families as they evaluate their choices and select interventions for their child. PMID:25365470

  19. Efficient Service Delivery for High-speed Railway Communications Using MIMO and Access Control Technique

    NASA Astrophysics Data System (ADS)

    Zhou, Yuzhe; Ai, Bo

    2014-07-01

    In order to realize the notion of "anytime, anywhere" communication for high-speed train passengers, the Long Term Evolution for Railway is designed to provide broadband accesses and reliable communications for high-speed train passengers. However, with the increase of train speed, the system is subject to high bit error rate, Doppler frequency shift, and call drops. This paper is trying to solve these problems by employing the Multiple-Input Multiple-Output technique and access control schemes. The goal is to provide higher quality of services such as data rate, reliability, and delay for train passengers. Physical layer performance analysis and access control schemes are proposed in a two-hop model. Handovers and service types are also considered. Simulation results show that proposed models and schemes perform better in improving the quality of services.

  20. Can front-of-pack labelling schemes guide healthier food choices? Australian shoppers' responses to seven labelling formats.

    PubMed

    Watson, Wendy L; Kelly, Bridget; Hector, Debra; Hughes, Clare; King, Lesley; Crawford, Jennifer; Sergeant, John; Chapman, Kathy

    2014-01-01

    There is evidence that easily accessible, comprehensible and consistent nutrient information on the front of packaged foods could assist shoppers to make healthier food choices. This study used an online questionnaire of 4357 grocery shoppers to examine Australian shoppers' ability to use a range of front-of-pack labels to identify healthier food products. Seven different front-of-pack labelling schemes comprising variants of the Traffic Light labelling scheme and the Percentage Daily Intake scheme, and a star rating scheme, were applied to nine pairs of commonly purchased food products. Participants could also access a nutrition information panel for each product. Participants were able to identify the healthier product in each comparison over 80% of the time using any of the five schemes that provided information on multiple nutrients. No individual scheme performed significantly better in terms of shoppers' ability to determine the healthier product, shopper reliance on the 'back-of-pack' nutrition information panel, and speed of use. The scheme that provided information about energy only and a scheme with limited numerical information of nutrient type or content performed poorly, as did the nutrition information panel alone (control). Further consumer testing is necessary to determine the optimal format and content of an interpretive front-of-pack nutrition labelling scheme. PMID:24126243

  1. Performance analyses and improvements for the IEEE 802.15.4 CSMA/CA scheme with heterogeneous buffered conditions.

    PubMed

    Zhu, Jianping; Tao, Zhengsu; Lv, Chunfeng

    2012-01-01

    Studies of the IEEE 802.15.4 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme have been received considerable attention recently, with most of these studies focusing on homogeneous or saturated traffic. Two novel transmission schemes-OSTS/BSTS (One Service a Time Scheme/Bulk Service a Time Scheme)-are proposed in this paper to improve the behaviors of time-critical buffered networks with heterogeneous unsaturated traffic. First, we propose a model which contains two modified semi-Markov chains and a macro-Markov chain combined with the theory of M/G/1/K queues to evaluate the characteristics of these two improved CSMA/CA schemes, in which traffic arrivals and accessing packets are bestowed with non-preemptive priority over each other, instead of prioritization. Then, throughput, packet delay and energy consumption of unsaturated, unacknowledged IEEE 802.15.4 beacon-enabled networks are predicted based on the overall point of view which takes the dependent interactions of different types of nodes into account. Moreover, performance comparisons of these two schemes with other non-priority schemes are also proposed. Analysis and simulation results show that delay and fairness of our schemes are superior to those of other schemes, while throughput and energy efficiency are superior to others in more heterogeneous situations. Comprehensive simulations demonstrate that the analysis results of these models match well with the simulation results. PMID:22666076

  2. A new two dimensional spectral/spatial multi-diagonal code for noncoherent optical code division multiple access (OCDMA) systems

    NASA Astrophysics Data System (ADS)

    Kadhim, Rasim Azeez; Fadhil, Hilal Adnan; Aljunid, S. A.; Razalli, Mohamad Shahrazel

    2014-10-01

    A new two dimensional codes family, namely two dimensional multi-diagonal (2D-MD) codes, is proposed for spectral/spatial non-coherent OCDMA systems based on the one dimensional MD code. Since the MD code has the property of zero cross correlation, the proposed 2D-MD code also has this property. So that, the multi-access interference (MAI) is fully eliminated and the phase induced intensity noise (PIIN) is suppressed with the proposed code. Code performance is analyzed in terms of bit error rate (BER) while considering the effect of shot noise, PIIN, and thermal noise. The performance of the proposed code is compared with the related MD, modified quadratic congruence (MQC), two dimensional perfect difference (2D-PD) and two dimensional diluted perfect difference (2D-DPD) codes. The analytical and the simulation results reveal that the proposed 2D-MD code outperforms the other codes. Moreover, a large number of simultaneous users can be accommodated at low BER and high data rate.

  3. A Wide Dynamics and Fast Scan Interrogating Method for a Fiber Bragg Grating Sensor Network Implemented Using Code Division Multiple Access

    PubMed Central

    Kim, Youngbok; Jeon, Sie-Wook; Kwon, Won-Bae; Park, Chang-Soo

    2012-01-01

    We propose and demonstrate a fiber Bragg grating (FBG) sensor network employing the code division multiple access (CDMA) technique to identify information from individual sensors. To detect information without considering time delays between sensors, a sliding correlation method is applied, in which two different signals with the same pseudo-random binary sequence (PRBS) pattern, but slightly different frequencies, are applied to the source and detector sides. Moreover, for time domain detection, a wavelength-to-time conversion technique using a wavelength dispersive medium is introduced. The experimental results show that the proposed sensor network has a wide strain dynamic range of 2,400 με and a low crosstalk of 950:1. PMID:22778619

  4. Efficiency droop effects of GaN-based light-emitting diodes on the performance of code division multiple access visible-light communication system

    NASA Astrophysics Data System (ADS)

    Lu, Huimin; Yan, Chaowen; Gao, Wei; Yu, Tongjun; Wang, Jianping

    2016-02-01

    The physical mechanism in efficiency droop of GaN-based light-emitting diodes (LEDs) was investigated using a modified rate equation model considering inhomogeneous carrier distribution and was compared with the measured result. On this basis, the efficiency droop effect on the performance of a code division multiple access (CDMA) visible-light communication (VLC) system using GaN-based LEDs was also analyzed. The results reveal that the obvious transmitted signal error under the effect of LED efficiency droop leads to performance deterioration of multiuser CDMA VLC systems. Also, the performance of CDMA VLC systems is reduced with the user number increase due to LED efficiency droop. The bit error rate of a CDMA VLC system was further calculated for different branch signal levels and bias currents. It is demonstrated that the efficiency droop effect on the performance of CDMA VLC systems can be alleviated by adjusting the branch signal level and the bias current.

  5. Four-Channel, 8 x 8 Bit, Two-Dimensional Parallel Transmission by use of Space-Code-Division Multiple-Access Encoder and Decoder Modules.

    PubMed

    Nakamura, M; Kitayama, K; Igasaki, Y; Kaneda, K

    1998-07-10

    We experimentally demonstrate four-channel multiplexing of 64-bit (8 x 8) two-dimensional (2-D) parallel data links on the basis of optical space-code-division multiple access (CDMA) by using new modules of optical spatial encoders and a decoder with a new high-contrast 9-m-long image fiber with 3 x 10(4) cores. Each 8 x 8 bit plane (64-bit parallel data) is optically encoded with an 8 x 8, 2-D optical orthogonal signature pattern. The encoded bit planes are spatially multiplexed and transmitted through an image fiber. A receiver can recover the intended input bit plane by means of an optical decoding process. This result should encourage the application of optical space-CDMA to future high-throughput 2-D parallel data links connecting massively parallel processors. PMID:18285889

  6. Performance improvement of spectral amplitude coding-optical code division multiple access systems using NAND detection with enhanced double weight code

    NASA Astrophysics Data System (ADS)

    Ahmed, Nasim; Aljunid, Syed Alwee; Ahmad, R. Badlishah; Fadhil, Hilal A.; Rashid, Mohd Abdur

    2012-01-01

    The bit-error rate (BER) performance of the spectral amplitude coding-optical code division multiple access (SACOCDMA) system has been investigated by using NAND subtraction detection technique with enhanced double weight (EDW) code. The EDW code is the enhanced version of double weight (DW) code family where the code weight is any odd number and greater than one with ideal cross-correlation. In order to evaluate the performance of the system, we used mathematical analysis extensively along with the simulation experiment. The evaluation results obtained using the NAND subtraction detection technique was compared with those obtained using the complementary detection technique for the same number of active users. The comparison results revealed that the BER performance of the system using NAND subtraction detection technique has greatly been improved as compared to the complementary technique.

  7. A wide dynamics and fast scan interrogating method for a fiber Bragg grating sensor network implemented using code division multiple access.

    PubMed

    Kim, Youngbok; Jeon, Sie-Wook; Kwon, Won-Bae; Park, Chang-Soo

    2012-01-01

    We propose and demonstrate a fiber Bragg grating (FBG) sensor network employing the code division multiple access (CDMA) technique to identify information from individual sensors. To detect information without considering time delays between sensors, a sliding correlation method is applied, in which two different signals with the same pseudo-random binary sequence (PRBS) pattern, but slightly different frequencies, are applied to the source and detector sides. Moreover, for time domain detection, a wavelength-to-time conversion technique using a wavelength dispersive medium is introduced. The experimental results show that the proposed sensor network has a wide strain dynamic range of 2,400 με and a low crosstalk of 950:1. PMID:22778619

  8. The use of multiple indices of physiological activity to access viability in chlorine disinfected Escherichia coli O157:H7

    NASA Technical Reports Server (NTRS)

    Lisle, J. T.; Pyle, B. H.; McFeters, G. A.

    1999-01-01

    A suite of fluorescent intracellular stains and probes was used, in conjunction with viable plate counts, to assess the effect of chlorine disinfection on membrane potential (rhodamine 123; Rh123 and bis-(1,3-dibutylbarbituric acid) trimethine oxonol; DiBAC4(3)), membrane integrity (LIVE/DEAD BacLight kit), respiratory activity (5-cyano-2,3-ditolyl tetrazolium chloride; CTC) and substrate responsiveness (direct viable counts; DVC) in the commensal pathogen Escherichia coli O157:H7. After a 5 min exposure to the disinfectant, physiological indices were affected in the following order: viable plate counts > substrate responsiveness > membrane potential > respiratory activity > membrane integrity. In situ assessment of physiological activity by examining multiple targets, as demonstrated in this study, permits a more comprehensive determination of the site and extent of injury in bacterial cells following sublethal disinfection with chlorine. This approach to assessing altered bacterial physiology has application in various fields where detection of stressed bacteria is of interest.

  9. An orthogonal wavelet division multiple-access processor architecture for LTE-advanced wireless/radio-over-fiber systems over heterogeneous networks

    NASA Astrophysics Data System (ADS)

    Mahapatra, Chinmaya; Leung, Victor CM; Stouraitis, Thanos

    2014-12-01

    The increase in internet traffic, number of users, and availability of mobile devices poses a challenge to wireless technologies. In long-term evolution (LTE) advanced system, heterogeneous networks (HetNet) using centralized coordinated multipoint (CoMP) transmitting radio over optical fibers (LTE A-ROF) have provided a feasible way of satisfying user demands. In this paper, an orthogonal wavelet division multiple-access (OWDMA) processor architecture is proposed, which is shown to be better suited to LTE advanced systems as compared to orthogonal frequency division multiple access (OFDMA) as in LTE systems 3GPP rel.8 (3GPP, http://www.3gpp.org/DynaReport/36300.htm). ROF systems are a viable alternative to satisfy large data demands; hence, the performance in ROF systems is also evaluated. To validate the architecture, the circuit is designed and synthesized on a Xilinx vertex-6 field-programmable gate array (FPGA). The synthesis results show that the circuit performs with a clock period as short as 7.036 ns (i.e., a maximum clock frequency of 142.13 MHz) for transform size of 512. A pipelined version of the architecture reduces the power consumption by approximately 89%. We compare our architecture with similar available architectures for resource utilization and timing and provide performance comparison with OFDMA systems for various quality metrics of communication systems. The OWDMA architecture is found to perform better than OFDMA for bit error rate (BER) performance versus signal-to-noise ratio (SNR) in wireless channel as well as ROF media. It also gives higher throughput and mitigates the bad effect of peak-to-average-power ratio (PAPR).

  10. Matroids and quantum-secret-sharing schemes

    SciTech Connect

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-05-15

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  11. A new multiple scattering scheme for the FLAIR forest radiative transfer model: Application to biochemical and biophysical parameter retrieval using hyperspectral data

    NASA Astrophysics Data System (ADS)

    Omari, Khalid

    This thesis investigated the development and assessment of a simple parameterization of the multiple scattering within canopies assuming the single scattering field is known and the background beneath the canopy is completely absorbing. The parameterization is based on the concept of spectral invariants related to recollision and escape probabilities from vegetation canopies. The simplified approach is evaluated against detailed 3-D ray tracing model, PARCINOPY, as well as reference datasets from the Radiation Modelling Intercomparison Experiment On-Line Checker. Comparison with homogenous canopies simulated with PARCINOPY showed that the model's performance is best in both the solar principal and perpendicular planes at low and mid LAI levels for all solar zenith angles. The comparison to the On-line Checker datasets shows also that the model is a suitable approach to describe the multiple scattering components of physically based models. This simple parameterization is then incorporated into the Four Scale Linear Model for Anisotropie Reflectance (FLAIR) canopy radiative transfer model to enhance the description of the spectrally dependant multiple scattered radiation field of a forest canopy. The contribution of the multiply scattered radiation between the canopy and the background is also added to the parameterization of the multiple scattering component. The validation of the new version of the FLAIR model was performed using the multi-angular data sets obtained by the airborne sensor POLarization and Directionality of the Earth's Reflectances (POLDER) during the BOReal Ecosystem-Atmosphere Study (BOREAS) campaign of 1994. The results indicate that this approach is well suited to the FLAIR model. It is also demonstrated that the multiple scattering problem can be parameterized by a limited number of architectural parameters and the leaf scattering coefficient. Finally, the combined canopy-leaf PROFLAIR (PROSPECT + FLAIR) model is used to investigate the

  12. Initial ranging scheme based on interpolated Zadoff-Chu sequences for OFDMA-PON.

    PubMed

    Razmtouz, Ali; Habel, Kai; Kottke, Christoph; Ruprecht, Christian; Rosenkranz, Werner

    2014-02-10

    Initial access to passive optical networks (PONs) requires upstream (US) synchronization of multiple optical network units (ONUs). We propose a low-complexity scheme for orthogonal frequency division multiple access (OFDMA) based PONs and demonstrate it experimentally. The scheme is based on interpolated Zadoff-Chu sequences, to synchronize the signal of each ONU arriving at the optical line terminal (OLT). Our experimental test bed consists of 4 colorless ONUs seeded by a single laser located at the OLT. Thermal expansion of a fiber is utilized to emulate a dynamic time drift in the demodulation-window positioning of OLT. The detected individual offsets at the OLT are fed back to the ONUs and are compensated at every data frame transmission. In this way, both inter carrier interference (ICI) and inter symbol interference (ISI) remain below acceptable levels. PMID:24663658

  13. Performance Analysis of a New Coded TH-CDMA Scheme in Dispersive Infrared Channel with Additive Gaussian Noise

    NASA Astrophysics Data System (ADS)

    Hamdi, Mazda; Kenari, Masoumeh Nasiri

    2013-06-01

    We consider a time-hopping based multiple access scheme introduced in [1] for communication over dispersive infrared links, and evaluate its performance for correlator and matched filter receivers. In the investigated time-hopping code division multiple access (TH-CDMA) method, the transmitter benefits a low rate convolutional encoder. In this method, the bit interval is divided into Nc chips and the output of the encoder along with a PN sequence assigned to the user determines the position of the chip in which the optical pulse is transmitted. We evaluate the multiple access performance of the system for correlation receiver considering background noise which is modeled as White Gaussian noise due to its large intensity. For the correlation receiver, the results show that for a fixed processing gain, at high transmit power, where the multiple access interference has the dominant effect, the performance improves by the coding gain. But at low transmit power, in which the increase of coding gain leads to the decrease of the chip time, and consequently, to more corruption due to the channel dispersion, there exists an optimum value for the coding gain. However, for the matched filter, the performance always improves by the coding gain. The results show that the matched filter receiver outperforms the correlation receiver in the considered cases. Our results show that, for the same bandwidth and bit rate, the proposed system excels other multiple access techniques, like conventional CDMA and time hopping scheme.

  14. A Microstrip Patch-Fed Short Backfire Antenna for the Tracking and Data Relay Satellite System-Continuation (TDRSS-C) Multiple Access (MA) Array

    NASA Technical Reports Server (NTRS)

    Nessel, James A.; Kory, Carol L.; Lambert, Kevin M.; Acosta, Roberto J.

    2006-01-01

    Short Backfire Antennas (SBAs) are widely utilized for mobile satellite communications, tracking, telemetry, and wireless local area network (WLAN) applications due to their compact structure and excellent radiation characteristics [1-3]. Typically, these SBA s consist of an excitation element (i.e., a half-wavelength dipole), a reflective bottom plane, a planar sub-reflector located above the "exciter", and an outer circular rim. This configuration is capable of achieving gains on the order of 13-15 dBi, but with relatively narrow bandwidths (approx.3%-5%), making it incompatible with the requirements of the next generation enhanced Tracking and Data Relay Satellite System-Continuation (TDRSS-C) Multiple Access (MA) array [1]. Several attempts have been made to enhance the bandwidth performance of the common dipole-fed SBA by employing various other feeding mechanisms (e.g., waveguide, slot) with moderate success [4-5]. In this paper, a novel method of using a microstrip patch is employed for the first time to excite an SBA. The patch element is fed via two H-shaped slots electromagnetically coupled to a broadband hybrid coupler to maintain a wide bandwidth, as well as provide for dual circular polarization capabilities.

  15. Fairness issues in resource allocation schemes for wireless visual sensor networks

    NASA Astrophysics Data System (ADS)

    Pandremmenou, Katerina; Kondi, Lisimachos P.; Parsopoulos, Konstantinos E.

    2013-02-01

    This work addresses the problem of fairness and efficiency evaluation of various resource allocation schemes for wireless visual sensor networks (VSNs). These schemes are used to optimally allocate the source coding rates, channel coding rates, and power levels among the nodes of a wireless direct sequence code division multiple access (DS-CDMA) VSN. All of the considered schemes optimize a function of the video qualities of the nodes. However, there is no single scheme that maximizes the video quality of each node simultaneously. In fact, all presented schemes are able to provide a Pareto-optimal solution, meaning that there is no other solution that is simultaneously preferred by all nodes. Thus, it is not clear which scheme results in the best resource allocation for the whole network. To handle the resulting tradeoffs, in this study we examine four metrics that investigate fairness and efficiency under different perspectives. Specifically, we apply a metric that considers both fairness and performance issues, and another metric that measures the "equality" of a resource allocation (equal utilities for the nodes). The third metric computes the total system utility, while the last metric computes the total power consumption of the nodes. Ideally, a desirable scheme would achieve high total utility while being equally fair to all nodes and requiring low amounts of power.

  16. Non-orthogonal optical multicarrier access based on filter bank and SCMA.

    PubMed

    Liu, Bo; Zhang, Lijia; Xin, Xiangjun

    2015-10-19

    This paper proposes a novel non-orthogonal optical multicarrier access system based on filter bank and sparse code multiple access (SCMA). It offers released frequency offset and better spectral efficiency for multicarrier access. An experiment of 73.68 Gb/s filter bank-based multicarrier (FBMC) SCMA system with 60 km single mode fiber link is performed to demonstrate the feasibility. The comparison between fast Fourier transform (FFT) based multicarrier and the proposed scheme is also investigated in the experiment. PMID:26480395

  17. Subranging scheme for SQUID sensors

    NASA Technical Reports Server (NTRS)

    Penanen, Konstantin I. (Inventor)

    2008-01-01

    A readout scheme for measuring the output from a SQUID-based sensor-array using an improved subranging architecture that includes multiple resolution channels (such as a coarse resolution channel and a fine resolution channel). The scheme employs a flux sensing circuit with a sensing coil connected in series to multiple input coils, each input coil being coupled to a corresponding SQUID detection circuit having a high-resolution SQUID device with independent linearizing feedback. A two-resolution configuration (course and fine) is illustrated with a primary SQUID detection circuit for generating a fine readout, and a secondary SQUID detection circuit for generating a course readout, both having feedback current coupled to the respective SQUID devices via feedback/modulation coils. The primary and secondary SQUID detection circuits function and derive independent feedback. Thus, the SQUID devices may be monitored independently of each other (and read simultaneously) to dramatically increase slew rates and dynamic range.

