Science.gov

Sample records for active defrost scheme

  1. Activating the Microscale Edge Effect in a Hierarchical Surface for Frosting Suppression and Defrosting Promotion

    PubMed Central

    Chen, Xuemei; Ma, Ruiyuan; Zhou, Hongbo; Zhou, Xiaofeng; Che, Lufeng; Yao, Shuhuai; Wang, Zuankai

    2013-01-01

    Despite extensive progress, current icephobic materials are limited by the breakdown of their icephobicity in the condensation frosting environment. In particular, the frost formation over the entire surface is inevitable as a result of undesired inter-droplet freezing wave propagation initiated by the sample edges. Moreover, the frost formation directly results in an increased frost adhesion, posing severe challenges for the subsequent defrosting process. Here, we report a hierarchical surface which allows for interdroplet freezing wave propagation suppression and efficient frost removal. The enhanced performances are mainly owing to the activation of the microscale edge effect in the hierarchical surface, which increases the energy barrier for ice bridging as well as engendering the liquid lubrication during the defrosting process. We believe the concept of harnessing the surface morphology to achieve superior performances in two opposite phase transition processes might shed new light on the development of novel materials for various applications. PMID:23981909

  2. Apparatus and method for evaporator defrosting

    DOEpatents

    Mei, Viung C.; Chen, Fang C.; Domitrovic, Ronald E.

    2001-01-01

    An apparatus and method for warm-liquid defrosting of the evaporator of a refrigeration system. The apparatus includes a first refrigerant expansion device that selectively expands refrigerant for cooling the evaporator, a second refrigerant expansion device that selectively expands the refrigerant after the refrigerant has passed through the evaporator, and a defrosting control for the first refrigerant expansion device and second refrigerant expansion device to selectively defrost the evaporator by causing warm refrigerant to flow through the evaporator. The apparatus is alternately embodied with a first refrigerant bypass and/or a second refrigerant bypass for selectively directing refrigerant to respectively bypass the first refrigerant expansion device and the second refrigerant expansion device, and with the defrosting control connected to the first refrigerant bypass and/or the second refrigerant bypass to selectively activate and deactivate the bypasses depending upon the current cycle of the refrigeration system. The apparatus alternately includes an accumulator for accumulating liquid and/or gaseous refrigerant that is then pumped either to a refrigerant receiver or the first refrigerant expansion device for enhanced evaporator defrosting capability. The inventive method of defrosting an evaporator in a refrigeration system includes the steps of compressing refrigerant in a compressor and cooling the refrigerant in the condenser such that the refrigerant is substantially in liquid form, passing the refrigerant substantially in liquid form through the evaporator, and expanding the refrigerant with a refrigerant expansion device after the refrigerant substantially passes through the evaporator.

  3. Defrost Temperature Termination in Supermarket Refrigeration Systems

    SciTech Connect

    Fricke, Brian A; Sharma, Vishaldeep

    2011-11-01

    The objective of this project was to determine the potential energy savings associated with implementing demand defrost strategies to defrost supermarket refrigerated display case evaporators, as compared to the widely accepted current practice of controlling display case defrost cycles with a preset timer. The defrost heater energy use of several representative display case types was evaluated. In addition, demand defrost strategies for refrigerated display cases as well as those used in residential refrigerator/freezers were evaluated. Furthermore, it is anticipated that future work will include identifying a preferred defrost strategy, with input from Retail Energy Alliance members. Based on this strategy, a demand defrost system will be designed which is suitable for supermarket refrigerated display cases. Limited field testing of the preferred defrost strategy will be performed in a supermarket environment.

  4. 9 CFR 590.539 - Defrosting operations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... temperature. All other whites shall be defrosted in accordance with paragraph (d) of this section. (d) Frozen... hours at a room temperature no higher than 40 °F. or not to exceed 24 hours at a room temperature above 40 °F.: Provided, That no portion of the defrosted liquid shall exceed 50 °F. while in or out of...

  5. 9 CFR 590.539 - Defrosting operations.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... temperature. All other whites shall be defrosted in accordance with paragraph (d) of this section. (d) Frozen... hours at a room temperature no higher than 40 °F. or not to exceed 24 hours at a room temperature above 40 °F.: Provided, That no portion of the defrosted liquid shall exceed 50 °F. while in or out of...

  6. 9 CFR 590.539 - Defrosting operations.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... denatured. (c) Frozen whites to be used in the production of dried albumen may be defrosted at room... container. (1) Frozen eggs packed in metal or plastic containers may be placed in running tap water (70...

  7. Shortening the Defrost Time on a Heat Pump Air Conditioner

    NASA Astrophysics Data System (ADS)

    Kuwahara, Eiji; Yamazaki, Masaya; Kawamura, Toshiaki

    Methods to shorten the defrost time have been studied on a heat pump air conditioner. The experiment has been carried out using a 0.75kW heat pump and the energy balance during defrosting has been analyzed. We have found that the following methods are effective to shorten the defrost time; (1) Increase in power inqut to the compressor during defrosting, (2) Utilization of the compressor for thermal energy storage, (3) Reduction of the water left on the outdoor heat exchanger fins. The heat pump with the new defrosting system has been made on an experimental basis. lts defrost time is 1 minute and 55 seconds under the defrost condition of the Japanese Industrial Standard. The defrost time of a conventional heat pump is about 4 or 5 minutes.

  8. 9 CFR 590.539 - Defrosting operations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Defrosting operations. 590.539 Section 590.539 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE EGG PRODUCTS INSPECTION INSPECTION OF EGGS AND EGG PRODUCTS (EGG PRODUCTS INSPECTION ACT) Sanitary, Processing, and Facility Requirements §...

  9. Heat pump having improved defrost system

    DOEpatents

    Chen, F.C.; Mei, V.C.; Murphy, R.W.

    1998-12-08

    A heat pump system includes, in an operable relationship for transferring heat between an exterior atmosphere and an interior atmosphere via a fluid refrigerant: a compressor; an interior heat exchanger; an exterior heat exchanger; an accumulator; and means for heating the accumulator in order to defrost the exterior heat exchanger. 2 figs.

  10. Heat pump having improved defrost system

    DOEpatents

    Chen, Fang C.; Mei, Viung C.; Murphy, Richard W.

    1998-01-01

    A heat pump system includes, in an operable relationship for transferring heat between an exterior atmosphere and an interior atmosphere via a fluid refrigerant: a compressor; an interior heat exchanger; an exterior heat exchanger; an accumulator; and means for heating the accumulator in order to defrost the exterior heat exchanger.

  11. 49 CFR 393.79 - Windshield defrosting and defogging systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 5 2011-10-01 2011-10-01 false Windshield defrosting and defogging systems. 393... Windshield defrosting and defogging systems. (a) Vehicles manufactured on or after December 25, 1968. Each bus, truck, and truck-tractor manufactured on or after December 25, 1968, must have a...

  12. 49 CFR 393.79 - Windshield defrosting and defogging systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 5 2012-10-01 2012-10-01 false Windshield defrosting and defogging systems. 393... Windshield defrosting and defogging systems. (a) Vehicles manufactured on or after December 25, 1968. Each bus, truck, and truck-tractor manufactured on or after December 25, 1968, must have a...

  13. 49 CFR 393.79 - Windshield defrosting and defogging systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 5 2010-10-01 2010-10-01 false Windshield defrosting and defogging systems. 393... Windshield defrosting and defogging systems. (a) Vehicles manufactured on or after December 25, 1968. Each bus, truck, and truck-tractor manufactured on or after December 25, 1968, must have a...

  14. Defrosting Polar Dunes--'The Snow Leopard'

    NASA Technical Reports Server (NTRS)

    1999-01-01

    The patterns created by dark spots on defrosting south polar dunes are often strange and beautiful. This picture, which the Mars Orbiter Camera team has dubbed, 'the snow leopard,' shows a dune field located at 61.5oS, 18.9oW, as it appeared on July 1, 1999. The spots are areas where dark sand has been exposed from beneath bright frost as the south polar winter cap begins to retreat. Many of the spots have a diffuse, bright ring around them this is thought to be fresh frost that was re-precipitated after being removed from the dark spot. The spots seen on defrosting polar dunes are a new phenomenon that was not observed by previous spacecraft missions to Mars. Thus, there is much about these features that remains unknown. For example, no one yet knows why the dunes become defrosted by forming small spots that grow and grow over time. No one knows for sure if the bright rings around the dark spots are actually composed of re-precipitated frost. And no one knows for sure why some dune show spots that appear to be 'lined-up' (as they do in the picture shown here).

    This Mars Global Surveyor Mars Orbiter Camera image is illuminated from the upper left. North is toward the upper right. The scale bar indicates a distance of 200 meters (656 feet).

    Malin Space Science Systems and the California Institute of Technology built the MOC using spare hardware from the Mars Observer mission. MSSS operates the camera from its facilities in San Diego, CA. The Jet Propulsion Laboratory's Mars Surveyor Operations Project operates the Mars Global Surveyor spacecraft with its industrial partner, Lockheed Martin Astronautics, from facilities in Pasadena, CA and Denver, CO.

  15. Development of a demand defrost controller. Final report

    SciTech Connect

    Borton, D.N.; Walker, D.H.

    1993-10-01

    The purpose of this project was to develop and commercialize a demand defrost controller that initiates defrosts of refrigeration systems only when required. The standard method of control is a time clock that usually defrosts too often, which wastes energy. The controller developed by this project uses an algorithm based on the temperature difference between the discharge and return of the display case air curtain along with several time settings to defrost only when needed. This controller was field tested in a supermarket where it controlled defrost of the low-temperature display cases. According to test results the controller could reduce annual energy consumption by 20,000 and 62,000 kWh for hot gas and electric defrost, respectively. The controller saves electric demand as well as energy, is adaptable to ambient air conditions, and provides valuable savings throughout the year. The savings are greatest for low-temperature systems that use the most energy. A less tangible benefit of the demand controller is the improvement in food quality that results from fewer defrosts.

  16. Measured impacts of supermarket humidity level on defrost performance and refrigerating system energy use

    SciTech Connect

    Henderson, H.I.; Khattar, M.

    1999-07-01

    This paper presents field-monitor data from two supermarkets where the impact of space humidity on refrigerating system energy use was evaluated. Direct digital control (DDC) systems were used at both stores to collect 15-minute monitored data. At Store A in Minneapolis, the DDC system was used to monitor system performance as well as to implement temperature-terminated control in place of time-terminated control on 16 refrigerated zones using hot gas defrost. At Store B in Indianapolis, the DDC system was used to quantify the performance trends for the single compressor rack system with electric defrost. The results at Store B showed that refrigerating system energy use decreases by nearly 10 kWh/day for each 1% drop in space relative humidity, or about 0.4% of average annual system energy use. This value includes the impact of reduced latent loads, the reduction in direct energy use and imposed load from reduced electric defrost heater operation, and the smaller imposed load from reduced anti-sweat heater energy use. The measured reductions agree well with the impact predicted using the calculation methods developed by Howell (1933b) in ASHRAE Research Project 596. At Store A, the measured data show that implementing temperature-terminated defrost reduced refrigerating system energy use by nearly 70 kWh/day over the winter period when the average space humidity was 22% RH. The savings from temperature-terminated defrost increase by 4 kWh/day per each 1% drop in relative humidity. At both stores, the same type of mechanical controls were used to duty cycle the anti-sweat heaters based on store dew point. Anti-sweat heater electricity use was observed to decrease by 4.6 kWh/day at Store B and 3.4 kWh/day at Store A for each 1% drop in relative humidity. At Store A, a more aggressive control scheme was implemented with the DDC system that reduced anti-sweat heater energy use by 7.8 kWh/day per % RH. The more aggressive control approach was reported to properly

  17. Frost sensor for use in defrost controls for refrigeration

    DOEpatents

    French, Patrick D.; Butz, James R.; Veatch, Bradley D.; O'Connor, Michael W.

    2002-01-01

    An apparatus and method for measuring the total thermal resistance to heat flow from the air to the evaporative cooler fins of a refrigeration system. The apparatus is a frost sensor that measures the reduction in heat flow due to the added thermal resistance of ice (reduced conduction) as well as the reduction in heat flow due to the blockage of airflow (reduced convection) from excessive ice formation. The sensor triggers a defrost cycle when needed, instead of on a timed interval. The invention is also a method for control of frost in a system that transfers heat from air to a refrigerant along a thermal path. The method involves measuring the thermal conductivity of the thermal path from the air to the refrigerant, recognizing a reduction in thermal conductivity due to the thermal insulation effect of the frost and due to the loss of airflow from excessive ice formation; and controlling the defrosting of the system.

  18. 16 CFR Appendix B2 to Part 305 - Upright Freezers With Automatic Defrost

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Upright Freezers With Automatic Defrost B2 Appendix B2 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF...) Pt. 305, App. B2 Appendix B2 to Part 305—Upright Freezers With Automatic Defrost Range...

  19. 16 CFR Appendix B2 to Part 305 - Upright Freezers With Automatic Defrost

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Upright Freezers With Automatic Defrost B2 Appendix B2 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF...) Pt. 305, App. B2 Appendix B2 to Part 305—Upright Freezers With Automatic Defrost Range...

  20. 16 CFR Appendix B2 to Part 305 - Upright Freezers With Automatic Defrost

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Upright Freezers With Automatic Defrost B2 Appendix B2 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF...) Pt. 305, App. B2 Appendix B2 to Part 305—Upright Freezers With Automatic Defrost Range...

  1. 16 CFR Appendix B2 to Part 305 - Upright Freezers With Automatic Defrost

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Upright Freezers With Automatic Defrost B2 Appendix B2 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF...) Pt. 305, App. B2 Appendix B2 to Part 305—Upright Freezers With Automatic Defrost Range...

  2. 16 CFR Appendix B1 to Part 305 - Upright Freezers With Manual Defrost

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Upright Freezers With Manual Defrost B1 Appendix B1 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF...) Pt. 305, App. B1 Appendix B1 to Part 305—Upright Freezers With Manual Defrost Range...

  3. A Hybrid Nonlinear Control Scheme for Active Magnetic Bearings

    NASA Technical Reports Server (NTRS)

    Xia, F.; Albritton, N. G.; Hung, J. Y.; Nelms, R. M.

    1996-01-01

    A nonlinear control scheme for active magnetic bearings is presented in this work. Magnet winding currents are chosen as control inputs for the electromechanical dynamics, which are linearized using feedback linearization. Then, the desired magnet currents are enforced by sliding mode control design of the electromagnetic dynamics. The overall control scheme is described by a multiple loop block diagram; the approach also falls in the class of nonlinear controls that are collectively known as the 'integrator backstepping' method. Control system hardware and new switching power electronics for implementing the controller are described. Various experiments and simulation results are presented to demonstrate the concepts' potentials.

  4. Defrosting Polar Dunes--'They Look Like Bushes!'

    NASA Technical Reports Server (NTRS)

    1999-01-01

    'They look like bushes!' That's what almost everyone says when they see the dark features found in pictures taken of sand dunes in the polar regions as they are beginning to defrost after a long, cold winter. It is hard to escape the fact that, at first glance, these images acquired by the Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC) over both polar regions during the spring and summer seasons, do indeed resemble aerial photographs of sand dune fields on Earth--complete with vegetation growing on and around them! Of course, this is not what the features are, as we describe below and in related picture captions. Still, don't they look like vegetation to you? Shown here are two views of the same MGS MOC image. On the left is the full scene, on the right is an expanded view of a portion of the scene on the left. The bright, smooth surfaces that are dotted with occasional, nearly triangular dark spots are sand dunes covered by winter frost.

    The MGS MOC has been used over the past several months (April-August 1999) to monitor dark spots as they form and evolve on polar dune surfaces. The dark spots typically appear first along the lower margins of a dune--similar to the position of bushes and tufts of grass that occur in and among some sand dunes on Earth.

    Because the martian air pressure is very low--100 times lower than at Sea Level on Earth--ice on Mars does not melt and become liquid when it warms up. Instead, ice sublimes--that is, it changes directly from solid to gas, just as 'dry ice' does on Earth. As polar dunes emerge from the months-long winter night, and first become exposed to sunlight, the bright winter frost and snow begins to sublime. This process is not uniform everywhere on a dune, but begins in small spots and then over several months it spreads until the entire dune is spotted like a leopard.

    The early stages of the defrosting process--as in the picture shown here--give the impression that something is 'growing' on the dunes

  5. 49 CFR 571.103 - Standard No. 103; Windshield defrosting and defogging systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... millimeters; (f) The defroster blower may be turned on at any time; and (g) The wind velocity is at any level from 0 to 3 kilometers per hour. (h) The test chamber temperature and the wind velocity shall...

  6. Defrosting Polar Dunes--Dark Spots and Wind Streaks

    NASA Technical Reports Server (NTRS)

    1999-01-01

    The first time that the Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC)team saw dark spots on defrosting dune surfaces was in August and September of 1998. At that time, it was the north polar seasonal frost cap that was subliming away (more recent images from 1999 have shown the south polar frosts). This picture (above) shows a small portion of the giant dune field that surrounds the north polar region, as it appeared on August 23, 1998. At the time, it was early northern spring and the dunes were still covered with winter frost.

    Dark spots had appeared on the north polar dunes, and many of them exhibited a radial or semi-radial pattern of dark streaks and streamers. At first, there was speculation that the streaks indicated that the defrosting process might somehow involve explosions! The dark spots seemed to resemble small craters with dark, radial ejecta. It seemed possible that frozen carbon dioxide trapped beneath water ice might somehow heat up, turn to gas, expand, and then 'explode' in either a small blast or at least a 'puff' of air similar to that which comes from the blowhole of a surfacing whale or seal.

    The image shown here changed the earlier impression. The dark spots and streaks do not result from explosions. The spots--though not well understood--represent the earliest stages of defrosting on the sand dunes. The streaks, instead of being caused by small explosions, are instead the result of wind. In this picture, the fine, dark streaks show essentially identical orientations from spot to spot (e.g., compare the spots seen in boxes (a) and (b)). Each ray of dark material must result from wind blowing from a particular direction--for example, all of the spots in this picture exhibit a ray that points toward the upper left corner of the image, and each of these rays indicates the same wind regime. Each spot also has a ray pointing toward the lower right and top/upper-right. These, too, must indicate periods when the wind was strong

  7. WARM-LIQUID DEFROST FOR COMMERCIAL FOOD DISPLAY CASES: EXPERIMENTAL INVESTIGATION AT 32.2 DEGREES C CONDENSING

    EPA Science Inventory

    The paper gives results of an experimental investigation at 32.2 C condensing of warm-liquid defrost for commercial food display cases. A refrigeration test rig with two open cases and two reach-in cases was tested using warm-liquid defrost (WLD) at -34.4 C evaporating, 32.2 C co...

  8. 16 CFR Appendix B2 to Part 305 - Upright Freezers With Automatic Defrost

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Upright Freezers With Automatic Defrost B2 Appendix B2 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF... (âENERGY LABELING RULEâ) Pt. 305, App. B2 Appendix B2 to Part 305—Upright Freezers With...

  9. 16 CFR Appendix A2 to Part 305 - Refrigerators and Refrigerators-Freezers With Manual Defrost

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Refrigerators and Refrigerators-Freezers With Manual Defrost A2 Appendix A2 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULE CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND...

  10. 16 CFR Appendix A1 to Part 305 - Refrigerators With Automatic Defrost

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Refrigerators With Automatic Defrost A1 Appendix A1 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULE CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND WATER USE OF CERTAIN HOME...

  11. 16 CFR Appendix A2 to Part 305 - Refrigerators and Refrigerators-Freezers With Manual Defrost

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Refrigerators and Refrigerators-Freezers With Manual Defrost A2 Appendix A2 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULE CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND...

  12. 16 CFR Appendix A1 to Part 305 - Refrigerators With Automatic Defrost

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Refrigerators With Automatic Defrost A1 Appendix A1 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULE CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND WATER USE OF CERTAIN HOME...

  13. 16 CFR Appendix A3 to Part 305 - Refrigerator-Freezers With Partial Automatic Defrost

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Refrigerator-Freezers With Partial Automatic Defrost A3 Appendix A3 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULE CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND WATER USE OF...

  14. 16 CFR Appendix B1 to Part 305 - Upright Freezers With Manual Defrost

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Upright Freezers With Manual Defrost B1 Appendix B1 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULE CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND WATER USE OF CERTAIN HOME...

  15. 16 CFR Appendix A3 to Part 305 - Refrigerator-Freezers With Partial Automatic Defrost

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Refrigerator-Freezers With Partial Automatic Defrost A3 Appendix A3 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULE CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND WATER USE OF...

  16. Performance comparison between two axial active support schemes for 1-m thin meniscus primary mirror

    NASA Astrophysics Data System (ADS)

    Niu, D. S.; Wang, G. M.; Gu, B. Z.; Ye, Y.

    2013-03-01

    Active support scheme may decide the deformation of the optical surface figure of the primary mirror. Two main active axial support schemes are often adopted to the thin meniscus primary mirror, one scheme is that the axial supports normal to the mirror bottom surface, and the other is that the active forces parallel to the optical axis. In order to compare the performance of the two support schemes, 1-m thin meniscus primary mirror is conducted. Finite element analysis (FEA) is employed to analyze the optical surface figures of the primary mirror, and optimizations are carried out by using ANSYS for each support scheme to obtain the locations and active forces. The axial support force sensitivities are calculated for the two support schemes in a case that a single axial support has a force error of 0.5 N. The correction ability of the active support system for both of the support schemes are analyzed when an arbitrary axial support is failure. Several low order Zernike modes are modeled with MATLAB procedure, and active optics corrections are applied to these modes for the two active supports. The extra mirror surface error due to thermal deformation is also corrected with the two support schemes.

  17. Active targeting schemes for nanoparticle systems in cancer therapeutics.

    PubMed

    Byrne, James D; Betancourt, Tania; Brannon-Peppas, Lisa

    2008-12-14

    The objective of this review is to outline current major cancer targets for nanoparticle systems and give insight into the direction of the field. The major targeting strategies that have been used for the delivery of therapeutic or imaging agents to cancer have been broken into three sections. These sections are angiogenesis-associated targeting, targeting to uncontrolled cell proliferation markers, and tumor cell targeting. The targeting schemes explored for many of the reported nanoparticle systems suggest the great potential of targeted delivery to revolutionize cancer treatment.