  18. Asynchronous Communication Scheme For Hypercube Computer

    NASA Technical Reports Server (NTRS)

    Madan, Herb S.

    1988-01-01

    Scheme devised for asynchronous-message communication system for Mark III hypercube concurrent-processor network. Network consists of up to 1,024 processing elements connected electrically as though were at corners of 10-dimensional cube. Each node contains two Motorola 68020 processors along with Motorola 68881 floating-point processor utilizing up to 4 megabytes of shared dynamic random-access memory. Scheme intended to support applications requiring passage of both polled or solicited and unsolicited messages.

  19. Access and Technology

    ERIC Educational Resources Information Center

    Watson, Lemuel W.

    2004-01-01

    Community colleges are well positioned to provide underserved student populations with access to computer technology. This chapter explores the issues of access and technology from multiple perspectives in the community college, and explains how community colleges can develop a foundation for their technology plan.

  20. Cross-ontological analytics for alignment of different classification schemes

    DOEpatents

    Posse, Christian; Sanfilippo, Antonio P; Gopalan, Banu; Riensche, Roderick M; Baddeley, Robert L

    2010-09-28

    Quantification of the similarity between nodes in multiple electronic classification schemes is provided by automatically identifying relationships and similarities between nodes within and across the electronic classification schemes. Quantifying the similarity between a first node in a first electronic classification scheme and a second node in a second electronic classification scheme involves finding a third node in the first electronic classification scheme, wherein a first product value of an inter-scheme similarity value between the second and third nodes and an intra-scheme similarity value between the first and third nodes is a maximum. A fourth node in the second electronic classification scheme can be found, wherein a second product value of an inter-scheme similarity value between the first and fourth nodes and an intra-scheme similarity value between the second and fourth nodes is a maximum. The maximum between the first and second product values represents a measure of similarity between the first and second nodes.

  1. Adaptive mobile access protocol (AMAP) for the message service of a land mobile satellite experiment (MSAT-X)

    NASA Technical Reports Server (NTRS)

    Li, V. O. K.; Yan, T.-Y.

    1984-01-01

    This paper describes a feasibility study of the adaptive mobile access protocol (AMAP) for MSATA-X, a proposed experimental mobile satellite communication network. The mobiles are dispersed over a wide geographical area and the channel data rate is limited due to the size and cost limitations of mobile antennas. AMAP is a reservation based multiple-access scheme. The available bandwidth is divided into subchannels, which are divided into reservation and message channels. The ALOHA multiple-access scheme is employed in the reservation channels, while the message channels are demand assigned. AMAP adaptively reallocates the reservation and message channels to optimize system performance. It has been shown that if messages are generated at a rate of one message per hour, AMAP can support approximately 2000 active users per 2400 bit/s channel with an average delay of 1.4 s.

  2. Demystifying Open Access

    SciTech Connect

    Mele, Salvatore

    2007-05-14

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  3. Demystifying Open Access

    SciTech Connect

    Mele, Salvatore

    2007-05-14

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a "fair share" scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  4. Improving the secrecy rate by turning foes to allies: An auction scheme

    NASA Astrophysics Data System (ADS)

    Ma, Ya-Yan; Wang, Bao-Yun

    2015-09-01

    Security against eavesdroppers is a critical issue in cognitive radio networks (CRNs). In this paper, a scenario consisting of one primary pair and multiple secondary pairs is considered. The secondary transmitters (STs) work in half-duplex mode and they are potential eavesdroppers on the primary transmission unless they are allowed to simultaneously transmit with the primary transmitter (PT). A modified second-price sealed-bid auction scheme is employed to model the interaction between the PT and STs. With the proposed auction scheme, the hostile relationship between the PT and STs is transformed into a cooperative relationship. An iterative algorithm based on the max-min criteria is proposed to find the optimal bidding power of the STs for an access chance in the presence of multiple eavesdroppers. Numerical results show that the proposed auction scheme not only improves the PT’s security but also increases the access opportunities of the STs. Project supported by the National Natural Science Foundation of China (Grant Nos. 61271232 and 61372126) and the University Postgraduate Research and Innovation Project in Jiangsu Province, China (Grant No. CXZZ12-0472).

  5. Pathology accessioning and retrieval system with encoding by computer (PARSEC). A microcomputer-based system for anatomic pathology featuring automated SNOP coding and multiple administrative functions.

    PubMed

    Foulis, P R; Norbut, A M; Mendelow, H; Kessler, G F

    1980-06-01

    A pathology accessioning and retrieval system with encoding by computer (PARSEC) has been developed, employing a relatively inexpensive microcomputer. PARSEC performs a variety of administrative functions for anatomic pathology, including accessioning of surgical specimens, storage of patient demographic information, editing, retrieval, and archiving of patient data, as well as CAP (college of American Pathologists) workload units, billing, and inventory functions for histopathology. In addition, appropriate gross and microscopic descriptions and pathologic diagnoses can be entered into the system by a text editor. Automatic assignment of SNOP (Systematized Nomenclature of Pathology) codes, is accomplished via an online SNOP lexicon, allowing the ultimate generation of completed surgical pathology reports. The data base management system employed makes optimum use of disk storage space, while permitting rapid data retrieval. Data file maintenance is automatically accomplished by the system, requiring no user intervention. PMID:7395803

  6. Multiple-aperture speckle method applied to local displacement measurements

    NASA Astrophysics Data System (ADS)

    Ángel, Luciano; Tebaldi, Myrian; Bolognini, Néstor

    2007-06-01

    The goal of this work is to analyze the measurement capability of the modified speckle photography technique that uses different multiple aperture pupils in a multiple exposure scheme. In particular, the rotation case is considered. A point-wise analysis procedure is utilized to obtain the fringes required to access to the local displacement measurements. The proposed arrangement allows simultaneous displaying in the Fourier plane several fringes system each one associated with different rotations. We experimentally verified that the local displacement measurements can be determined with a high precision and accuracy.

  7. A CDMA synchronisation scheme

    NASA Technical Reports Server (NTRS)

    Soprano, C.

    1993-01-01

    CDMA (Code Division Multiple Access) is known to decrease inter-service interference in Satellite Communication Systems. Its performance is increased by chip quasi-synchronous operation which virtually eliminates the self-noise; however, the theory shows that the time error on the synchronization has to be kept at less than one tenth of a chip which, for 1 Mchip/sec. spreading rate, corresponds to 10(exp -7) sec. This, on the return-link, may only be achieved by means of a closed loop control system which, for mobile communication systems, has to be capable of autonomous operation. Until now some results have been reported on the feasibility of chip quasi-synchronous operation for mobile communication systems only including satellites on GEO (Geostationary Earth Orbit). In what follows, the basic principles are exposed, and results are presented showing how low chip synchronism error may be achieved by means of an autonomous control loop operating through satellites on any Earth orbit.

  8. Discretionary access control in a heterogeneous distributed data base management system

    SciTech Connect

    Wang, C.Y.

    1986-01-01

    An important technical problem in building a distributed database management system (DDBMS) is access control which prevents unauthorized access or malicious destruction of a database. Consider a DDBMS that uses a uniform global data model to integrate the local schemes of existing DBMSs at the sites of a network. The local DBMSs are unchanged, and the DDBMS is implemented as a module on top of the existing DBMSs at each site. The DBMS at each site is expected to retain its autonomy. That is, the local DBMS at each site maintains control of the data stored at that site. Each local DBMS decides for itself if a user (of the local DBMS or of the DDBMS) may access the data it manages. The design of the access control system for the database in such an environment presents several problems. First, the DBMSs at different sites may have different and incompatible access control mechanisms. Second, queries involving data from multiple sites must be processed by the access control mechanisms of multiple and possible different local DBMSs. Coordinating the access control mechanisms of these DBMSs to provide a consistent access control facility to the users of the heterogeneous DDBMS is a difficult task. This research discusses the problem described above. A general architecture for a DDBMS was developed. Data abstraction techniques were adapted to specify the architecture. A formal verification for the specification was completed.

  9. Power consumption analysis of priority-based service differentiation scheme for LR-WPANs

    NASA Astrophysics Data System (ADS)

    Kim, Meejoung; Hwang, Eenjun

    2016-06-01

    In this paper, we investigate the effect of service differentiation on the power consumption in contention period of IEEE 802.15.4 sensor networks. Power consumption is analysed for two different service differentiation schemes under non-saturation condition. The two service differentiation schemes are the differentiation by the backoff exponent (BED) and differentiation by the contention window (CWD), which provide multilevel differentiated services in beacon-enabled mode with slotted carrier sense multiple access/collision avoidance (CSMA/CA) algorithm. The analysis is based on the stationary probabilities of a discrete-time Markov chain, which is a model of CSMA/CA describing the state of a head packet of a device. Numerical results show that CWD uses the power more efficiently and performs better in terms of throughput, while BED more differentiates the service.

  10. Plotting and Scheming

    NASA Technical Reports Server (NTRS)

    2004-01-01

    [figure removed for brevity, see original site] Figure 1 [figure removed for brevity, see original site] Figure 2 Click for larger view

    These two graphics are planning tools used by Mars Exploration Rover engineers to plot and scheme the perfect location to place the rock abrasion tool on the rock collection dubbed 'El Capitan' near Opportunity's landing site. 'El Capitan' is located within a larger outcrop nicknamed 'Opportunity Ledge.'

    The rover visualization team from NASA Ames Research Center, Moffett Field, Calif., initiated the graphics by putting two panoramic camera images of the 'El Capitan' area into their three-dimensional model. The rock abrasion tool team from Honeybee Robotics then used the visualization tool to help target and orient their instrument on the safest and most scientifically interesting locations. The blue circle represents one of two current targets of interest, chosen because of its size, lack of dust, and most of all its distinct and intriguing geologic features. To see the second target location, see the image titled 'Plotting and Scheming.'

    The rock abrasion tool is sensitive to the shape and texture of a rock, and must safely sit within the 'footprint' indicated by the blue circles. The rock area must be large enough to fit the contact sensor and grounding mechanism within the area of the outer blue circle, and the rock must be smooth enough to get an even grind within the abrasion area of the inner blue circle. If the rock abrasion tool were not grounded by its support mechanism or if the surface were uneven, it could 'run away' from its target. The rock abrasion tool is location on the rover's instrument deployment device, or arm.

    Over the next few martian days, or sols, the rover team will use these and newer, similar graphics created with more recent, higher-resolution panoramic camera images and super-spectral data from the miniature thermal emission spectrometer. These data will be used to pick the best

  11. Tabled Execution in Scheme

    SciTech Connect

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  12. Indirect visual cryptography scheme

    NASA Astrophysics Data System (ADS)

    Yang, Xiubo; Li, Tuo; Shi, Yishi

    2015-10-01

    Visual cryptography (VC), a new cryptographic scheme for image. Here in encryption, image with message is encoded to be N sub-images and any K sub-images can decode the message in a special rules (N>=2, 2<=K<=N). Then any K of the N sub-images are printed on transparency and stacked exactly, the message of original image will be decrypted by human visual system, but any K-1 of them get no information about it. This cryptographic scheme can decode concealed images without any cryptographic computations, and it has high security. But this scheme lacks of hidden because of obvious feature of sub-images. In this paper, we introduce indirect visual cryptography scheme (IVCS), which encodes sub-images to be pure phase images without visible strength based on encoding of visual cryptography. The pure phase image is final ciphertexts. Indirect visual cryptography scheme not only inherits the merits of visual cryptography, but also raises indirection, hidden and security. Meanwhile, the accuracy alignment is not required any more, which leads to the strong anti-interference capacity and robust in this scheme. System of decryption can be integrated highly and operated conveniently, and its process of decryption is dynamic and fast, which all lead to the good potentials in practices.

  13. Living in a 'fat swamp': exposure to multiple sources of accessible, cheap, energy-dense fast foods in a deprived community.

    PubMed

    Saunders, Patrick; Saunders, Annie; Middleton, John

    2015-06-14

    This study assesses the levels of fats, including trans-fatty acids, and salt in common takeaway fast foods in a deprived urban municipality in the West Midlands, England, and implications in the context of the spatial distribution of fast food takeaways. The results of the compositional analysis of over 250 take-out foods were compared with established and derived standards. About 70% of products exceeded the recommendation that a meal should contain less than 30% of a Guideline Daily Amount (GDA). More than half of them exceeded 50% GDA for at least one metric, including 81% of all analyses for SFA. And 17% of samples exceeded the GDA for SFA, including each of two meals that contained about twice the GDA. Over 30% samples exceeded the children's GDA for total fat or SFA. 27% of salt analyses exceeded the GDA. People in Sandwell are exposed to large portion sizes and high levels of fats and salt in takeaway foods, with levels in some foods having increased since 2010. Given this population's limited options to break out of a highly compromising environment of living simultaneously in a 'swamp' of unhealthy, readily accessible and cheap takeaways, and a 'desert' of healthy options, an immediate and innovative package of interventions is required. PMID:25885785

  14. A robust and novel dynamic-ID-based authentication scheme for care team collaboration with smart cards.

    PubMed

    Chang, Ya-Fen; Chen, Chia-Chen; Chang, Pei-Yu

    2013-04-01

    Nowadays, users/patients may gain desired medical services on-line because of the rapid development of computer network technologies. Conventional healthcare services are provided by a single server. However, care team collaboration by integrating services is the key to improve financial and clinical performance. How a user/patient accesses desired medical services provided by multiple servers becomes a challenge to realize care team collaboration. User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In this paper, we first discuss the perceived security drawbacks of pervasive smart-card-based remote user authentication schemes. Then, we propose a novel dynamic-ID-based user authentication scheme based on elliptic curve cryptosystem (ECC) for multi-server environment with smart cards. The proposed scheme ensures user anonymity and computational efficiency and complies with essential requirements of a secure smart-card-based authentication scheme for multi-server environment to enable care team collaboration. PMID:23355184

  15. Web Accessibility and Accessibility Instruction

    ERIC Educational Resources Information Center

    Green, Ravonne A.; Huprich, Julia

    2009-01-01

    Section 508 of the Americans with Disabilities Act (ADA) mandates that programs and services be accessible to people with disabilities. While schools of library and information science (SLIS*) and university libraries should model accessible Web sites, this may not be the case. This article examines previous studies about the Web accessibility of…

  16. Unique Access to Learning

    ERIC Educational Resources Information Center

    Goble, Don

    2009-01-01

    This article describes the many learning opportunities that broadcast technology students at Ladue Horton Watkins High School in St. Louis, Missouri, experience because of their unique access to technology and methods of learning. Through scaffolding, stepladder techniques, and trial by fire, students learn to produce multiple television programs,…

  17. Access to health care

    PubMed Central

    Fortin, Martin; Maltais, Danielle; Hudon, Catherine; Lapointe, Lise; Ntetu, Antoine Lutumba

    2005-01-01

    OBJECTIVE To explore access to health care for patients presenting with multiple chronic conditions and to identify barriers and factors conducive to access. DESIGN Qualitative study with focus groups. SETTING Family practice unit in Chicoutimi (Saguenay), Que. PARTICIPANTS Twenty-five male and female adult patients with at least four chronic conditions but no cognitive disorders or decompensating conditions. METHODS For this pilot study, only three focus group discussions were held. MAIN FINDINGS The main barriers to accessing follow-up appointments included long waits on the telephone, automated telephone-answering systems, and needing to attend at specific times to obtain appointments. The main barriers to specialized care were long waiting times and the need to get prescriptions and referrals from family physicians. Factors reported conducive to access included systematic callbacks and the personal involvement of family physicians. Good communication between family physicians and specialists was also perceived to be an important factor in access. CONCLUSION Systematic callbacks, family physicians’ personal efforts to obtain follow-up visits, and better physician-specialist communication were all suggested as ways to improve access to care for patients with multiple chronic conditions. PMID:16926944

  18. ISDC Data Access Layer

    NASA Astrophysics Data System (ADS)

    Jennings, D.; Borkowski, J.; Contessi, T.; Lock, T.; Rohlfs, R.; Walter, R.

    The ISDC Data Access Layer (DAL) is an ANSI C and \\fortran 90 compatible library under development in support of the ESA INTEGRAL mission data analysis software. DALs primary purpose is to isolate the analysis software from the specifics of the data formats while at the same time providing new data abstraction and access capabilities. DAL supports the creation and manipulation of hierarchical data sets which may span multiple files and, in theory, multiple computer systems. A number of Application Programming Interfaces (APIs) are supported by DAL that allow software to view and access data at different levels of complexity. DAL also allows data sets to reside on disk, in conventional memory or in shared memory in a way that is transparent to the user/application.

  19. Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks.

    PubMed

    Du, Qinghe; Zhao, Weidong; Li, Weimin; Zhang, Xuelin; Sun, Bo; Song, Houbing; Ren, Pinyi; Sun, Li; Wang, Yichen

    2016-07-01

    The prosperity of e-health is boosted by fast development of medical devices with wireless communications capability such as wearable devices, tiny sensors, monitoring equipments, etc., which are randomly distributed in clinic environments. The drastically-increasing population of such devices imposes new challenges on the limited wireless resources. To relieve this problem, key knowledge needs to be extracted from massive connection attempts dispersed in the air towards efficient access control. In this paper, a hybrid periodic-random massive access (HPRMA) scheme for wireless clinical networks employing ultra-narrow band (UNB) techniques is proposed. In particular, the proposed scheme towards accommodating a large population of devices include the following new features. On one hand, it can dynamically adjust the resource allocated for coexisting periodic and random services based on the traffic load learned from signal collision status. On the other hand, the resource allocation within periodic services is thoroughly designed to simultaneously align with the timing requests of differentiated services. Abundant simulation results are also presented to demonstrate the superiority of the proposed HPRMA scheme over baseline schemes including time-division multiple access (TDMA) and random access approach, in terms of channel utilization efficiency, packet drop ratio, etc., for the support of massive devices' services. PMID:27240842

  20. Nonstandard finite difference schemes

    NASA Technical Reports Server (NTRS)

    Mickens, Ronald E.

    1995-01-01

    The major research activities of this proposal center on the construction and analysis of nonstandard finite-difference schemes for ordinary and partial differential equations. In particular, we investigate schemes that either have zero truncation errors (exact schemes) or possess other significant features of importance for numerical integration. Our eventual goal is to bring these methods to bear on problems that arise in the modeling of various physical, engineering, and technological systems. At present, these efforts are extended in the direction of understanding the exact nature of these nonstandard procedures and extending their use to more complicated model equations. Our presentation will give a listing (obtained to date) of the nonstandard rules, their application to a number of linear and nonlinear, ordinary and partial differential equations. In certain cases, numerical results will be presented.

  1. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card. PMID:23321972

  2. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-05-01

    are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis

  3. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan; Jersey Inst Ansari, New; Jersey Inst, New

    2005-04-01

    are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis

  4. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis

  5. A Novel Scheme of Fast-frequency Hopping Optical CDMA System with No-hit-zone Sequence

    NASA Astrophysics Data System (ADS)

    Ji, Jianhua; liu, Ling; Wang, Ke; Zhang, Zhipeng; Xu, Ming

    2013-09-01

    In traditional fast frequency-hopping OCDMA (FFH-OCDMA) system, beat noise and multiple-access interference are the main performance limitations, and complicated power control must be employed to eliminate the near-far effect. In this paper, a novel scheme of FFH-OCDMA with no-hit-zone sequence is proposed, which is named NHZ FFH-OCDMA. In NHZ FFH-OCDMA, the synchronization among users can be controlled within permissible time delay, and the code cross-correlation for different users equals zero. Therefore, near-far effect can be eliminated. Furthermore, beat noise and multiple-access interference also can be removed. Simulation of eight simultaneous users with dada rate 100 Mbit/s is demonstrated, where the fiber link consists of 50 km single-mode fiber, plus 5 km dispersion compensating fiber. Simulation results show that the near-far problem of NHZ FFH-OCDMA can be eliminated, and complicated power control can be removed. Therefore, this scheme is a good candidate for optical access network.