  18. A Novel, Simplified Scheme for Plastics Identification: "JCE" Classroom Activity 104

    ERIC Educational Resources Information Center

    Harris, Mary E.; Walker, Barbara

    2010-01-01

    In this Activity, students identify samples of seven types of recyclable plastic by using a flowchart scheme. The flowchart procedure includes making density comparisons of the plastic samples in water and alcohol and observing physical changes of plastic samples subjected to boiling water temperatures and exposure to acetone. This scheme is…

  19. Performance comparison between two active support schemes for 1-m primary mirror

    NASA Astrophysics Data System (ADS)

    Niu, Dongsheng; Wang, Guomin; Gu, Bozhong

    2012-09-01

    Active support scheme may decide the deformation of the optical surface figure of the primary mirror. Two active support schemes have been designed for 1-m primary mirror, and the performance of each support scheme is conducted. Finite element analysis (FEA) is employed to analyze the optical surface figures of the primary mirror, and optimizations are carried out by using ANSYS for each support scheme to obtain the locations of the axial support. When the locations are determined, axial support force sensitivities are calculated for the two support schemes in a case that a single axial support has a force error of 0.5N. The correction ability of the active support system for both of support schemes are analyzed when an arbitrary axial support is failure. Several low order Zernike modes are modeled with MATLAB procedure, and active optics corrections are applied to these modes for the two active supports. Thermal deformation of the mirror is also corrected for the two schemes.

  20. Passive and active pulse stacking scheme for pulse shaping

    DOEpatents

    Harney, Robert C.; Schipper, John F.

    1977-01-01

    Apparatus and method for producing a sequence of radiation pulses with a pulse envelope of time variation which is controllable by an external electromagnetic signal applied to an active medium or by a sectored reflector, through which the radiation passes.

  1. 16 CFR Appendix A7 to Part 305 - Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service A7 Appendix A7 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service...

  2. 16 CFR Appendix A6 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door Ice Service A6 Appendix A6 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door Ice...

  3. 16 CFR Appendix A4 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice Service A4 Appendix A4 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice...

  4. 16 CFR Appendix A6 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door Ice Service A6 Appendix A6 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door Ice...

  5. 16 CFR Appendix A8 to Part 305 - Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice Service A8 Appendix A8 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice Service...

  6. 16 CFR Appendix A4 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice Service A4 Appendix A4 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice...

  7. 16 CFR Appendix A5 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door Ice Service A5 Appendix A5 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door Ice...

  8. 16 CFR Appendix A8 to Part 305 - Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice Service A8 Appendix A8 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice Service...

  9. 16 CFR Appendix A4 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice Service A4 Appendix A4 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice...

  10. 16 CFR Appendix A6 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door Ice Service A6 Appendix A6 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door Ice...

  11. 16 CFR Appendix A6 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door Ice Service A6 Appendix A6 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door Ice...

  12. 16 CFR Appendix A8 to Part 305 - Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice Service A8 Appendix A8 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice Service...

  13. 16 CFR Appendix A5 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door Ice Service A5 Appendix A5 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door Ice...

  14. 16 CFR Appendix A4 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice Service A4 Appendix A4 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice...

  15. 16 CFR Appendix A7 to Part 305 - Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service A7 Appendix A7 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service...

  16. 16 CFR Appendix A5 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door Ice Service A5 Appendix A5 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door Ice...

  17. 16 CFR Appendix A7 to Part 305 - Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service A7 Appendix A7 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service...

  18. 16 CFR Appendix A7 to Part 305 - Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service A7 Appendix A7 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service...

  19. 16 CFR Appendix A5 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door Ice Service A5 Appendix A5 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door Ice...

  20. 16 CFR Appendix A8 to Part 305 - Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice Service A8 Appendix A8 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice Service...

  1. Smartphone-Based Patients' Activity Recognition by Using a Self-Learning Scheme for Medical Monitoring.

    PubMed

    Guo, Junqi; Zhou, Xi; Sun, Yunchuan; Ping, Gong; Zhao, Guoxing; Li, Zhuorong

    2016-06-01

    Smartphone based activity recognition has recently received remarkable attention in various applications of mobile health such as safety monitoring, fitness tracking, and disease prediction. To achieve more accurate and simplified medical monitoring, this paper proposes a self-learning scheme for patients' activity recognition, in which a patient only needs to carry an ordinary smartphone that contains common motion sensors. After the real-time data collection though this smartphone, we preprocess the data using coordinate system transformation to eliminate phone orientation influence. A set of robust and effective features are then extracted from the preprocessed data. Because a patient may inevitably perform various unpredictable activities that have no apriori knowledge in the training dataset, we propose a self-learning activity recognition scheme. The scheme determines whether there are apriori training samples and labeled categories in training pools that well match with unpredictable activity data. If not, it automatically assembles these unpredictable samples into different clusters and gives them new category labels. These clustered samples combined with the acquired new category labels are then merged into the training dataset to reinforce recognition ability of the self-learning model. In experiments, we evaluate our scheme using the data collected from two postoperative patient volunteers, including six labeled daily activities as the initial apriori categories in the training pool. Experimental results demonstrate that the proposed self-learning scheme for activity recognition works very well for most cases. When there exist several types of unseen activities without any apriori information, the accuracy reaches above 80 % after the self-learning process converges.

  2. Smartphone-Based Patients' Activity Recognition by Using a Self-Learning Scheme for Medical Monitoring.

    PubMed

    Guo, Junqi; Zhou, Xi; Sun, Yunchuan; Ping, Gong; Zhao, Guoxing; Li, Zhuorong

    2016-06-01

    Smartphone based activity recognition has recently received remarkable attention in various applications of mobile health such as safety monitoring, fitness tracking, and disease prediction. To achieve more accurate and simplified medical monitoring, this paper proposes a self-learning scheme for patients' activity recognition, in which a patient only needs to carry an ordinary smartphone that contains common motion sensors. After the real-time data collection though this smartphone, we preprocess the data using coordinate system transformation to eliminate phone orientation influence. A set of robust and effective features are then extracted from the preprocessed data. Because a patient may inevitably perform various unpredictable activities that have no apriori knowledge in the training dataset, we propose a self-learning activity recognition scheme. The scheme determines whether there are apriori training samples and labeled categories in training pools that well match with unpredictable activity data. If not, it automatically assembles these unpredictable samples into different clusters and gives them new category labels. These clustered samples combined with the acquired new category labels are then merged into the training dataset to reinforce recognition ability of the self-learning model. In experiments, we evaluate our scheme using the data collected from two postoperative patient volunteers, including six labeled daily activities as the initial apriori categories in the training pool. Experimental results demonstrate that the proposed self-learning scheme for activity recognition works very well for most cases. When there exist several types of unseen activities without any apriori information, the accuracy reaches above 80 % after the self-learning process converges. PMID:27106584

  3. Task discrimination from myoelectric activity: a learning scheme for EMG-based interfaces.

    PubMed

    Liarokapis, Minas V; Artemiadis, Panagiotis K; Kyriakopoulos, Kostas J

    2013-06-01

    A learning scheme based on Random Forests is used to discriminate the task to be executed using only myoelectric activity from the upper limb. Three different task features can be discriminated: subspace to move towards, object to be grasped and task to be executed (with the object). The discrimination between the different reach to grasp movements is accomplished with a random forests classifier, which is able to perform efficient features selection, helping us to reduce the number of EMG channels required for task discrimination. The proposed scheme can take advantage of both a classifier and a regressor that cooperate advantageously to split the task space, providing better estimation accuracy with task-specific EMG-based motion decoding models, as reported in [1] and [2]. The whole learning scheme can be used by a series of EMG-based interfaces, that can be found in rehabilitation cases and neural prostheses.

  4. Defrosting North

    NASA Technical Reports Server (NTRS)

    2004-01-01

    15 June 2004 Spring is upon the martian northern hemisphere, and the north polar cap is shrinking. This Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC) image, acquired on 12 June 2004, shows the retreating edge of the seasonal north polar cap near 70oN, 209oW. Low clouds and fogs stream away from the cap edge as it sublimes away. North is approximately up and the image covers an area roughly 500 km (311 mi) across. Sunlight illuminates the scene from the lower left. The crater containing a thick mound of material near the right-center of the image is Korolev.

  5. Engineering and manufacture of a high-efficiency, automatic defrosting refrigerator-freezer

    NASA Astrophysics Data System (ADS)

    Bohman, R. H.; Harrison, R. L.

    The engineering effort and method of manufacture used to build thirty-six high efficiency, automatic defrosting, refrigerator-freezers are described. It was determined that an 18 cubic ft. model would be suited for the market test. Calculations were made to establish its physical size and insulation thicknesses were specified. The heat leaks were calculated using a computer program and the calculation established the expected heat flow when operated in a 90 F ambient with a 5 F freezer and a 38 F fresh food compartment. The program was also used to determine expected performance when various refrigeration system components and configurations were considered. The engineering design and the component selection are discussed. The sequences of prototype testing are followed.

  6. Agent-based power sharing scheme for active hybrid power sources

    NASA Astrophysics Data System (ADS)

    Jiang, Zhenhua

    The active hybridization technique provides an effective approach to combining the best properties of a heterogeneous set of power sources to achieve higher energy density, power density and fuel efficiency. Active hybrid power sources can be used to power hybrid electric vehicles with selected combinations of internal combustion engines, fuel cells, batteries, and/or supercapacitors. They can be deployed in all-electric ships to build a distributed electric power system. They can also be used in a bulk power system to construct an autonomous distributed energy system. An important aspect in designing an active hybrid power source is to find a suitable control strategy that can manage the active power sharing and take advantage of the inherent scalability and robustness benefits of the hybrid system. This paper presents an agent-based power sharing scheme for active hybrid power sources. To demonstrate the effectiveness of the proposed agent-based power sharing scheme, simulation studies are performed for a hybrid power source that can be used in a solar car as the main propulsion power module. Simulation results clearly indicate that the agent-based control framework is effective to coordinate the various energy sources and manage the power/voltage profiles.

  7. The Nature of All "Inappropriate Referrals" Made to a Countywide Physical Activity Referral Scheme: Implications for Practice

    ERIC Educational Resources Information Center

    Johnston, Lynne Halley; Warwick, Jane; De Ste Croix, Mark; Crone, Diane; Sldford, Adrienne

    2005-01-01

    Objective: The aim of this study was to evaluate the impact of a centralised referral mechanism (CRM) upon the number and type of "inappropriate referrals" made to a countywide physical activity referral scheme. Design: Case study. Method: Phase 1: Hierarchical Content Analysis of 458 "inappropriate referrals" made to a countywide scheme over a…

  8. Dynamo-based scheme for forecasting the magnitude of solar activity cycles

    NASA Technical Reports Server (NTRS)

    Layden, A. C.; Fox, P. A.; Howard, J. M.; Sarajedini, A.; Schatten, K. H.

    1991-01-01

    This paper presents a general framework for forecasting the smoothed maximum level of solar activity in a given cycle, based on a simple understanding of the solar dynamo. This type of forecasting requires knowledge of the sun's polar magnetic field strength at the preceding activity minimum. Because direct measurements of this quantity are difficult to obtain, the quality of a number of proxy indicators already used by other authors is evaluated, which are physically related to the sun's polar field. These indicators are subjected to a rigorous statistical analysis, and the analysis technique for each indicator is specified in detail in order to simplify and systematize reanalysis for future use. It is found that several of these proxies are in fact poorly correlated or uncorrelated with solar activity, and thus are of little value for predicting activity maxima. Also presented is a scheme in which the predictions of the individual proxies are combined via an appropriately weighted mean to produce a compound prediction. The scheme is then applied to the current cycle 22, and a maximum smoothed international sunspot number of 171 + or - 26 is estimated.

  9. Active sway control of a gantry crane using hybrid input shaping and PID control schemes

    NASA Astrophysics Data System (ADS)

    Mohd Tumari, M. Z.; Shabudin, L.; Zawawi, M. A.; Shah, L. H. Ahmad

    2013-12-01

    This project presents investigations into the development of hybrid input-shaping and PID control schemes for active sway control of a gantry crane system. The application of positive input shaping involves a technique that can reduce the sway by creating a common signal that cancels its own vibration and used as a feed-forward control which is for controlling the sway angle of the pendulum, while the proportional integral derivative (PID) controller is used as a feedback control which is for controlling the crane position. The PID controller was tuned using Ziegler-Nichols method to get the best performance of the system. The hybrid input-shaping and PID control schemes guarantee a fast input tracking capability, precise payload positioning and very minimal sway motion. The modeling of gantry crane is used to simulate the system using MATLAB/SIMULINK software. The results of the response with the controllers are presented in time domains and frequency domains. The performances of control schemes are examined in terms of level of input tracking capability, sway angle reduction and time response specification.

  10. Enhancing Educational Research and Development Activity through Small Grant Schemes: A Case Study

    ERIC Educational Resources Information Center

    Morris, Clare; Fry, Heather

    2006-01-01

    There are many funding schemes in existence for small projects in educational development, but fewer equivalent research schemes. Data from an evaluation of two schemes at one institution are used as the catalyst for considering such schemes in wider contextual and theoretical perspectives. The evaluation analysed success rate data, project…

  11. A PLL Scheme for Synchronization with Grid Voltage Phasor in Active Power Filter Systems

    NASA Astrophysics Data System (ADS)

    Krievs, Oskars; Steiks, Ingars; Ribickis, Leonids

    2010-01-01

    Voltage source inverters connected to the grid in applications such as active power filters require synchronization with the grid voltage. Since in practice the grid voltage can be unbalanced and distorted, but the operation of the whole active filter control system is strongly dependant on precise estimation of grid voltage phase, the fundamental positive sequence phasor of the grid voltage has to be extracted. In this paper a system for smooth estimation of the position of the voltage phasor at the point of common coupling of a parallel active filter system is presented using a sinusoidal signal integrator and a simple software PLL. The performance of the proposed system is verified by simulation and experimental results. The proposed PLL scheme can also be used in other vector oriented control systems.

  12. Neural encoding schemes of tactile information in afferent activity of the vibrissal system.

    PubMed

    Farfán, Fernando D; Albarracín, Ana L; Felice, Carmelo J

    2013-02-01

    When rats acquire sensory information by actively moving their vibrissae, a neural code is manifested at different levels of the sensory system. Behavioral studies in tactile discrimination agree that rats can distinguish different roughness surfaces by whisking their vibrissae. The present study explores the existence of neural encoding in the afferent activity of one vibrissal nerve. Two neural encoding schemes based on "events" were proposed (cumulative event count and median inter-event time). The events were detected by using an event detection algorithm based on multiscale decomposition of the signal (Continuous Wavelet Transform). The encoding schemes were quantitatively evaluated through the maximum amount of information which was obtained by the Shannon's mutual information formula. Moreover, the effect of difference distances between rat snout and swept surfaces on the information values was also studied. We found that roughness information was encoded by events of 0.8 ms duration in the cumulative event count and event of 1.0 to 1.6 ms duration in the median inter-event count. It was also observed that an extreme decrease of the distance between rat snout and swept surfaces significantly reduces the information values and the capacity to discriminate among the sweep situations.

  13. Performance Analysis of Positive-feedback-based Active Anti-islanding Schemes for Inverter-Based Distributed Generators

    SciTech Connect

    Du, Pengwei; Aponte, Erick E.; Nelson, J. Keith

    2010-06-14

    Recently proposed positive-feedback-based anti-islanding schemes (AI) are highly effective in preventing islanding without causing any degradation in power quality. This paper aims to analyze the performance of these schemes quantitatively in the context of the dynamic models of inverter-based distributed generators (DG). In this study, the characteristics of these active anti-islanding methods are discussed and design guidelines are derived.

  14. Defrosting the Digital Library: Bibliographic Tools for the Next Generation Web

    PubMed Central

    Hull, Duncan; Pettifer, Steve R.; Kell, Douglas B.

    2008-01-01

    Many scientists now manage the bulk of their bibliographic information electronically, thereby organizing their publications and citation material from digital libraries. However, a library has been described as “thought in cold storage,” and unfortunately many digital libraries can be cold, impersonal, isolated, and inaccessible places. In this Review, we discuss the current chilly state of digital libraries for the computational biologist, including PubMed, IEEE Xplore, the ACM digital library, ISI Web of Knowledge, Scopus, Citeseer, arXiv, DBLP, and Google Scholar. We illustrate the current process of using these libraries with a typical workflow, and highlight problems with managing data and metadata using URIs. We then examine a range of new applications such as Zotero, Mendeley, Mekentosj Papers, MyNCBI, CiteULike, Connotea, and HubMed that exploit the Web to make these digital libraries more personal, sociable, integrated, and accessible places. We conclude with how these applications may begin to help achieve a digital defrost, and discuss some of the issues that will help or hinder this in terms of making libraries on the Web warmer places in the future, becoming resources that are considerably more useful to both humans and machines. PMID:18974831

  15. Defrosting the digital library: bibliographic tools for the next generation web.

    PubMed

    Hull, Duncan; Pettifer, Steve R; Kell, Douglas B

    2008-10-01

    Many scientists now manage the bulk of their bibliographic information electronically, thereby organizing their publications and citation material from digital libraries. However, a library has been described as "thought in cold storage," and unfortunately many digital libraries can be cold, impersonal, isolated, and inaccessible places. In this Review, we discuss the current chilly state of digital libraries for the computational biologist, including PubMed, IEEE Xplore, the ACM digital library, ISI Web of Knowledge, Scopus, Citeseer, arXiv, DBLP, and Google Scholar. We illustrate the current process of using these libraries with a typical workflow, and highlight problems with managing data and metadata using URIs. We then examine a range of new applications such as Zotero, Mendeley, Mekentosj Papers, MyNCBI, CiteULike, Connotea, and HubMed that exploit the Web to make these digital libraries more personal, sociable, integrated, and accessible places. We conclude with how these applications may begin to help achieve a digital defrost, and discuss some of the issues that will help or hinder this in terms of making libraries on the Web warmer places in the future, becoming resources that are considerably more useful to both humans and machines.

  16. The destructive negative binomial cure rate model with a latent activation scheme.

    PubMed

    Cancho, Vicente G; Bandyopadhyay, Dipankar; Louzada, Francisco; Yiqi, Bao

    2013-07-01

    A new flexible cure rate survival model is developed where the initial number of competing causes of the event of interest (say lesions or altered cells) follow a compound negative binomial (NB) distribution. This model provides a realistic interpretation of the biological mechanism of the event of interest as it models a destructive process of the initial competing risk factors and records only the damaged portion of the original number of risk factors. Besides, it also accounts for the underlying mechanisms that leads to cure through various latent activation schemes. Our method of estimation exploits maximum likelihood (ML) tools. The methodology is illustrated on a real data set on malignant melanoma, and the finite sample behavior of parameter estimates are explored through simulation studies.

  17. Does Kaniso activate CASINO?: input coding schemes and phonology in visual-word recognition.

    PubMed

    Acha, Joana; Perea, Manuel

    2010-01-01

    Most recent input coding schemes in visual-word recognition assume that letter position coding is orthographic rather than phonological in nature (e.g., SOLAR, open-bigram, SERIOL, and overlap). This assumption has been drawn - in part - by the fact that the transposed-letter effect (e.g., caniso activates CASINO) seems to be (mostly) insensitive to phonological manipulations (e.g., Perea & Carreiras, 2006, 2008; Perea & Pérez, 2009). However, one could argue that the lack of a phonological effect in prior research was due to the fact that the manipulation always occurred in internal letter positions - note that phonological effects tend to be stronger for the initial syllable (Carreiras, Ferrand, Grainger, & Perea, 2005). To reexamine this issue, we conducted a masked priming lexical decision experiment in which we compared the priming effect for transposed-letter pairs (e.g., caniso-CASINO vs. caviro-CASINO) and for pseudohomophone transposed-letter pairs (kaniso-CASINO vs. kaviro-CASINO). Results showed a transposed-letter priming effect for the correctly spelled pairs, but not for the pseudohomophone pairs. This is consistent with the view that letter position coding is (primarily) orthographic in nature.

  18. A cure rate survival model under a hybrid latent activation scheme.

    PubMed

    Borges, Patrick; Rodrigues, Josemar; Louzada, Francisco; Balakrishnan, Narayanaswamy

    2016-04-01

    In lifetimes studies, the occurrence of an event (such as tumor detection or death) might be caused by one of many competing causes. Moreover, both the number of causes and the time-to-event associated with each cause are not usually observable. The number of causes can be zero, corresponding to a cure fraction. In this article, we propose a method of estimating the numerical characteristics of unobservable stages (such as initiation, promotion and progression) of carcinogenesis from data on tumor size at detection in the presence of latent competing causes. To this end, a general survival model for spontaneous carcinogenesis under a hybrid latent activation scheme has been developed to allow for a simple pattern of the dynamics of tumor growth. It is assumed that a tumor becomes detectable when its size attains some threshold level (proliferation of tumorais cells (or descendants) generated by the malignant cell), which is treated as a random variable. We assume the number of initiated cells and the number of malignant cells (competing causes) both to follow weighted Poisson distributions. The advantage of this model is that it incorporates into the analysis characteristics of the stage of tumor progression as well as the proportion of initiated cells that had been 'promoted' to the malignant ones and the proportion of malignant cells that die before tumor induction. The lifetimes corresponding to each competing cause are assumed to follow a Weibull distribution. Parameter estimation of the proposed model is discussed through the maximum likelihood estimation method. A simulation study has been carried out in order to examine the coverage probabilities of the confidence intervals. Finally, we illustrate the usefulness of the proposed model by applying it to a real data involving malignant melanoma.

  19. 16 CFR Appendix A6 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door Ice Service A6 Appendix A6 to Part 305 Commercial... Freezer Without Through-the-Door Ice Service Range Information Manufacturer's Rated Total...

  20. 16 CFR Appendix A7 to Part 305 - Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service A7 Appendix A7 to Part 305 Commercial... With Through-the-door Ice Service Range Information Manufacturer's Rated Total Refrigerated Volume...

  1. 16 CFR Appendix A4 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice Service A4 Appendix A4 to Part 305 Commercial... Without Through-the-Door Ice Service Range Information Manufacturer's Rated Total Refrigerated Volume...

  2. 16 CFR Appendix A5 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door Ice Service A5 Appendix A5 to Part 305 Commercial... Without Through-the-Door Ice Service Range Information Manufacturer's Rated Total Refrigerated Volume...

  3. 16 CFR Appendix A8 to Part 305 - Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice Service A8 Appendix A8 to Part 305 Commercial... With Through-the-door Ice Service Range Information Manufacturer's Rated Total Refrigerated Volume...

  4. Cometary cores with multiple structure from the oort cloud and the general scheme of origin of unusually active comets

    SciTech Connect

    Davydov, V.D.