  6. Multiple duty battery

    SciTech Connect

    Cohen, F.S.; Hyland, A.L.

    1980-05-20

    A laminar battery capable of providing multiple currents and capacities at different voltages is described in which electrical access is provided to intermediate cells in the battery by conductive metal terminal layers incorporated in the structure of the battery.

  7. Check-Digit Schemes.

    ERIC Educational Resources Information Center

    Wheeler, Mary L.

    1994-01-01

    Discusses the study of identification codes and check-digit schemes as a way to show students a practical application of mathematics and introduce them to coding theory. Examples include postal service money orders, parcel tracking numbers, ISBN codes, bank identification numbers, and UPC codes. (MKR)

  8. Open Access

    ERIC Educational Resources Information Center

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…

  9. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  10. A New Era of Open Access?

    ERIC Educational Resources Information Center

    Mercieca, Paul; Macauley, Peter

    2008-01-01

    There has been a push for open access journals for more than a decade in a higher education and research environment in which the "publish or perish" syndrome is as dominant as ever. This article examines the success, or otherwise, of open access schemes in light of the Excellence in Research for Australia (ERA) initiative. It compares the…

  11. Implicit schemes and parallel computing in unstructured grid CFD

    NASA Technical Reports Server (NTRS)

    Venkatakrishnam, V.

    1995-01-01

    The development of implicit schemes for obtaining steady state solutions to the Euler and Navier-Stokes equations on unstructured grids is outlined. Applications are presented that compare the convergence characteristics of various implicit methods. Next, the development of explicit and implicit schemes to compute unsteady flows on unstructured grids is discussed. Next, the issues involved in parallelizing finite volume schemes on unstructured meshes in an MIMD (multiple instruction/multiple data stream) fashion are outlined. Techniques for partitioning unstructured grids among processors and for extracting parallelism in explicit and implicit solvers are discussed. Finally, some dynamic load balancing ideas, which are useful in adaptive transient computations, are presented.

  12. Hybridization schemes for clusters

    NASA Astrophysics Data System (ADS)

    Wales, David J.

    The concept of an optimum hybridization scheme for cluster compounds is developed with particular reference to electron counting. The prediction of electron counts for clusters and the interpretation of the bonding is shown to depend critically upon the presumed hybridization pattern of the cluster vertex atoms. This fact has not been properly appreciated in previous work, particularly in applications of Stone's tensor surface harmonic (TSH) theory, but is found to be a useful tool when dealt with directly. A quantitative definition is suggested for the optimum cluster hybridization pattern based directly upon the ease of interpretation of the molecular orbitals, and results are given for a range of species. The relationship of this scheme to the detailed cluster geometry is described using Löwdin's partitioned perturbation theory, and the success and range of application of TSH theory are discussed.

  13. Beyond Scheme F

    SciTech Connect

    Elliott, C.J.; Fisher, H.; Pepin, J.; Gillmann, R.

    1996-07-01

    Traffic classification techniques were evaluated using data from a 1993 investigation of the traffic flow patterns on I-20 in Georgia. First we improved the data by sifting through the data base, checking against the original video for questionable events and removing and/or repairing questionable events. We used this data base to critique the performance quantitatively of a classification method known as Scheme F. As a context for improving the approach, we show in this paper that scheme F can be represented as a McCullogh-Pitts neural network, oar as an equivalent decomposition of the plane. We found that Scheme F, among other things, severely misrepresents the number of vehicles in Class 3 by labeling them as Class 2. After discussing the basic classification problem in terms of what is measured, and what is the desired prediction goal, we set forth desirable characteristics of the classification scheme and describe a recurrent neural network system that partitions the high dimensional space up into bins for each axle separation. the collection of bin numbers, one for each of the axle separations, specifies a region in the axle space called a hyper-bin. All the vehicles counted that have the same set of in numbers are in the same hyper-bin. The probability of the occurrence of a particular class in that hyper- bin is the relative frequency with which that class occurs in that set of bin numbers. This type of algorithm produces classification results that are much more balanced and uniform with respect to Classes 2 and 3 and Class 10. In particular, the cancellation of errors of classification that occurs is for many applications the ideal classification scenario. The neural network results are presented in the form of a primary classification network and a reclassification network, the performance matrices for which are presented.

  14. Analysis of synchronous digital-modulation schemes for satellite communication

    NASA Technical Reports Server (NTRS)

    Takhar, G. S.; Gupta, S. C.

    1975-01-01

    The multipath communication channel for space communications is modeled as a multiplicative channel. This paper discusses the effects of multiplicative channel processes on the symbol error rate for quadrature modulation (QM) digital modulation schemes. An expression for the upper bound on the probability of error is derived and numerically evaluated. The results are compared with those obtained for additive channels.

  15. Classification Schemes: Developments and Survival.

    ERIC Educational Resources Information Center

    Pocock, Helen

    1997-01-01

    Discusses the growth, survival and future of library classification schemes. Concludes that to survive, a scheme must constantly update its policies, and readily adapt itself to accommodate growing disciplines and changing terminology. (AEF)

  16. ESCAP mobile training scheme.

    PubMed

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries. PMID:12265562

  17. A Hybrid Sender- and Receiver-Initiated Protocol Scheme in Underwater Acoustic Sensor Networks.

    PubMed

    Lee, Jae-Won; Cho, Ho-Shin

    2015-01-01

    In this paper, we propose a method for sharing the handshakes of control packets among multiple nodes, which we call a hybrid sender- and receiver-initiated (HSR) protocol scheme. Handshake-sharing can be achieved by inviting neighbors to join the current handshake and by allowing them to send their data packets without requiring extra handshakes. Thus, HSR can reduce the signaling overhead involved in control packet exchanges during handshakes, as well as resolve the spatial unfairness problem between nodes. From an operational perspective, HSR resembles the well-known handshake-sharing scheme referred to as the medium access control (MAC) protocol using reverse opportunistic packet appending (ROPA). However, in ROPA the waiting time is not controllable for the receiver's neighbors and thus unexpected collisions may occur at the receiver due to hidden neighbors, whereas the proposed scheme allows all nodes to avoid hidden-node-induced collisions according to an elaborately calculated waiting time. Our computer simulations demonstrated that HSR outperforms ROPA with respect to both the throughput and delay by around 9.65% and 11.36%, respectively. PMID:26556359

  18. A Hybrid Sender- and Receiver-Initiated Protocol Scheme in Underwater Acoustic Sensor Networks

    PubMed Central

    Lee, Jae-Won; Cho, Ho-Shin

    2015-01-01

    In this paper, we propose a method for sharing the handshakes of control packets among multiple nodes, which we call a hybrid sender- and receiver-initiated (HSR) protocol scheme. Handshake-sharing can be achieved by inviting neighbors to join the current handshake and by allowing them to send their data packets without requiring extra handshakes. Thus, HSR can reduce the signaling overhead involved in control packet exchanges during handshakes, as well as resolve the spatial unfairness problem between nodes. From an operational perspective, HSR resembles the well-known handshake-sharing scheme referred to as the medium access control (MAC) protocol using reverse opportunistic packet appending (ROPA). However, in ROPA the waiting time is not controllable for the receiver’s neighbors and thus unexpected collisions may occur at the receiver due to hidden neighbors, whereas the proposed scheme allows all nodes to avoid hidden-node-induced collisions according to an elaborately calculated waiting time. Our computer simulations demonstrated that HSR outperforms ROPA with respect to both the throughput and delay by around 9.65% and 11.36%, respectively. PMID:26556359

  19. Stealth transmission of temporal phase en/decoded polarization-modulated-code-shift-keying optical-code-division multiple-access signal over synchronous digital hierarchy network with asynchronous detection

    NASA Astrophysics Data System (ADS)

    Chen, Yinfang; Wang, Rong; Fang, Tao; Pu, Tao; Xiang, Peng; Zhu, Huatao; Zheng, Jilin

    2014-06-01

    An innovative approach for security-enhanced optical stealth transmission in a synchronous digital hierarchy network is proposed and experimentally investigated. The security enhancement is achieved through a signal modulation format, so-called polarization-modulated-code-shift-keying, which is implemented with two superstructured fiber Bragg gratings-based optical-code-division multiple-access encoders and a polarization modulator. The proposed modulation format can provide a constant energy level for both bits 0's and 1's, which avoids secure vulnerability of single-stealth-user with on-off-keying modulation before coupling into the host channel and after the cascade of filters. Moreover, a self-made cost-effective gain-switched distributed feedback laser with relatively narrow spectrum is first employed as a stealth optical source, which greatly reduces the system cost and complexity. The stealth signal is recovered and detected asynchronously. The experimental results show high secure performance and robustness against eavesdropping, while keeping a bit error rate below forward error correction limit.

  20. Effect of encoder--decoder mismatch due to wavelength and time misalignments on the performance of two-dimensional wavelength--time optical code-division multiple access systems.

    PubMed

    Adams, Rhys; Chen, Lawrence R

    2005-07-10

    We examine the effects of encoder and decoder mismatch due to wavelength and time chip misalignments on the bit-error rate (BER) performance of two-dimensional (2D) wavelength--time optical code-division multiple access systems. We investigate several instances of misalignment in the desired user encoder and decoder as well as in the interfering user encoders. Our simulation methodology can be used to analyze any type of 2D wavelength--time code family as well as probability distribution for misalignment. For illustration purposes, we consider codes generated by use of the depth-first search algorithm and a Gaussian distribution for the misalignment. Our simulation results show that, in the case of a misalignment in either wavelength or time chip, the variance of the distribution for the misalignment must be below 0.01 for the corresponding degradation in the BER system's performance to be less than 1 order of magnitude compared with that when there is no mismatch between the encoders and decoders. The tolerances become even more strict when misalignments in both wavelength and time chips are considered. Furthermore, our results show that the effect of misalignment in wavelength (time chips) is the same regardless of the number of wavelengths (time chips) used in the codes. PMID:16045225

  1. Using Steffe's Advanced Fraction Schemes

    ERIC Educational Resources Information Center

    McCloskey, Andrea V.; Norton, Anderson H.

    2009-01-01

    Recognizing schemes, which are different from strategies, can help teachers understand their students' thinking about fractions. Using Steffe's advanced fraction schemes, the authors describe a progression of development that upper elementary and middle school students might follow in understanding fractions. Each scheme can be viewed as a…

  2. Multiple-Trellis-Coded Modulation

    NASA Technical Reports Server (NTRS)

    Divsalar, D.; Simon, M. K.

    1990-01-01

    Theoretical gain over simple multiple-phase-shift keying at least 2 to 3 decibels. Multiple-trellis-coded modulation scheme combined with M-ary modulation shows theoretically to yield asymptotic gains in performance over uncoded multiple-phase-shift keying, while employing symmetric multiple-phase-shift signal constellations and avoiding code catastrophe. Suitable for satellite and terrestrial-mobile/satellite communications or other communications requiring burst-error correction. Extended to such higher dimensional modulations as quadrature amplitude modulation.

  3. Mobile and Accessible Learning for MOOCs

    ERIC Educational Resources Information Center

    Sharples, Mike; Kloos, Carlos Delgado; Dimitriadis, Yannis; Garlatti, Serge; Specht, Marcus

    2015-01-01

    Many modern web-based systems provide a "responsive" design that allows material and services to be accessed on mobile and desktop devices, with the aim of providing "ubiquitous access." Besides offering access to learning materials such as podcasts and videos across multiple locations, mobile, wearable and ubiquitous…

  4. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks.

    Scope of Contributions

    This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to:
    • Optical access network architectures and protocols
    • Passive optical networks (BPON, EPON, GPON, etc.)
    • Active optical networks
    • Multiple access control
    • Multiservices and QoS provisioning
    • Network survivability
    • Field trials and standards
    • Performance modeling and analysis

    Manuscript Submission

    To submit to this special issue, follow the normal procedure for submission to JON, indicating ``Optical Access Networks feature' in the ``Comments' field of the online submission form. For all other questions relating to this feature issue, please send an e-mail to jon@osa.org, subject line ``Optical Access Networks' Additional information can be found on the JON website: http://www.osa-jon.org/submission/. Submission Deadline: 1 June 2005

  5. Hemodialysis access - self care

    MedlinePlus

    Kidney failure - chronic-hemodialysis access; Renal failure - chronic-hemodialysis access; Chronic renal insufficiency - hemodialysis access; Chronic kidney failure - hemodialysis access; Chronic renal failure - hemodialysis access; dialysis - hemodialysis access

  6. English Universities, Additional Fee Income and Access Agreements: Their Impact on Widening Participation and Fair Access

    ERIC Educational Resources Information Center

    McCaig, Colin; Adnett, Nick

    2009-01-01

    This paper argues that the introduction of access agreements following the establishment of the Office for Fair Access (OFFA) has consolidated how English higher education institutions (HEIs) position themselves in the marketplace in relation to widening participation. However, the absence of a national bursary scheme has led to obfuscation rather…

  7. An energy efficient cooperative hierarchical MIMO clustering scheme for wireless sensor networks.

    PubMed

    Nasim, Mehwish; Qaisar, Saad; Lee, Sungyoung

    2012-01-01

    In this work, we present an energy efficient hierarchical cooperative clustering scheme for wireless sensor networks. Communication cost is a crucial factor in depleting the energy of sensor nodes. In the proposed scheme, nodes cooperate to form clusters at each level of network hierarchy ensuring maximal coverage and minimal energy expenditure with relatively uniform distribution of load within the network. Performance is enhanced by cooperative multiple-input multiple-output (MIMO) communication ensuring energy efficiency for WSN deployments over large geographical areas. We test our scheme using TOSSIM and compare the proposed scheme with cooperative multiple-input multiple-output (CMIMO) clustering scheme and traditional multihop Single-Input-Single-Output (SISO) routing approach. Performance is evaluated on the basis of number of clusters, number of hops, energy consumption and network lifetime. Experimental results show significant energy conservation and increase in network lifetime as compared to existing schemes. PMID:22368459

  8. An Energy Efficient Cooperative Hierarchical MIMO Clustering Scheme for Wireless Sensor Networks

    PubMed Central

    Nasim, Mehwish; Qaisar, Saad; Lee, Sungyoung

    2012-01-01

    In this work, we present an energy efficient hierarchical cooperative clustering scheme for wireless sensor networks. Communication cost is a crucial factor in depleting the energy of sensor nodes. In the proposed scheme, nodes cooperate to form clusters at each level of network hierarchy ensuring maximal coverage and minimal energy expenditure with relatively uniform distribution of load within the network. Performance is enhanced by cooperative multiple-input multiple-output (MIMO) communication ensuring energy efficiency for WSN deployments over large geographical areas. We test our scheme using TOSSIM and compare the proposed scheme with cooperative multiple-input multiple-output (CMIMO) clustering scheme and traditional multihop Single-Input-Single-Output (SISO) routing approach. Performance is evaluated on the basis of number of clusters, number of hops, energy consumption and network lifetime. Experimental results show significant energy conservation and increase in network lifetime as compared to existing schemes. PMID:22368459

  9. Hemodialysis access - self care

    MedlinePlus

    Kidney failure - chronic-hemodialysis access; Renal failure - chronic-hemodialysis access; Chronic renal insufficiency - hemodialysis access; Chronic kidney failure - hemodialysis access; Chronic renal failure - ...

  10. Expanding Access

    ERIC Educational Resources Information Center

    Roach, Ronald

    2007-01-01

    There is no question that the United States lags behind most industrialized nations in consumer access to broadband Internet service. For many policy makers and activists, this shortfall marks the latest phase in the struggle to overcome the digital divide. To remedy this lack of broadband affordability and availability, one start-up firm--with…

  11. Access Denied

    ERIC Educational Resources Information Center

    Raths, David

    2012-01-01

    As faculty members add online and multimedia elements to their courses, colleges and universities across the country are realizing that there is a lot of work to be done to ensure that disabled students (and employees) have equal access to course material and university websites. Unfortunately, far too few schools consider the task a top priority.…

  12. Easy Access

    ERIC Educational Resources Information Center

    Gettelman, Alan

    2009-01-01

    School and university restrooms, locker and shower rooms have specific ADA accessibility requirements that serve the needs of staff, students and campus visitors who are disabled as a result of injury, illness or age. Taking good care of them is good for the reputation of a sensitive community institution, and fosters positive public relations.…

  13. Computer-Access-Code Matrices

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr.

    1990-01-01

    Authorized users respond to changing challenges with changing passwords. Scheme for controlling access to computers defeats eavesdroppers and "hackers". Based on password system of challenge and password or sign, challenge, and countersign correlated with random alphanumeric codes in matrices of two or more dimensions. Codes stored on floppy disk or plug-in card and changed frequently. For even higher security, matrices of four or more dimensions used, just as cubes compounded into hypercubes in concurrent processing.

  14. Multilevel Cell Storage and Resistance Variability in Resistive Random Access Memory

    NASA Astrophysics Data System (ADS)

    Pantelis, D. I.; Karakizis, P. N.; Dragatogiannis, D. A.; Charitidis, C. A.

    2016-06-01

    Multilevel per cell (MLC) storage in resistive random access memory (ReRAM) is attractive in achieving high-density and low-cost memory and will be required in future. In this chapter, MLC storage and resistance variability and reliability of multilevel in ReRAM are discussed. Different MLC operation schemes with their physical mechanisms and a comprehensive analysis of resistance variability have been provided. Various factors that can induce variability and their effect on the resistance margin between the multiple resistance levels are assessed. The reliability characteristics and the impact on MLC storage have also been assessed.

  15. Optical beat interference noise reduction in OFDMA optical access link using self-homodyne balanced detection

    NASA Astrophysics Data System (ADS)

    Jung, Sang-Min; Won, Yong-Yuk; Han, Sang-Kook

    2013-12-01

    A Novel technique for reducing the OBI noise in optical OFDMA-PON uplink is presented. OFDMA is a multipleaccess/ multiplexing scheme that can provide multiplexing operation of user data streams onto the downlink sub-channels and uplink multiple access by means of dividing OFDM subcarriers as sub-channels. The main issue of high-speed, single-wavelength upstream OFDMA-PON arises from optical beating interference noise. Because the sub-channels are allocated dynamically to multiple access users over same nominal wavelength, it generates the optical beating interference among upstream signals. In this paper, we proposed a novel scheme using self-homodyne balanced detection in the optical line terminal (OLT) to reduce OBI noise which is generated in the uplink transmission of OFDMA-PON system. When multiple OFDMA sub-channels over the same nominal wavelength are received at the same time in the proposed architecture, OBI noises can be removed using balanced detection. Using discrete multitone modulation (DMT) to generate real valued OFDM signals, the proposed technique is verified through experimental demonstration.

  16. Proposal of Wireless Traffic Control Schemes for Wireless LANs

    NASA Astrophysics Data System (ADS)

    Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji

    This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.

  17. The Scheme of Beam Synchronization in MEIC

    SciTech Connect

    Zhang, Yuhong; Derbenev, Yaroslav S.; Hutton, Andrew M.

    2013-06-01

    Synchronizing colliding beams at single or multiple collision points is a critical R&D issue in the design of a medium energy electron-ion collider (MEIC) at Jefferson Lab. The path-length variation due to changes in the ion energy, which varies over 20 to 100 GeV, could be more than several times the bunch spacing. The scheme adopted in the present MEIC baseline is centered on varying the number of bunches (i.e., harmonic number) stored in the collider ring. This could provide a set of discrete energies for proton or ions such that the beam synchronization condition is satisfied. To cover the ion energy between these synchronized values, we further propose to vary simultaneously the electron ring circumference and the frequency of the RF systems in both collider rings. We also present in this paper the requirement of frequency tunability of SRF cavities to support the scheme.

  18. CORD - a WDMA optical network: subcarrier-based signaling and control scheme

    NASA Astrophysics Data System (ADS)

    Lu, Chung-Li; Sabido, Delfin Jay M.; Poggiolini, Pierluigi; Hofmeister, R. Theodore; Kazovsky, Leonid G.

    1995-05-01

    CORD (COntention Resolution using Delay lines) is a 2.5-Gb/s/ Lambda wavelength-division multiple-access (WDMA) packet-switched network experiment. We experimentally demonstrated the simultaneous transmission of a 2.5-Gb/s packet-switched payload data and an 80-Mb/s control channel using the multichannel subcarrier multiplexing (MSCM) signaling scheme with 3 and 3.5 GHz subcarriers. We optimized the control channel modulation depth at the transmitter to 0.4, and the splitting ratio to a 90/10 payload data/control channel split at the receiver, to obtain the optimal receiver sensitivity of - 12.9 dBm.

  19. A self-learning call admission control scheme for CDMA cellular networks.

    PubMed

    Liu, Derong; Zhang, Yi; Zhang, Huaguang

    2005-09-01

    In the present paper, a call admission control scheme that can learn from the network environment and user behavior is developed for code division multiple access (CDMA) cellular networks that handle both voice and data services. The idea is built upon a novel learning control architecture with only a single module instead of two or three modules in adaptive critic designs (ACDs). The use of adaptive critic approach for call admission control in wireless cellular networks is new. The call admission controller can perform learning in real-time as well as in offline environments and the controller improves its performance as it gains more experience. Another important contribution in the present work is the choice of utility function for the present self-learning control approach which makes the present learning process much more efficient than existing learning control methods. The performance of our algorithm will be shown through computer simulation and compared with existing algorithms. PMID:16252828

  20. An adaptive control scheme for coordinated multimanipulator systems

    SciTech Connect

    Jonghann Jean; Lichen Fu . Dept. of Electrical Engineering)

    1993-04-01

    The problem of adaptive coordinated control of multiple robot arms transporting an object is addressed. A stable adaptive control scheme for both trajectory tracking and internal force control is presented. Detailed analyses on tracking properties of the object position, velocity and the internal forces exerted on the object are given. It is shown that this control scheme can achieve satisfactory tracking performance without using the measurement of contact forces and their derivatives. It can be shown that this scheme can be realized by decentralized implementation to reduce the computational burden. Moreover, some efficient adaptive control strategies can be incorporated to reduce the computational complexity.

  1. A chaotic map-based authentication scheme for telecare medicine information systems.

    PubMed

    Hao, Xinhong; Wang, Jiantao; Yang, Qinghai; Yan, Xiaopeng; Li, Ping

    2013-04-01

    With the development of Internet, patients could enjoy health-care delivery services through telecare medicine information systems (TMIS) in their home. To control the access to remote medical servers' resources, many authentication schemes using smart cards have been proposed. However, the performance of these schemes is not satisfactory since modular exponential operations are used in these schemes. In the paper, we propose a chaotic map-based authentication scheme for telecare medicine information systems. The security and performance analysis shows our scheme is more suitable for TMIS. PMID:23334801

  2. An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM)

    PubMed Central

    Xu, Ke; Liao, Yongjian; Qiao, Li

    2015-01-01

    A broadcast encryption scheme with personalized messages (BEPM) is a scheme in which a broadcaster transmits not only encrypted broadcast messages to a subset of recipients but also encrypted personalized messages to each user individually. Several broadcast encryption (BE) schemes allow a broadcaster encrypts a message for a subset S of recipients with public keys and any user in S can decrypt the message with his/her private key. However, these BE schemes can not provide an efficient way to transmit encrypted personalized messages to each user individually. In this paper, we propose a broadcast encryption scheme with a transmission of personalized messages. Besides, the scheme is based on multilinear maps ensure constant ciphertext size and private key size of each user and the scheme can achieve statically security. More realistically, the scheme can be applied to the Conditional Access System (CAS) of pay television (pay-TV) efficiently and safely. PMID:26629817

  3. An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM).

    PubMed

    Xu, Ke; Liao, Yongjian; Qiao, Li; Liu, Zhangyun; Yang, Xiaowei

    2015-01-01

    A broadcast encryption scheme with personalized messages (BEPM) is a scheme in which a broadcaster transmits not only encrypted broadcast messages to a subset of recipients but also encrypted personalized messages to each user individually. Several broadcast encryption (BE) schemes allow a broadcaster encrypts a message for a subset S of recipients with public keys and any user in S can decrypt the message with his/her private key. However, these BE schemes can not provide an efficient way to transmit encrypted personalized messages to each user individually. In this paper, we propose a broadcast encryption scheme with a transmission of personalized messages. Besides, the scheme is based on multilinear maps ensure constant ciphertext size and private key size of each user and the scheme can achieve statically security. More realistically, the scheme can be applied to the Conditional Access System (CAS) of pay television (pay-TV) efficiently and safely. PMID:26629817

  4. Cooperative medical schemes in contemporary rural China.

    PubMed

    Feng, X; Tang, S; Bloom, G; Segall, M; Gu, Y

    1995-10-01

    Improvements in rural health care in China in the 1950s, 1960s and 1970s were largely due to the development of cooperative medical schemes (CMSs) and the establishment of a three-tier rural health network. Since the economic reforms were instituted in the late 1970s, the financing and delivery of rural health services have seen many changes, some positive, others not. Most CMSs have collapsed. In the absence of CMSs, the rural population has to pay for health care out-of-pocket and poor families have greater difficulty in getting access to essential health care. In the meantime, emphases of health services have tended to shift from lower to higher levels, from preventive to curative services, and from planning and management to market forces. This paper outlines the evolution of CMSs, reasons for their collapse, and their likely impact on rural health services. The main focus is on the development of a new generation of rural cooperative health care schemes, given their importance in the process of consolidating the rural three-tier health network after the impact of the economic reforms: the characteristics of some schemes, the apparent conditions for success, and government policy towards the development of cooperative health care financing are presented. PMID:8578334

  5. Making Your Website More Accessible. Tips

    ERIC Educational Resources Information Center

    Arnone, Marilyn

    2007-01-01

    Employing Universal Design for Learning (UDL) principles, such as multiple means of representation (of content), multiple means of engagement (motivation) and multiple means of expression (sharing the results of research, for example), will put one on the right path toward increasing accessibility for all learners. In this article, the author…

  6. Hemodialysis access procedures

    MedlinePlus

    Kidney failure - chronic-dialysis access; Renal failure - chronic-dialysis access; Chronic renal insufficiency-dialysis access; Chronic kidney failure-dialysis access; Chronic renal failure-dialysis access

  7. A modified prediction scheme of the H.264 multiview video coding to improve the decoder performance

    NASA Astrophysics Data System (ADS)

    Hamadan, Ayman M.; Aly, Hussein A.; Fouad, Mohamed M.; Dansereau, Richard M.

    2013-02-01

    In this paper, we present a modified inter-view prediction scheme for the multiview video coding (MVC).With more inter-view prediction, the number of reference frames required to decode a single view increase. Consequently, the data size of decoding a single view increases, thus impacting the decoder performance. In this paper, we propose an MVC scheme that requires less inter-view prediction than that of the MVC standard scheme. The proposed scheme is implemented and tested on real multiview video sequences. Improvements are shown using the proposed scheme in terms of average data size required either to decode a single view, or to access any frame (i.e., random access), with comparable rate-distortion. It is compared to the MVC standard scheme and another improved techniques from the literature.

  8. Improving antivenom availability and accessibility: science, technology, and beyond.

    PubMed

    Gutiérrez, José María

    2012-09-15

    Snakebite envenomings constitute a serious and neglected public health problem. Despite the fact that effective treatment exists, i.e. administration of animal-derived antivenoms, the availability and accessibility of these life-saving immunobiologicals is deficitary in various parts of the world, particularly in sub-Saharan Africa and some regions of Asia. This article discusses some of the problems that need to be circumvented in order to improve the availability and accessibility of antivenoms. The conglomerate of antivenom manufacturers is highly heterogeneous in terms of technological base, qualification of staff, implementation of Good Manufacturing Practices (GMPs), and volume of production. Therefore, improvements in antivenom quality and availability should be based on strategies tailored to the situation of each region or country; in this context, three different scenarios are discussed. Accessibility of antivenoms demands concerted efforts at multiple levels, including raising the awareness of public health authorities on the relevance of the problem, implementing innovative antivenom purchasing schemes, strengthening national distribution channels on the basis of robust epidemiological information, improving the cold chain and the provision of health services in remote rural settings, supporting the correct use of antivenoms, and promoting the involvement of local community organizations in various aspects of prevention and management. These tasks should be envisaged in terms of synergistic, interprogrammatic and intersectorial interventions, with the participation of many players. PMID:22781134

  9. A Theoretical Analysis of a New Polarimetric Optical Scheme for Glucose Sensing in the Human Eye

    NASA Technical Reports Server (NTRS)

    Rovati, Luigi L.; Boeckle, Stefan; Ansari, Rafat R.; Salzman, Jack A. (Technical Monitor)

    2002-01-01

    The challenging task of in vivo polarimetric glucose sensing is the identification and selection of a scheme to optically access the aqueous humor of the human eye. In this short communication an earlier approach of Cote et al. is theoretically compared with our new optical scheme. Simulations of the new scheme using the eye model of Navarro, suggest that the new optical geometry can overcome the limitations of the previous approach for in vivo measurements of glucose in a human eye.

  10. Multiple image encryption by phase retrieval

    NASA Astrophysics Data System (ADS)

    Di, Hong; Kang, Yanmei; Liu, Yueqin; Zhang, Xin

    2016-07-01

    Multiple image encryption (MIE) was proposed to increase the efficiency of encrypting images by processing several images simultaneously. Because of the advantage of optical technology in processing twodimensional images at high throughput, MIE has been significantly improved by use of methods originating from optics. Phase retrieval was the process of algorithmically finding solutions to the phase loss problem due to light detectors only capturing the intensity. It was to retrieve phase information for the determination of a structure from diffraction data. Error-reduction algorithm is a typical phase retrieval method. Here, we employ it to illustrate that methods in phase retrieval are able to encrypt multiple images and compress them into encrypted data simultaneously. Moreover, the decryption is also designed to handle multiple images at the same time. The whole process including both the encryption and decryption is proposed to improve MIE with respect to the compression and efficiency. The feasibility and encryption of the MIE scheme is demonstrated with encryption experiments under Gaussian white noise and unauthorized access.

  11. Hampshire Probation Sports Counselling Scheme.

    ERIC Educational Resources Information Center

    Waldman, Keith

    A sports counseling scheme for young people on criminal probation in Hampshire (England) was developed in the 1980s as a partnership between the Sports Council and the Probation Service. The scheme aims to encourage offenders, aged 14 and up, to make constructive use of their leisure time; to allow participants the opportunity to have positive…

  12. Access to Medications for Cardiovascular Diseases in Low- and Middle-Income Countries.

    PubMed

    Wirtz, Veronika J; Kaplan, Warren A; Kwan, Gene F; Laing, Richard O

    2016-05-24

    Cardiovascular diseases (CVD) represent the highest burden of disease globally. Medicines are a critical intervention used to prevent and treat CVD. This review describes access to medication for CVD from a health system perspective and strategies that have been used to promote access, including providing medicines at lower cost, improving medication supply, ensuring medicine quality, promoting appropriate use, and managing intellectual property issues. Using key evidence in published and gray literature and systematic reviews, we summarize advances in access to cardiovascular medicines using the 5 health system dimensions of access: availability, affordability, accessibility, acceptability, and quality of medicines. There are multiple barriers to access of CVD medicines, particularly in low- and middle-income countries. Low availability of CVD medicines has been reported in public and private healthcare facilities. When patients lack insurance and pay out of pocket to purchase medicines, medicines can be unaffordable. Accessibility and acceptability are low for medicines used in secondary prevention; increasing use is positively related to country income. Fixed-dose combinations have shown a positive effect on adherence and intermediate outcome measures such as blood pressure and cholesterol. We have a new opportunity to improve access to CVD medicines by using strategies such as efficient procurement of low-cost, quality-assured generic medicines, development of fixed-dose combination medicines, and promotion of adherence through insurance schemes that waive copayment for long-term medications. Monitoring progress at all levels, institutional, regional, national, and international, is vital to identifying gaps in access and implementing adequate policies. PMID:27217433

  13. Sampling scheme for pyrethroids on multiple surfaces on commercial aircrafts.

    PubMed

    Mohan, Krishnan R; Weisel, Clifford P

    2010-06-01

    A wipe sampler for the collection of permethrin from soft and hard surfaces has been developed for use in aircraft. "Disinsection" or application of pesticides, predominantly pyrethrods, inside commercial aircraft is routinely required by some countries and is done on an as-needed basis by airlines resulting in potential pesticide dermal and inhalation exposures to the crew and passengers. A wipe method using filter paper and water was evaluated for both soft and hard aircraft surfaces. Permethrin was analyzed by GC/MS after its ultrasonication extraction from the sampling medium into hexane and volume reduction. Recoveries, based on spraying known levels of permethrin, were 80-100% from table trays, seat handles and rugs; and 40-50% from seat cushions. The wipe sampler is easy to use, requires minimum training, is compatible with the regulations on what can be brought through security for use on commercial aircraft, and readily adaptable for use in residential and other settings. PMID:19756041

  14. Efficient spares matrix multiplication scheme for the CYBER 203

    NASA Technical Reports Server (NTRS)

    Lambiotte, J. J., Jr.

    1984-01-01

    This work has been directed toward the development of an efficient algorithm for performing this computation on the CYBER-203. The desire to provide software which gives the user the choice between the often conflicting goals of minimizing central processing (CPU) time or storage requirements has led to a diagonal-based algorithm in which one of three types of storage is selected for each diagonal. For each storage type, an initialization sub-routine estimates the CPU and storage requirements based upon results from previously performed numerical experimentation. These requirements are adjusted by weights provided by the user which reflect the relative importance the user places on the resources. The three storage types employed were chosen to be efficient on the CYBER-203 for diagonals which are sparse, moderately sparse, or dense; however, for many densities, no diagonal type is most efficient with respect to both resource requirements. The user-supplied weights dictate the choice.

  15. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    NASA Astrophysics Data System (ADS)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  16. FD/DAMA Scheme For Mobile/Satellite Communications

    NASA Technical Reports Server (NTRS)

    Yan, Tsun-Yee; Wang, Charles C.; Cheng, Unjeng; Rafferty, William; Dessouky, Khaled I.

    1992-01-01

    Integrated-Adaptive Mobile Access Protocol (I-AMAP) proposed to allocate communication channels to subscribers in first-generation MSAT-X mobile/satellite communication network. Based on concept of frequency-division/demand-assigned multiple access (FD/DAMA) where partition of available spectrum adapted to subscribers' demands for service. Requests processed, and competing requests resolved according to channel-access protocol, or free-access tree algorithm described in "Connection Protocol for Mobile/Satellite Communications" (NPO-17735). Assigned spectrum utilized efficiently.

  17. Multiple Multi-Qubit Quantum States Sharing

    NASA Astrophysics Data System (ADS)

    Qin, Hua-Wang; Dai, Yue-Wei

    2016-04-01

    A multiple multi-qubit quantum states sharing scheme is proposed, in which the dealer can share multiple multi-qubit quantum states among the participants through only one distribution and one recovery. The dealer encodes the secret quantum states into a special entangled state, and then distributes the particles of the entangled state to the participants. The participants perform the single-particle measurements on their particles, and can cooperate to recover the multiple multi-qubit quantum states. Compared to the existing schemes, our scheme is more efficient and more flexible in practice.

  18. Joint Access Control Based on Access Ratio and Resource Utilization for High-Speed Railway Communications

    NASA Astrophysics Data System (ADS)

    Zhou, Yuzhe; Ai, Bo

    2015-05-01

    The fast development of high-speed rails makes people's life more and more convenient. However, provisioning of quality of service of multimedia applications for users on the high-speed train is a critical task for wireless communications. Therefore, new solutions are desirable to be found to address this kind of problem. Current researches mainly focus on providing seamless broadband wireless access for high-speed mobile terminals. In this paper, an algorithm to calculate the optimal resource reservation fraction of handovers is proposed. A joint access control scheme for high-speed railway communication handover scenario is proposed. Metrics of access ratio and resource utilization ratio are considered jointly in the analysis and the performance evaluation. Simulation results show that the proposed algorithm and the scheme improve quality of service compared with other conventional schemes.

  19. Data Access Performance Through Parallelization and Vectored Access: Some Results

    SciTech Connect

    Furano, Fabrizio; Hanushevsky, Andrew; /SLAC

    2011-11-10

    High Energy Physics data processing and analysis applications typically deal with the problem of accessing and processing data at high speed. Recent studies, development and test work have shown that the latencies due to data access can often be hidden by parallelizing them with the data processing, thus giving the ability to have applications which process remote data with a high level of efficiency. Techniques and algorithms able to reach this result have been implemented in the client side of the Scalla/xrootd system, and in this contribution we describe the results of some tests done in order to compare their performance and characteristics. These techniques, if used together with multiple streams data access, can also be effective in allowing to efficiently and transparently deal with data repositories accessible via a Wide Area Network.

  20. Scheme for Quantum Computing Immune to Decoherence

    NASA Technical Reports Server (NTRS)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report

  1. Multiplexing schemes for quantum repeater networks

    NASA Astrophysics Data System (ADS)

    Aparicio, Luciano; Van Meter, Rodney

    2011-08-01

    When built, quantum repeaters will allow the distribution of entangled quantum states across large distances, playing a vital part in many proposed quantum technologies. Enabling multiple users to connect through the same network will be key to their real-world deployment. Previous work on repeater technologies has focussed only on simple entanglment production, without considering the issues of resource scarcity and competition that necessarily arise in a network setting. In this paper we simulated a thirteen-node network with up to five flows sharing different parts of the network, measuring the total throughput and fairness for each case. Our results suggest that the Internet-like approach of statistical multiplexing use of a congested link gives the highest aggregate throughput. Time division multiplexing and buffer space multiplexing were slightly less effective, but all three schemes allow the sum of multiple flows to substantially exceed that of any one flow, improving over circuit switching by taking advantage of resources that are forced to remain idle in circuit switching. All three schemes proved to have excellent fairness. The high performance, fairness and simplicity of implementation support a recommendation of statistical multiplexing for shared quantum repeater networks.

  2. A secure biometrics-based authentication scheme for telecare medicine information systems.

    PubMed

    Yan, Xiaopeng; Li, Weiheng; Li, Ping; Wang, Jiantao; Hao, Xinhong; Gong, Peng

    2013-10-01

    The telecare medicine information system (TMIS) allows patients and doctors to access medical services or medical information at remote sites. Therefore, it could bring us very big convenient. To safeguard patients' privacy, authentication schemes for the TMIS attracted wide attention. Recently, Tan proposed an efficient biometrics-based authentication scheme for the TMIS and claimed their scheme could withstand various attacks. However, in this paper, we point out that Tan's scheme is vulnerable to the Denial-of-Service attack. To enhance security, we also propose an improved scheme based on Tan's work. Security and performance analysis shows our scheme not only could overcome weakness in Tan's scheme but also has better performance. PMID:23996083

  3. Entropy-bounded discontinuous Galerkin scheme for Euler equations

    NASA Astrophysics Data System (ADS)

    Lv, Yu; Ihme, Matthias

    2015-08-01

    An entropy-bounded Discontinuous Galerkin (EBDG) scheme is proposed in which the solution is regularized by constraining the entropy. The resulting scheme is able to stabilize the solution in the vicinity of discontinuities and retains the optimal accuracy for smooth solutions. The properties of the limiting operator according to the entropy-minimum principle are proofed, and an optimal CFL-criterion is derived. We provide a rigorous description for locally imposing entropy constraints to capture multiple discontinuities. Significant advantages of the EBDG-scheme are the general applicability to arbitrary high-order elements and its simple implementation for multi-dimensional configurations. Numerical tests confirm the properties of the scheme, and particular focus is attributed to the robustness in treating discontinuities on arbitrary meshes.

  4. Digital imaging access library

    NASA Astrophysics Data System (ADS)

    Cook, Jay F.; Hansen, Mark; Francoise, James J.; Leckie, Robert G.; Smith, Donald V.

    1994-05-01

    The ability to access a vast array of radiological and pathologic diagnoses through computer searches of local medical facility databases is a by-product of the continued development of filmless imaging systems. The Department of Defense (DoD) Medical Diagnostic Imaging Support initiative is expanding through the addition of on-line systems at several DoD health care facilities. Madigan Army Medical Center, as the initial site, will soon be 90% filmless, with over one million images archived. Multiple other DoD medical centers are under installation. The eventual goal is an interconnected network of PACS systems of DoD medical centers and their supported medical facilities throughout the United States. To access this potential pool of medical information requires a centralized database capable of acting as a diagnostic index system. The establishment of a multi-center film library index begins with an initial analysis of issues regarding data storage and access, indexing, cross-coding with pathological files, communication formats, cost sharing, and patient confidentiality. In initiating these first steps to developing this telecommunications library these issues and their implications are discussed. The final implementation of this system will facilitate markedly improved research and teaching capabilities in both radiological and pathological fields.