    1986-03-01

    A newly conceived scheme is constructed which synthesizes consistent solutions to several principal problems concerning multiple-core comets: a power mechanism, a place and epoch of formation of the multiple core structure, the qualitative differences between current structure and younger structure, the origin of two types of cometary orbits, and a trigger mechanism for recent ignition of cometary activity of a multiple core. This scheme uses a new explanation of the ejection of dust (including icy dust) from various cometary cores as evidence that the material of multiple-core comets may be collisionally ablated at the expense of the comet-centered orbital energy of a multitude of massive boulders (see Kosm. Issled., No. 6 (1984)). Natural mechanisms are shown which preserve this important feature of multiple cores. The concept consists of the following elements: evolution of a system of satellites of the core toward a colli sionless structure; preservation of internal kinetic energy in the collisionless system over astro nomically lengthy time scales; tidal initiation of a collisional mechanism with the first revolution of the ancient multiple core in the zone of visibility. It is possible that such revoltions correspond to the existence of especially active comets in nearly parabolic orbits. Multiple structure in the core of active short-period comets might be descended from a nearly parabolic comet (if the theory holds on perturbational multistage transformation of near-parabolic orbits into contemporary short-period orbits).

  5. Development of a high efficiency, automatic defrosting refrigerator/freezer. Phase I. Design and development. Volume 1. Executive summary. Final report

    SciTech Connect

    Lee, W.D.

    1980-02-01

    Eighteen energy-saving design options were identified for the automatic defrost refrigerator/freezer unit. Projected energy savings and likely consumer acceptance of the design options were evaluated and seven promising options were selected for the development phase. Computer and laboratory studies of an improved condenser and evaporator design, new air flow path and fan housing design, improved defrost and refrigeration expansion valve control, and optimized cabinet insulation were performed. A prototype 16-cubic-foot automatic defrost refrigerator/freezer combining the seven energy saving design options was designed, built, and tested at Amana Refrigeraton, Inc. The Phase I prototype refrigerator/freezer had a 1.8 kWh per day energy consumption under the standard 900F closed door energy test. This is an energy factor of over 10 cubic feet per kWh per day and it represents better than a 50% improvement in unit efficiency over the most efficient unit presently available. A field test and market assessment (Phase II) is outlined. The test is designed to evaluate the unit performance in actual home use and marketability in a retail environment.

  6. Active control for drag reduction in turbulent channel flow: the opposition control schemes revisited

    NASA Astrophysics Data System (ADS)

    Wang, Yin-Shan; Huang, Wei-Xi; Xu, Chun-Xiao

    2016-10-01

    The opposition control schemes first proposed by Choi et al (1994 J. Fluid Mech. 262 75) employing wall-normal (v) and spanwise (w) velocity are revisited in the present study by performing direct numerical simulation to turbulent channel flow at R{e}τ = 180. Special attention is paid to the combined control, in which the wall-normal and spanwise velocities are imposed at the wall just instantaneously opposite to those at a small distance to the wall. In comparison to the v- and w-controls, combined-control could achieve the best drag reduction rate and control efficiency, with the greatest suppression of turbulence intensities. The influence of control on the statistical properties of vortices is scrutinized. By control, the numbers of vortices with every circulation and radius apparently decrease at the same normal location near the wall, while the vortex radius scaled by the actual wall-friction velocity almost remains the same. The streamwise vortices and the induced Reynolds shear stress undergo the greatest suppression by combined control. It is shown that combined control achieves a better efficacy, attributed to the co-work of the mechanisms of the v- and w-controls. At a higher Reynolds number R{e}τ = 1000, combined control is also more effective than v- and w-controls. The better suppression effect on the outer large scales is the primary reason for the larger drag reduction rate in combined control.

  7. Source Driver Channel Reduction Schemes Employing Corresponding Pixel Alignments for Current Programming Active-Matrix Organic Light-Emitting Diode Displays

    NASA Astrophysics Data System (ADS)

    Hong, Soon-Kwang; Oh, Du-Hwan; Jeong, Seok-Hee; Park, Young-Ju; Kim, Byeong-Koo; Ha, Yong-Min; Jang, Jin

    2008-03-01

    We propose two types of novel scheme for reducing the number of output channels of driver-integrated circuit (D-IC) for the current programming compensation pixel structures of active-matrix organic light-emitting diodes (AMOLEDs). One is a 2:1 data demultiplexing technique that can reduce the number of output channels of D-IC by half. The proposed second scheme is a vertically aligned red (R), green (G), and blue (B) subpixel scheme instead of a horizontally aligned R-G-B subpixel one, which is regarded as the conventional pixel alignment scheme. We have also successfully implemented these schemes in a 2.4-in.-sized QCIF + (176 × RGB × 220) AMOLED using p-type excimer laser annealing (ELA) low-temperature polycrystalline silicon (LTPS) technology and evaluated key performance characteristics.

  8. Formulation of 36-noded piezoelectric spectral finite element scheme with active/passive layers coupled by Lagrange multipliers

    NASA Astrophysics Data System (ADS)

    Ashwin, U.; Raja, S.; Sathyanarayana, C. N.

    2014-08-01

    A novel spectral finite element formulation scheme is presented for modeling a plate structure with surface-mounted piezoelectric transducers. Surface-mounted piezoelectric transducers may asymmetrically distribute the mass in the thickness direction of the plate/panel structure, resulting in a coupled mass matrix in spectral element formulation. A new procedure is developed by equating the layer-wise kinematics of the element using undetermined Lagrange multipliers to achieve the diagonal mass matrix. To demonstrate the effectiveness of the element formulation scheme, a two-dimensional piezoelectric spectral element is constructed with 36 nodes and five active/passive layers (layers: transducer/bond/plate/bond/transducer). The performance of the developed element is illustrated by (a) simulation of Lamb wave propagation and estimation of its velocity, and (b) simulation of the effect of transducer size, its dynamics and shear lag on sensor’s response. The results presented highlight the importance of modeling the dynamics of transducers and understanding the effects on sensor response. The presented technique has relevance in the field of structural health monitoring, wherein it can be used to model and simulate aircraft panels with surface-mounted piezoelectric transducers.

  9. A Network-Based Multi-Target Computational Estimation Scheme for Anticoagulant Activities of Compounds

    PubMed Central

    Li, Canghai; Chen, Lirong; Song, Jun; Tang, Yalin; Xu, Xiaojie

    2011-01-01

    Background Traditional virtual screening method pays more attention on predicted binding affinity between drug molecule and target related to a certain disease instead of phenotypic data of drug molecule against disease system, as is often less effective on discovery of the drug which is used to treat many types of complex diseases. Virtual screening against a complex disease by general network estimation has become feasible with the development of network biology and system biology. More effective methods of computational estimation for the whole efficacy of a compound in a complex disease system are needed, given the distinct weightiness of the different target in a biological process and the standpoint that partial inhibition of several targets can be more efficient than the complete inhibition of a single target. Methodology We developed a novel approach by integrating the affinity predictions from multi-target docking studies with biological network efficiency analysis to estimate the anticoagulant activities of compounds. From results of network efficiency calculation for human clotting cascade, factor Xa and thrombin were identified as the two most fragile enzymes, while the catalytic reaction mediated by complex IXa:VIIIa and the formation of the complex VIIIa:IXa were recognized as the two most fragile biological matter in the human clotting cascade system. Furthermore, the method which combined network efficiency with molecular docking scores was applied to estimate the anticoagulant activities of a serial of argatroban intermediates and eight natural products respectively. The better correlation (r = 0.671) between the experimental data and the decrease of the network deficiency suggests that the approach could be a promising computational systems biology tool to aid identification of anticoagulant activities of compounds in drug discovery. Conclusions This article proposes a network-based multi-target computational estimation method for

  10. Oleate lipase activity in Gardnerella vaginalis and reconsideration of existing biotype schemes

    PubMed Central

    2009-01-01

    Background Gardnerella vaginalis is a facultative gram positive organism that requires subculture every 1–2 days to maintain viability. It has been linked with bacterial vaginosis (BV), a syndrome that has been associated with increased risk for preterm delivery, pelvic inflammatory disease and HIV acquisition. About 10% of the G. vaginalis isolates have been reported to produce sialidase, but there have not been any studies relating sialidase production and biotype. Sialidase activity is dramatically increased in the vaginal fluid of women with BV and bacterial sialidases have been shown to increase the infectivity of HIV in vitro. There are 8 different biotypes of G. vaginalis. Biotypes 1–4 produce lipase and were reported to be associated with BV and the association of these biotypes with BV is under dispute. Other studies have demonstrated that G. vaginalis biotype 1 can stimulate HIV-1 production. Because of the discrepancies in the literature we compared the methods used to biotype G. vaginalis and investigated the relationship of biotype and sialidase production. Results A new medium for maintenance of Gardnerella vaginalis which allows survival for longer than one week is described. Some isolates only grew well under anaerobic conditions. Sialidase producing isolates were observed in 5 of the 6 biotypes tested. Using 4-methylumbelliferyl-oleate to determine lipase activity, instead of egg yolk agar, resulted in erroneous biotypes and does not provide reliable results. Conclusion Previous studies associating G. vaginalis biotype with bacterial vaginosis were methodologically flawed, suggesting there is not an association of G. vaginalis biotypes and bacterial vaginosis. Sialidase activity was observed in 5 of the 8 biotypes. PMID:19386125

  11. Oscillation dynamics of active-unsterile neutrino mixing in a 2+1-tilde mixing scheme

    SciTech Connect

    Boyanovsky, D.; Holman, R.; Hutasoit, Jimmy A.

    2010-02-01

    We consider the possibility that sterile neutrinos exist and admit a description as unparticles; we call these unsterile neutrinos. We then examine the nature of neutrino oscillations in a model where an unsterile can mix with two active flavors with a very simple mass matrix of the seesaw type. Despite these simplifications, we find a number of remarkable features, all of which will occur generically when more realistic cases are considered. These include momentum dependent mixing angles, invisible decay widths for the unsterile-like mode, as well as the inheritance of a nonvanishing spectral density for the massive activelike modes. We also obtain the disappearance and appearance probabilities for the activelike neutrinos and find remarkable interference effects between the active and unsterile neutrinos as a consequence of threshold effects, yielding new oscillatory contributions with different oscillation lengths. These effects are only measurable on short baseline experiments because there both probabilities are suppressed as compared to mixing with a canonical sterile neutrino, thereby providing a diagnostics tool to discriminate unsterile from canonical sterile neutrinos. We conclude with a discussion of whether these new phenomena could aid in the reconciliation of the LSND and MiniBooNE results.

  12. GPU-BASED MONTE CARLO DUST RADIATIVE TRANSFER SCHEME APPLIED TO ACTIVE GALACTIC NUCLEI

    SciTech Connect

    Heymann, Frank; Siebenmorgen, Ralf

    2012-05-20

    A three-dimensional parallel Monte Carlo (MC) dust radiative transfer code is presented. To overcome the huge computing-time requirements of MC treatments, the computational power of vectorized hardware is used, utilizing either multi-core computer power or graphics processing units. The approach is a self-consistent way to solve the radiative transfer equation in arbitrary dust configurations. The code calculates the equilibrium temperatures of two populations of large grains and stochastic heated polycyclic aromatic hydrocarbons. Anisotropic scattering is treated applying the Heney-Greenstein phase function. The spectral energy distribution (SED) of the object is derived at low spatial resolution by a photon counting procedure and at high spatial resolution by a vectorized ray tracer. The latter allows computation of high signal-to-noise images of the objects at any frequencies and arbitrary viewing angles. We test the robustness of our approach against other radiative transfer codes. The SED and dust temperatures of one- and two-dimensional benchmarks are reproduced at high precision. The parallelization capability of various MC algorithms is analyzed and included in our treatment. We utilize the Lucy algorithm for the optical thin case where the Poisson noise is high, the iteration-free Bjorkman and Wood method to reduce the calculation time, and the Fleck and Canfield diffusion approximation for extreme optical thick cells. The code is applied to model the appearance of active galactic nuclei (AGNs) at optical and infrared wavelengths. The AGN torus is clumpy and includes fluffy composite grains of various sizes made up of silicates and carbon. The dependence of the SED on the number of clumps in the torus and the viewing angle is studied. The appearance of the 10 {mu}m silicate features in absorption or emission is discussed. The SED of the radio-loud quasar 3C 249.1 is fit by the AGN model and a cirrus component to account for the far-infrared emission.

  13. GPU-based Monte Carlo Dust Radiative Transfer Scheme Applied to Active Galactic Nuclei

    NASA Astrophysics Data System (ADS)

    Heymann, Frank; Siebenmorgen, Ralf

    2012-05-01

    A three-dimensional parallel Monte Carlo (MC) dust radiative transfer code is presented. To overcome the huge computing-time requirements of MC treatments, the computational power of vectorized hardware is used, utilizing either multi-core computer power or graphics processing units. The approach is a self-consistent way to solve the radiative transfer equation in arbitrary dust configurations. The code calculates the equilibrium temperatures of two populations of large grains and stochastic heated polycyclic aromatic hydrocarbons. Anisotropic scattering is treated applying the Heney-Greenstein phase function. The spectral energy distribution (SED) of the object is derived at low spatial resolution by a photon counting procedure and at high spatial resolution by a vectorized ray tracer. The latter allows computation of high signal-to-noise images of the objects at any frequencies and arbitrary viewing angles. We test the robustness of our approach against other radiative transfer codes. The SED and dust temperatures of one- and two-dimensional benchmarks are reproduced at high precision. The parallelization capability of various MC algorithms is analyzed and included in our treatment. We utilize the Lucy algorithm for the optical thin case where the Poisson noise is high, the iteration-free Bjorkman & Wood method to reduce the calculation time, and the Fleck & Canfield diffusion approximation for extreme optical thick cells. The code is applied to model the appearance of active galactic nuclei (AGNs) at optical and infrared wavelengths. The AGN torus is clumpy and includes fluffy composite grains of various sizes made up of silicates and carbon. The dependence of the SED on the number of clumps in the torus and the viewing angle is studied. The appearance of the 10 μm silicate features in absorption or emission is discussed. The SED of the radio-loud quasar 3C 249.1 is fit by the AGN model and a cirrus component to account for the far-infrared emission.

  14. Integrated separation scheme for measuring a suite of fission and activation products from a fresh mixed fission and activation product sample

    SciTech Connect

    Morley, Shannon M.; Seiner, Brienne N.; Finn, Erin C.; Greenwood, Lawrence R.; Smith, Steven C.; Gregory, Stephanie J.; Haney, Morgan M.; Lucas, Dawn D.; Arrigo, Leah M.; Beacham, Tere A.; Swearingen, Kevin J.; Friese, Judah I.; Douglas, Matthew; Metz, Lori A.

    2015-05-01

    Mixed fission and activation materials resulting from various nuclear processes and events contain a wide range of isotopes for analysis spanning almost the entire periodic table. In some applications such as environmental monitoring, nuclear waste management, and national security a very limited amount of material is available for analysis and characterization so an integrated analysis scheme is needed to measure multiple radionuclides from one sample. This work describes the production of a complex synthetic sample containing fission products, activation products, and irradiated soil and determines the percent recovery of select isotopes through the integrated chemical separation scheme. Results were determined using gamma energy analysis of separated fractions and demonstrate high yields of Ag (76 ± 6%), Au (94 ± 7%), Cd (59 ± 2%), Co (93 ± 5%), Cs (88 ± 3%), Fe (62 ± 1%), Mn (70 ± 7%), Np (65 ± 5%), Sr (73 ± 2%) and Zn (72 ± 3%). Lower yields (< 25%) were measured for Ga, Ir, Sc, and W. Based on the results of this experiment, a complex synthetic sample can be prepared with low atom/fission ratios and isotopes of interest accurately and precisely measured following an integrated chemical separation method.

  15. Immersion freezing of supermicron mineral dust particles: freezing results, testing different schemes for describing ice nucleation, and ice nucleation active site densities.

    PubMed

    Wheeler, M J; Mason, R H; Steunenberg, K; Wagstaff, M; Chou, C; Bertram, A K

    2015-05-14

    Ice nucleation on mineral dust particles is known to be an important process in the atmosphere. To accurately implement ice nucleation on mineral dust particles in atmospheric simulations, a suitable theory or scheme is desirable to describe laboratory freezing data in atmospheric models. In the following, we investigated ice nucleation by supermicron mineral dust particles [kaolinite and Arizona Test Dust (ATD)] in the immersion mode. The median freezing temperature for ATD was measured to be approximately -30 °C compared with approximately -36 °C for kaolinite. The freezing results were then used to test four different schemes previously used to describe ice nucleation in atmospheric models. In terms of ability to fit the data (quantified by calculating the reduced chi-squared values), the following order was found for ATD (from best to worst): active site, pdf-α, deterministic, single-α. For kaolinite, the following order was found (from best to worst): active site, deterministic, pdf-α, single-α. The variation in the predicted median freezing temperature per decade change in the cooling rate for each of the schemes was also compared with experimental results from other studies. The deterministic model predicts the median freezing temperature to be independent of cooling rate, while experimental results show a weak dependence on cooling rate. The single-α, pdf-α, and active site schemes all agree with the experimental results within roughly a factor of 2. On the basis of our results and previous results where different schemes were tested, the active site scheme is recommended for describing the freezing of ATD and kaolinite particles. We also used our ice nucleation results to determine the ice nucleation active site (INAS) density for the supermicron dust particles tested. Using the data, we show that the INAS densities of supermicron kaolinite and ATD particles studied here are smaller than the INAS densities of submicron kaolinite and ATD particles

  16. Immersion freezing of supermicron mineral dust particles: freezing results, testing different schemes for describing ice nucleation, and ice nucleation active site densities.

    PubMed

    Wheeler, M J; Mason, R H; Steunenberg, K; Wagstaff, M; Chou, C; Bertram, A K

    2015-05-14

    Ice nucleation on mineral dust particles is known to be an important process in the atmosphere. To accurately implement ice nucleation on mineral dust particles in atmospheric simulations, a suitable theory or scheme is desirable to describe laboratory freezing data in atmospheric models. In the following, we investigated ice nucleation by supermicron mineral dust particles [kaolinite and Arizona Test Dust (ATD)] in the immersion mode. The median freezing temperature for ATD was measured to be approximately -30 °C compared with approximately -36 °C for kaolinite. The freezing results were then used to test four different schemes previously used to describe ice nucleation in atmospheric models. In terms of ability to fit the data (quantified by calculating the reduced chi-squared values), the following order was found for ATD (from best to worst): active site, pdf-α, deterministic, single-α. For kaolinite, the following order was found (from best to worst): active site, deterministic, pdf-α, single-α. The variation in the predicted median freezing temperature per decade change in the cooling rate for each of the schemes was also compared with experimental results from other studies. The deterministic model predicts the median freezing temperature to be independent of cooling rate, while experimental results show a weak dependence on cooling rate. The single-α, pdf-α, and active site schemes all agree with the experimental results within roughly a factor of 2. On the basis of our results and previous results where different schemes were tested, the active site scheme is recommended for describing the freezing of ATD and kaolinite particles. We also used our ice nucleation results to determine the ice nucleation active site (INAS) density for the supermicron dust particles tested. Using the data, we show that the INAS densities of supermicron kaolinite and ATD particles studied here are smaller than the INAS densities of submicron kaolinite and ATD particles

  17. Degradation in urban air quality from construction activity and increased traffic arising from a road widening scheme.

    PubMed

    Font, Anna; Baker, Timothy; Mudway, Ian S; Purdie, Esme; Dunster, Christina; Fuller, Gary W

    2014-11-01

    Road widening schemes in urban areas are often proposed as a solution to traffic congestion and as a means of stimulating economic growth. There is however clear evidence that new or expanded roads rapidly fill with either displaced or induced traffic, offsetting any short-term gains in eased traffic flows. What has not been addressed in any great detail is the impact of such schemes on air quality, with modelled impact predictions seldom validated by measurements after the expansion of road capacity. In this study we made use of a road widening project in London to investigate the impact on ambient air quality (particulate matter, NOX, NO2) during and after the completion of the road works. PM10 increased during the construction period up to 15 μg m(-3) during working hours compared to concentrations before the road works. A box modelling approach was used to determine a median emission factor of 0.0022 kg PM10 m(-2) month(-1), three times larger than that used in the UK emission inventory (0.0007 kg PM10 m(-2) month(-1)). Peaks of activity released 0.0130 kg PM10 m(-2) month(-1), three and eight times smaller than the peak values used in the European and US inventories. After the completion of the widening there was an increase in all pollutants from the road during rush hour: 2-4 μg m(-3) for PM10; 1 μg m(-3) for PM2.5; 40 and 8 μg m(-3) for NOX and NO2, respectively. NO2 EU Limit Value was breached after the road development illustrating a notable deterioration in residential air quality. Additionally, PM10, but not PM2.5, glutathione dependent oxidative potential increased after the road was widened consistent with an increase in pro-oxidant components in the coarse particle mode, related to vehicle abrasion processes. These increased air pollution indices were associated with an increase in the number of cars, taxis and LGVs.

  18. Degradation in urban air quality from construction activity and increased traffic arising from a road widening scheme.

    PubMed

    Font, Anna; Baker, Timothy; Mudway, Ian S; Purdie, Esme; Dunster, Christina; Fuller, Gary W

    2014-11-01

    Road widening schemes in urban areas are often proposed as a solution to traffic congestion and as a means of stimulating economic growth. There is however clear evidence that new or expanded roads rapidly fill with either displaced or induced traffic, offsetting any short-term gains in eased traffic flows. What has not been addressed in any great detail is the impact of such schemes on air quality, with modelled impact predictions seldom validated by measurements after the expansion of road capacity. In this study we made use of a road widening project in London to investigate the impact on ambient air quality (particulate matter, NOX, NO2) during and after the completion of the road works. PM10 increased during the construction period up to 15 μg m(-3) during working hours compared to concentrations before the road works. A box modelling approach was used to determine a median emission factor of 0.0022 kg PM10 m(-2) month(-1), three times larger than that used in the UK emission inventory (0.0007 kg PM10 m(-2) month(-1)). Peaks of activity released 0.0130 kg PM10 m(-2) month(-1), three and eight times smaller than the peak values used in the European and US inventories. After the completion of the widening there was an increase in all pollutants from the road during rush hour: 2-4 μg m(-3) for PM10; 1 μg m(-3) for PM2.5; 40 and 8 μg m(-3) for NOX and NO2, respectively. NO2 EU Limit Value was breached after the road development illustrating a notable deterioration in residential air quality. Additionally, PM10, but not PM2.5, glutathione dependent oxidative potential increased after the road was widened consistent with an increase in pro-oxidant components in the coarse particle mode, related to vehicle abrasion processes. These increased air pollution indices were associated with an increase in the number of cars, taxis and LGVs. PMID:25128882

  19. Health Professionals' Perspectives on Exercise Referral and Physical Activity Promotion in Primary Care: Findings from a Process Evaluation of the National Exercise Referral Scheme in Wales

    ERIC Educational Resources Information Center

    Din, Nafees U.; Moore, Graham F.; Murphy, Simon; Wilkinson, Clare; Williams, Nefyn H.

    2015-01-01

    Background and objectives: Referring clinicians' experiences of exercise referral schemes (ERS) can provide valuable insights into their uptake. However, most qualitative studies focus on patient views only. This paper explores health professionals' perceptions of their role in promoting physical activity and experiences of a National Exercise…

  20. Tabled Execution in Scheme

    SciTech Connect

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  1. New Driving Scheme to Improve Hysteresis Characteristics of Organic Thin Film Transistor-Driven Active-Matrix Organic Light Emitting Diode Display

    NASA Astrophysics Data System (ADS)

    Yamamoto, Toshihiro; Nakajima, Yoshiki; Takei, Tatsuya; Fujisaki, Yoshihide; Fukagawa, Hirohiko; Suzuki, Mitsunori; Motomura, Genichi; Sato, Hiroto; Tokito, Shizuo; Fujikake, Hideo

    2011-02-01

    A new driving scheme for an active-matrix organic light emitting diode (AMOLED) display was developed to prevent the picture quality degradation caused by the hysteresis characteristics of organic thin film transistors (OTFTs). In this driving scheme, the gate electrode voltage of a driving-OTFT is directly controlled through the storage capacitor so that the operating point for the driving-OTFT is on the same hysteresis curve for every pixel after signal data are stored in the storage capacitor. Although the number of OTFTs in each pixel for the AMOLED display is restricted because OTFT size should be large enough to drive organic light emitting diodes (OLEDs) due to their small carrier mobility, it can improve the picture quality for an OTFT-driven flexible OLED display with the basic two transistor-one capacitor circuitry.

  2. Fabrication of Z-scheme Ag3PO4/MoS2 composites with enhanced photocatalytic activity and stability for organic pollutant degradation

    NASA Astrophysics Data System (ADS)

    Zhu, Chaosheng; Zhang, Lu; Jiang, Bo; Zheng, Jingtang; Hu, Ping; Li, Sujuan; Wu, Mingbo; Wu, Wenting

    2016-07-01

    In this study, highly efficient visible-light-driven Ag3PO4/MoS2 composite photocatalysts with different weight ratios of MoS2 were prepared via the ethanol-water mixed solvents precipitation method and characterized by ICP, XRD, HRTEM, FE-SEM, BET, XPS, UV-vis DRS and PL analysis. Under visible-light irradiation, Ag3PO4/MoS2 composites exhibit excellent photocatalytic activity towards the degradation of organic pollutants in aqueous solution. The optimal composite with 0.648 wt% MoS2 content exhibits the highest photocatalytic activity, which can degrade almost all MB under visible-light irradiation within 60 min. Recycling experiments confirmed that the Ag3PO4/MoS2 catalysts had superior cycle performance and stability. The photocatalytic activity enhancement of Ag3PO4/MoS2 photocatalysts can be mainly ascribed to the efficient separation of photogenerated charge carriers and the stronger oxidation and reduction ability through a Z-scheme system composed of Ag3PO4, Ag and MoS2, in which Ag particles act as the charge separation center. The high photocatalytic stability is due to the successful inhibition of the photocorrosion of Ag3PO4 by transferring the photogenerated electrons of Ag3PO4 to MoS2. The evidence of the Z-scheme photocatalytic mechanism of the composite photocatalysts could be obtained from the active species trapping experiments and the photoluminescence technique.

  3. Exercise referral: the public health panacea for physical activity promotion? A critical perspective of exercise referral schemes; their development and evaluation.

    PubMed

    Dugdill, Lindsey; Graham, Rebecca C; McNair, Fiona

    This review critically explores the development, impact and evaluation of exercise referral schemes (ERS) in the UK. A rapid expansion in the use of such ERSs has been recorded throughout leisure and primary care settings, but the evidence underpinning their implementation has been sparse and predominantly limited to randomized control trial (RCT) research design. Consequently, understanding of exercise referral as a 'real world' intervention has been limited. Considering the increasing importance being placed on evidence-based practice and clinical effectiveness, it is no longer sufficient for service providers of exercise referral to ignore the need to evaluate schemes. The guidelines on evaluation provided by the National Quality Assurance Framework for Exercise Referral are limited, hence practitioners are often unsure of the best measures to use when assessing effectiveness. Predominantly, exercise professionals focus on the collection of physiological data but tend to ignore relevant psychological and environmental parameters. Also, few UK studies have followed participants up in the long term, to see if physical activity behaviour is sustained over time. Here, evidence from two on-going, large-scale (n = 1600/annum) evaluation studies of exercise referral schemes, based in urban localities in the northwest of England, are described. A participatory action research framework for evaluation was utilized and incorporated multi-method research approaches for the assessment of both ERS participants and health professionals involved in intervention delivery. This framework is an appropriate methodology for the evaluation and development of complex interventions, and here incorporates case study, focus groups, interviews and survey questionnaires. Included was a 12-month tracking study of a cohort of exercise referral participants (n = 342), which measured leisure-time physical activity levels (Godin leisure time score), at baseline (entry to exercise referral) and

  4. The effect of various atomic partial charge schemes to elucidate consensus activity-correlating molecular regions: a test case of diverse QSAR models.

    PubMed

    Kumar, Sivakumar Prasanth; Jha, Prakash C; Jasrai, Yogesh T; Pandya, Himanshu A

    2016-01-01

    The estimation of atomic partial charges of the small molecules to calculate molecular interaction fields (MIFs) is an important process in field-based quantitative structure-activity relationship (QSAR). Several studies showed the influence of partial charge schemes that drastically affects the prediction accuracy of the QSAR model and focused on the selection of appropriate charge models that provide highest cross-validated correlation coefficient ([Formula: see text] or q(2)) to explain the variation in chemical structures against biological endpoints. This study shift this focus in a direction to understand the molecular regions deemed to explain SAR in various charge models and recognize a consensus picture of activity-correlating molecular regions. We selected eleven diverse dataset and developed MIF-based QSAR models using various charge schemes including Gasteiger-Marsili, Del Re, Merck Molecular Force Field, Hückel, Gasteiger-Hückel, and Pullman. The generalized resultant QSAR models were then compared with Open3DQSAR model to interpret the MIF descriptors decisively. We suggest the regions of activity contribution or optimization can be effectively determined by studying various charge-based models to understand SAR precisely.

  5. In-situ preparation of Z-scheme AgI/Bi5O7I hybrid and its excellent photocatalytic activity

    NASA Astrophysics Data System (ADS)

    Cui, Min; Yu, Jingxiong; Lin, Hongjun; Wu, Ying; Zhao, Leihong; He, Yiming

    2016-11-01

    The aim of this work was to synthesize, characterize and evaluate the photocatalytic activity of AgI/Bi5O7I composite photocatalyst under visible light irradiation. The photocatalyst was prepared by a simple one-step ionic reaction between Bi5O7I microrods and AgNO3 solutions, and was characterized by various techniques including X-ray diffraction (XRD), Raman spectroscopy (Raman), scanning electron microscopy (SEM), transmission electron microscopy (TEM), X-ray photoelectron spectroscopy (XPS), UV-vis diffuse reflectance spectroscopy (DRS), and photoluminescence spectroscopy (PL). The characterizations indicate that AgI particles were closely anchored on Bi5O7I micronods. During the photocataytic reaction, the composite was actually an Ag-AgI-Bi5O7I ternary system. The plasmonic effect of the formed Ag nanoparticles improved the visible light absorption performance, which benefits the photocatalytic reaction. However, more important was the formed heterojunction structure in the composite, which efficiently promoted the separation of electron-hole pairs by a plasmonic Z-scheme mechanism, and ultimately enhanced the photocatalytic activity. The optimal AgI/Bi5O7I composite showed a RhB degradation rate of 0.046 min-1, which was 3.83 and 6.57 times higher than those of Bi5O7I and AgI, respectively. This work may provide some insight into the design of novel and highly efficient Z-scheme visible-light photocatalysts.

  6. Electromyographic Activity of Hand Muscles in a Motor Coordination Game: Effect of Incentive Scheme and Its Relation with Social Capital

    PubMed Central

    Censolo, Roberto; Craighero, Laila; Ponti, Giovanni; Rizzo, Leonzio; Canto, Rosario; Fadiga, Luciano

    2011-01-01

    Background A vast body of social and cognitive psychology studies in humans reports evidence that external rewards, typically monetary ones, undermine intrinsic motivation. These findings challenge the standard selfish-rationality assumption at the core of economic reasoning. In the present work we aimed at investigating whether the different modulation of a given monetary reward automatically and unconsciously affects effort and performance of participants involved in a game devoid of visual and verbal interaction and without any perspective-taking activity. Methodology/Principal Findings Twelve pairs of participants were submitted to a simple motor coordination game while recording the electromyographic activity of First Dorsal Interosseus (FDI), the muscle mainly involved in the task. EMG data show a clear effect of alternative rewards strategies on subjects' motor behavior. Moreover, participants' stock of relevant past social experiences, measured by a specifically designed questionnaire, was significantly correlated with EMG activity, showing that only low social capital subjects responded to monetary incentives consistently with a standard rationality prediction. Conclusions/Significance Our findings show that the effect of extrinsic motivations on performance may arise outside social contexts involving complex cognitive processes due to conscious perspective-taking activity. More importantly, the peculiar performance of low social capital individuals, in agreement with standard economic reasoning, adds to the knowledge of the circumstances that makes the crowding out/in of intrinsic motivation likely to occur. This may help in improving the prediction and accuracy of economic models and reconcile this puzzling effect of external incentives with economic theory. PMID:21464986

  7. Progress on the application of ELM control schemes to ITER scenarios from the non-active phase to DT operation

    NASA Astrophysics Data System (ADS)

    Loarte, A.; Huijsmans, G.; Futatani, S.; Baylor, L. R.; Evans, T. E.; Orlov, D. M.; Schmitz, O.; Becoulet, M.; Cahyna, P.; Gribov, Y.; Kavin, A.; Sashala Naik, A.; Campbell, D. J.; Casper, T.; Daly, E.; Frerichs, H.; Kischner, A.; Laengner, R.; Lisgo, S.; Pitts, R. A.; Saibene, G.; Wingen, A.

    2014-03-01

    Progress in the definition of the requirements for edge localized mode (ELM) control and the application of ELM control methods both for high fusion performance DT operation and non-active low-current operation in ITER is described. Evaluation of the power fluxes for low plasma current H-modes in ITER shows that uncontrolled ELMs will not lead to damage to the tungsten (W) divertor target, unlike for high-current H-modes in which divertor damage by uncontrolled ELMs is expected. Despite the lack of divertor damage at lower currents, ELM control is found to be required in ITER under these conditions to prevent an excessive contamination of the plasma by W, which could eventually lead to an increased disruptivity. Modelling with the non-linear MHD code JOREK of the physics processes determining the flow of energy from the confined plasma onto the plasma-facing components during ELMs at the ITER scale shows that the relative contribution of conductive and convective losses is intrinsically linked to the magnitude of the ELM energy loss. Modelling of the triggering of ELMs by pellet injection for DIII-D and ITER has identified the minimum pellet size required to trigger ELMs and, from this, the required fuel throughput for the application of this technique to ITER is evaluated and shown to be compatible with the installed fuelling and tritium re-processing capabilities in ITER. The evaluation of the capabilities of the ELM control coil system in ITER for ELM suppression is carried out (in the vacuum approximation) and found to have a factor of ˜2 margin in terms of coil current to achieve its design criterion, although such a margin could be substantially reduced when plasma shielding effects are taken into account. The consequences for the spatial distribution of the power fluxes at the divertor of ELM control by three-dimensional (3D) fields are evaluated and found to lead to substantial toroidal asymmetries in zones of the divertor target away from the separatrix

  8. Establishing a Proficiency Testing Scheme for Drinking Water Radiochemistry

    SciTech Connect

    Brookman, Brian

    2008-08-14

    As part of its international water proficiency testing (PT) scheme, 'Aquacheck', the LGC Proficiency Testing Group has established a new water radiochemistry PT scheme. The PT scheme is aimed at laboratories who undertake radiochemical analysis on drinking water samples as part of an environmental monitoring programme. Following a scheme design and feasibility study, the new scheme was established to monitor the laboratory performance of participants undertaking the determination of gross alpha, gross beta and tritium activity. Three rounds of the new water radiochemistry PT scheme are now complete. This paper explains the process of establishing such a scheme, reviews the results so far, and addresses future development of the scheme.

  9. Pixel-Level Digital-to-Analog Conversion Scheme with Compensation of Thin-Film-Transistor Variations for Compact Integrated Data Drivers of Active Matrix Organic Light Emitting Diodes

    NASA Astrophysics Data System (ADS)

    Kim, Tae-Wook; Park, Sang-Gyu; Choi, Byong-Deok

    2011-03-01

    The previous pixel-level digital-to-analog-conversion (DAC) scheme that implements a part of a DAC in a pixel circuit turned out to be very efficient for reducing the peripheral area of an integrated data driver fabricated with low-temperature polycrystalline silicon thin-film transistors (LTPS TFTs). However, how the pixel-level DAC can be compatible with the existing pixel circuits including compensation schemes of TFT variations and IR drops on supply rails, which is of primary importance for active matrix organic light emitting diodes (AMOLEDs) is an issue in this scheme, because LTPS TFTs suffer from random variations in their characteristics. In this paper, we show that the pixel-level DAC scheme can be successfully used with the previous compensation schemes by giving two examples of voltage- and current-programming pixels. The previous pixel-level DAC schemes require additional two TFTs and one capacitor, but for these newly proposed pixel circuits, the overhead is no more than two TFTs by utilizing the already existing capacitor. In addition, through a detailed analysis, it has been shown that the pixel-level DAC can be expanded to a 4-bit resolution, or be applied together with 1:2 demultiplexing driving for 6- to 8-in. diagonal XGA AMOLED display panels.

  10. Monitoring of the ground surface temperature and the active layer in NorthEastern Canadian permafrost areas using remote sensing data assimilated in a climate land surface scheme.

    NASA Astrophysics Data System (ADS)

    Marchand, N.; Royer, A.; Krinner, G.; Roy, A.

    2014-12-01

    Projected future warming is particularly strong in the Northern high latitudes where increases of temperatures are up to 2 to 6 °C. Permafrost is present on 25 % of the northern hemisphere lands and contain high quantities of « frozen » carbon, estimated at 1400 Gt (40 % of the global terrestrial carbon). The aim of this study is to improve our understanding of the climate evolution in arctic areas, and more specifically of land areas covered by snow. The objective is to describe the ground temperature year round including under snow cover, and to analyse the active layer thickness evolution in relation to the climate variability. We use satellite data (fusion of MODIS land surface temperature « LST » and microwave AMSR-E brightness temperature « Tb ») assimilated in the Canadian Land Surface Scheme (CLASS) of the Canadian climate model coupled with a simple radiative transfer model (HUT). This approach benefits from the advantages of each of the data type in order to complete two objectives : 1- build a solid methodology for retrieving the ground temperature, with and without snow cover, in taïga and tundra areas ; 2 - from those retrieved ground temperatures, derive the summer melt duration and the active layer depth. We describe the coupling of the models and the methodology that adjusts the meteorological input parameters of the CLASS model (mainly air temperature and precipitations derived from the NARR database) in order to minimise the simulated LST and Tb ouputs in comparison with satellite measurements. Using ground-based meteorological data as validation references in NorthEastern Canadian tundra, the results show that the proposed approach improves the soil temperatures estimates when using the MODIS LST and Tb at 10 and 19 GHz to constrain the model in comparison with the model outputs without satellite data. Error analysis is discussed for the summer period (2.5 - 4 K) and for the snow covered winter period (2 - 3.5 K). Further steps are

  11. The NEC Link Scheme

    ERIC Educational Resources Information Center

    Noakes, Peter

    1976-01-01

    Describes the operation of the National Electronics Council (NEC) Link Scheme for schools in Great Britain. The service is intended to provide technical assistance, information concerning surplus equipment, and guest speakers for school aspiring professional electronic counsel. (CP)

  12. Exercise-referral scheme to promote physical activity among hypertensive patients: design of a cluster randomized trial in the Primary Health Care Units of Mexico’s Social Security System

    PubMed Central

    2014-01-01

    Background Although the benefits of physical activity (PA) on to prevent and manage non-communicable diseases are well known, strategies to help increase the levels of PA among different populations are limited. Exercise-referral schemes have emerged as one effective approach to promote PA; however, there is uncertainty about the feasibility and effectiveness of these schemes in settings outside high-income countries. This study will examine the effectiveness of a scheme to refer hypertensive patients identified in Primary Health Care facilities (PHCU) of the Mexican social security institution to a group PA program offered in the same institution. Methods and design We will describe the methods of a cluster randomized trial study designed to evaluate the effectiveness of an exercise referral scheme to increasing physical activity in hypertensive patients compared to a non-referral scheme. Four PHCU were selected for the study; the PHCU will take part as the unit of randomization and sedentary hypertensive patients as the unit of assessment. 2 PHCU of control group (GC) will provide information to hypertensive patients about physical activity benefits and ways to increase it safely. 2 PHCU of intervention group (IG) will refer patients to sports facilities at the same institution, to follow a group-based PA program developed to increase the PA levels with a designed based on the Transtheoretical Model and Social Cognitive Theory. To evaluate the effects of the intervention as well as short-term maintenance of the intervention’s effects, PA will be assessed at baseline, at 24 and 32 weeks of follow-up. The main outcome will be the difference before and after intervention in the percentage of participants meeting recommended levels of PA between and within intervention and control groups. PA will be measured through self-report and with objective measure by accelerometer. Discussion This study will allow us to evaluate a multidisciplinary effort to link the primary

  13. Mediator-free direct Z-scheme photocatalytic system: BiVO4/g-C3N4 organic-inorganic hybrid photocatalyst with highly efficient visible-light-induced photocatalytic activity.

    PubMed

    Tian, Na; Huang, Hongwei; He, Ying; Guo, Yuxi; Zhang, Tierui; Zhang, Yihe

    2015-03-01

    We disclose the fabrication of a mediator-free direct Z-scheme photocatalyst system BiVO4/g-C3N4 using a mixed-calcination method based on the more reliable interfacial interaction. The facet coupling occurred between the g-C3N4 (002) and BiVO4 (121), and it was revealed by X-ray diffraction (XRD), X-ray photoelectron spectroscopy (XPS) and transmission electron microscope (TEM). The crystal structure and optical properties of the as-prepared samples have also been characterized by Fourier-transform infrared (FTIR), scanning electron microscopy (SEM) and UV-vis diffuse reflectance spectra (DRS) in details. The photocatalytic experiments indicated that the BiVO4/g-C3N4 composite photocatalysts display a significantly enhanced photocatalytic activity pertaining to RhB degradation and photocurrent generation (PC) compared to the pristine BiVO4 and g-C3N4. This remarkably improved photocatalytic performance should be attributed to the fabrication of a direct Z-scheme system of BiVO4/g-C3N4, which can result in a more efficient separation of photoinduced charge carriers than band-band transfer, thus endowing it with the much more powerful oxidation and reduction capability, as confirmed by the photoluminescence (PL) spectra and electrochemical impedance spectra (EIS). The Z-scheme mechanism of BiVO4/g-C3N4 heterostructure was verified by a series of combined techniques, including the active species trapping experiments, NBT transformation and terephthalic acid photoluminescence probing technique (TA-PL) over BiVO4/g-C3N4 composites and the pristine samples. The present work not only furthered the understanding of mediator-free Z-scheme photocatalysis, but also shed new light on the design of heterostructural photocatalysts with high-performance. PMID:25635354

  14. Mediator-free direct Z-scheme photocatalytic system: BiVO4/g-C3N4 organic-inorganic hybrid photocatalyst with highly efficient visible-light-induced photocatalytic activity.

    PubMed

    Tian, Na; Huang, Hongwei; He, Ying; Guo, Yuxi; Zhang, Tierui; Zhang, Yihe

    2015-03-01

    We disclose the fabrication of a mediator-free direct Z-scheme photocatalyst system BiVO4/g-C3N4 using a mixed-calcination method based on the more reliable interfacial interaction. The facet coupling occurred between the g-C3N4 (002) and BiVO4 (121), and it was revealed by X-ray diffraction (XRD), X-ray photoelectron spectroscopy (XPS) and transmission electron microscope (TEM). The crystal structure and optical properties of the as-prepared samples have also been characterized by Fourier-transform infrared (FTIR), scanning electron microscopy (SEM) and UV-vis diffuse reflectance spectra (DRS) in details. The photocatalytic experiments indicated that the BiVO4/g-C3N4 composite photocatalysts display a significantly enhanced photocatalytic activity pertaining to RhB degradation and photocurrent generation (PC) compared to the pristine BiVO4 and g-C3N4. This remarkably improved photocatalytic performance should be attributed to the fabrication of a direct Z-scheme system of BiVO4/g-C3N4, which can result in a more efficient separation of photoinduced charge carriers than band-band transfer, thus endowing it with the much more powerful oxidation and reduction capability, as confirmed by the photoluminescence (PL) spectra and electrochemical impedance spectra (EIS). The Z-scheme mechanism of BiVO4/g-C3N4 heterostructure was verified by a series of combined techniques, including the active species trapping experiments, NBT transformation and terephthalic acid photoluminescence probing technique (TA-PL) over BiVO4/g-C3N4 composites and the pristine samples. The present work not only furthered the understanding of mediator-free Z-scheme photocatalysis, but also shed new light on the design of heterostructural photocatalysts with high-performance.

  15. Compact Spreader Schemes

    SciTech Connect

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  16. Compact spreader schemes

    NASA Astrophysics Data System (ADS)

    Placidi, M.; Jung, J.-Y.; Ratti, A.; Sun, C.

    2014-12-01

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  17. Check-Digit Schemes.

    ERIC Educational Resources Information Center

    Wheeler, Mary L.

    1994-01-01

    Discusses the study of identification codes and check-digit schemes as a way to show students a practical application of mathematics and introduce them to coding theory. Examples include postal service money orders, parcel tracking numbers, ISBN codes, bank identification numbers, and UPC codes. (MKR)

  18. Enhanced arbitrated quantum signature scheme using Bell states

    NASA Astrophysics Data System (ADS)

    Wang, Chao; Liu, Jian-Wei; Shang, Tao

    2014-06-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme.