  5. Accessing and visualizing scientific spatiotemporal data

    NASA Technical Reports Server (NTRS)

    Katz, Daniel S.; Bergou, Attila; Berriman, G. Bruce; Block, Gary L.; Collier, Jim; Curkendall, David W.; Good, John; Husman, Laura; Jacob, Joseph C.; Laity, Anastasia; Li, P. Peggy; Miller, Craig; Prince, Tom; Siegel, Herb; Williams, Roy

    2004-01-01

    This paper discusses work done by JPL's Parallel Applications Technologies Group in helping scientists access and visualize very large data sets through the use of multiple computing resources, such as parallel supercomputers, clusters, and grids.

  6. A study on Data Transmission Scheme for High Functional Railway Signaling System

    NASA Astrophysics Data System (ADS)

    Ishikawa, Ryo; Sano, Minoru; Mochizuki, Hiroshi; Nakamura, Hideo

    Railway signaling systems that transmit control information via rails have been deployed in many applications, for example, digital automatic train control (ATC) systems for controlling train speed. Since the performance of digital ATC systems depends on the signal transmission speed, recently there have been many studies aimed at realizing high-speed data transmission. However, it is difficult to increase the transmission speed because rails have strong attenuation in proportion to an increase of the frequency. In this paper, we aimed to increase the transmission speed by improving the modulation scheme to overcome these limitations. We proposed CDMA-QAM method that is combined code-division multiple access (CDMA) and quadrature amplitude modulation (QAM). And we evaluated in a field trial the CDMA-QAM rail transmission device developed using DSP. On the other hand, an analog ATC based on an amplitude modulation (AM) is still employed in some railway lines. It is difficult for their lines to introduce the digital signal due to track circuit configurations and interoperability conditions. So we studied a data transmission scheme that makes it possible to mix an analog signal and a digital signal, and evaluated the influence given to both signals using a developed device that generates the mixed signal of analog and digital signal.

  7. A novel encoded excitation scheme in a phased array for the improving data acquisition rate.

    PubMed

    Gutiérrez-Fernández, César; Jiménez, Ana; Martín-Arguedas, Carlos Julián; Ureña, Jesús; Hernández, Álvaro

    2013-01-01

    One of the challenges of phased array (PA) ultrasonic imaging systems is their limited capability to deal with real-time applications, such as echocardiography and obstetrics. In its most basic outline, these systems require emitting and receiving with the entire array for each image line to be acquired; therefore, with many image lines, a higher acquisition time and a lower frame rate. This constraint requires one to find alternatives to reduce the total number of emissions needed to obtain the whole image. In this work, we propose a new PA scheme based on the Code Division Multiple Access (CDMA) technique, where a different code is assigned to each steering direction, allowing the array to emit in several directions simultaneously. However, the use of encoding techniques produces a reduction of the image contrast because of the interferences between codes. To solve this, a new scheme based on merging several images is proposed, allowing the system to get close to the theoretical maximum frame rate, as well as to limit the loss of contrast, intrinsic to the technique. PMID:24385031

  8. A Novel Phase Rotation Scheme on the Constellations for the E-UTRA Uplink ACK/NACK Signals

    NASA Astrophysics Data System (ADS)

    Nakao, Seigo; Takata, Tomohumi; Imamura, Daichi; Hiramatsu, Katsuhiko

    Hybrid automatic repeat request (HARQ) is employed for the Evolved Universal Terrestrial Radio Access (E-UTRA) downlink. The ACK/NACK signals from each user equipment (UE) are multiplexed by code division multiple access (CDMA) and transmitted via a physical uplink control channel (PUCCH). The ACK/NACK signals are code spread by the cyclic shift (CS) sequences made from zero auto-correlation (ZAC) sequences; however, the orthogonality of these sequences is not guaranteed depending on the propagation channels; moreover, the amount of inter-code interference (ICI) depends on the delay spread of the channel and the transmitting timing control error of each UE. In the conventional PUCCH structure, ICI between two ACK signals does not degrade their detection performance, whereas ICI between an ACK signal and a NACK signal degrades the detection performance. This causes a serious gap between the detection performances of ACK and NACK signals, because generally in a PUCCH, there are more ACK signals than NACK signals. In this paper, we propose a novel phase rotation scheme on the constellations of ACK/NACK signals that can resolve this issue, and the simulation evaluation results confirm the benefits of the proposed phase rotation scheme.

  9. Novel driving scheme for FLCD

    NASA Astrophysics Data System (ADS)

    Wu, Jiin-chuan; Wang, Chi-Chang

    1996-03-01

    A frame change data driving scheme (FCDDS) for ferroelectric LCD(FLCD) of matrix- addressing is developed which uses only positive voltages for the row and column waveforms to achieve bipolar driving waveforms on the FLCD pixels. Thus the required supply voltage for the driver chips is half that of the conventional driving scheme. Each scan line is addressed in only twice the switching time (tau) (minimum response time of FLC) so that this scheme is suitable for high duty ratio panels. In order to meet this bistable electro-optic effect of FLCD and zero net dc voltage across each pixel of the liquid crystal, turning on and turning off pixels are done at different time slots and frame slots. This driving scheme can be easily implemented using commercially available STN LCD drivers plus a small external circuit or by making an ASIC which is a slight modification of the STN driver. Both methods are discussed.

  10. Community health insurance schemes & patient satisfaction - evidence from India

    PubMed Central

    Devadasan, N.; Criel, Bart; Damme, Wim Van; Lefevre, Pierre; Manoharan, S.; der Stuyft, Patrick Van

    2011-01-01

    Background & objectives: Quality of care is an important determinant for utilizing health services. In India, the quality of care in most health services is poor. The government recognizes this and has been working on both supply and demand aspects. In particular, it is promoting community health insurance (CHI) schemes, so that patients can access quality services. This observational study was undertaken to measure the level of satisfaction among insured and uninsured patients in two CHI schemes in India. Methods: Patient satisfaction was measured, which is an outcome of good quality care. Two CHI schemes, Action for Community Organisation, Rehabilitation and Development (ACCORD) and Kadamalai Kalanjiam Vattara Sangam (KKVS), were chosen. Randomly selected, insured and uninsured households were interviewed. The household where a patient was admitted to a hospital was interviewed in depth about the health seeking behaviour, the cost of treatment and the satisfaction levels. Results: It was found that at both ACCORD and KKVS, there was no significant difference in the levels of satisfaction between the insured and uninsured patients. The main reasons for satisfaction were the availability of doctors and medicines and the recovery by the patient. Interpretation & conclusions: Our study showed that insured hospitalized patients did not have significantly higher levels of satisfaction compared to uninsured hospitalized patients. If CHI schemes want to improve the quality of care for their clients, so that they adhere to the scheme, the scheme managers need to negotiate actively for better quality of care with empanelled providers. PMID:21321418

  11. On the marginal stability of upwind schemes

    NASA Astrophysics Data System (ADS)

    Gressier, J.; Moschetta, J.-M.

    Following Quirk's analysis of Roe's scheme, general criteria are derived to predict the odd-even decoupling. This analysis is applied to Roe's scheme, EFM Pullin's scheme, EIM Macrossan's scheme and AUSM Liou's scheme. Strict stability is shown to be desirable to avoid most of these flaws. Finally, the link between marginal stability and accuracy on shear waves is established.

  12. Relaxation schemes for Chebyshev spectral multigrid methods

    NASA Technical Reports Server (NTRS)

    Kang, Yimin; Fulton, Scott R.

    1993-01-01

    Two relaxation schemes for Chebyshev spectral multigrid methods are presented for elliptic equations with Dirichlet boundary conditions. The first scheme is a pointwise-preconditioned Richardson relaxation scheme and the second is a line relaxation scheme. The line relaxation scheme provides an efficient and relatively simple approach for solving two-dimensional spectral equations. Numerical examples and comparisons with other methods are given.

  13. Improved pKa calculations through flexibility based sampling of a water-dominated interaction scheme

    PubMed Central

    Warwicker, Jim

    2004-01-01

    Ionizable groups play critical roles in biological processes. Computation of pKas is complicated by model approximations and multiple conformations. Calculated and experimental pKas are compared for relatively inflexible active-site side chains, to develop an empirical model for hydration entropy changes upon charge burial. The modification is found to be generally small, but large for cysteine, consistent with small molecule ionization data and with partial charge distributions in ionized and neutral forms. The hydration model predicts significant entropic contributions for ionizable residue burial, demonstrated for components in the pyruvate dehydrogenase complex. Conformational relaxation in a pH-titration is estimated with a mean-field assessment of maximal side chain solvent accessibility. All ionizable residues interact within a low protein dielectric finite difference (FD) scheme, and more flexible groups also access water-mediated Debye-Hückel (DH) interactions. The DH method tends to match overall pH-dependent stability, while FD can be more accurate for active-site groups. Tolerance for side chain rotamer packing is varied, defining access to DH interactions, and the best fit with experimental pKas obtained. The new (FD/DH) method provides a fast computational framework for making the distinction between buried and solvent-accessible groups that has been qualitatively apparent from previous work, and pKa calculations are significantly improved for a mixed set of ionizable residues. Its effectiveness is also demonstrated with computation of the pH-dependence of electrostatic energy, recovering favorable contributions to folded state stability and, in relation to structural genomics, with substantial improvement (reduction of false positives) in active-site identification by electrostatic strain. PMID:15388865

  14. Small Satellite Access of the Space Network

    NASA Technical Reports Server (NTRS)

    Horan, Stephen; Minnix, Timothy O.; Vigil, J. S.

    1999-01-01

    Small satellites have been perceived as having limited access to NASA's Space Network (SN). The potential for satellite access of the space network when the design utilizes a fixed antenna configuration and low-power, coded transmission is analyzed. From the analysis, satellites using this configuration in high-inclination orbits are shown to have a daily data throughput in the 100 to 1000 Mbit range using the multiple access communications service.

  15. Privacy protection schemes for fingerprint recognition systems

    NASA Astrophysics Data System (ADS)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  16. Communication Improvement for the LU NAS Parallel Benchmark: A Model for Efficient Parallel Relaxation Schemes

    NASA Technical Reports Server (NTRS)

    Yarrow, Maurice; VanderWijngaart, Rob; Kutler, Paul (Technical Monitor)

    1997-01-01

    The first release of the MPI version of the LU NAS Parallel Benchmark (NPB2.0) performed poorly compared to its companion NPB2.0 codes. The later LU release (NPB2.1 & 2.2) runs up to two and a half times faster, thanks to a revised point access scheme and related communications scheme. The new scheme sends substantially fewer messages. is cache "friendly", and has a better load balance. We detail the, observations and modifications that resulted in this efficiency improvement, and show that the poor behavior of the original code resulted from deriving a message passing scheme from an algorithm originally devised for a vector architecture.

  17. A Data Gathering Scheme in Wireless Sensor Networks Based on Synchronization of Chaotic Spiking Oscillator Networks

    SciTech Connect

    Nakano, Hidehiro; Utani, Akihide; Miyauchi, Arata; Yamamoto, Hisao

    2011-04-19

    This paper studies chaos-based data gathering scheme in multiple sink wireless sensor networks. In the proposed scheme, each wireless sensor node has a simple chaotic oscillator. The oscillators generate spike signals with chaotic interspike intervals, and are impulsively coupled by the signals via wireless communication. Each wireless sensor node transmits and receives sensor information only in the timing of the couplings. The proposed scheme can exhibit various chaos synchronous phenomena and their breakdown phenomena, and can effectively gather sensor information with the significantly small number of transmissions and receptions compared with the conventional scheme. Also, the proposed scheme can flexibly adapt various wireless sensor networks not only with a single sink node but also with multiple sink nodes. This paper introduces our previous works. Through simulation experiments, we show effectiveness of the proposed scheme and discuss its development potential.

  18. Implicit Block ACK Scheme for IEEE 802.11 WLANs

    PubMed Central

    Sthapit, Pranesh; Pyun, Jae-Young

    2016-01-01

    The throughput of IEEE 802.11 standard is significantly bounded by the associated Medium Access Control (MAC) overhead. Because of the overhead, an upper limit exists for throughput, which is bounded, including situations where data rates are extremely high. Therefore, an overhead reduction is necessary to achieve higher throughput. The IEEE 802.11e amendment introduced the block ACK mechanism, to reduce the number of control messages in MAC. Although the block ACK scheme greatly reduces overhead, further improvements are possible. In this letter, we propose an implicit block ACK method that further reduces the overhead associated with IEEE 802.11e’s block ACK scheme. The mathematical analysis results are presented for both the original protocol and the proposed scheme. A performance improvement of greater than 10% was achieved with the proposed implementation.

  19. High resolution schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Harten, A.

    1983-01-01

    A class of new explicit second order accurate finite difference schemes for the computation of weak solutions of hyperbolic conservation laws is presented. These highly nonlinear schemes are obtained by applying a nonoscillatory first order accurate scheme to an appropriately modified flux function. The so-derived second order accurate schemes achieve high resolution while preserving the robustness of the original nonoscillatory first order accurate scheme. Numerical experiments are presented to demonstrate the performance of these new schemes.

  20. On applications of chimera grid schemes to store separation

    NASA Technical Reports Server (NTRS)

    Cougherty, F. C.; Benek, J. A.; Steger, J. L.

    1985-01-01

    A finite difference scheme which uses multiple overset meshes to simulate the aerodynamics of aircraft/store interaction and store separation is described. In this chimera, or multiple mesh, scheme, a complex configuration is mapped using a major grid about the main component of the configuration, and minor overset meshes are used to map each additional component such as a store. As a first step in modeling the aerodynamics of store separation, two dimensional inviscid flow calculations were carried out in which one of the minor meshes is allowed to move with respect to the major grid. Solutions of calibrated two dimensional problems indicate that allowing one mesh to move with respect to another does not adversely affect the time accuracy of an unsteady solution. Steady, inviscid three dimensional computations demonstrate the capability to simulate complex configurations, including closely packed multiple bodies.

  1. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

    PubMed

    Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita

    2014-05-01

    Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme. PMID:24771484

  2. Nonlinear secret image sharing scheme.

    PubMed

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively. PMID:25140334

  3. Nonlinear Secret Image Sharing Scheme

    PubMed Central

    Shin, Sang-Ho; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2⁡m⌉ bit-per-pixel (bpp), respectively. PMID:25140334

  4. Energy partitioning schemes: a dilemma.

    PubMed

    Mayer, I

    2007-01-01

    Two closely related energy partitioning schemes, in which the total energy is presented as a sum of atomic and diatomic contributions by using the "atomic decomposition of identity", are compared on the example of N,N-dimethylformamide, a simple but chemically rich molecule. Both schemes account for different intramolecular interactions, for instance they identify the weak C-H...O intramolecular interactions, but give completely different numbers. (The energy decomposition scheme based on the virial theorem is also considered.) The comparison of the two schemes resulted in a dilemma which is especially striking when these schemes are applied for molecules distorted from their equilibrium structures: one either gets numbers which are "on the chemical scale" and have quite appealing values at the equilibrium molecular geometries, but exhibiting a counter-intuitive distance dependence (the two-center energy components increase in absolute value with the increase of the interatomic distances)--or numbers with too large absolute values but "correct" distance behaviour. The problem is connected with the quick decay of the diatomic kinetic energy components. PMID:17328441

  5. Acceleration of neutrons in a scheme of a tautochronous mathematical pendulum (physical principles)

    SciTech Connect

    Rivlin, Lev A

    2010-12-09

    We consider the physical principles of neutron acceleration through a multiple synchronous interaction with a gradient rf magnetic field in a scheme of a tautochronous mathematical pendulum. (laser applications and other aspects of quantum electronics)

  6. Factors affecting sustainability of rural water schemes in Swaziland

    NASA Astrophysics Data System (ADS)

    Peter, Graciana; Nkambule, Sizwe E.

    The Millennium Development Goal (MDG) target to reduce the proportion of people without sustainable access to safe drinking water by the year 2015 has been met as of 2010, but huge disparities exist. Some regions, particularly Sub-Saharan Africa are lagging behind it is also in this region where up to 30% of the rural schemes are not functional at any given time. There is need for more studies on factors affecting sustainability and necessary measures which when implemented will improve the sustainability of rural water schemes. The main objective of this study was to assess the main factors affecting the sustainability of rural water schemes in Swaziland using a Multi-Criteria Analysis Approach. The main factors considered were: financial, social, technical, environmental and institutional. The study was done in Lubombo region. Fifteen functional water schemes in 11 communities were studied. Data was collected using questionnaires, checklist and focused group discussion guide. A total of 174 heads of households were interviewed. Statistical Package for Social Sciences (SPSS) was used to analyse the data and to calculate sustainability scores for water schemes. SPSS was also used to classify sustainability scores according to sustainability categories: sustainable, partially sustainable and non-sustainable. The averages of the ratings for the different sub-factors studied and the results on the sustainability scores for the sustainable, partially sustainable and non-sustainable schemes were then computed and compared to establish the main factors influencing sustainability of the water schemes. The results indicated technical and social factors as most critical while financial and institutional, although important, played a lesser role. Factors which contributed to the sustainability of water schemes were: functionality; design flow; water fetching time; ability to meet additional demand; use by population; equity; participation in decision making on operation and

  7. A design of tamper resistant prescription RFID access control system.

    PubMed

    Chen, Yu-Yi; Huang, Der-Chen; Tsai, Meng-Lin; Jan, Jinn-Ke

    2012-10-01

    In this paper, we propose a tamper resistant prescription RFID access control protocol for different authorized readers. Not only the authentication mechanism but also the access right authorization mechanism is designed in our scheme. Only the specific doctor, usually the patient's doctor, can access the tag. Moreover, some related information of patient's prescription is attached to a RFID tag for tamper resistance. The patients' rights will be guaranteed. PMID:21751015

  8. An intelligent robotics control scheme

    NASA Technical Reports Server (NTRS)

    Orlando, N. E.

    1984-01-01

    The problem of robot control is viewed at the level of communicating high-level commands produced by intelligent algorithms to the actuator/sensor controllers. Four topics are considered in the design of an integrated control and communications scheme for an intelligent robotic system: the use of abstraction spaces, hierarchical versus heterarchical control, distributed processing, and the interleaving of the steps of plan creation and plan execution. A scheme is presented for an n-level distributed hierarchical/heterarchical control system that effectively interleaves intelligent planning, execution, and sensory feedback. A three-level version of this scheme has been successfully implemented in the Intelligent Systems Research Lab at NASA Langley Research Center. This implementation forms the control structure for DAISIE (Distributed Artificially Intelligent System for Interacting with the Environment), a testbed system integrating AI software with robotics hardware.

  9. A Hybrid Nonlinear Control Scheme for Active Magnetic Bearings

    NASA Technical Reports Server (NTRS)

    Xia, F.; Albritton, N. G.; Hung, J. Y.; Nelms, R. M.

    1996-01-01

    A nonlinear control scheme for active magnetic bearings is presented in this work. Magnet winding currents are chosen as control inputs for the electromechanical dynamics, which are linearized using feedback linearization. Then, the desired magnet currents are enforced by sliding mode control design of the electromagnetic dynamics. The overall control scheme is described by a multiple loop block diagram; the approach also falls in the class of nonlinear controls that are collectively known as the 'integrator backstepping' method. Control system hardware and new switching power electronics for implementing the controller are described. Various experiments and simulation results are presented to demonstrate the concepts' potentials.