  19. Beyond Scheme F

    SciTech Connect

    Elliott, C.J.; Fisher, H.; Pepin, J.; Gillmann, R.

    1996-07-01

    Traffic classification techniques were evaluated using data from a 1993 investigation of the traffic flow patterns on I-20 in Georgia. First we improved the data by sifting through the data base, checking against the original video for questionable events and removing and/or repairing questionable events. We used this data base to critique the performance quantitatively of a classification method known as Scheme F. As a context for improving the approach, we show in this paper that scheme F can be represented as a McCullogh-Pitts neural network, oar as an equivalent decomposition of the plane. We found that Scheme F, among other things, severely misrepresents the number of vehicles in Class 3 by labeling them as Class 2. After discussing the basic classification problem in terms of what is measured, and what is the desired prediction goal, we set forth desirable characteristics of the classification scheme and describe a recurrent neural network system that partitions the high dimensional space up into bins for each axle separation. the collection of bin numbers, one for each of the axle separations, specifies a region in the axle space called a hyper-bin. All the vehicles counted that have the same set of in numbers are in the same hyper-bin. The probability of the occurrence of a particular class in that hyper- bin is the relative frequency with which that class occurs in that set of bin numbers. This type of algorithm produces classification results that are much more balanced and uniform with respect to Classes 2 and 3 and Class 10. In particular, the cancellation of errors of classification that occurs is for many applications the ideal classification scenario. The neural network results are presented in the form of a primary classification network and a reclassification network, the performance matrices for which are presented.

  20. ESCAP mobile training scheme.

    PubMed

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries. PMID:12265562

  1. New LNG process scheme

    SciTech Connect

    Foglietta, J.H.

    1999-07-01

    A new LNG cycle has been developed for base load liquefaction facilities. This new design offers a different technical and economical solution comparing in efficiency with the classical technologies. The new LNG scheme could offer attractive business opportunities to oil and gas companies that are trying to find paths to monetize gas sources more effectively; particularly for remote or offshore locations where smaller scale LNG facilities might be applicable. This design offers also an alternative route to classic LNG projects, as well as alternative fuel sources. Conceived to offer simplicity and access to industry standard equipment, This design is a hybrid result of combining a standard refrigeration system and turboexpander technology.

  2. On the role of SMA modeling in simulating NiTinol self-expanding stenting surgeries to assess the performance characteristics of mechanical and thermal activation schemes.

    PubMed

    Saleeb, A F; Dhakal, B; Owusu-Danquah, J S

    2015-09-01

    The work is focused on a detailed simulation of the key stages involved in the NiTinol self-expanding stenting surgical procedure; i.e., crimping, deployment, SMA activation, as well as post-surgery steady-state cyclic behavior mimicking the systolic-to-diastolic pressure oscillations. To this end, a general multi-mechanism SMA model was utilized, whose calibration was completed using the test data from simple isothermal uniaxial tension experiments. The emphasis in the study was placed on the comparison of two alternative SMA activation protocols, in terms of both the immediate and long-term (post-surgery) performance characteristics. The first is 'hard' mechanical activation utilizing superelasticity, and the second is 'soft' thermal activation relying upon the combined one-way shape memory effect and constrained-recovery characteristics of the NiTinol material. The important findings are (1) the thermal activation protocol is far superior compared to the mechanical counterpart, from the point of view of lower magnitudes of the induced outward chronic forces, lesser developed stresses in the host tissue, as well as higher compression ratio with lesser crimping force for the same geometry of initial stent memory configuration, (2) the thermal activation protocol completely bypassed the complications of maintaining the high restraining force during deployment of the stent, and (3) there is no indication of any detrimental functional fatigue/degradation in the cured stenotic artery during cyclic pressure oscillations.

  3. Pixel-Level Digital-to-Analog Conversion Scheme for Compact Data Drivers of Active Matrix Organic Light-Emitting Diodes with Low-Temperature Polycrystalline Silicon Thin-Film Transistors

    NASA Astrophysics Data System (ADS)

    Kim, Tae-Wook; Choi, Byong-Deok

    2010-03-01

    This paper shows that a part of a digital-to-analog conversion (DAC) function can be included in a pixel circuit to save the circuit area of an integrated data driver fabricated with low-temperature polycrystalline silicon thin-film transistors (LTPS-TFTs). Because the pixel-level DAC can be constructed by two TFTs and one small capacitor, the pixel circuit does not become markedly complex. The design of an 8-bit DAC, which combines a 6-bit resistor-string-based DAC and a 2-bit pixel-level DAC for a 4-in. diagonal VGA format active matrix organic light-emitting diode (AMOLED), is shown in detail. In addition, analysis results are presented, revealing that the 8-bit DAC scheme including a 2-bit pixel-level DAC with 1:3 demultiplexing can be applied to very high video formats, such as XGA, for a 3 to 4-in. diagonal AMOLED. Even for a 9- to 12-in. diagonal AMOLED, the proposed scheme can still be applied to the XGA format, even though no demultiplexing is allowed. The total height of the proposed 8-bit DAC is approximately 960 µm, which is almost one-half of that of the previous 6-bit resistor-string-based DAC.

  4. Pixel-Level Digital-to-Analog Conversion Scheme for Compact Data Drivers of Active Matrix Organic Light-Emitting Diodes with Low-Temperature Polycrystalline Silicon Thin-Film Transistors

    NASA Astrophysics Data System (ADS)

    Tae-Wook Kim,; Byong-Deok Choi,

    2010-03-01

    This paper shows that a part of a digital-to-analog conversion (DAC) function can be included in a pixel circuit to save the circuit area of an integrated data driver fabricated with low-temperature polycrystalline silicon thin-film transistors (LTPS-TFTs). Because the pixel-level DAC can be constructed by two TFTs and one small capacitor, the pixel circuit does not become markedly complex. The design of an 8-bit DAC, which combines a 6-bit resistor-string-based DAC and a 2-bit pixel-level DAC for a 4-in. diagonal VGA format active matrix organic light-emitting diode (AMOLED), is shown in detail. In addition, analysis results are presented, revealing that the 8-bit DAC scheme including a 2-bit pixel-level DAC with 1:3 demultiplexing can be applied to very high video formats, such as XGA, for a 3 to 4-in. diagonal AMOLED. Even for a 9- to 12-in. diagonal AMOLED, the proposed scheme can still be applied to the XGA format, even though no demultiplexing is allowed. The total height of the proposed 8-bit DAC is approximately 960 μm, which is almost one-half of that of the previous 6-bit resistor-string-based DAC.

  5. An Investigation into Nigerian Teachers' Knowledge of Primary Science Curriculum Content and Involvement in Practical Activities: Implications for the UBE Scheme

    ERIC Educational Resources Information Center

    Ogunleye, Ayodele O.

    2009-01-01

    The study was designed to find out the extent of Nigerian teachers' knowledge of primary science curriculum content and their involvement in the participation of their pupils in science activities. Furthermore, the study sought to find out teachers ranking of primary science objectives. The subjects were 60 primary school teachers randomly…

  6. The impact of revised simplified Arakawa-Schubert scheme on the simulation of mean and diurnal variability associated with active and break phases of Indian summer monsoon using CFSv2

    NASA Astrophysics Data System (ADS)

    Ganai, Malay; Krishna, R. Phani Murali; Mukhopadhyay, P.; Mahakur, M.

    2016-08-01

    The impact of revised simplified Arakawa-Schubert (RSAS) convective parameterization scheme in Climate Forecast System (CFS) version 2 (CFSv2) on the simulation of active and break phases of Indian summer monsoon (ISM) has been investigated. The results revealed that RSAS showed better fidelity in simulating monsoon features from diurnal to daily scales during active and break periods as compared to SAS simulation. Prominent improvement can be noted in simulating diurnal phase of precipitation in RSAS over central India (CI) and equatorial Indian Ocean (EIO) region during active periods. The spatial distribution of precipitation largely improved in RSAS simulation during active and break episodes. CFSv2 with SAS simulation has noticeable dry bias over CI and wet bias over EIO region which appeared to be largely reduced in RSAS simulation during both phases of the intraseasonal oscillation (ISO). During active periods, RSAS simulates more realistic probability distribution function (PDF) in good agreement with the observation. The relative improvement has been identified in outgoing longwave radiation, monsoon circulations, and vertical velocities in RSAS over SAS simulation. The improvement of rainfall distribution appears to be contributed by proper simulation of convective rainfall in RSAS. CFSv2 with RSAS simulation is able to simulate observed diurnal cycle of rainfall over CI. It correctly reproduces the time of maximum rainfall over CI. It is found that the improved feedback between moisture and convective processes in RSAS may be attributed to its improved simulation. Besides improvement, RSAS could not reproduce proper tropospheric temperature, cloud hydrometeors over ISM domain which shows the scope for future development.

  7. 1550 nm VCSEL-based 0.48 Tb/s transmission scheme employing PAM-4 and WDM for active optical cables

    NASA Astrophysics Data System (ADS)

    Markou, S.; Dris, S.; Kalavrouziotis, D.; Avramopoulos, H.; Pleros, N.; Tsiokos, Dimitris M.

    2014-05-01

    With this paper we investigate the system-level performance of VCSELs, parameterized with true experimental LI-VI data and dynamic characteristics of state-of-the-art VCSELs with 3 dB modulation bandwidth at 15 GHz, and propose their deployment as high-speed multi-level optical sources in a mid-range active optical cable (AOC) model for performance prediction of a rack-to-rack interconnection. The AOC architecture combines a 6-element 1550 nm VCSEL array, each directly modulated with 40 Gbaud PAM-4 data, with a wavelength division multiplexer (WDM), in order to implement a parallel link with aggregate traffic of 0.48 Tb/s. Transmission reach exceeded 300 m by deploying a two-tap feed forward equalizer filter at the electrical VCSEL driver. Bit Error Rate (BER) measurements and analysis were carried out in MATLAB. In practice, the thermal behavior and basic operational characteristics of the VCSELs fabricated by the Technische Universität München (TUM) were used to study the thermal performance and operational range of the complete AOC model. The VCSELs were initially operated at 20°C and BER measurements showed power penalties of 1.7 dB and 3.5 dB at 300 m and 500 m of transmission distance respectively for all 6 data channels. System performance was also investigated for elevated operating temperatures of the VCSEL module and the additional system degradation and BER penalties introduced by operation at 50°C and 65°C were also investigated for transmission distances of 300 m and 500 m.

  8. Plotting and Scheming

    NASA Technical Reports Server (NTRS)

    2004-01-01

    [figure removed for brevity, see original site] Figure 1 [figure removed for brevity, see original site] Figure 2 Click for larger view

    These two graphics are planning tools used by Mars Exploration Rover engineers to plot and scheme the perfect location to place the rock abrasion tool on the rock collection dubbed 'El Capitan' near Opportunity's landing site. 'El Capitan' is located within a larger outcrop nicknamed 'Opportunity Ledge.'

    The rover visualization team from NASA Ames Research Center, Moffett Field, Calif., initiated the graphics by putting two panoramic camera images of the 'El Capitan' area into their three-dimensional model. The rock abrasion tool team from Honeybee Robotics then used the visualization tool to help target and orient their instrument on the safest and most scientifically interesting locations. The blue circle represents one of two current targets of interest, chosen because of its size, lack of dust, and most of all its distinct and intriguing geologic features. To see the second target location, see the image titled 'Plotting and Scheming.'

    The rock abrasion tool is sensitive to the shape and texture of a rock, and must safely sit within the 'footprint' indicated by the blue circles. The rock area must be large enough to fit the contact sensor and grounding mechanism within the area of the outer blue circle, and the rock must be smooth enough to get an even grind within the abrasion area of the inner blue circle. If the rock abrasion tool were not grounded by its support mechanism or if the surface were uneven, it could 'run away' from its target. The rock abrasion tool is location on the rover's instrument deployment device, or arm.

    Over the next few martian days, or sols, the rover team will use these and newer, similar graphics created with more recent, higher-resolution panoramic camera images and super-spectral data from the miniature thermal emission spectrometer. These data will be used to pick the best

  9. Active polar gullies on Mars and the role of carbon dioxide.

    PubMed

    Hoffman, Nick

    2002-01-01

    The detection of geologically recent channels and gullies on Mars has been interpreted as evidence for recent water activity on this arid and cold planet. The presence of active water would have considerable implications for the history of Mars and for the potential for an active near-surface biota; however, water is not the only substance that can flow and may actually be one of the least likely candidates when the modern permafrost environment is considered. Here, a key site of recent gully and channel development on Mars is reported at 71 degrees S in Sisyphi Cavi, within the annual zone of polar CO2 ice and snow accumulation. Superposition of channel features over and/or through the defrosting CO2 snowpack shows that the channels are active at the present day and probably have fluid flows every spring during the annual defrosting. In itself, this is a significant observation as active fluid flows of any nature have not yet been proven on Mars. However, the ambient temperature at the time of gully activity appears to require a role for CO2 in the formation of the channels, rather than water. A model is proposed for gas-lubricated flow in the channels based on avalanching of CO2 snowpack and clastic debris. If similar mechanisms are responsible for all the recent gullies on Mars, then perhaps no near-surface astrobiological targets are available.

  10. Classification schemes for arteriovenous malformations.

    PubMed

    Davies, Jason M; Kim, Helen; Young, William L; Lawton, Michael T

    2012-01-01

    The wide variety of arteriovenous malformation (AVM) anatomy, size, location, and clinical presentation makes patient selection for surgery a difficult process. Neurosurgeons have identified key factors that determine the risks of surgery and then devised classification schemes that integrate these factors, predict surgical results, and help select patients for surgery. These classification schemes have value because they transform complex decisions into simpler algorithms. In this review, the important grading schemes that have contributed to management of patients with brain AVMs are described, and our current approach to patient selection is outlined.

  11. An 8-bit Data Driving Scheme Based on Two-Step Digital-to-Analog Conversion for Integrated Data Drivers of Active-Matrix Organic Light-Emitting Diodes

    NASA Astrophysics Data System (ADS)

    Kim, Tae-Wook; Choi, Byong-Deok

    2012-03-01

    The two-step digital-to-analog conversion (DAC) scheme has been reported to be very area-efficient for thin-film transistor-liquid crystal display (TFT-LCD) data driver ICs, but it is not as well suited as it is for polycrystalline silicon (poly-Si) TFT integrated circuits. The charge redistribution in the two-step DAC process requires an operational amplifier in principle, which is most challenging for poly-Si TFT circuits. The proposed two-step DAC for active-matrix organic light-emitting diodes (AMOLEDs) makes the operational amplifier unnecessary by appropriately exploiting the preexisting capacitors in the pixel to compensate for the characteristic variations of TFTs. Moreover, the second-step DAC occurs at the same time as threshold voltage compensation, and it does not require additional time. By thoroughly analyzing area efficiency depending on the resolution decomposition between the first- and second-step DACs, we found that 5-bit coarse plus 3-bit fine DACs are best in terms of circuit area. When we designed a layout of the proposed 8-bit DAC on the basis of the 4 µm design rules, the DAC circuit area is no more than 72×637 µm2, which, to the best of our knowledge, is the most compact to date.

  12. The Influence of Second-Hand Cigarette Smoke Exposure during Childhood and Active Cigarette Smoking on Crohn’s Disease Phenotype Defined by the Montreal Classification Scheme in a Western Cape Population, South Africa

    PubMed Central

    Chivese, Tawanda; Esterhuizen, Tonya M.; Basson, Abigail Raffner

    2015-01-01

    Background Smoking may worsen the disease outcomes in patients with Crohn’s disease (CD), however the effect of exposure to second-hand cigarette smoke during childhood is unclear. In South Africa, no such literature exists. The aim of this study was to investigate whether disease phenotype, at time of diagnosis of CD, was associated with exposure to second-hand cigarette during childhood and active cigarette smoking habits. Methods A cross sectional examination of all consecutive CD patients seen during the period September 2011-January 2013 at 2 large inflammatory bowel disease centers in the Western Cape, South Africa was performed. Data were collected via review of patient case notes, interviewer-administered questionnaire and clinical examination by the attending gastroenterologist. Disease phenotype (behavior and location) was evaluated at time of diagnosis, according to the Montreal Classification scheme. In addition, disease behavior was stratified as ‘complicated’ or ‘uncomplicated’, using predefined definitions. Passive cigarette smoke exposure was evaluated during 3 age intervals: 0–5, 6–10, and 11–18 years. Results One hundred and ninety four CD patients were identified. Cigarette smoking during the 6 months prior to, or at time of diagnosis was significantly associated with ileo-colonic (L3) disease (RRR = 3.63; 95%CI, 1.32–9.98, p = 0.012) and ileal (L1) disease (RRR = 3.54; 95%CI, 1.06–11.83, p = 0.040) compared with colonic disease. In smokers, childhood passive cigarette smoke exposure during the 0–5 years age interval was significantly associated with ileo-colonic CD location (RRR = 21.3; 95%CI, 1.16–391.55, p = 0.040). No significant association between smoking habits and disease behavior at diagnosis, whether defined by the Montreal scheme, or stratified as ‘complicated’ vs ‘uncomplicated’, was observed. Conclusion Smoking habits were associated with ileo-colonic (L3) and ileal (L1) disease at time of diagnosis in

  13. Relaxation schemes for Chebyshev spectral multigrid methods

    NASA Technical Reports Server (NTRS)

    Kang, Yimin; Fulton, Scott R.

    1993-01-01

    Two relaxation schemes for Chebyshev spectral multigrid methods are presented for elliptic equations with Dirichlet boundary conditions. The first scheme is a pointwise-preconditioned Richardson relaxation scheme and the second is a line relaxation scheme. The line relaxation scheme provides an efficient and relatively simple approach for solving two-dimensional spectral equations. Numerical examples and comparisons with other methods are given.

  14. Development of a numerical scheme to predict geomagnetic storms after intense solar events and geomagnetic activity 27 days in advance. Final report, 6 Aug 86-16 Nov 90

    SciTech Connect

    Akasofu, S.I.; Lee, L.H.

    1991-02-01

    The modern geomagnetic storm prediction scheme should be based on a numerical simulation method, rather than on a statistical result. Furthermore, the scheme should be able to predict the geomagnetic storm indices, such as the Dst and AE indices, as a function of time. By recognizing that geomagnetic storms are powered by the solar wind-magnetosphere generator and that its power is given in terms of the solar wind speed, the interplanetary magnetic field (IMF) magnitude and polar angle, the authors have made a major advance in predicting both flare-induced storms and recurrent storms. Furthermore, it is demonstrated that the prediction scheme can be calibrated using the interplanetary scintillation (IPS) observation, when the solar disturbance advances about half-way to the earth. It is shown, however, that we are still far from a reliable prediction scheme. The prediction of the IMF polar angle requires future advance in understanding characteristics of magnetic clouds.

  15. The salivary testosterone and cortisol response to three loading schemes.

    PubMed

    Crewther, Blair; Cronin, John; Keogh, Justin; Cook, Christian

    2008-01-01

    This aim of this study was to examine the free hormone (in saliva) responses to squat workouts performed by recreationally weight-trained males, using either a power (8 sets of 6 reps, 45% 1 repetition maximum [1RM], 3-minute rest periods, ballistic movements), hypertrophy (10 sets of 10 reps, 75% 1RM, 2-minute rest periods, controlled movements), or maximal strength scheme (6 sets of 4 reps, 88% 1RM, 4-minute rest periods, explosive intent). To determine the relative importance of the different training variables, these schemes were equated by workout duration with the power and strength schemes also equated by load volume. Salivary testosterone (T) and cortisol (C) both increased following the hypertrophy scheme (P < 0.05), with little to no hormonal change across the power and maximal strength schemes (P > 0.05). In general, the postexercise T and C responses to the hypertrophy scheme exceeded the other two schemes (P < 0.05). The greater volume of load lifted in the hypertrophy protocol over the same workout duration may explain the endocrine differences observed. The similar T and C responses to the power and maximal strength schemes (of equal volume) support such a view and suggest that differences in load intensity, rest periods, and technique are secondary to volume. Because the acute hormonal responses to resistance exercise contribute to protein metabolism, then load volume may be the most important workout variable activating the endocrine system and stimulating muscle growth.

  16. High resolution schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Harten, A.

    1983-01-01

    A class of new explicit second order accurate finite difference schemes for the computation of weak solutions of hyperbolic conservation laws is presented. These highly nonlinear schemes are obtained by applying a nonoscillatory first order accurate scheme to an appropriately modified flux function. The so-derived second order accurate schemes achieve high resolution while preserving the robustness of the original nonoscillatory first order accurate scheme. Numerical experiments are presented to demonstrate the performance of these new schemes.

  17. Energy partitioning schemes: a dilemma.

    PubMed

    Mayer, I

    2007-01-01

    Two closely related energy partitioning schemes, in which the total energy is presented as a sum of atomic and diatomic contributions by using the "atomic decomposition of identity", are compared on the example of N,N-dimethylformamide, a simple but chemically rich molecule. Both schemes account for different intramolecular interactions, for instance they identify the weak C-H...O intramolecular interactions, but give completely different numbers. (The energy decomposition scheme based on the virial theorem is also considered.) The comparison of the two schemes resulted in a dilemma which is especially striking when these schemes are applied for molecules distorted from their equilibrium structures: one either gets numbers which are "on the chemical scale" and have quite appealing values at the equilibrium molecular geometries, but exhibiting a counter-intuitive distance dependence (the two-center energy components increase in absolute value with the increase of the interatomic distances)--or numbers with too large absolute values but "correct" distance behaviour. The problem is connected with the quick decay of the diatomic kinetic energy components.

  18. Nonlinear secret image sharing scheme.

    PubMed

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  19. Nonlinear secret image sharing scheme.

    PubMed

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively. PMID:25140334

  20. Energy partitioning schemes: a dilemma.

    PubMed

    Mayer, I

    2007-01-01

    Two closely related energy partitioning schemes, in which the total energy is presented as a sum of atomic and diatomic contributions by using the "atomic decomposition of identity", are compared on the example of N,N-dimethylformamide, a simple but chemically rich molecule. Both schemes account for different intramolecular interactions, for instance they identify the weak C-H...O intramolecular interactions, but give completely different numbers. (The energy decomposition scheme based on the virial theorem is also considered.) The comparison of the two schemes resulted in a dilemma which is especially striking when these schemes are applied for molecules distorted from their equilibrium structures: one either gets numbers which are "on the chemical scale" and have quite appealing values at the equilibrium molecular geometries, but exhibiting a counter-intuitive distance dependence (the two-center energy components increase in absolute value with the increase of the interatomic distances)--or numbers with too large absolute values but "correct" distance behaviour. The problem is connected with the quick decay of the diatomic kinetic energy components. PMID:17328441

  1. Nonlinear Secret Image Sharing Scheme

    PubMed Central

    Shin, Sang-Ho; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2⁡m⌉ bit-per-pixel (bpp), respectively. PMID:25140334

  2. Invisibly Sanitizable Digital Signature Scheme

    NASA Astrophysics Data System (ADS)

    Miyazaki, Kunihiko; Hanaoka, Goichiro; Imai, Hideki

    A digital signature does not allow any alteration of the document to which it is attached. Appropriate alteration of some signed documents, however, should be allowed because there are security requirements other than the integrity of the document. In the disclosure of official information, for example, sensitive information such as personal information or national secrets is masked when an official document is sanitized so that its nonsensitive information can be disclosed when it is requested by a citizen. If this disclosure is done digitally by using the current digital signature schemes, the citizen cannot verify the disclosed information because it has been altered to prevent the leakage of sensitive information. The confidentiality of official information is thus incompatible with the integrity of that information, and this is called the digital document sanitizing problem. Conventional solutions such as content extraction signatures and digitally signed document sanitizing schemes with disclosure condition control can either let the sanitizer assign disclosure conditions or hide the number of sanitized portions. The digitally signed document sanitizing scheme we propose here is based on the aggregate signature derived from bilinear maps and can do both. Moreover, the proposed scheme can sanitize a signed document invisibly, that is, no one can distinguish whether the signed document has been sanitized or not.

  3. Upwind Compact Finite Difference Schemes

    NASA Astrophysics Data System (ADS)

    Christie, I.

    1985-07-01

    It was shown by Ciment, Leventhal, and Weinberg ( J. Comput. Phys.28 (1978), 135) that the standard compact finite difference scheme may break down in convection dominated problems. An upwinding of the method, which maintains the fourth order accuracy, is suggested and favorable numerical results are found for a number of test problems.

  4. On symmetric and upwind TVD schemes

    NASA Technical Reports Server (NTRS)

    Yee, H. C.

    1985-01-01

    A class of explicit and implicit total variation diminishing (TVD) schemes for the compressible Euler and Navier-Stokes equations was developed. They do not generate spurious oscillations across shocks and contact discontinuities. In general, shocks can be captured within 1 to 2 grid points. For the inviscid case, these schemes are divided into upwind TVD schemes and symmetric (nonupwind) TVD schemes. The upwind TVD scheme is based on the second-order TVD scheme. The symmetric TVD scheme is a generalization of Roe's and Davis' TVD Lax-Wendroff scheme. The performance of these schemes on some viscous and inviscid airfoil steady-state calculations is investigated. The symmetric and upwind TVD schemes are compared.

  5. Subranging scheme for SQUID sensors

    NASA Technical Reports Server (NTRS)

    Penanen, Konstantin I. (Inventor)

    2008-01-01

    A readout scheme for measuring the output from a SQUID-based sensor-array using an improved subranging architecture that includes multiple resolution channels (such as a coarse resolution channel and a fine resolution channel). The scheme employs a flux sensing circuit with a sensing coil connected in series to multiple input coils, each input coil being coupled to a corresponding SQUID detection circuit having a high-resolution SQUID device with independent linearizing feedback. A two-resolution configuration (course and fine) is illustrated with a primary SQUID detection circuit for generating a fine readout, and a secondary SQUID detection circuit for generating a course readout, both having feedback current coupled to the respective SQUID devices via feedback/modulation coils. The primary and secondary SQUID detection circuits function and derive independent feedback. Thus, the SQUID devices may be monitored independently of each other (and read simultaneously) to dramatically increase slew rates and dynamic range.

  6. Stable maps and Quot schemes

    NASA Astrophysics Data System (ADS)

    Popa, Mihnea; Roth, Mike

    2003-06-01

    In this paper we study the relationship between two different compactifications of the space of vector bundle quotients of an arbitrary vector bundle on a curve. One is Grothendieck's Quot scheme, while the other is a moduli space of stable maps to the relative Grassmannian. We establish an essentially optimal upper bound on the dimension of the two compactifications. Based on that, we prove that for an arbitrary vector bundle, the Quot schemes of quotients of large degree are irreducible and generically smooth. We precisely describe all the vector bundles for which the same thing holds in the case of the moduli spaces of stable maps. We show that there are in general no natural morphisms between the two compactifications. Finally, as an application, we obtain new cases of a conjecture on effective base point freeness for pluritheta linear series on moduli spaces of vector bundles.

  7. A biometric signcryption scheme without bilinear pairing

    NASA Astrophysics Data System (ADS)

    Wang, Mingwen; Ren, Zhiyuan; Cai, Jun; Zheng, Wentao

    2013-03-01

    How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis's fuzzy extractor method and Liu's original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.

  8. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.

  9. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme. PMID:24888983

  10. Community health insurance schemes & patient satisfaction - evidence from India

    PubMed Central

    Devadasan, N.; Criel, Bart; Damme, Wim Van; Lefevre, Pierre; Manoharan, S.; der Stuyft, Patrick Van

    2011-01-01

    Background & objectives: Quality of care is an important determinant for utilizing health services. In India, the quality of care in most health services is poor. The government recognizes this and has been working on both supply and demand aspects. In particular, it is promoting community health insurance (CHI) schemes, so that patients can access quality services. This observational study was undertaken to measure the level of satisfaction among insured and uninsured patients in two CHI schemes in India. Methods: Patient satisfaction was measured, which is an outcome of good quality care. Two CHI schemes, Action for Community Organisation, Rehabilitation and Development (ACCORD) and Kadamalai Kalanjiam Vattara Sangam (KKVS), were chosen. Randomly selected, insured and uninsured households were interviewed. The household where a patient was admitted to a hospital was interviewed in depth about the health seeking behaviour, the cost of treatment and the satisfaction levels. Results: It was found that at both ACCORD and KKVS, there was no significant difference in the levels of satisfaction between the insured and uninsured patients. The main reasons for satisfaction were the availability of doctors and medicines and the recovery by the patient. Interpretation & conclusions: Our study showed that insured hospitalized patients did not have significantly higher levels of satisfaction compared to uninsured hospitalized patients. If CHI schemes want to improve the quality of care for their clients, so that they adhere to the scheme, the scheme managers need to negotiate actively for better quality of care with empanelled providers. PMID:21321418

  11. TVD schemes for open channel flow

    NASA Astrophysics Data System (ADS)

    Delis, A. I.; Skeels, C. P.

    1998-04-01

    The Saint Venant equations for modelling flow in open channels are solved in this paper, using a variety of total variation diminishing (TVD) schemes. The performance of second- and third-order-accurate TVD schemes is investigated for the computation of free-surface flows, in predicting dam-breaks and extreme flow conditions created by the river bed topography. Convergence of the schemes is quantified by comparing error norms between subsequent iterations. Automatically calculated time steps and entropy corrections allow high CFL numbers and smooth transition between different conditions. In order to compare different approaches with TVD schemes, the most accurate of each type was chosen. All four schemes chosen proved acceptably accurate. However, there are important differences between the schemes in the occurrence of clipping, overshooting and oscillating behaviour and in the highest CFL numbers allowed by a scheme. These variations in behaviour stem from the different orders and inherent properties of the four schemes.

  12. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    NASA Technical Reports Server (NTRS)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  13. Pay scheme preferences and health policy objectives.

    PubMed

    Abelsen, Birgit

    2011-04-01

    This paper studies the preferences among healthcare workers towards pay schemes involving different levels of risk. It identifies which pay scheme individuals would prefer for themselves, and which they think is best in furthering health policy objectives. The paper adds, methodologically, a way of defining pay schemes that include different levels of risk. A questionnaire was mailed to a random sample of 1111 dentists. Respondents provided information about their current and preferred pay schemes, and indicated which pay scheme, in their opinion, would best further overall health policy objectives. A total of 504 dentists (45%) returned the questionnaire, and there was no indication of systematic non-response bias. All public dentists had a current pay scheme based on a fixed salary and the majority of individuals preferred a pay scheme with more income risk. Their preferred pay schemes coincided with the ones believed to further stabilise healthcare personnel. The predominant current pay scheme among private dentists was based solely on individual output, and the majority of respondents preferred this pay scheme. In addition, their preferred pay schemes coincided with the ones believed to further efficiency objectives. Both public and private dentists believed that pay schemes, furthering efficiency objectives, had to include more performance-related pay than the ones believed to further stability and quality objectives. PMID:20565995

  14. Quantum Signature Scheme with Weak Arbitrator

    NASA Astrophysics Data System (ADS)

    Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian

    2012-07-01

    In this paper, we propose one quantum signature scheme with a weak arbitrator to sign classical messages. This scheme can preserve the merits in the original arbitrated scheme with some entanglement resources, and provide a higher efficiency in transmission and reduction the complexity of implementation. The arbitrator is costless and only involved in the disagreement case.

  15. 75 FR 78809 - Energy Conservation Program for Consumer Products: Test Procedures for Refrigerators...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-16

    ... use associated with the defrost cycle, establish a test procedure for products with a single compressor and multiple evaporators with active defrost cycles, incorporate into the energy use metric the... Defrost Cycle Types 3. Incorporating by Reference AHAM Standard HRF-1-2008 for Measuring Energy...

  16. On symmetric and upwind TVD schemes

    NASA Technical Reports Server (NTRS)

    Yee, H. C.

    1986-01-01

    The performance of the upwind and symmetric total variation diminishing (TVD) schemes in viscous and inviscid airfoil steady-state calculations is considered, and the extension of the implicit second-order-accurate TVD scheme for hyperbolic systems of conservative laws in curvilinear coordinates is discussed. For two-dimensional steady-state applications, schemes are implemented in a conservative noniterative alternating direction implicit form, and results illustrate that the algorithm produces a fairly good solution for an RAE2822 airfoil calculation. The study demonstrates that the symmetric TVD scheme is as accurate as the upwind TVD scheme, while requiring less computational effort than it.

  17. Construction of weighted upwind compact scheme

    NASA Astrophysics Data System (ADS)

    Wang, Zhengjie

    Enormous endeavor has been devoted in spatial high order high resolution schemes in more than twenty five years previously, like total variation diminishing (TVD), essentially non-oscillatory scheme, weighted essentially non-oscillatory scheme for finite difference, and Discontinuous Galerkin methods for finite element and the finite volume. In this dissertation, a high order finite difference Weighted Upwind Compact Scheme has been constructed by dissipation and dispersion analysis. Secondly, a new method to construct global weights has been tested. Thirdly, a methodology to compromise dissipation and dispersion in constructing Weighted Upwind Compact Scheme has been derived. Finally, several numerical test cases have been shown.

  18. Training of Medical Physicists: Some Existing Training Schemes.

    ERIC Educational Resources Information Center

    Lanzl, Lawrence H.

    As an address to a seminar held in Germany, a summary is made concerning the present status and future development of medical physicist preparation in the U.S.A. A total of 121 programs are discussed on the basis of degree levels. Most training schemes consist of lectures, laboratory courses, and research activities with actual experience provided…

  19. High-Order Energy Stable WENO Schemes

    NASA Technical Reports Server (NTRS)

    Yamaleev, Nail K.; Carpenter, Mark H.

    2008-01-01

    A new third-order Energy Stable Weighted Essentially NonOscillatory (ESWENO) finite difference scheme for scalar and vector linear hyperbolic equations with piecewise continuous initial conditions is developed. The new scheme is proven to be stable in the energy norm for both continuous and discontinuous solutions. In contrast to the existing high-resolution shock-capturing schemes, no assumption that the reconstruction should be total variation bounded (TVB) is explicitly required to prove stability of the new scheme. A rigorous truncation error analysis is presented showing that the accuracy of the 3rd-order ESWENO scheme is drastically improved if the tuning parameters of the weight functions satisfy certain criteria. Numerical results show that the new ESWENO scheme is stable and significantly outperforms the conventional third-order WENO finite difference scheme of Jiang and Shu in terms of accuracy, while providing essentially nonoscillatory solutions near strong discontinuities.

  20. Low-cost resilience schemes for the Optical Ethernet

    NASA Astrophysics Data System (ADS)

    Cugini, Filippo; Valcarenghi, Luca; Castoldi, Piero; Guglielmucci, Michele

    2005-12-01

    Optical Ethernet (OE) architectures transport IP packets directly over the optical layer by providing a specific Layer 2 framing. Although the architectures represent a simple and low-cost solution, the limiting factor for their widespread deployment is represented by the lack of some efficient operation, administration, and maintenance (OA&M) features, such as resilience. Optical layer protection represents a low-cost resilience scheme for OE links. We present the experimental results of low-cost protection implementations that are based on different failure detection and failure protection activation schemes for IP-over-OE networks. Specifically, a dedicated span protection scheme and an evolution for shared protection based on generalized multiprotocol label switching (GMPLS) signaling in transparent domains is presented. Experimental results show that recovery times in the millisecond range are achieved.

  1. Matroids and quantum-secret-sharing schemes

    SciTech Connect

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-05-15

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  2. High resolution TVD schemes for interface tracking

    NASA Astrophysics Data System (ADS)

    Nandi, K.; Walker, S. P.; Date, A. W.

    2016-06-01

    A first order upwind difference scheme (UDS) is routinely adopted for representing convection terms in a discretised space. UDS provides stable solutions. However it also introduces false diffusion in situations in which the flow direction is oblique relative to the numerical grid or when the cell-Peclet number is large. In order to predict sharp interface, higher order upwind schemes are preferred because of they reduce numerical dissipation. In interfacial flows, density and viscosity vary sharply in space. Representation of convective terms by Total variation diminishing (TVD) schemes ensures reduced smearing without impairing convergence property. TVD schemes develop formulae for interpolation of a cell-face value of the transported variable. If the interpolated value is bounded by the neighbouring nodal values then the scheme is `Bounded'. However, not all TVD schemes possess this property of `Boundedness'. The Normalised Variable Diagram (NVD) defines a domain within which the TVD scheme is bounded. Thus by combining the features of both TVD schemes and ensuring that they fall with the defined area of NVD, the convergence as well as the boundedness of a computational scheme can be ensured. In this paper, six different higher order schemes are considered some which are TVD bounded or unbounded, to solve the well known interface tracking problem of Rayleigh-Taylor Instability. To the best of our knowledge, a comparison of combined TVD/NVD principles in the case of interface tracking problems has not been reported in published literature.

  3. Sequential Feedback Scheme Outperforms the Parallel Scheme for Hamiltonian Parameter Estimation

    NASA Astrophysics Data System (ADS)

    Yuan, Haidong

    2016-10-01

    Measurement and estimation of parameters are essential for science and engineering, where the main quest is to find the highest achievable precision with the given resources and design schemes to attain it. Two schemes, the sequential feedback scheme and the parallel scheme, are usually studied in the quantum parameter estimation. While the sequential feedback scheme represents the most general scheme, it remains unknown whether it can outperform the parallel scheme for any quantum estimation tasks. In this Letter, we show that the sequential feedback scheme has a threefold improvement over the parallel scheme for Hamiltonian parameter estimations on two-dimensional systems, and an order of O (d +1 ) improvement for Hamiltonian parameter estimation on d -dimensional systems. We also show that, contrary to the conventional belief, it is possible to simultaneously achieve the highest precision for estimating all three components of a magnetic field, which sets a benchmark on the local precision limit for the estimation of a magnetic field.

  4. How can conceptual schemes change teaching?

    NASA Astrophysics Data System (ADS)

    Wickman, Per-Olof

    2012-03-01

    Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.

  5. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes. PMID:25750176

  6. On the security of two remote user authentication schemes for telecare medical information systems.

    PubMed

    Kim, Kee-Won; Lee, Jae-Dong

    2014-05-01

    The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes. PMID:24777588

  7. Curvilinear bicubic spline fit interpolation scheme

    NASA Technical Reports Server (NTRS)

    Chi, C.

    1973-01-01

    Modification of the rectangular bicubic spline fit interpolation scheme so as to make it suitable for use with a polar grid pattern. In the proposed modified scheme the interpolation function is expressed in terms of the radial length and the arc length, and the shape of the patch, which is a wedge or a truncated wedge, is taken into account implicitly. Examples are presented in which the proposed interpolation scheme was used to reproduce the equations of a hemisphere.

  8. Quantum Authentication Scheme Based on Entanglement Swapping

    NASA Astrophysics Data System (ADS)

    Penghao, Niu; Yuan, Chen; Chong, Li

    2016-01-01

    Based on the entanglement swapping, a quantum authentication scheme with a trusted- party is proposed in this paper. With this scheme, two users can perform mutual identity authentication to confirm each other's validity. In addition, the scheme is proved to be secure under circumstances where a malicious attacker is capable of monitoring the classical and quantum channels and has the power to forge all information on the public channel.

  9. Simulation of the Australian Mobilesat signalling scheme

    NASA Technical Reports Server (NTRS)

    Rahman, Mushfiqur

    1990-01-01

    The proposed Australian Mobilesat system will provide a range of circuit switched voice/data services using the B-series satellites. The reliability of the signalling scheme between the Network Management Station (NMS) and the mobile terminal (MT) is of critical importance to the performance of the overall system. Simulation results of the performance of the signalling scheme under various channel conditions and coding schemes are presented.

  10. Variable-flavor number scheme for next-to-next-to-leading order

    SciTech Connect

    Thorne, R.S.

    2006-03-01

    At NNLO it is particularly important to have a Variable-flavor Number Scheme (VFNS) to deal with heavy quarks because there are major problems with both the zero-mass variable-flavor number scheme and the fixed-flavor number scheme. I illustrate these problems and present a general formulation of a Variable-flavor Number Scheme (VFNS) for heavy quarks that is explicitly implemented up to NNLO in the strong coupling constant {alpha}{sub S}, and may be used in NNLO global fits for parton distributions. The procedure combines elements of the ACOT({chi}) scheme and the Thorne-Roberts scheme. Despite the fact that at NNLO the parton distributions are discontinuous as one changes the number of active quark flavors, all physical quantities are continuous at flavor transitions and the comparison with data is successful.

  11. On Tenth Order Central Spatial Schemes

    SciTech Connect

    Sjogreen, B; Yee, H C

    2007-05-14

    This paper explores the performance of the tenth-order central spatial scheme and derives the accompanying energy-norm stable summation-by-parts (SBP) boundary operators. The objective is to employ the resulting tenth-order spatial differencing with the stable SBP boundary operators as a base scheme in the framework of adaptive numerical dissipation control in high order multistep filter schemes of Yee et al. (1999), Yee and Sj{umlt o}green (2002, 2005, 2006, 2007), and Sj{umlt o}green and Yee (2004). These schemes were designed for multiscale turbulence flows including strong shock waves and combustion.

  12. On central-difference and upwind schemes

    NASA Technical Reports Server (NTRS)

    Swanson, R. C.; Turkel, Eli

    1990-01-01

    A class of numerical dissipation models for central-difference schemes constructed with second- and fourth-difference terms is considered. The notion of matrix dissipation associated with upwind schemes is used to establish improved shock capturing capability for these models. In addition, conditions are given that guarantee that such dissipation models produce a Total Variation Diminishing (TVD) scheme. Appropriate switches for this type of model to ensure satisfaction of the TVD property are presented. Significant improvements in the accuracy of a central-difference scheme are demonstrated by computing both inviscid and viscous transonic airfoil flows.

  13. Direct Eulerian MUSCL scheme for gas dynamics

    SciTech Connect

    Colella, P.

    1985-01-01

    The authors present a second order extension of Godunov's method for gas dynamics in Eulerian coordinates patterned after van Leer's MUSCL scheme for gas dynamics in Lagrangian coordinates. The present method performs the Eulerian calculation in a single step by solving Riemann problems and characteristic equations for the fluxes in the Eulerian frame. The authors also make several modifications in the formulation of MUSCL, applicable to both this scheme and to the original Lagrangian scheme, all aimed at making a more robust and accurate scheme. The authors present the results of test calculations in one and two space variables. 12 references, 5 figures.

  14. Frost Growth CFD Model of an Integrated Active Desiccant Rooftop Unit

    SciTech Connect

    Geoghegan, Patrick J; Petrov, Andrei Y; Vineyard, Edward Allan; Zaltash, Abdolreza; Linkous, Randall Lee

    2008-01-01

    A frost growth model is incorporated into a Computational Fluid Dynamics (CFD) simulation of a heat pump by means of a user-defined function in FLUENT, a commercial CFD code. The transient model is applied to the outdoor section of an Integrated Active Desiccant Rooftop (IADR) unit in heating mode. IADR is a hybrid vapor compression and active desiccant unit capable of handling 100% outdoor air (dedicated outdoor air system) or as a total conditioning system, handling both outdoor air and space cooling or heating loads. The predicted increase in flow resistance and loss in heat transfer capacity due to frost build-up are compared to experimental pressure drop readings and thermal imaging. The purpose of this work is to develop a CFD model that is capable of predicting frost growth, an invaluable tool in evaluating the effectiveness of defrost-on-demand cycles.

  15. Modeling Students' Mathematics Using Steffe's Fraction Schemes

    ERIC Educational Resources Information Center

    Norton, Anderson H.; McCloskey, Andrea V.

    2008-01-01

    Each year, more teachers learn about the successful intervention program known as Math Recovery (USMRC 2008; Wright 2003). The program uses Steffe's whole-number schemes to model, understand, and support children's development of whole-number reasoning. Readers are probably less familiar with Steffe's fraction schemes, which have proven similarly…

  16. Finite volume renormalization scheme for fermionic operators

    SciTech Connect

    Monahan, Christopher; Orginos, Kostas

    2013-11-01

    We propose a new finite volume renormalization scheme. Our scheme is based on the Gradient Flow applied to both fermion and gauge fields and, much like the Schr\\"odinger functional method, allows for a nonperturbative determination of the scale dependence of operators using a step-scaling approach. We give some preliminary results for the pseudo-scalar density in the quenched approximation.

  17. An Accounting Scheme for Personality Study.

    ERIC Educational Resources Information Center

    Dillon, James J.; Feldman, S. Shirley

    Realizing the importance of human personality variables in comprehensive educational assessment structures, Operation PEP sought to develop a tool to assess specific human personality characteristics. The resulting accounting scheme is divided into three chapters: (1) an outline and definition of relevant terminology, (2) a scheme to account for…

  18. Impact of nonlocal boundary-layer diffusion scheme on forecasts over Indian region

    NASA Astrophysics Data System (ADS)

    Sanjay, J.; Mukhopadhyay, P.; Singh, S. S.