  10. A quantum access network.

    PubMed

    Fröhlich, Bernd; Dynes, James F; Lucamarini, Marco; Sharpe, Andrew W; Yuan, Zhiliang; Shields, Andrew J

    2013-09-01

    The theoretically proven security of quantum key distribution (QKD) could revolutionize the way in which information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, until now no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we introduce and experimentally demonstrate the concept of a 'quantum access network': based on simple and cost-effective telecommunication technologies, the scheme can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We show that a high-speed single-photon detector positioned at a network node can be shared between up to 64 users for exchanging secret keys with the node, thereby significantly reducing the hardware requirements for each user added to the network. This point-to-multipoint architecture removes one of the main obstacles restricting the widespread application of QKD. It presents a viable method for realizing multi-user QKD networks with efficient use of resources, and brings QKD closer to becoming a widespread technology. PMID:24005413

  11. Consolidating the social health insurance schemes in China: towards an equitable and efficient health system.

    PubMed

    Meng, Qingyue; Fang, Hai; Liu, Xiaoyun; Yuan, Beibei; Xu, Jin

    2015-10-10

    Fragmentation in social health insurance schemes is an important factor for inequitable access to health care and financial protection for people covered by different health insurance schemes in China. To fulfil its commitment of universal health coverage by 2020, the Chinese Government needs to prioritise addressing this issue. After analysing the situation of fragmentation, this Review summarises efforts to consolidate health insurance schemes both in China and internationally. Rural migrants, elderly people, and those with non-communicable diseases in China will greatly benefit from consolidation of the existing health insurance schemes with extended funding pools, thereby narrowing the disparities among health insurance schemes in fund level and benefit package. Political commitments, institutional innovations, and a feasible implementation plan are the major elements needed for success in consolidation. Achievement of universal health coverage in China needs systemic strategies including consolidation of the social health insurance schemes. PMID:26466052

  12. Optimized Handover Schemes over WiMAX

    NASA Astrophysics Data System (ADS)

    Jerjees, Zina; Al-Raweshidy, H. S.; Al-Banna, Zaineb

    Voice Over Internet Protocol (VoIP) applications have received significant interests from the Mobile WiMAX standard in terms of capabilities and means of delivery multimedia services, by providing high bandwidth over long-range transmission. However, one of the main problems of IEEE 802.16 is that it covers multi BS with too many profiled layers, which can lead to potential interoperability problems. The multi BS mode requires multiple BSs to be scanned synchronously before initiating the transmission of broadcast data. In this paper, we first identify the key issues for VoIP over WiMAX. Then we present a MAC Layer solution to guarantee the demanded bandwidth and supporting a higher possible throughput between two WiMAX end points during the handover. Moreover, we propose a PHY and MAC layers scheme to maintain the required communication channel quality for VoIP during handover. Results show that our proposed schemes can significantly improve the network throughput up to 55%, reducing the data dropped to 70% while satisfying VoIP quality requirements.

  13. Access to What? Access, Diversity and Participation in India's Schools. Research Monograph No. 32

    ERIC Educational Resources Information Center

    Juneja, Nalini

    2010-01-01

    India has witnessed substantial diversification of provision to basic education. Policy changes from 1980s onwards, has seen the creation of para-formal delivery systems and the inclusion in the system of non state providers. The Education Guarantee Scheme and the Alternate Initiatives in Education programmes have generated new pathways to access.…

  14. Fundamental Limitations in Advanced LC Schemes

    SciTech Connect

    Mikhailichenko, A. A.

    2010-11-04

    Fundamental limitations in acceleration gradient, emittance, alignment and polarization in acceleration schemes are considered in application for novel schemes of acceleration, including laser-plasma and structure-based schemes. Problems for each method are underlined whenever it is possible. Main attention is paid to the scheme with a tilted laser bunch.

  15. A scheme for symmetrization verification

    NASA Astrophysics Data System (ADS)

    Sancho, Pedro

    2011-08-01

    We propose a scheme for symmetrization verification in two-particle systems, based on one-particle detection and state determination. In contrast to previous proposals, it does not follow a Hong-Ou-Mandel-type approach. Moreover, the technique can be used to generate superposition states of single particles.

  16. Invisibly Sanitizable Digital Signature Scheme

    NASA Astrophysics Data System (ADS)

    Miyazaki, Kunihiko; Hanaoka, Goichiro; Imai, Hideki

    A digital signature does not allow any alteration of the document to which it is attached. Appropriate alteration of some signed documents, however, should be allowed because there are security requirements other than the integrity of the document. In the disclosure of official information, for example, sensitive information such as personal information or national secrets is masked when an official document is sanitized so that its nonsensitive information can be disclosed when it is requested by a citizen. If this disclosure is done digitally by using the current digital signature schemes, the citizen cannot verify the disclosed information because it has been altered to prevent the leakage of sensitive information. The confidentiality of official information is thus incompatible with the integrity of that information, and this is called the digital document sanitizing problem. Conventional solutions such as content extraction signatures and digitally signed document sanitizing schemes with disclosure condition control can either let the sanitizer assign disclosure conditions or hide the number of sanitized portions. The digitally signed document sanitizing scheme we propose here is based on the aggregate signature derived from bilinear maps and can do both. Moreover, the proposed scheme can sanitize a signed document invisibly, that is, no one can distinguish whether the signed document has been sanitized or not.

  17. Geophysical Inversion Through Hierarchical Scheme

    NASA Astrophysics Data System (ADS)

    Furman, A.; Huisman, J. A.

    2010-12-01

    Geophysical investigation is a powerful tool that allows non-invasive and non-destructive mapping of subsurface states and properties. However, non-uniqueness associated with the inversion process prevents the quantitative use of these methods. One major direction researchers are going is constraining the inverse problem by hydrological observations and models. An alternative to the commonly used direct inversion methods are global optimization schemes (such as genetic algorithms and Monte Carlo Markov Chain methods). However, the major limitation here is the desired high resolution of the tomographic image, which leads to a large number of parameters and an unreasonably high computational effort when using global optimization schemes. Two innovative schemes are presented here. First, a hierarchical approach is used to reduce the computational effort for the global optimization. Solution is achieved for coarse spatial resolution, and this solution is used as the starting point for finer scheme. We show that the computational effort is reduced in this way dramatically. Second, we use a direct ERT inversion as the starting point for global optimization. In this case preliminary results show that the outcome is not necessarily beneficial, probably because of spatial mismatch between the results of the direct inversion and the true resistivity field.

  18. Modeling mandatory access control in role-based security systems

    SciTech Connect

    Nyanchama, M.; Osborn, S.

    1996-12-31

    This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic definitions of roles, their application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information context. By handling each of the role contexts as independent security levels of information, we simulate mandatory access by imposing the requirements of mandatory access control. Among the key considerations, we propose a means of taming Trojan horses by imposing acyclic information flow among contexts in role-based protection systems. The acyclic information flows and suitable access rules incorporate secrecy which is an essential component of mandatory access control.

  19. On symmetric and upwind TVD schemes

    NASA Technical Reports Server (NTRS)

    Yee, H. C.

    1985-01-01

    A class of explicit and implicit total variation diminishing (TVD) schemes for the compressible Euler and Navier-Stokes equations was developed. They do not generate spurious oscillations across shocks and contact discontinuities. In general, shocks can be captured within 1 to 2 grid points. For the inviscid case, these schemes are divided into upwind TVD schemes and symmetric (nonupwind) TVD schemes. The upwind TVD scheme is based on the second-order TVD scheme. The symmetric TVD scheme is a generalization of Roe's and Davis' TVD Lax-Wendroff scheme. The performance of these schemes on some viscous and inviscid airfoil steady-state calculations is investigated. The symmetric and upwind TVD schemes are compared.

  20. A provably-secure ECC-based authentication scheme for wireless sensor networks.

    PubMed

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009

  1. A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

    PubMed Central

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009

  2. United States Access Board

    MedlinePlus

    ... disabilities through leadership in accessible design and the development of accessibility guidelines and standards for the built environment, transportation, communication, medical diagnostic equipment, and information technology. ...

  3. A Parameter Estimation Scheme for Multiscale Kalman Smoother (MKS) Algorithm Used in Precipitation Data Fusion

    NASA Technical Reports Server (NTRS)

    Wang, Shugong; Liang, Xu

    2013-01-01

    A new approach is presented in this paper to effectively obtain parameter estimations for the Multiscale Kalman Smoother (MKS) algorithm. This new approach has demonstrated promising potentials in deriving better data products based on data of different spatial scales and precisions. Our new approach employs a multi-objective (MO) parameter estimation scheme (called MO scheme hereafter), rather than using the conventional maximum likelihood scheme (called ML scheme) to estimate the MKS parameters. Unlike the ML scheme, the MO scheme is not simply built on strict statistical assumptions related to prediction errors and observation errors, rather, it directly associates the fused data of multiple scales with multiple objective functions in searching best parameter estimations for MKS through optimization. In the MO scheme, objective functions are defined to facilitate consistency among the fused data at multiscales and the input data at their original scales in terms of spatial patterns and magnitudes. The new approach is evaluated through a Monte Carlo experiment and a series of comparison analyses using synthetic precipitation data. Our results show that the MKS fused precipitation performs better using the MO scheme than that using the ML scheme. Particularly, improvements are significant compared to that using the ML scheme for the fused precipitation associated with fine spatial resolutions. This is mainly due to having more criteria and constraints involved in the MO scheme than those included in the ML scheme. The weakness of the original ML scheme that blindly puts more weights onto the data associated with finer resolutions is overcome in our new approach.

  4. A New Non-Iterative Scheme for Surface Fluxes Parameterization

    NASA Astrophysics Data System (ADS)

    Gao, Z.

    2015-12-01

    In weather or climate models, the earth's surface is the boundary that needs to be resolved physically. The condition of atmosphere aloft (e.g., wind, temperature and humidity) is highly dependent on the momentum, sensible heat and latent heat fluxes at surface. However, parameterization of surface turbulent fluxes under unstably/stably stratified conditions has always been a challenge. Currently, the exchanges of momentum and heat fluxes between the earth's surface and the atmosphere are usually calculated with various schemes based on Monin-Obukhov similarity theory. These schemes either need iterations or suffer low accuracy, which might consume excessive CPU time or could lead to unrealistic simulation results. In this paper, a non-iterative scheme is proposed to approach the classic iterative computation results using multiple regressions.The range -5 ≤ RiB ≤ 2.5, 10 ≤ z/z0m ≤ 105 and -0.5 ≤ ln(z0m/z0h) ≤ 30 is divided into several regions, and in each of the regions, multiple linear regression is performed to obtain non-iterative solutions for surface fluxes. As compared to the other most recent non-iterative schemes, we show that the suggested scheme has the smallest bias. The maximum relative errors of turbulent transfer coefficients for momentum (CM) and sensible heat (CH), as compared to those obtained from the classic iterative method, are always smaller than 2% in unstable condition and 12% in stable condition from our new non-iterative scheme.

  5. Multiple Sclerosis

    MedlinePlus

    Multiple sclerosis (MS) is a nervous system disease that affects your brain and spinal cord. It damages the ... attacks healthy cells in your body by mistake. Multiple sclerosis affects women more than men. It often begins ...

  6. Multiple Pregnancy

    MedlinePlus

    ... is called multiple pregnancy . If more than one egg is released during the menstrual cycle and each ... fraternal twins (or more). When a single fertilized egg splits, it results in multiple identical embryos. This ...

  7. Multiple myeloma

    MedlinePlus

    Plasma cell dyscrasia; Plasma cell myeloma; Malignant plasmacytoma; Plasmacytoma of bone; Myeloma - multiple ... Multiple myeloma most commonly causes: Low red blood cell count ( anemia ), which can lead to fatigue and ...

  8. BLE protection scheme for light-trail WDM mesh networks

    NASA Astrophysics Data System (ADS)

    Xing, Junwei; Wang, Hongxiang; Ji, Yuefeng

    2007-11-01

    Light-trail is a solution to providing high resource utilization and sub-wavelength support [1]. A light-trail is a multi-point light-path, such that multiple users can take part in communication along the trail, through time (differentiated) non-overlapping connections. This multi-point flow model leads to a new set of problems in the area of protecting and restoring light-trail based networks. Conventional link protection which just protects the existed connection in the light-trail at the time of the failure is not sufficient for light-trails because of the potential of having multiple possible source-destination pairs in the same trail over time. The fact is demonstrated and explained detailedly in [4]. In this paper, a novel protection mechanism is proposed for light-trail WDM mesh network, which is Backup Light-trail Expending scheme. Subsequently the performance of this scheme is evaluated and compared to conventional Connection Dedicated Protection Scheme. Numerical results obtained by simulation indicate that, Backup Light-trail Expending Scheme has a faster restoration time and better wavelength utilization.

  9. Finger Multiplication

    ERIC Educational Resources Information Center

    Simanihuruk, Mudin

    2011-01-01

    Multiplication facts are difficult to teach. Therefore many researchers have put a great deal of effort into finding multiplication strategies. Sherin and Fuson (2005) provided a good survey paper on the multiplication strategies research area. Kolpas (2002), Rendtorff (1908), Dabell (2001), Musser (1966) and Markarian (2009) proposed the finger…

  10. Multiple Sclerosis

    MedlinePlus

    ... Awards Enhancing Diversity Find People About NINDS NINDS Multiple Sclerosis Information Page Condensed from Multiple Sclerosis: Hope Through ... en Español Additional resources from MedlinePlus What is Multiple Sclerosis? An unpredictable disease of the central nervous system, ...

  11. Stable maps and Quot schemes

    NASA Astrophysics Data System (ADS)

    Popa, Mihnea; Roth, Mike

    2003-06-01

    In this paper we study the relationship between two different compactifications of the space of vector bundle quotients of an arbitrary vector bundle on a curve. One is Grothendieck's Quot scheme, while the other is a moduli space of stable maps to the relative Grassmannian. We establish an essentially optimal upper bound on the dimension of the two compactifications. Based on that, we prove that for an arbitrary vector bundle, the Quot schemes of quotients of large degree are irreducible and generically smooth. We precisely describe all the vector bundles for which the same thing holds in the case of the moduli spaces of stable maps. We show that there are in general no natural morphisms between the two compactifications. Finally, as an application, we obtain new cases of a conjecture on effective base point freeness for pluritheta linear series on moduli spaces of vector bundles.

  12. Multi-area layered multicast scheme for MPLS networks

    NASA Astrophysics Data System (ADS)

    Ma, Yajie; Yang, Zongkai; Wang, Yuming; Chen, Jingwen

    2005-02-01

    Multi-protocol label switching (MPLS) is multiprotocols both at layer 2 and layer 3. It is suggested to overcome the shortcomings of performing complex longest prefix matching in layer 3 routing by using short, fixed length labels. The MPLS community has put more effort into the label switching of unicast IP traffic, but less in the MPLS multicast mechanism. The reasons are the higher label consumption, the dynamical mapping of L3 multicast tree to L2 LSPs and the 20-bit shim header which is much fewer than the IPv4 IP header. On the other hand, heterogeneity of node capability degrades total performance of a multicast group. In order to achieve the scalability as well as the heterogeneity in MPLS networks, a novel scheme of MPLS-based Multi-area Layered Multicast Scheme (MALM) is proposed. Unlike the existing schemes which focus on aggregating the multicast stream, we construct the multicast tree based on the virtual topology aggregation. The MPLS area is divided into different sub-areas to form the hierarchical virtual topology and the multicast group is reconstructed into multiple layers according to the node capability. At the same time, the label stack is used to save the label space. For stability of the MALM protocol, a multi-layer protection scheme is also discussed. The experiment results show that the proposed scheme saves label space and decrease the Multicast Forwarding Table in much degree.

  13. A concatenated coded modulation scheme for error control (addition 2)

    NASA Technical Reports Server (NTRS)

    Lin, Shu

    1988-01-01

    A concatenated coded modulation scheme for error control in data communications is described. The scheme is achieved by concatenating a Reed-Solomon outer code and a bandwidth efficient block inner code for M-ary PSK modulation. Error performance of the scheme is analyzed for an AWGN channel. It is shown that extremely high reliability can be attained by using a simple M-ary PSK modulation inner code and a relatively powerful Reed-Solomon outer code. Furthermore, if an inner code of high effective rate is used, the bandwidth expansion required by the scheme due to coding will be greatly reduced. The proposed scheme is particularly effective for high-speed satellite communications for large file transfer where high reliability is required. This paper also presents a simple method for constructing block codes for M-ary PSK modulation. Some short M-ary PSK codes with good minimum squared Euclidean distance are constructed. These codes have trellis structure and hence can be decoded with a soft-decision Viterbi decoding algorithm. Furthermore, some of these codes are phase invariant under multiples of 45 deg rotation.

  14. A concatenated coded modulation scheme for error control

    NASA Technical Reports Server (NTRS)

    Lin, Shu

    1988-01-01

    A concatenated coded modulation scheme for error control in data communications is presented. The scheme is achieved by concatenating a Reed-Solomon outer code and a bandwidth efficient block inner code for M-ary PSK modulation. Error performance of the scheme is analyzed for an AWGN channel. It is shown that extremely high reliability can be attained by using a simple M-ary PSK modulation inner code and a relatively powerful Reed-Solomon outer code. Furthermore, if an inner code of high effective rate is used, the bandwidth expansion required by the scheme due to coding will be greatly reduced. The proposed scheme is very effective for high speed satellite communications for large file transfer where high reliability is required. A simple method is also presented for constructing codes for M-ary PSK modulation. Some short M-ary PSK codes with good minimum squared Euclidean distance are constructed. These codes have trellis structure and hence can be decoded with a soft decision Viterbi decoding algorithm. Furthermore, some of these codes are phase invariant under multiples of 45 deg rotation.

  15. A Theory of Access

    ERIC Educational Resources Information Center

    Ribot, Jesse C.; Peluso, Nancy Lee

    2003-01-01

    The term "access" is frequently used by property and natural resource analysts without adequate definition. In this paper we develop a concept of access and examine a broad set of factors that differentiate access from property. We define access as "the "ability" to derive benefits from things," broadening from property's classical definition as…

  16. Multiplicity Counting

    SciTech Connect

    Geist, William H.

    2015-12-01

    This set of slides begins by giving background and a review of neutron counting; three attributes of a verification item are discussed: 240Pueff mass; α, the ratio of (α,n) neutrons to spontaneous fission neutrons; and leakage multiplication. It then takes up neutron detector systems – theory & concepts (coincidence counting, moderation, die-away time); detector systems – some important details (deadtime, corrections); introduction to multiplicity counting; multiplicity electronics and example distributions; singles, doubles, and triples from measured multiplicity distributions; and the point model: multiplicity mathematics.

  17. A biometric signcryption scheme without bilinear pairing

    NASA Astrophysics Data System (ADS)

    Wang, Mingwen; Ren, Zhiyuan; Cai, Jun; Zheng, Wentao

    2013-03-01

    How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis's fuzzy extractor method and Liu's original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.

  18. Efficient Management of Multiple Piconets in an MC-CDMA-Based UWB System

    NASA Astrophysics Data System (ADS)

    Gong, Peng; Xue, Peng; Piao, Cheng Jie; Kim, Duk Kyung

    With multiple overlapped piconets, the IEEE 802.15.3 Medium Access Control (MAC) protocol uses a Parent/Child (P/C) or Parent/Neighbor (P/N) configuration to avoid inter-piconet interference. However, the throughput of a P/N or P/C configuration cannot exceed that of a single piconet. In the present paper we propose an efficient means of managing multiple piconets to cooperate with a Multi-Carrier Code Division Multiple Access (MC-CDMA) based UWB system. The proposed management approach uses an Intermediate Device (IDEV) to connect Piconet Coordinators (PNCs). A senior PNC adaptively arranges two simultaneous data transmission links with the proposed spreading matrices in each Channel Time Allocation (CTA) instead of a P/C or P/N configuration, which supports only a single link in each CTA. Simulation results demonstrate the proposed scheme can achieve a higher throughput with an acceptable compromise of link success probability in multiple overlapped piconets.

  19. A user anonymity preserving three-factor authentication scheme for telecare medicine information systems.

    PubMed

    Tan, Zuowen

    2014-03-01

    The telecare medicine information system enables the patients gain health monitoring at home and access medical services over internet or mobile networks. In recent years, the schemes based on cryptography have been proposed to address the security and privacy issues in the telecare medicine information systems. However, many schemes are insecure or they have low efficiency. Recently, Awasthi and Srivastava proposed a three-factor authentication scheme for telecare medicine information systems. In this paper, we show that their scheme is vulnerable to the reflection attacks. Furthermore, it fails to provide three-factor security and the user anonymity. We propose a new three-factor authentication scheme for the telecare medicine information systems. Detailed analysis demonstrates that the proposed scheme provides mutual authentication, server not knowing password and freedom of password, biometric update and three-factor security. Moreover, the new scheme provides the user anonymity. As compared with the previous three-factor authentication schemes, the proposed scheme is more secure and practical. PMID:24643750

  20. Multiple trellis coded modulation

    NASA Technical Reports Server (NTRS)

    Simon, Marvin K. (Inventor); Divsalar, Dariush (Inventor)

    1990-01-01

    A technique for designing trellis codes to minimize bit error performance for a fading channel. The invention provides a criteria which may be used in the design of such codes which is significantly different from that used for average white Gaussian noise channels. The method of multiple trellis coded modulation of the present invention comprises the steps of: (a) coding b bits of input data into s intermediate outputs; (b) grouping said s intermediate outputs into k groups of s.sub.i intermediate outputs each where the summation of all s.sub.i,s is equal to s and k is equal to at least 2; (c) mapping each of said k groups of intermediate outputs into one of a plurality of symbols in accordance with a plurality of modulation schemes, one for each group such that the first group is mapped in accordance with a first modulation scheme and the second group is mapped in accordance with a second modulation scheme; and (d) outputting each of said symbols to provide k output symbols for each b bits of input data.