    The results of incorporating a nonlocal boundary-layer diffusion scheme in a forecast model over Indian region are discussed. The simple formulation of atmospheric boundary layer height in the nonlocal diffusion scheme is examined in detail to understand how far the model simulated boundary layer height is realistic. Analyses of the temporal and spatial variability of the boundary height for three cases representing premonsoon, active monsoon and post monsoon conditions over Indian region show that it is comparable with the observational evidence. Further, for a case of active monsoon condition over Indian region, comparison of precipitation forecasts with the nonlocal scheme and the control local boundary-layer scheme clearly indicated that the model run with the nonlocal scheme is significantly more accurate in forecasting the intense precipitation locations.

  19. A novel key management scheme using biometrics

    NASA Astrophysics Data System (ADS)

    Sui, Yan; Yang, Kai; Du, Yingzi; Orr, Scott; Zou, Xukai

    2010-04-01

    Key management is one of the most important issues in cryptographic systems. Several important challenges in such a context are represented by secure and efficient key generation, key distribution, as well as key revocation. Addressing such challenges requires a comprehensive solution which is robust, secure and efficient. Compared to traditional key management schemes, key management using biometrics requires the presence of the user, which can reduce fraud and protect the key better. In this paper, we propose a novel key management scheme using iris based biometrics. Our newly proposed scheme outperforms traditional key management schemes as well as some existing key-binding biometric schemes in terms of security, diversity and/or efficiency.

  20. The basic function scheme of polynomial type

    SciTech Connect

    WU, Wang-yi; Lin, Guang

    2009-12-01

    A new numerical method---Basic Function Method is proposed. This method can directly discrete differential operator on unstructured grids. By using the expansion of basic function to approach the exact function, the central and upwind schemes of derivative are constructed. By using the second-order polynomial as basic function and applying the technique of flux splitting method and the combination of central and upwind schemes to suppress the non-physical fluctuation near the shock wave, the second-order basic function scheme of polynomial type for solving inviscid compressible flow numerically is constructed in this paper. Several numerical results of many typical examples for two dimensional inviscid compressible transonic and supersonic steady flow illustrate that it is a new scheme with high accuracy and high resolution for shock wave. Especially, combining with the adaptive remeshing technique, the satisfactory results can be obtained by these schemes.

  1. Efficient DSMC collision-partner selection schemes.

    SciTech Connect

    Gallis, Michail A.; Torczynski, John Robert

    2010-07-01

    The effect of collision-partner selection schemes on the accuracy and the efficiency of the Direct Simulation Monte Carlo (DSMC) method of Bird is investigated. Several schemes to reduce the total discretization error as a function of the mean collision separation and the mean collision time are examined. These include the historically first sub-cell scheme, the more recent nearest-neighbor scheme, and various near-neighbor schemes, which are evaluated for their effect on the thermal conductivity for Fourier flow. Their convergence characteristics as a function of spatial and temporal discretization and the number of simulators per cell are compared to the convergence characteristics of the sophisticated and standard DSMC algorithms. Improved performance is obtained if the population from which possible collision partners are selected is an appropriate fraction of the population of the cell.

  2. Two level scheme solvers for nuclear spectroscopy

    NASA Astrophysics Data System (ADS)

    Jansson, Kaj; DiJulio, Douglas; Cederkäll, Joakim

    2011-10-01

    A program for building level schemes from γ-spectroscopy coincidence data has been developed. The scheme builder was equipped with two different algorithms: a statistical one based on the Metropolis method and a more logical one, called REMP (REcurse, Merge and Permute), developed from scratch. These two methods are compared both on ideal cases and on experimental γ-ray data sets. The REMP algorithm is based on coincidences and transition energies. Using correct and complete coincidence data, it has solved approximately half a million schemes without failures. Also, for incomplete data and data with minor errors, the algorithm produces consistent sub-schemes when it is not possible to obtain a complete scheme from the provided data.

  3. Efficient DSMC collision-partner selection schemes.

    SciTech Connect

    Gallis, Michail A.; Torczynski, John Robert

    2010-05-01

    The effect of collision-partner selection schemes on the accuracy and the efficiency of the Direct Simulation Monte Carlo (DSMC) method of Bird is investigated. Several schemes to reduce the total discretization error as a function of the mean collision separation and the mean collision time are examined. These include the historically first sub-cell scheme, the more recent nearest-neighbor scheme, and various near-neighbor schemes, which are evaluated for their effect on the thermal conductivity for Fourier flow. Their convergence characteristics as a function of spatial and temporal discretization and the number of simulators per cell are compared to the convergence characteristics of the sophisticated and standard DSMC algorithms. Improved performance is obtained if the population from which possible collision partners are selected is an appropriate fraction of the population of the cell.

  4. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Kumar, Neeraj

    2015-11-01

    In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System, where the patient and medical server exchange medical information using Internet. We have found that most of the schemes are not usable for practical applications due to known security weaknesses. It is also worth to note that unrestricted number of patients login to the single medical server across the globe. Therefore, the computation and maintenance overhead would be high and the server may fail to provide services. In this article, we have designed a medical system architecture and a standard mutual authentication scheme for single medical server, where the patient can securely exchange medical data with the doctor(s) via trusted central medical server over any insecure network. We then explored the security of the scheme with its resilience to attacks. Moreover, we formally validated the proposed scheme through the simulation using Automated Validation of Internet Security Schemes and Applications software whose outcomes confirm that the scheme is protected against active and passive attacks. The performance comparison demonstrated that the proposed scheme has lower communication cost than the existing schemes in literature. In addition, the computation cost of the proposed scheme is nearly equal to the exiting schemes. The proposed scheme not only efficient in terms of different security attacks, but it also provides an efficient login, mutual authentication, session key agreement and verification and password update phases along with password recovery.

  5. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Kumar, Neeraj

    2015-11-01

    In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System, where the patient and medical server exchange medical information using Internet. We have found that most of the schemes are not usable for practical applications due to known security weaknesses. It is also worth to note that unrestricted number of patients login to the single medical server across the globe. Therefore, the computation and maintenance overhead would be high and the server may fail to provide services. In this article, we have designed a medical system architecture and a standard mutual authentication scheme for single medical server, where the patient can securely exchange medical data with the doctor(s) via trusted central medical server over any insecure network. We then explored the security of the scheme with its resilience to attacks. Moreover, we formally validated the proposed scheme through the simulation using Automated Validation of Internet Security Schemes and Applications software whose outcomes confirm that the scheme is protected against active and passive attacks. The performance comparison demonstrated that the proposed scheme has lower communication cost than the existing schemes in literature. In addition, the computation cost of the proposed scheme is nearly equal to the exiting schemes. The proposed scheme not only efficient in terms of different security attacks, but it also provides an efficient login, mutual authentication, session key agreement and verification and password update phases along with password recovery. PMID:26433889

  6. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  7. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks. PMID:25666924

  8. Simulation study on the efficiencies of MOET nucleus breeding schemes applying marker assisted selection in dairy cattle.

    PubMed

    Luo, WeiZhen; Wang, YaChun; Zhang, Yuan

    2009-03-01

    Advantages of breeding schemes using genetic marker information and/or multiple ovulation and embryo transfer (MOET) technology over the traditional approach were extensively evaluated through simulation. Milk yield was the trait of interest and QTL was the genetic marker utilized. Eight dairy cattle breeding scenarios were considered, i.e., traditional progeny testing breeding scheme (denoted as STANPT), GASPT scheme including a pre-selection of young bulls entering progeny testing based on their own QTL information, MOETPT scheme using MOET technology to generate young bulls and a selection of young bulls limited within the full-sib family, GAMOPT scheme adopting both QTL pre-selection and MOET technology, COMBPT scheme using a mixed linear model which considered QTL genotype instead of the BLUP model in GAMOPT, and three non-progeny testing schemes, i.e. the MOET, GAMO and COMB schemes, corresponding to MOETPT, GAMOPT and COMBPT with progeny testing being part of the system. Animals were selected based on their breeding value which was estimated under an animal model framework. Sequential selection over 17 years was performed in the simulations and 30 replicates were designed for each scenario. The influences of using QTL information and MOET technology on favorable QTL allele frequency, true breeding values, polygenetic breeding values and the accumulated genetic superiority were extensively evaluated, for five different populations including active sires, lactating cows, bull dams, bull sires, and young bulls. The results showed that the combined schemes significantly outperformed other approaches wherein accumulated true breeding value progressed. The difference between schemes exclusively using QTL information or MOET technology was not significant. The STANPT scheme was the least efficient among the 8 schemes. The schemes using MOET technology had a higher polygenetic response than others in the 17th year. The increases of frequency of the favorable QTL

  9. Novel neural networks-based fault tolerant control scheme with fault alarm.

    PubMed

    Shen, Qikun; Jiang, Bin; Shi, Peng; Lim, Cheng-Chew

    2014-11-01

    In this paper, the problem of adaptive active fault-tolerant control for a class of nonlinear systems with unknown actuator fault is investigated. The actuator fault is assumed to have no traditional affine appearance of the system state variables and control input. The useful property of the basis function of the radial basis function neural network (NN), which will be used in the design of the fault tolerant controller, is explored. Based on the analysis of the design of normal and passive fault tolerant controllers, by using the implicit function theorem, a novel NN-based active fault-tolerant control scheme with fault alarm is proposed. Comparing with results in the literature, the fault-tolerant control scheme can minimize the time delay between fault occurrence and accommodation that is called the time delay due to fault diagnosis, and reduce the adverse effect on system performance. In addition, the FTC scheme has the advantages of a passive fault-tolerant control scheme as well as the traditional active fault-tolerant control scheme's properties. Furthermore, the fault-tolerant control scheme requires no additional fault detection and isolation model which is necessary in the traditional active fault-tolerant control scheme. Finally, simulation results are presented to demonstrate the efficiency of the developed techniques.

  10. Symmetric weak ternary quantum homomorphic encryption schemes

    NASA Astrophysics Data System (ADS)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  11. A Real Quantum Designated Verifier Signature Scheme

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2015-09-01

    The effectiveness of most quantum signature schemes reported in the literature can be verified by a designated person, however, those quantum signature schemes aren't the real traditional designated verifier signature schemes, because the designated person hasn't the capability to efficiently simulate a signature which is indistinguishable from a signer, which cannot satisfy the requirements in some special environments such as E-voting, call for tenders and software licensing. For solving this problem, a real quantum designated verifier signature scheme is proposed in this paper. According to the property of unitary transformation and quantum one-way function, only a verifier designated by a signer can verify the "validity of a signature" and the designated verifier cannot prove to a third party that the signature was produced by the signer or by himself through a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Analysis results show that this new scheme satisfies the main security requirements of designated verifier signature scheme and the major attack strategies.

  12. A nonconservative scheme for isentropic gas dynamics

    SciTech Connect

    Chen, Gui-Qiang |; Liu, Jian-Guo

    1994-05-01

    In this paper, we construct a second-order nonconservative for the system of isentropic gas dynamics to capture the physical invariant regions for preventing negative density, to treat the vacuum singularity, and to control the local entropy from dramatically increasing near shock waves. The main difference in the construction of the scheme discussed here is that we use piecewise linear functions to approximate the Riemann invariants w and z instead of the physical variables {rho} and m. Our scheme is a natural extension of the schemes for scalar conservation laws and it can be numerical implemented easily because the system is diagonalized in this coordinate system. Another advantage of using Riemann invariants is that the Hessian matrix of any weak entropy has no singularity in the Riemann invariant plane w-z, whereas the Hessian matrices of the weak entropies have singularity at the vacuum points in the physical plane p-m. We prove that this scheme converges to an entropy solution for the Cauchy problem with L{sup {infinity}} initial data. By convergence here we mean that there is a subsequent convergence to a generalized solution satisfying the entrophy condition. As long as the entropy solution is unique, the whole sequence converges to a physical solution. This shows that this kind of scheme is quite reliable from theoretical view of point. In addition to being interested in the scheme itself, we wish to provide an approach to rigorously analyze nonconservative finite difference schemes.

  13. Towards an "All Speed" Unstructured Upwind Scheme

    NASA Technical Reports Server (NTRS)

    Loh, Ching Y.; Jorgenson, Philip C.E.

    2009-01-01

    In the authors previous studies [1], a time-accurate, upwind finite volume method (ETAU scheme) for computing compressible flows on unstructured grids was proposed. The scheme is second order accurate in space and time and yields high resolution in the presence of discontinuities. The scheme features a multidimensional limiter and multidimensional numerical dissipation. These help to stabilize the numerical process and to overcome the annoying pathological behaviors of upwind schemes. In the present paper, it will be further shown that such multidimensional treatments also lead to a nearly all-speed or Mach number insensitive upwind scheme. For flows at very high Mach number, e.g., 10, local numerical instabilities or the pathological behaviors are suppressed, while for flows at very low Mach number, e.g., 0.02, computation can be directly carried out without invoking preconditioning. For flows in different Mach number regimes, i.e., low, medium, and high Mach numbers, one only needs to adjust one or two parameters in the scheme. Several examples with low and high Mach numbers are demonstrated in this paper. Thus, the ETAU scheme is applicable to a broad spectrum of flow regimes ranging from high supersonic to low subsonic, appropriate for both CFD (computational fluid dynamics) and CAA (computational aeroacoustics).

  14. Testing hydrodynamics schemes in galaxy disc simulations

    NASA Astrophysics Data System (ADS)

    Few, C. G.; Dobbs, C.; Pettitt, A.; Konstandin, L.

    2016-08-01

    We examine how three fundamentally different numerical hydrodynamics codes follow the evolution of an isothermal galactic disc with an external spiral potential. We compare an adaptive mesh refinement code (RAMSES), a smoothed particle hydrodynamics code (SPHNG), and a volume-discretized mesh-less code (GIZMO). Using standard refinement criteria, we find that RAMSES produces a disc that is less vertically concentrated and does not reach such high densities as the SPHNG or GIZMO runs. The gas surface density in the spiral arms increases at a lower rate for the RAMSES simulations compared to the other codes. There is also a greater degree of substructure in the SPHNG and GIZMO runs and secondary spiral arms are more pronounced. By resolving the Jeans length with a greater number of grid cells, we achieve more similar results to the Lagrangian codes used in this study. Other alterations to the refinement scheme (adding extra levels of refinement and refining based on local density gradients) are less successful in reducing the disparity between RAMSES and SPHNG/GIZMO. Although more similar, SPHNG displays different density distributions and vertical mass profiles to all modes of GIZMO (including the smoothed particle hydrodynamics version). This suggests differences also arise which are not intrinsic to the particular method but rather due to its implementation. The discrepancies between codes (in particular, the densities reached in the spiral arms) could potentially result in differences in the locations and time-scales for gravitational collapse, and therefore impact star formation activity in more complex galaxy disc simulations.

  15. Different options for noble gas categorization schemes

    NASA Astrophysics Data System (ADS)

    Kalinowski, Martin

    2010-05-01

    For noble gas monitoring it is crucial to support the decision makers who need to decide whether a decection may indicate a potential nuclear test. Several parameters are available that may help to distinguish a legitimate civilian source from a nuclear explosion. The most promising parameters are: (a) Anomaly observations with respect to the history of concentrations found at that site. (b) Isotopic activity ratios can be used to separate a nuclear reactor domain from the parameter space that is specific for nuclear explosions. (c) Correlation with source-receptor-sensitivities related to known civilian sources as determined by atmospheric transport simulations. A combination of these can be used to categorize an observation. So far, several initial ideas have been presented but the issue of noble gas categorisation has been postponed with the argument that further scientific studies and additional experience have to be awaited. This paper presents the principles of different options for noble gas categorisation and considers how they would meet the interests of different classes of member states. It discusses under different points of view what might be the best approach for the noble gas categorisation scheme.

  16. Bench-scale evaluation of treatment schemes incorporating struvite precipitation for young landfill leachate.

    PubMed

    Kabdaşli, I; Safak, A; Tünay, O

    2008-11-01

    In this study, landfill leachate treatment technologies alternative to anaerobic treatment were experimentally investigated. The emphasis was placed upon nitrogen removal through the use of struvite precipitation. Treatment technologies studied included struvite precipitation, low pH (acidic) air stripping, and activated sludge. Dilution of landfill leachate was used as a means to obtain appropriate quality for feeding the activated sludge process in some instances. Five main treatment combinations were applied. The first and second schemes were struvite precipitation followed by activated sludge process which was fed on undiluted and diluted (1:5) effluents. The third scheme was dilution, activated sludge and struvite precipitation. The fourth alternative was acidic air stripping, struvite precipitation and activated sludge process. The fifth scheme was acidic air stripping, activated sludge and struvite precipitation. All treatment schemes provided comparable COD and ammonia removals, all being around 90%. The treatment schemes incorporating the acidic air stripping, however, was found to be the most advantageous in terms of both efficiency and volume and aeration requirements of the activated sludge process since over 80% COD could be removed in the stripping step. Of the fourth and fifth alternative schemes, the fourth was the most efficient, providing 95% removal of both COD and ammonia. Initial dilution of the leachate at a 1:5 ratio was the least effective one, yielding 90% or lower removals for COD and ammonia. The first scheme, namely application of struvite precipitation to raw leachate followed by activated sludge with or without dilution, proved to be a practical system, providing over 85% COD and 99% ammonia removals. High organic loading up to 0.8 g COD/g VSS day was found to be applicable within this scheme.

  17. A Spatial Domain Quantum Watermarking Scheme

    NASA Astrophysics Data System (ADS)

    Wei, Zhan-Hong; Chen, Xiu-Bo; Xu, Shu-Jiang; Niu, Xin-Xin; Yang, Yi-Xian

    2016-07-01

    This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. Supported by the National Natural Science Foundation of China under Grant Nos. 61272514, 61170272, 61373131, 61121061, 61411146001, the program for New Century Excellent Talents under Grant No. NCET-13-0681, the National Development Foundation for Cryptological Research (Grant No. MMJJ201401012) and the Fok Ying Tung Education Foundation under Grant No. 131067, and the Shandong Provincial Natural Science Foundation of China under Grant No. ZR2013FM025

  18. A diagonally inverted LU implicit multigrid scheme

    NASA Technical Reports Server (NTRS)

    Yokota, Jeffrey W.; Caughey, David A.; Chima, Rodrick V.

    1988-01-01

    A new Diagonally Inverted LU Implicit scheme is developed within the framework of the multigrid method for the 3-D unsteady Euler equations. The matrix systems that are to be inverted in the LU scheme are treated by local diagonalizing transformations that decouple them into systems of scalar equations. Unlike the Diagonalized ADI method, the time accuracy of the LU scheme is not reduced since the diagonalization procedure does not destroy time conservation. Even more importantly, this diagonalization significantly reduces the computational effort required to solve the LU approximation and therefore transforms it into a more efficient method of numerically solving the 3-D Euler equations.

  19. Palmprint based multidimensional fuzzy vault scheme.

    PubMed

    Liu, Hailun; Sun, Dongmei; Xiong, Ke; Qiu, Zhengding

    2014-01-01

    Fuzzy vault scheme (FVS) is one of the most popular biometric cryptosystems for biometric template protection. However, error correcting code (ECC) proposed in FVS is not appropriate to deal with real-valued biometric intraclass variances. In this paper, we propose a multidimensional fuzzy vault scheme (MDFVS) in which a general subspace error-tolerant mechanism is designed and embedded into FVS to handle intraclass variances. Palmprint is one of the most important biometrics; to protect palmprint templates; a palmprint based MDFVS implementation is also presented. Experimental results show that the proposed scheme not only can deal with intraclass variances effectively but also could maintain the accuracy and meanwhile enhance security. PMID:24892094

  20. The GEMPAK Barnes objective analysis scheme

    NASA Technical Reports Server (NTRS)

    Koch, S. E.; Desjardins, M.; Kocin, P. J.

    1981-01-01

    GEMPAK, an interactive computer software system developed for the purpose of assimilating, analyzing, and displaying various conventional and satellite meteorological data types is discussed. The objective map analysis scheme possesses certain characteristics that allowed it to be adapted to meet the analysis needs GEMPAK. Those characteristics and the specific adaptation of the scheme to GEMPAK are described. A step-by-step guide for using the GEMPAK Barnes scheme on an interactive computer (in real time) to analyze various types of meteorological datasets is also presented.

  1. Renormalization schemes: Where do we stand

    SciTech Connect

    Ward, B.F.L.

    1989-07-01

    We consider the status of the current approaches to the application of the renormalization program to the standard SU/sub 2L/ /times/ U/sub 1/ theory from the standpoint of the interplay of the scheme chosen for such an application and the attendant high-precision tests of the respective loop effects. We thus review the available schemes and discuss their theoretical relationships. We also show how such schemes stand in numerical relation to one another in the context of high-precision Z/sup 0/ physics, as an illustration. 15 refs., 2 figs., 2 tabs.

  2. Practical scheme for error control using feedback

    SciTech Connect

    Sarovar, Mohan; Milburn, Gerard J.; Ahn, Charlene; Jacobs, Kurt

    2004-05-01

    We describe a scheme for quantum-error correction that employs feedback and weak measurement rather than the standard tools of projective measurement and fast controlled unitary gates. The advantage of this scheme over previous protocols [for example, Ahn et al. Phys. Rev. A 65, 042301 (2001)], is that it requires little side processing while remaining robust to measurement inefficiency, and is therefore considerably more practical. We evaluate the performance of our scheme by simulating the correction of bit flips. We also consider implementation in a solid-state quantum-computation architecture and estimate the maximal error rate that could be corrected with current technology.

  3. A classification scheme for chimera states

    NASA Astrophysics Data System (ADS)

    Kemeth, Felix P.; Haugland, Sindre W.; Schmidt, Lennart; Kevrekidis, Ioannis G.; Krischer, Katharina

    2016-09-01

    We present a universal characterization scheme for chimera states applicable to both numerical and experimental data sets. The scheme is based on two correlation measures that enable a meaningful definition of chimera states as well as their classification into three categories: stationary, turbulent, and breathing. In addition, these categories can be further subdivided according to the time-stationarity of these two measures. We demonstrate that this approach is both consistent with previously recognized chimera states and enables us to classify states as chimeras which have not been categorized as such before. Furthermore, the scheme allows for a qualitative and quantitative comparison of experimental chimeras with chimeras obtained through numerical simulations.

  4. Improved Quantum Signature Scheme with Weak Arbitrator

    NASA Astrophysics Data System (ADS)

    Su, Qi; Li, Wen-Min

    2013-09-01

    In this paper, we find a man-in-the-middle attack on the quantum signature scheme with a weak arbitrator (Luo et al., Int. J. Theor. Phys., 51:2135, 2012). In that scheme, the authors proposed a quantum signature based on quantum one way function which contains both verifying the signer phase and verifying the signed message phase. However, after our analysis we will show that Eve can adopt different strategies in respective phases to forge the signature without being detected. Then we present an improved scheme to increase the security.