  1. Bounds on the information rate of quantum-secret-sharing schemes

    SciTech Connect

    Sarvepalli, Pradeep

    2011-04-15

    An important metric of the performance of a quantum-secret-sharing scheme is its information rate. Beyond the fact that the information rate is upper-bounded by one, very little is known in terms of bounds on the information rate of quantum-secret-sharing schemes. Furthermore, not every scheme can be realized with rate one. In this paper we derive upper bounds for the information rates of quantum-secret-sharing schemes. We show that there exist quantum access structures on n players for which the information rate cannot be better than O((log{sub 2}n)/n). These results are the quantum analogues of the bounds for classical-secret-sharing schemes proved by Csirmaz.

  2. World Wide Access: Accessible Web Design.

    ERIC Educational Resources Information Center

    Washington Univ., Seattle.

    This brief paper considers the application of "universal design" principles to Web page design in order to increase accessibility for people with disabilities. Suggestions are based on the World Wide Web Consortium's accessibility initiative, which has proposed guidelines for all Web authors and federal government standards. Seven guidelines for…

  3. Enhanced Hydrogen Production from DNA-Assembled Z-Scheme TiO2-CdS Photocatalyst Systems.

    PubMed

    Ma, Ke; Yehezkeli, Omer; Domaille, Dylan W; Funke, Hans H; Cha, Jennifer N

    2015-09-21

    A wide range of inorganic nanostructures have been used as photocatalysts for generating H2. To increase activity, Z-scheme photocatalytic systems have been implemented that use multiple types of photoactive materials and electron mediators. Optimal catalysis has previously been obtained by interfacing different materials through aggregation or epitaxial nucleation, all of which lowers the accessible active surface area. DNA has now been used as a structure-directing agent to organize TiO2 and CdS nanocrystals. A significant increase in H2 production compared to CdS or TiO2 alone was thus observed directly in solution with no sacrificial donors or applied bias. The inclusion of benzoquinone (BQ) equidistant between the TiO2 and CdS through DNA assembly further increased H2 production. While the use of a second quinone in conjunction with BQ showed no more improvement, its location within the Z-scheme was found to strongly influence catalysis. PMID:26136433

  4. EFFICIENCY PROBLEMS RELATED TO PERMANGANATE OXIDATION SCHEMES

    EPA Science Inventory

    Oxidation schemes for the in-situ destruction of chlorinated solvents, using potassium permanganate, are receiving considerable attention. Indication from field studies and from our own work are that permanganate oxidation schemes have inherent problems that could severely limit...

  5. Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems.

    PubMed

    Jiang, Qi; Ma, Jianfeng; Lu, Xiang; Tian, Youliang

    2014-02-01

    To ensure only authorized access to medical services, several authentication schemes for telecare medicine information systems (TMIS) have been proposed in the literature. Due to its better performance than traditional cryptography, Hao et al. proposed an authentication scheme for TMIS using chaotic map based cryptography. They claimed that their scheme could resist various attacks, including the smart card stolen attack. However, we identify that their scheme is vulnerable to the stolen smart card attack. The reason causing the stolen smart card attack is that the scheme is designed based on the assumption that the scheme itself achieves user untraceability. Then, we propose a robust authentication and key agreement scheme. Compared with the previous schemes, our scheme not only enjoys more security features, but also has better efficiency. Our analysis indicates that designing a two-factor authentication scheme based on the assumption that privacy protection is achieved in the scheme itself may pose potential security risks. The lesson learned is that, we should avoid this situation in the future design of two-factor authentication schemes. PMID:24493073

  6. BJPsych Bulletin author mentoring scheme - helping trainees become published authors.

    PubMed

    Pimm, Jonathan; Galbraith, Niall

    2016-02-01

    The publishing world is changing rapidly. Innovations include the move to open access, the rise of social media and the transition to digitalisation. In the light of these developments and with ever-increasing pressures on early career psychiatrists and trainees to publish papers in journals with a recognised pedigree, the BJPsych Bulletin is piloting an author mentoring scheme. Mentors will help clinicians and aspiring academics develop articles from a pedestrian manuscript to one that will hopefully provoke important debate and aid changes in current practices. The scheme will run on a trial basis for approximately 12 months and will then be reviewed. Mentoring has been found to have an important effect of research output including publication and grant success; the hope is that this new initiative at the BJPsych Bulletin will result in such dividends to all involved. PMID:26958356

  7. Multiobjective hyper heuristic scheme for system design and optimization

    NASA Astrophysics Data System (ADS)

    Rafique, Amer Farhan

    2012-11-01

    As system design is becoming more and more multifaceted, integrated, and complex, the traditional single objective optimization trends of optimal design are becoming less and less efficient and effective. Single objective optimization methods present a unique optimal solution whereas multiobjective methods present pareto front. The foremost intent is to predict a reasonable distributed pareto-optimal solution set independent of the problem instance through multiobjective scheme. Other objective of application of intended approach is to improve the worthiness of outputs of the complex engineering system design process at the conceptual design phase. The process is automated in order to provide the system designer with the leverage of the possibility of studying and analyzing a large multiple of possible solutions in a short time. This article presents Multiobjective Hyper Heuristic Optimization Scheme based on low level meta-heuristics developed for the application in engineering system design. Herein, we present a stochastic function to manage meta-heuristics (low-level) to augment surety of global optimum solution. Generic Algorithm, Simulated Annealing and Swarm Intelligence are used as low-level meta-heuristics in this study. Performance of the proposed scheme is investigated through a comprehensive empirical analysis yielding acceptable results. One of the primary motives for performing multiobjective optimization is that the current engineering systems require simultaneous optimization of conflicting and multiple. Random decision making makes the implementation of this scheme attractive and easy. Injecting feasible solutions significantly alters the search direction and also adds diversity of population resulting in accomplishment of pre-defined goals set in the proposed scheme.

  8. The DIII-D ECH multiple gyrotron control system

    SciTech Connect

    Ponce, D.; Lohr, J.; Tooker, J.F.; Cary, W.P.; Harris, T.E.

    1997-11-01

    DIII-D`s ECH upgrade with 1 MW, 110 GHz gyrotrons is ongoing, and with it, an upgrade of the control system. The ECH Multiple Gyrotron Control System uses software distributed among networked computers, interfaced to a programmable logic controller (PLC), the timing and pulse system, power supplies, vacuum and wave guide controls, and instrumentation. During DIII-D operations, the system will allow a chief and a co-operator to control and monitor a number of gyrotrons from different manufacturers. The software, written using LabVIEW, allows for remote and multiple operator control. Thus any supported computer can become a control station and multiple projects can be simultaneously accommodated. Each operator can be given access to the controls of all gyrotrons or to a subset of controls. Status information is also remotely available. The use of a PLC simplifies the hardware and software design. It reduces interlock and control circuitry, includes monitoring for slow analog signals, and allows one software driver to efficiently interface to a number of systems. In addition, the interlock logic can be easily changed and control points can be forced as needed. The pulse system is designed around arbitrary function generators. Various modulation schemes can be accommodated, including real-time control of the modulation. This discussion will include the hardware and software design of the control system and its current implementation.

  9. Pay scheme preferences and health policy objectives.

    PubMed

    Abelsen, Birgit

    2011-04-01

    This paper studies the preferences among healthcare workers towards pay schemes involving different levels of risk. It identifies which pay scheme individuals would prefer for themselves, and which they think is best in furthering health policy objectives. The paper adds, methodologically, a way of defining pay schemes that include different levels of risk. A questionnaire was mailed to a random sample of 1111 dentists. Respondents provided information about their current and preferred pay schemes, and indicated which pay scheme, in their opinion, would best further overall health policy objectives. A total of 504 dentists (45%) returned the questionnaire, and there was no indication of systematic non-response bias. All public dentists had a current pay scheme based on a fixed salary and the majority of individuals preferred a pay scheme with more income risk. Their preferred pay schemes coincided with the ones believed to further stabilise healthcare personnel. The predominant current pay scheme among private dentists was based solely on individual output, and the majority of respondents preferred this pay scheme. In addition, their preferred pay schemes coincided with the ones believed to further efficiency objectives. Both public and private dentists believed that pay schemes, furthering efficiency objectives, had to include more performance-related pay than the ones believed to further stability and quality objectives. PMID:20565995

  10. Quantum Signature Scheme with Weak Arbitrator

    NASA Astrophysics Data System (ADS)

    Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian

    2012-07-01

    In this paper, we propose one quantum signature scheme with a weak arbitrator to sign classical messages. This scheme can preserve the merits in the original arbitrated scheme with some entanglement resources, and provide a higher efficiency in transmission and reduction the complexity of implementation. The arbitrator is costless and only involved in the disagreement case.

  11. Efficient Multi Secret Sharing with Generalized Access Structures

    NASA Astrophysics Data System (ADS)

    VP, Binu; A, Sreekumar

    2014-03-01

    Multi-secret sharing is an extension of secret sharing technique where several secrets are shared between the participants, each according to a specified access structure. The secrets can be reconstructed according to the access structure by participants using their private shares.Each participant has to hold a single share, additional information are made available in a public bulletin board.The scheme is computationally efficient and also each participant can verify the shares of the other participants and also the reconstructed secret.The scheme does not need any secure channel also.

  12. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    NASA Technical Reports Server (NTRS)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  13. Multiple-Replica Strategies for Free-Energy Calculations in NAMD: Multiple-Walker Adaptive Biasing Force and Walker Selection Rules.

    PubMed

    Comer, Jeffrey; Phillips, James C; Schulten, Klaus; Chipot, Christophe

    2014-12-01

    From the most powerful supercomputers to multicore desktops and laptops, parallel computing architectures have been in the mainstream for some time. However, numerical schemes for calculating free energies in molecular systems that directly leverage this hardware paradigm, usually taking the form of multiple-replica strategies, are just now on the cusp of becoming standard practice. Here, we present a modification of the popular molecular dynamics program NAMD that is envisioned to facilitate the use of powerful multiple-replica strategies to improve ergodic sampling for a specific class of free-energy methods known as adaptive biasing force. We describe the software implementation in a so-called multiple-walker context, alongside the interface that makes the proposed approach accessible to the end users. We further evaluate the performance of the adaptive biasing force multiple-walker strategy for a model system, namely, the reversible folding of a short peptide, and show, in particular, in regions of the transition coordinate where convergence of the free-energy calculation is encumbered by hidden barriers, that the multiple-walker strategy can yield far more reliable results in appreciably less real time on parallel architectures, relative to standard, single-replica calculations. PMID:26583211

  14. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks. PMID:25666924

  15. Optical induction scheme for assembling nondiffracting aperiodic Vogel spirals

    SciTech Connect

    Diebel, Falko Rose, Patrick; Boguslawski, Martin; Denz, Cornelia

    2014-05-12

    We introduce an experimental approach to realize aperiodic photonic lattices based on multiplexing of nondiffracting Bessel beams. This holographic optical induction scheme takes advantage of the well localized Bessel beam as a basis to assemble two-dimensional photonic lattices. We present the realization of an optically induced two-dimensional golden-angle Vogel spiral lattice, which belongs to the family of deterministic aperiodic structures. With our technique, a very broad class of photonic refractive index landscapes now becomes accessible to optical induction, which could not be realized with established distributed holographic techniques.

  16. Optical induction scheme for assembling nondiffracting aperiodic Vogel spirals

    NASA Astrophysics Data System (ADS)

    Diebel, Falko; Rose, Patrick; Boguslawski, Martin; Denz, Cornelia

    2014-05-01

    We introduce an experimental approach to realize aperiodic photonic lattices based on multiplexing of nondiffracting Bessel beams. This holographic optical induction scheme takes advantage of the well localized Bessel beam as a basis to assemble two-dimensional photonic lattices. We present the realization of an optically induced two-dimensional golden-angle Vogel spiral lattice, which belongs to the family of deterministic aperiodic structures. With our technique, a very broad class of photonic refractive index landscapes now becomes accessible to optical induction, which could not be realized with established distributed holographic techniques.

  17. A dynamic bandwidth allocation scheme for EPON

    NASA Astrophysics Data System (ADS)

    Li, Xiuyuan; Wu, Xiaojuan; Ma, Maode; Li, Wenming; Zhang, Yuanyuan

    2008-11-01

    This paper analyses current bandwidth schemes and proposes a novel dynamic bandwidth allocation scheme for EPON. According the scheme, we define four kinds of multimedia services such as Unsolicited Request Service (URS), Realtime Service (rt-S), Non-Real-time Service (nrt-S) and Best Effort (BE). Different kinds of services have different Quality of Service (QoS) requirements. Our scheme considers the diverse QoS request, e.g., delay for rt-S, throughput for nrt-S and fairness for BE. The simulation results show this novel scheme can ensure the quality of service (QoS) and improve bandwidth utilization.

  18. Research of Ad Hoc Networks Access Algorithm

    NASA Astrophysics Data System (ADS)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  19. Hemodialysis access procedures

    MedlinePlus

    National Kidney and Urologic Diseases Information Clearinghouse. Vascular Access for Hemodialysis . Updated July 23, 2014. Available at: kidney.niddk.nih.gov/kudiseases/pubs/vascularaccess/index.aspx. Accessed: February 9, 2015. ...

  20. High-Order Energy Stable WENO Schemes

    NASA Technical Reports Server (NTRS)

    Yamaleev, Nail K.; Carpenter, Mark H.

    2008-01-01

    A new third-order Energy Stable Weighted Essentially NonOscillatory (ESWENO) finite difference scheme for scalar and vector linear hyperbolic equations with piecewise continuous initial conditions is developed. The new scheme is proven to be stable in the energy norm for both continuous and discontinuous solutions. In contrast to the existing high-resolution shock-capturing schemes, no assumption that the reconstruction should be total variation bounded (TVB) is explicitly required to prove stability of the new scheme. A rigorous truncation error analysis is presented showing that the accuracy of the 3rd-order ESWENO scheme is drastically improved if the tuning parameters of the weight functions satisfy certain criteria. Numerical results show that the new ESWENO scheme is stable and significantly outperforms the conventional third-order WENO finite difference scheme of Jiang and Shu in terms of accuracy, while providing essentially nonoscillatory solutions near strong discontinuities.

  1. [Accessible Rural Housing.

    ERIC Educational Resources Information Center

    Baker, Nick, Ed.

    1995-01-01

    This issue of the quarterly newsletter "Rural Exchange" provides information and resources on accessible rural housing for the disabled. "Accessible Manufactured Housing Could Increase Rural Home Supply" (Nick Baker) suggests that incorporation of access features such as lever door handles and no-step entries into manufactured housing could help…

  2. Open Access Alternatives

    ERIC Educational Resources Information Center

    Tenopir, Carol

    2004-01-01

    Open access publishing is a hot topic today. But open access publishing can have many different definitions, and pros and cons vary with the definitions. Open access publishing is especially attractive to companies and small colleges or universities that are likely to have many more readers than authors. A downside is that a membership fee sounds…

  3. Demystifying Remote Access

    ERIC Educational Resources Information Center

    Howe, Grant

    2009-01-01

    With money tight, more and more districts are considering remote access as a way to reduce expenses and budget information technology costs more effectively. Remote access allows staff members to work with a hosted software application from any school campus without being tied to a specific physical location. Each school can access critical…

  4. Open Access and beyond.

    PubMed

    Mathur, Shawn; Schmidt, Christian; Das, Chhaya; Tucker, Philip W

    2006-01-01

    Uncensored exchange of scientific results hastens progress. Open Access does not stop at the removal of price and permission barriers; still, censorship and reading disabilities, to name a few, hamper access to information. Here, we invite the scientific community and the public to discuss new methods to distribute, store and manage literature in order to achieve unfettered access to literature. PMID:16956402

  5. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  6. On the fly all-optical packet switching based on hybrid WDM/OCDMA labeling scheme

    NASA Astrophysics Data System (ADS)

    Brahmi, Houssem; Giannoulis, Giannis; Menif, Mourad; Katopodis, Vasilis; Kalavrouziotis, Dimitrios; Kouloumentas, Christos; Groumas, Panos; Kanakis, Giannis; Stamatiadis, Christos; Avramopoulos, Hercules; Erasme, Didier

    2014-02-01

    We introduce a novel design of an all-optical packet routing node that allows for the selection and forwarding of optical packets based on the routing information contained in hybrid wavelength division multiplexing/optical code division multiple access (WDM/OCDMA) labels. A stripping paradigm of optical code-label is adopted. The router is built around an optical-code gate that consists in an optical flip-flop controlled by two fiber Bragg grating correlators and is combined with a Mach-Zehnder interferometer (MZI)-based forwarding gate. We experimentally verify the proof-of-principle operation of the proposed self-routing node under NRZ and OCDMA packet traffic conditions. The successful switching of elastic NRZ payload at 40 Gb/s controlled by DS-OCDMA coded labels and the forwarding operation of encoded data using EQC codes are presented. Proper auto-correlation functions are obtained with higher than 8.1 dB contrast ratio, suitable to efficiently trigger the latching device with a contrast ratio of 11.6 dB and switching times below 3.8 ns. Error-free operation is achieved with 1.5 dB penalty for 40 Gb/s NRZ data and with 2.1 dB penalty for DS-OCDMA packets. The scheme can further be applied to large-scale optical packet switching networks by exploiting efficient optical coders allocated at different WDM channels.

  7. Multiple Myeloma Treatment (Beyond the Basics)

    MedlinePlus

    ... the Licensed Materials from any location via the Internet. b. STANDALONE WORKSTATION: A standalone subscription permits multiple ... computer. A Standalone Workstation license does not include Internet access to the Licensed Materials. c. INSTITUTIONAL SUBSCRIPTION: ...

  8. An improved scheme for classifying susceptibility to preferential flow

    NASA Astrophysics Data System (ADS)

    Moeys, Julien; Koestel, John; Hollis, John M.; Jarvis, Nicholas J.

    2010-05-01

    The ability to reliably predict the occurrence and strength of preferential flow in different soils and land use systems would be of great benefit in environmental planning and management at multiple spatial scales, from field to catchments and regions. We recently proposed a simple classification scheme for predicting the susceptibility of soil horizons and pedons to macropore flow, designed to support predictive modelling (Jarvis N.J. et al., 2009. A conceptual model of soil susceptibility to macropore flow. Vadose Zone Journal, 8: 902-910). The scheme, which takes the form of a decision tree, was successfully validated against a small dataset of solute transport experiments. However, in its present form, it is strongly biased toward European agricultural soils, since it was developed to support pesticide risk assessment in the EU. In this poster, we propose an improved version of the classification scheme, which is much broader in scope, with relevance for a much wider range of soils worldwide, including those with clay mineralogies that limit the development of soil macro-structure and restrict macropore flow (e.g. Ferralsols and Andosols). The new scheme is tested in a literature meta-analysis exercise, making use of the temporal moments of solute breakthrough curves derived from fits of the mobile / immobile model to steady-state experiments on short laboratory columns.

  9. Efficient implementation of weighted ENO schemes

    NASA Technical Reports Server (NTRS)

    Jiang, Guang-Shan; Shu, Chi-Wang

    1995-01-01

    In this paper, we further analyze, test, modify and improve the high order WENO (weighted essentially non-oscillatory) finite difference schemes of Liu, Osher and Chan. It was shown by Liu et al. that WENO schemes constructed from the r-th order (in L1 norm) ENO schemes are (r+1)-th order accurate. We propose a new way of measuring the smoothness of a numerical solution, emulating the idea of minimizing the total variation of the approximation, which results in a 5-th order WENO scheme for the case r = 3, instead of the 4-th order with the original smoothness measurement by Liu et al. This 5-th order WENO scheme is as fast as the 4-th order WENO scheme of Liu et al., and both schemes are about twice as fast as the 4-th order ENO schemes on vector supercomputers and as fast on serial and parallel computers. For Euler systems of gas dynamics, we suggest computing the weights from pressure and entropy instead of the characteristic values to simplify the costly characteristic procedure. The resulting WENO schemes are about twice as fast as the WENO schemes using the characteristic decompositions to compute weights, and work well for problems which do not contain strong shocks or strong reflected waves. We also prove that, for conservation laws with smooth solutions, all WENO schemes are convergent. Many numerical tests, including the 1D steady state nozzle flow problem and 2D shock entropy wave interaction problem, are presented to demonstrate the remarkable capability of the WENO schemes, especially the WENO scheme using the new smoothness measurement, in resolving complicated shock and flow structures. We have also applied Yang's artificial compression method to the WENO schemes to sharpen contact discontinuities.

  10. Shortwave radiation parameterization scheme for subgrid topography

    NASA Astrophysics Data System (ADS)

    Helbig, N.; LöWe, H.

    2012-02-01

    Topography is well known to alter the shortwave radiation balance at the surface. A detailed radiation balance is therefore required in mountainous terrain. In order to maintain the computational performance of large-scale models while at the same time increasing grid resolutions, subgrid parameterizations are gaining more importance. A complete radiation parameterization scheme for subgrid topography accounting for shading, limited sky view, and terrain reflections is presented. Each radiative flux is parameterized individually as a function of sky view factor, slope and sun elevation angle, and albedo. We validated the parameterization with domain-averaged values computed from a distributed radiation model which includes a detailed shortwave radiation balance. Furthermore, we quantify the individual topographic impacts on the shortwave radiation balance. Rather than using a limited set of real topographies we used a large ensemble of simulated topographies with a wide range of typical terrain characteristics to study all topographic influences on the radiation balance. To this end slopes and partial derivatives of seven real topographies from Switzerland and the United States were analyzed and Gaussian statistics were found to best approximate real topographies. Parameterized direct beam radiation presented previously compared well with modeled values over the entire range of slope angles. The approximation of multiple, anisotropic terrain reflections with single, isotropic terrain reflections was confirmed as long as domain-averaged values are considered. The validation of all parameterized radiative fluxes showed that it is indeed not necessary to compute subgrid fluxes in order to account for all topographic influences in large grid sizes.

  11. A multipath video delivery scheme over diffserv wireless LANs

    NASA Astrophysics Data System (ADS)

    Man, Hong; Li, Yang

    2004-01-01

    This paper presents a joint source coding and networking scheme for video delivery over ad hoc wireless local area networks. The objective is to improve the end-to-end video quality with the constraint of the physical network. The proposed video transport scheme effectively integrates several networking components including load-aware multipath routing, class based queuing (CBQ), and scalable (or layered) video source coding techniques. A typical progressive video coder, 3D-SPIHT, is used to generate multi-layer source data streams. The coded bitstreams are then segmented into multiple sub-streams, each with a different level of importance towards the final video reconstruction. The underlay wireless ad hoc network is designed to support service differentiation. A contention sensitive load aware routing (CSLAR) protocol is proposed. The approach is to discover multiple routes between the source and the destination, and label each route with a load value which indicates its quality of service (QoS) characteristics. The video sub-streams will be distributed among these paths according to their QoS priority. CBQ is also applied to all intermediate nodes, which gives preference to important sub-streams. Through this approach, the scalable source coding techniques are incorporated with differentiated service (DiffServ) networking techniques so that the overall system performance is effectively improved. Simulations have been conducted on the network simulator (ns-2). Both network layer performance and application layer performance are evaluated. Significant improvements over traditional ad hoc wireless network transport schemes have been observed.

  12. Aspects of the Problems of Bibliographic Access to University Library Collections.

    ERIC Educational Resources Information Center

    Aguolu, C. C.

    1979-01-01

    Problems of providing bibliographic access to university library-based information sources are discussed with focus upon bibliographies, card and union catalogs, and library classification schemes. (Author/MBR)

  13. Autonomous Throughput Improvement Scheme Using Machine Learning Algorithms for Heterogeneous Wireless Networks Aggregation

    NASA Astrophysics Data System (ADS)

    Kon, Yohsuke; Hashiguchi, Kazuki; Ito, Masato; Hasegawa, Mikio; Ishizu, Kentaro; Murakami, Homare; Harada, Hiroshi

    It is important to optimize aggregation schemes for heterogeneous wireless networks for maximizing communication throughput utilizing any available radio access networks. In the heterogeneous networks, differences of the quality of service (QoS), such as throughput, delay and packet loss rate, of the networks makes difficult to maximize the aggregation throughput. In this paper, we firstly analyze influences of such differences in QoS to the aggregation throughput, and show that it is possible to improve the throughput by adjusting the parameters of an aggregation system. Since manual parameter optimization is difficult and takes much time, we propose an autonomous parameter tuning scheme using a machine learning algorithm for the heterogeneous wireless network aggregation. We implement the proposed scheme on a heterogeneous cognitive radio network system. The results on our experimental network with network emulators show that the proposed scheme can improve the aggregation throughput better than the conventional schemes. We also evaluate the performance using public wireless network services, such as HSDPA, WiMAX and W-CDMA, and verify that the proposed scheme can improve the aggregation throughput by iterating the learning cycle even for the public wireless networks. Our experimental results show that the proposed scheme achieves twice better aggregation throughput than the conventional schemes.

  14. Cryptanalysis and improvement of 'A privacy enhanced scheme for telecare medical information systems'.

    PubMed

    Kumari, Saru; Khan, Muhammad Khurram; Kumar, Rahul

    2013-08-01

    To ensure reliable telecare services some user authentication schemes for telecare medical information system (TMIS) have been presented in literature. These schemes are proposed with intent to regulate only authorized access to medical services so that medical information can be protected from misuse. Very recently Jiang et al. proposed a user authentication scheme for TMIS which they claimed to provide enhanced privacy. They made use of symmetric encryption/decryption with cipher block chaining mode (CBC) to achieve the claimed user privacy. Their scheme provides features like user anonymity and user un-traceability unlike its preceding schemes on which it is built. Unluckily, authors overlook some important aspects in designing their scheme due to which it falls short to resist user impersonation attack, guessing attacks and denial of service attack. Besides, its password change phase is not secure; air message confidentiality is at risk and also has some other drawbacks. Therefore, we propose an improved scheme free from problems observed in Jiang et al.'s scheme and more suitable for TMIS. PMID:23689993

  15. A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Wen, Fengtong

    2013-12-01

    User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic. PMID:24146334

  16. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    PubMed

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system. PMID:22673892

  17. Scheme of thinking quantum systems

    NASA Astrophysics Data System (ADS)

    Yukalov, V. I.; Sornette, D.

    2009-11-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field.

  18. An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.

    PubMed

    Chaudhry, Shehzad Ashraf; Mahmood, Khalid; Naqvi, Husnain; Khan, Muhammad Khurram

    2015-11-01

    Telecare medicine information system (TMIS) offers the patients convenient and expedite healthcare services remotely anywhere. Patient security and privacy has emerged as key issues during remote access because of underlying open architecture. An authentication scheme can verify patient's as well as TMIS server's legitimacy during remote healthcare services. To achieve security and privacy a number of authentication schemes have been proposed. Very recently Lu et al. (J. Med. Syst. 39(3):1-8, 2015) proposed a biometric based three factor authentication scheme for TMIS to confiscate the vulnerabilities of Arshad et al.'s (J. Med. Syst. 38(12):136, 2014) scheme. Further, they emphasized the robustness of their scheme against several attacks. However, in this paper we establish that Lu et al.'s scheme is vulnerable to numerous attacks including (1) Patient anonymity violation attack, (2) Patient impersonation attack, and (3) TMIS server impersonation attack. Furthermore, their scheme does not provide patient untraceability. We then, propose an improvement of Lu et al.'s scheme. We have analyzed the security of improved scheme using popular automated tool ProVerif. The proposed scheme while retaining the plusses of Lu et al.'s scheme is also robust against known attacks. PMID:26399937

  19. Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment.

    PubMed

    Chiou, Shin-Yan; Ying, Zhaoqin; Liu, Junqiang

    2016-04-01

    Medical systems allow patients to receive care at different hospitals. However, this entails considerable inconvenience through the need to transport patients and their medical records between hospitals. The development of Telecare Medicine Information Systems (TMIS) makes it easier for patients to seek medical treatment and to store and access medical records. However, medical data stored in TMIS is not encrypted, leaving patients' private data vulnerable to external leaks. In 2014, scholars proposed a new cloud-based medical information model and authentication scheme which would not only allow patients to remotely access medical services but also protects patient privacy. However, this scheme still fails to provide patient anonymity and message authentication. Furthermore, this scheme only stores patient medical data, without allowing patients to directly access medical advice. Therefore, we propose a new authentication scheme, which provides anonymity, unlinkability, and message authentication, and allows patients to directly and remotely consult with doctors. In addition, our proposed scheme is more efficient in terms of computation cost. The proposed system was implemented in Android system to demonstrate its workability. PMID:26875078

  20. Assessment of Multiplication Fact Fluency

    ERIC Educational Resources Information Center

    Ford, Marilyn Sue; Usnick, Virginia

    2011-01-01

    This project had two major goals: to determine the usefulness of individually-administered interview process to access elementary students' fluency with basic multiplication facts, and to determine whether a developmental sequence found in Australian mathematics education literature applied to elementary students in the United States. Students in…

  1. The Social Meanings of the C-Card Scheme: The Importance of Friends and Peers

    ERIC Educational Resources Information Center

    Cheetham, Mandy

    2014-01-01

    This paper draws on findings from an analysis of interviews with young people aged 14-18 years, to explore the peer influences in young people's informal social networks which can affect their access to sexual health services. The research focuses on the social meanings of a C-Card condom distribution scheme in North East England. Such…

  2. Classroom Games: The Allocation of Renewable Resources under Different Property Rights and Regulation Schemes.

    ERIC Educational Resources Information Center

    Giraud, Kelly L.; Herrmann, Mark

    2002-01-01

    Describes a renewable resource allocation game designed to stimulate student interest in and understanding of market failure associated with open-access types of resource use. Employs the game to discuss advantages and disadvantages of property rights and regulation schemes. States the game benefits noneconomics majors in natural resource…

  3. Beyond Bookmarks: A Review of Frameworks, Features, and Functionalities of Schemes for Organizing the Web.

    ERIC Educational Resources Information Center

    McKiernan, Gerry

    1998-01-01

    Reviews and analyzes selected Web sites that use standard library classification schemes or controlled vocabularies to enhance access to Web information sources. Profiles common elements of many sites and the structural and navigational approaches incorporated with select sites. Includes an appendix of sites that use standard classification…

  4. Open Access: "à consommer avec modération"

    NASA Astrophysics Data System (ADS)

    Mahoney, Terence J.

    There is increasing pressure on academics and researchers to publish the results of their investigations in open access journals. Indeed, some funding agencies make open access publishing a basic requirement for funding projects, and the EU is considering taking firm steps in this direction. I argue that astronomy is already one of the most open of disciplines, and that access - both to the general public (in terms of a significantly growing outreach effort) and to developing countries (through efforts to provide computing facilities and Internet access, as well as schemes to provide research centres of limited resources with journals) - is becoming more and more open in a genuine and lasting way. I further argue that sudden switches to more formal kinds of open access schemes could cause irreparable harm to astronomical publishing. Several of the most prestigious astronomical research journals (e.g. MN, ApJ, AJ) have for more than a century met the publishing needs of the research community and continue to adapt successfully to changing demands on the part of that community. The after-effects of abrupt changes in publishing practices - implemented through primarily political concerns - are hard to predict and could be severely damaging. I conclude that open access, in its current acceptation, should be studied with great care and with sufficient time before any consideration is given to its implementation. If forced on the publishing and research communities, open access could well result in much more limited access to properly vetted research results.

  5. Multiple myeloma

    PubMed Central

    2010-01-01

    Abstract Advances in the imaging and treatment of multiple myeloma have occurred over the past decade. This article summarises the current status and highlights how an understanding of both is necessary for optimum management. PMID:20159661

  6. Multiple Sclerosis

    MedlinePlus

    Multiple sclerosis (MS) is a nervous system disease that affects your brain and spinal cord. It damages the myelin sheath, the ... and your body, leading to the symptoms of MS. They can include Visual disturbances Muscle weakness Trouble ...

  7. Multiple myeloma

    MedlinePlus

    Plasma cell dyscrasia; Plasma cell myeloma; Malignant plasmacytoma; Plasmacytoma of bone; Myeloma - multiple ... myeloma most commonly causes a low red blood cell count ( anemia ), which can lead to fatigue and ...

  8. Multiple myeloma.

    PubMed

    Raab, Marc S; Podar, Klaus; Breitkreutz, Iris; Richardson, Paul G; Anderson, Kenneth C

    2009-07-25

    Multiple myeloma is characterised by clonal proliferation of malignant plasma cells, and mounting evidence indicates that the bone marrow microenvironment of tumour cells has a pivotal role in myeloma pathogenesis. This knowledge has already expanded treatment options for patients with multiple myeloma. Prototypic drugs thalidomide, bortezomib, and lenalidomide have each been approved for the treatment of this disease by targeting both multiple myeloma cells and the bone marrow microenvironment. Although benefit was first shown in relapsed and refractory disease, improved overall response, duration of response, and progression-free and overall survival can be achieved when these drugs are part of first-line regimens. This treatment framework promises to improve outcome not only for patients with multiple myeloma, but also with other haematological malignancies and solid tumours. PMID:19541364

  9. What are the emerging features of community health insurance schemes in East Africa?

    PubMed Central

    Basaza, Robert; Pariyo, George; Criel, Bart

    2009-01-01

    Background The three East African countries of Uganda, Tanzania, and Kenya are characterized by high poverty levels, population growth rates, prevalence of HIV/AIDS, under-funding of the health sector, poor access to quality health care, and small health insurance coverage. Tanzania and Kenya have user-fees whereas Uganda abolished user-fees in public-owned health units. Objective To provide comparative description of community health insurance (CHI) schemes in three East African countries of Uganda, Tanzania, and Kenya and thereafter provide a basis for future policy research for development of CHI schemes. Methods An analytical grid of 10 distinctive items pertaining to the nature of CHI schemes was developed so as to have a uniform lens of comparing country situations of CHI. Results and conclusions The majority of the schemes have been in existence for a relatively short time of less than 10 years and their number remains small. There is need for further research to identify what is the mix and weight of factors that cause people to refrain from joining schemes. Specific issues that could also be addressed in subsequent studies are whether the current schemes provide financial protection, increase access to quality of care and impact on the equity of health services financing and delivery. On the basis of this knowledge, rational policy decisions can be taken. The governments thereafter could consider an option of playing more roles in advocacy, paying for the poorest, and developing an enabling policy and legal framework. PMID:22312207

  10. Multiple Sclerosis

    PubMed Central

    Hashimoto, S.A.; Jiwa, Theresa I.

    1991-01-01

    Successful management of patients with multiple sclerosis depends upon the involvement of the family physician. All contacts with either a multiple sclerosis clinic or a neurologist should be made at the instigation of the family practitioner. Constant contact with the family physician ensures that the individual receives proper care. While specialty care is needed for many of the symptoms, psychosocial problems are dealt with best by the individual's own family physician. PMID:21229090

  11. Triple image encryption scheme in fractional Fourier transform domains

    NASA Astrophysics Data System (ADS)

    Liu, Zhengjun; Dai, Jingmin; Sun, Xiaogang; Liu, Shutian

    2009-02-01

    We proposed a triple image encryption scheme by use of fractional Fourier transform. In this algorithm, an original image is encoded in amplitude part and other two images are encoded into phase information. The key of encryption algorithm is obtained from the difference between the third image and the output phase of transform. In general case, random phase encoding technology is not required in the proposed algorithm. Moreover, all information of images is preserved in theory when image are decrypted with correct key. The optical implementation of the algorithm is presented with an electro-optical hybrid structure. Numerical simulations have demonstrated the efficiency and the security of this algorithm. Based on this scheme a multiple image algorithm is expanded and designed.

  12. A scheme for supporting distributed data structures on multicomputers

    NASA Technical Reports Server (NTRS)

    Hiranandani, Seema; Saltz, Joel; Berryman, Harry; Mehrotra, Piyush

    1990-01-01

    A data migration mechanism is proposed that allows an explicit and controlled mapping of data to memory. While read or write copies of each data element can be assigned to any processor's memory, longer term storage of each data element is assigned to a specific location in the memory of a particular processor. The proposed integration of a data migration scheme with a compiler is able to eliminate the migration of unneeded data that can occur in multiprocessor paging or caching. The overhead of adjudicating multiple concurrent writes to the same page or cache line is also eliminated. Data is presented that suggests that the scheme may be a pratical method for efficiently supporting data migration.

  13. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  14. Troubling Clarity: The Politics of Accessible Language.

    ERIC Educational Resources Information Center

    Lather, Patti

    1996-01-01

    Using feminist and postmodern theories, argues that transparent or "accessible" language is not innocent, but is part of a discourse of power. Reflects on an experimental approach to writing about research that results in a multiply coded, multivoiced text that speaks to multiple audiences. (SK)

  15. IMPROVING ACCESS TO INFORMATION ABOUT ORD PROJECTS

    EPA Science Inventory

    ORD project information is maintained in, and retrieved from, multiple systems and home pages. Not all sources of project information are Intranet accessible. Descriptive information may be abbreviated and not useful in conveying a comprehensive understanding of a project. The m...

  16. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services. PMID:26349803

  17. Error determination of a successive correction type objective analysis scheme. [for surface meteorological data

    NASA Technical Reports Server (NTRS)

    Smith, D. R.; Leslie, F. W.

    1984-01-01

    The Purdue Regional Objective Analysis of the Mesoscale (PROAM) is a successive correction type scheme for the analysis of surface meteorological data. The scheme is subjected to a series of experiments to evaluate its performance under a variety of analysis conditions. The tests include use of a known analytic temperature distribution to quantify error bounds for the scheme. Similar experiments were conducted using actual atmospheric data. Results indicate that the multiple pass technique increases the accuracy of the analysis. Furthermore, the tests suggest appropriate values for the analysis parameters in resolving disturbances for the data set used in this investigation.

  18. An authentication scheme to healthcare security under wireless sensor networks.

    PubMed

    Hsiao, Tsung-Chih; Liao, Yu-Ting; Huang, Jen-Yan; Chen, Tzer-Shyong; Horng, Gwo-Boa

    2012-12-01

    In recent years, Taiwan has been seeing an extension of the average life expectancy and a drop in overall fertility rate, initiating our country into an aged society. Due to this phenomenon, how to provide the elderly and patients with chronic diseases a suitable healthcare environment has become a critical issue presently. Therefore, we propose a new scheme that integrates healthcare services with wireless sensor technology in which sensor nodes are employed to measure patients' vital signs. Data collected from these sensor nodes are then transmitted to mobile devices of the medical staff and system administrator, promptly enabling them to understand the patients' condition in real time, which will significantly improve patients' healthcare quality. As per the personal data protection act, patients' vital signs can only be accessed by authorized medical staff. In order to protect patients', the system administrator will verify the medical staff's identity through the mobile device using a smart card and password mechanism. Accordingly, only the verified medical staff can obtain patients' vital signs data such as their blood pressure, pulsation, and body temperature, etc.. Besides, the scheme includes a time-bounded characteristic that allows the verified staff access to data without having to have to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrator and user. PMID:22399067

  19. How can conceptual schemes change teaching?

    NASA Astrophysics Data System (ADS)

    Wickman, Per-Olof

    2012-03-01

    Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.

  20. Rapid Parameterization Schemes for Aircraft Shape Optimization

    NASA Technical Reports Server (NTRS)

    Li, Wu

    2012-01-01

    A rapid shape parameterization tool called PROTEUS is developed for aircraft shape optimization. This tool can be applied directly to any aircraft geometry that has been defined in PLOT3D format, with the restriction that each aircraft component must be defined by only one data block. PROTEUS has eight types of parameterization schemes: planform, wing surface, twist, body surface, body scaling, body camber line, shifting/scaling, and linear morphing. These parametric schemes can be applied to two types of components: wing-type surfaces (e.g., wing, canard, horizontal tail, vertical tail, and pylon) and body-type surfaces (e.g., fuselage, pod, and nacelle). These schemes permit the easy setup of commonly used shape modification methods, and each customized parametric scheme can be applied to the same type of component for any configuration. This paper explains the mathematics for these parametric schemes and uses two supersonic configurations to demonstrate the application of these schemes.