  5. TVD finite difference schemes and artificial viscosity

    NASA Technical Reports Server (NTRS)

    Davis, S. F.

    1984-01-01

    The total variation diminishing (TVD) finite difference scheme can be interpreted as a Lax-Wendroff scheme plus an upwind weighted artificial dissipation term. If a particular flux limiter is chosen and the requirement for upwind weighting is removed, an artificial dissipation term which is based on the theory of TVD schemes is obtained which does not contain any problem dependent parameters and which can be added to existing MacCormack method codes. Numerical experiments to examine the performance of this new method are discussed.

  6. Camouflage, Color Schemes, and Cubism.

    ERIC Educational Resources Information Center

    Guhin, Paula

    2002-01-01

    Presents an art activity where students learn about Cubism and color mixing. Explains that the students create camouflaged animals after learning about the work, "Female Torso" (Pablo Picasso). Includes directions for how to create the pictures and states that the assignment can be used with students of all ages. (CMK)

  7. Optimal Symmetric Ternary Quantum Encryption Schemes

    NASA Astrophysics Data System (ADS)

    Wang, Yu-qi; She, Kun; Huang, Ru-fen; Ouyang, Zhong

    2016-07-01

    In this paper, we present two definitions of the orthogonality and orthogonal rate of an encryption operator, and we provide a verification process for the former. Then, four improved ternary quantum encryption schemes are constructed. Compared with Scheme 1 (see Section 2.3), these four schemes demonstrate significant improvements in term of calculation and execution efficiency. Especially, under the premise of the orthogonal rate ɛ as secure parameter, Scheme 3 (see Section 4.1) shows the highest level of security among them. Through custom interpolation functions, the ternary secret key source, which is composed of the digits 0, 1 and 2, is constructed. Finally, we discuss the security of both the ternary encryption operator and the secret key source, and both of them show a high level of security and high performance in execution efficiency.

  8. ONU Power Saving Scheme for EPON System

    NASA Astrophysics Data System (ADS)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  9. A robust coding scheme for packet video

    NASA Technical Reports Server (NTRS)

    Chen, Y. C.; Sayood, Khalid; Nelson, D. J.

    1991-01-01

    We present a layered packet video coding algorithm based on a progressive transmission scheme. The algorithm provides good compression and can handle significant packet loss with graceful degradation in the reconstruction sequence. Simulation results for various conditions are presented.

  10. A robust coding scheme for packet video

    NASA Technical Reports Server (NTRS)

    Chen, Yun-Chung; Sayood, Khalid; Nelson, Don J.

    1992-01-01

    A layered packet video coding algorithm based on a progressive transmission scheme is presented. The algorithm provides good compression and can handle significant packet loss with graceful degradation in the reconstruction sequence. Simulation results for various conditions are presented.

  11. Secure Wake-Up Scheme for WBANs

    NASA Astrophysics Data System (ADS)

    Liu, Jing-Wei; Ameen, Moshaddique Al; Kwak, Kyung-Sup

    Network life time and hence device life time is one of the fundamental metrics in wireless body area networks (WBAN). To prolong it, especially those of implanted sensors, each node must conserve its energy as much as possible. While a variety of wake-up/sleep mechanisms have been proposed, the wake-up radio potentially serves as a vehicle to introduce vulnerabilities and attacks to WBAN, eventually resulting in its malfunctions. In this paper, we propose a novel secure wake-up scheme, in which a wake-up authentication code (WAC) is employed to ensure that a BAN Node (BN) is woken up by the correct BAN Network Controller (BNC) rather than unintended users or malicious attackers. The scheme is thus particularly implemented by a two-radio architecture. We show that our scheme provides higher security while consuming less energy than the existing schemes.

  12. Consistency of homogenization schemes in linear poroelasticity

    NASA Astrophysics Data System (ADS)

    Pichler, Bernhard; Dormieux, Luc

    2008-08-01

    In view of extending classical micromechanics of poroelasticity to the non-saturated regime, one has to deal with different pore stresses which may be affected by the size and the shape of the pores. Introducing the macrostrain and these pore stresses as loading parameters, the macrostress of a representative volume element of a porous material can be derived by means of Levin's theorem or by means of the direct formulation of the stress average rule, respectively. A consistency requirement for a given homogenization scheme is obtained from the condition that the two approaches should yield identical results. Classical approaches (Mori-Tanaka scheme, self-consistent scheme) are shown to be only conditionally consistent. In contrast, the Ponte Castañeda-Willis scheme proves to provide consistent descriptions both of porous matrix-inclusion composites and of porous polycrystals. To cite this article: B. Pichler, L. Dormieux, C. R. Mecanique 336 (2008).

  13. High-Order Energy Stable WENO Schemes

    NASA Technical Reports Server (NTRS)

    Yamaleev, Nail K.; Carpenter, Mark H.

    2009-01-01

    A third-order Energy Stable Weighted Essentially Non-Oscillatory (ESWENO) finite difference scheme developed by Yamaleev and Carpenter was proven to be stable in the energy norm for both continuous and discontinuous solutions of systems of linear hyperbolic equations. Herein, a systematic approach is presented that enables 'energy stable' modifications for existing WENO schemes of any order. The technique is demonstrated by developing a one-parameter family of fifth-order upwind-biased ESWENO schemes; ESWENO schemes up to eighth order are presented in the appendix. New weight functions are also developed that provide (1) formal consistency, (2) much faster convergence for smooth solutions with an arbitrary number of vanishing derivatives, and (3) improved resolution near strong discontinuities.

  14. A positive finite-difference advection scheme

    SciTech Connect

    Hundsdorfer, W.; Koren, B.; Loon, M. van

    1995-03-01

    This paper examines a class of explicit finite-difference advection schemes derived along the method of lines. An important application field is large-scale atmospheric transport. The paper therefore focuses on the demand of positivity. For the spatial discretization, attention is confined to conservative schemes using five points per direction. The fourth-order central scheme and the family of {kappa}-schemes, comprising the second-order central, the second-order upwind, and the third-order upwind biased, are studied. Positivity is enforced through flux limiting. It is concluded that the limited third-order upwind discretization is the best candidate from the four examined. For the time integration attention is confined to a number of explicit Runge-Kutta methods of orders two to four. With regard to the demand of positivity, these integration methods turn out to behave almost equally and no best method could be identified. 16 refs., 4 figs., 4 tabs.

  15. Twin-Schnorr: a security upgrade for the Schnorr identity-based identification scheme.

    PubMed

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael Chung-Wei

    2015-01-01

    Most identity-based identification (IBI) schemes proposed in recent literature are built using pairing operations. This decreases efficiency due to the high operation costs of pairings. Furthermore, most of these IBI schemes are proven to be secure against impersonation under active and concurrent attacks using interactive assumptions such as the one-more RSA inversion assumption or the one-more discrete logarithm assumption, translating to weaker security guarantees due to the interactive nature of these assumptions. The Schnorr-IBI scheme was first proposed through the Kurosawa-Heng transformation from the Schnorr signature. It remains one of the fastest yet most secure IBI schemes under impersonation against passive attacks due to its pairing-free design. However, when required to be secure against impersonators under active and concurrent attacks, it deteriorates greatly in terms of efficiency due to the protocol having to be repeated multiple times. In this paper, we upgrade the Schnorr-IBI scheme to be secure against impersonation under active and concurrent attacks using only the classical discrete logarithm assumption. This translates to a higher degree of security guarantee with only some minor increments in operational costs. Furthermore, because the scheme operates without pairings, it still retains its efficiency and superiority when compared to other pairing-based IBI schemes.

  16. Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme

    PubMed Central

    Heng, Swee-Huay; Phan, Raphael Chung-Wei

    2015-01-01

    Most identity-based identification (IBI) schemes proposed in recent literature are built using pairing operations. This decreases efficiency due to the high operation costs of pairings. Furthermore, most of these IBI schemes are proven to be secure against impersonation under active and concurrent attacks using interactive assumptions such as the one-more RSA inversion assumption or the one-more discrete logarithm assumption, translating to weaker security guarantees due to the interactive nature of these assumptions. The Schnorr-IBI scheme was first proposed through the Kurosawa-Heng transformation from the Schnorr signature. It remains one of the fastest yet most secure IBI schemes under impersonation against passive attacks due to its pairing-free design. However, when required to be secure against impersonators under active and concurrent attacks, it deteriorates greatly in terms of efficiency due to the protocol having to be repeated multiple times. In this paper, we upgrade the Schnorr-IBI scheme to be secure against impersonation under active and concurrent attacks using only the classical discrete logarithm assumption. This translates to a higher degree of security guarantee with only some minor increments in operational costs. Furthermore, because the scheme operates without pairings, it still retains its efficiency and superiority when compared to other pairing-based IBI schemes. PMID:25692179

  17. Renormalization scheme dependence with renormalization group summation

    NASA Astrophysics Data System (ADS)

    McKeon, D. G. C.

    2015-08-01

    We consider all perturbative radiative corrections to the total e+e- annihilation cross section Re+e- showing how the renormalization group (RG) equation associated with the radiatively induced mass scale μ can be used to sum the logarithmic contributions in two ways. First of all, one can sum leading-log, next-to-leading-log, etc., contributions to Re+e- using in turn the one-loop, two-loop, etc., contributions to the RG function β . A second summation shows how all logarithmic corrections to Re+e- can be expressed entirely in terms of the log-independent contributions when one employs the full β -function. Next, using Stevenson's characterization of any choice of renormalization scheme by the use of the contributions to the β -function arising beyond two-loop order, we examine the RG scheme dependence in Re+e- when using the second way of summing logarithms. The renormalization scheme invariants that arise are then related to the renormalization scheme invariants found by Stevenson. We next consider two choices of the renormalization scheme, one which can be used to express Re+e- solely in terms of two powers of a running coupling, and the second which can be used to express Re+e- as an infinite series in the two-loop running coupling (i.e., a Lambert W -function). In both cases, Re+e- is expressed solely in terms of renormalization scheme invariant parameters that are to be computed by a perturbative evaluation of Re+e-. We then establish how in general the coupling constant arising in one renormalization scheme can be expressed as a power series of the coupling arising in any other scheme. We then establish how, by using a different renormalization mass scale at each order of perturbation theory, all renormalization scheme dependence can be absorbed into these mass scales when one uses the second way of summing logarithmic corrections to Re+e-. We then employ the approach to renormalization scheme dependency that we have applied to Re+e- to a RG summed

  18. Motion-based wake-up scheme for ambulatory monitoring in wireless body sensor networks.

    PubMed

    Pek, Isaac; Waluyo, Agustinus Borgy; Yeoh, Wee-Soon; Chen, Xiang

    2009-01-01

    Given that wearable sensors that are attached on patients for the purpose of continuous real-time medical monitoring typically need to remain operational for periods of up to 24 hours before a battery change or recharge, power preservation schemes play a critical role in minimizing any possible disruption to a patient's daily activities. In this paper, we propose a motion-based wake-up scheme, a feature which combines motion detection with existing power preservation schemes in order to achieve a balance between energy saving and data timeliness, particularly in critical situations. As a showcase, we have integrated this feature with a healthcare application and demonstrate the capability of the scheme to deal with critical events, e.g., when a patient falls down from the bed. This showcase affirms the effective uses of our proposed motion-based wake-up scheme.

  19. A comparison of ENO and TVD schemes

    NASA Technical Reports Server (NTRS)

    Chang, Shih-Hung; Liou, Meng-Sing

    1988-01-01

    The numerical performance of a second-order upwind-based TVD scheme is compared with that of a uniform second-order ENO scheme on shock capturing. The cases considered include flows with Mach numbers of 2.9, 5.0, and 10.0. For cases with Mach numbers of 5.0 and 10.0, the computed ENO results are inferior to the corresponding TVD results.

  20. Signature scheme based on bilinear pairs

    NASA Astrophysics Data System (ADS)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  1. A modified scheme for biotyping Gardnerella vaginalis.

    PubMed

    Benito, R; Vazquez, J A; Berron, S; Fenoll, A; Saez-Neito, J A

    1986-06-01

    A scheme is proposed for biotyping Gardnerella vaginalis, based on detection of hippurate hydrolysis, beta-galactosidase (ONPG) and lipase, and fermentation of arabinose, galactose and xylose. Seventeen biotypes were found among 197 strains from asymptomatic women and patients with bacterial vaginosis (non-specific vaginitis). The distribution of biotypes was similar in both populations but some biotypes were found more frequently in patients. The proposed scheme is compared with those previously described.

  2. Binary Schemes of Vapor Bubble Growth

    NASA Astrophysics Data System (ADS)

    Zudin, Yu. B.

    2015-05-01

    A problem on spherically symmetric growth of a vapor bubble in an infi nite volume of a uniformly superheated liquid is considered. A description of the limiting schemes of bubble growth is presented. A binary inertial-thermal bubble growth scheme characterized by such specifi c features as the "three quarters" growth law and the effect of "pressure blocking" in a vapor phase is considered.

  3. Composite centered schemes for multidimensional conservation laws

    SciTech Connect

    Liska, R.; Wendroff, B.

    1998-05-08

    The oscillations of a centered second order finite difference scheme and the excessive diffusion of a first order centered scheme can be overcome by global composition of the two, that is by performing cycles consisting of several time steps of the second order method followed by one step of the diffusive method. The authors show the effectiveness of this approach on some test problems in two and three dimensions.

  4. Dynamic Restarting Schemes for Eigenvalue Problems

    SciTech Connect

    Wu, Kesheng; Simon, Horst D.

    1999-03-10

    In studies of restarted Davidson method, a dynamic thick-restart scheme was found to be excellent in improving the overall effectiveness of the eigen value method. This paper extends the study of the dynamic thick-restart scheme to the Lanczos method for symmetric eigen value problems and systematically explore a range of heuristics and strategies. We conduct a series of numerical tests to determine their relative strength and weakness on a class of electronic structure calculation problems.

  5. Asynchronous Communication Scheme For Hypercube Computer

    NASA Technical Reports Server (NTRS)

    Madan, Herb S.

    1988-01-01

    Scheme devised for asynchronous-message communication system for Mark III hypercube concurrent-processor network. Network consists of up to 1,024 processing elements connected electrically as though were at corners of 10-dimensional cube. Each node contains two Motorola 68020 processors along with Motorola 68881 floating-point processor utilizing up to 4 megabytes of shared dynamic random-access memory. Scheme intended to support applications requiring passage of both polled or solicited and unsolicited messages.

  6. On nonstandard finite difference schemes in biosciences

    NASA Astrophysics Data System (ADS)

    Anguelov, R.; Dumont, Y.; Lubuma, J. M.-S.

    2012-10-01

    We design, analyze and implement nonstandard finite difference (NSFD) schemes for some differential models in biosciences. The NSFD schemes are reliable in three directions. They are topologically dynamically consistent for onedimensional models. They can replicate the global asymptotic stability of the disease-free equilibrium of the MSEIR model in epidemiology whenever the basic reproduction number is less than 1. They preserve the positivity and boundedness property of solutions of advection-reaction and reaction-diffusion equations.

  7. FRESCO: flexible alignment with rectangle scoring schemes.

    PubMed

    Dalca, A V; Brudno, M

    2008-01-01

    While the popular DNA sequence alignment tools incorporate powerful heuristics to allow for fast and accurate alignment of DNA, most of them still optimize the classical Needleman Wunsch scoring scheme. The development of novel scoring schemes is often hampered by the difficulty of finding an optimizing algorithm for each non-trivial scheme. In this paper we define the broad class of rectangle scoring schemes, and describe an algorithm and tool that can align two sequences with an arbitrary rectangle scoring scheme in polynomial time. Rectangle scoring schemes encompass some of the popular alignment scoring metrics currently in use, as well as many other functions. We investigate a novel scoring function based on minimizing the expected number of random diagonals observed with the given scores and show that it rivals the LAGAN and Clustal-W aligners, without using any biological or evolutionary parameters. The FRESCO program, freely available at http://compbio.cs.toronto.edu/fresco, gives bioinformatics researchers the ability to quickly compare the performance of other complex scoring formulas without having to implement new algorithms to optimize them.

  8. Simplification of the unified gas kinetic scheme.

    PubMed

    Chen, Songze; Guo, Zhaoli; Xu, Kun

    2016-08-01

    The unified gas kinetic scheme (UGKS) is an asymptotic preserving (AP) scheme for kinetic equations. It is superior for transition flow simulation and has been validated in the past years. However, compared to the well-known discrete ordinate method (DOM), which is a classical numerical method solving the kinetic equations, the UGKS needs more computational resources. In this study, we propose a simplification of the unified gas kinetic scheme. It allows almost identical numerical cost as the DOM, but predicts numerical results as accurate as the UGKS. In the simplified scheme, the numerical flux for the velocity distribution function and the numerical flux for the macroscopic conservative quantities are evaluated separately. The equilibrium part of the UGKS flux is calculated by analytical solution instead of the numerical quadrature in velocity space. The simplification is equivalent to a flux hybridization of the gas kinetic scheme for the Navier-Stokes (NS) equations and the conventional discrete ordinate method. Several simplification strategies are tested, through which we can identify the key ingredient of the Navier-Stokes asymptotic preserving property. Numerical tests show that, as long as the collision effect is built into the macroscopic numerical flux, the numerical scheme is Navier-Stokes asymptotic preserving, regardless the accuracy of the microscopic numerical flux for the velocity distribution function. PMID:27627418

  9. Simplification of the unified gas kinetic scheme

    NASA Astrophysics Data System (ADS)

    Chen, Songze; Guo, Zhaoli; Xu, Kun

    2016-08-01

    The unified gas kinetic scheme (UGKS) is an asymptotic preserving (AP) scheme for kinetic equations. It is superior for transition flow simulation and has been validated in the past years. However, compared to the well-known discrete ordinate method (DOM), which is a classical numerical method solving the kinetic equations, the UGKS needs more computational resources. In this study, we propose a simplification of the unified gas kinetic scheme. It allows almost identical numerical cost as the DOM, but predicts numerical results as accurate as the UGKS. In the simplified scheme, the numerical flux for the velocity distribution function and the numerical flux for the macroscopic conservative quantities are evaluated separately. The equilibrium part of the UGKS flux is calculated by analytical solution instead of the numerical quadrature in velocity space. The simplification is equivalent to a flux hybridization of the gas kinetic scheme for the Navier-Stokes (NS) equations and the conventional discrete ordinate method. Several simplification strategies are tested, through which we can identify the key ingredient of the Navier-Stokes asymptotic preserving property. Numerical tests show that, as long as the collision effect is built into the macroscopic numerical flux, the numerical scheme is Navier-Stokes asymptotic preserving, regardless the accuracy of the microscopic numerical flux for the velocity distribution function.

  10. A factorial assessment of the sensitivity of the BATS land-surface parameterization scheme. [BATS (Biosphere-Atmosphere Transfer Scheme)

    SciTech Connect

    Henderson-Sellers, A. )

    1993-02-01

    Land-surface schemes developed for incorporation into global climate models include parameterizations that are not yet fully validated and depend upon the specification of a large (20-50) number of ecological and soil parameters, the values of which are not yet well known. There are two methods of investigating the sensitivity of a land-surface scheme to prescribed values: simple one-at-a-time changes or factorial experiments. Factorial experiments offer information about interactions between parameters and are thus a more powerful tool. Here the results of a suite of factorial experiments are reported. These are designed (i) to illustrate the usefulness of this methodology and (ii) to identify factors important to the performance of complex land-surface schemes. The Biosphere-Atmosphere Transfer Scheme (BATS) is used and its sensitivity is considered (a) to prescribed ecological and soil parameters and (b) to atmospheric forcing used in the off-line tests undertaken. Results indicate that the most important atmospheric forcings are mean monthly temperature and the interaction between mean monthly temperature and total monthly precipitation, although fractional cloudiness and other parameters are also important. The most important ecological parameters are vegetation roughness length, soil porosity, and a factor describing the sensitivity of the stomatal resistance of vegetation to the amount of photosynthetically active solar radiation and, to a lesser extent, soil and vegetation albedos. Two-factor interactions including vegetation roughness length are more important than many of the 23 specified single factors. The results of factorial sensitivity experiments such as these could form the basis for intercomparison of land-surface parameterization schemes and for field experiments and satellite-based observation programs aimed at improving evaluation of important parameters.

  11. Filtered schemes for Hamilton-Jacobi equations: A simple construction of convergent accurate difference schemes

    NASA Astrophysics Data System (ADS)

    Oberman, Adam M.; Salvador, Tiago

    2015-03-01

    We build a simple and general class of finite difference schemes for first order Hamilton-Jacobi (HJ) Partial Differential Equations. These filtered schemes are convergent to the unique viscosity solution of the equation. The schemes are accurate: we implement second, third and fourth order accurate schemes in one dimension and second order accurate schemes in two dimensions, indicating how to build higher order ones. They are also explicit, which means they can be solved using the fast sweeping method. The accuracy of the method is validated with computational results for the eikonal equation and other HJ equations in one and two dimensions, using filtered schemes made from standard centered differences, higher order upwinding and ENO interpolation.

  12. Simplified scheme for routine identification of human Staphylococcus species.

    PubMed

    Kloos, W E; Schleifer, K H

    1975-01-01

    From a total of 40 characters that were previously used to differentiate species of staphylococci, 13 key characters were selected to make a simplified scheme that could be easily used by the routine clinical laboratory for identifying human staphylococci. These key characters included coagulase activity, hemolysis, nitrate reduction, and aerobic acid production from fructose, xylose, arabinose, ribose, maltose, lactose, sucrose, trehalose, mannitol, and xylitol. In the simplified scheme, 924 strains of staphylococci were placed into 11 positions, each of which contained the major portion (greater than or equal to 80%) of strains of one of the recognized species. Several positions contained a rare or few uncommon strains of one or more additional species and these could be resolved on the basis of other key characters.

  13. Passive Phase Noise Cancellation Scheme

    PubMed Central

    Kenig, Eyal; Cross, M. C.; Lifshitz, Ron; Karabalin, R. B.; Villanueva, L. G.; Matheny, M. H.; Roukes, M. L.

    2013-01-01

    We introduce a new method for reducing phase noise in oscillators, thereby improving their frequency precision. The noise reduction is realized by a passive device consisting of a pair of coupled nonlinear resonating elements that are driven parametrically by the output of a conventional oscillator at a frequency close to the sum of the linear mode frequencies. Above the threshold for parametric instability, the coupled resonators exhibit self-oscillations which arise as a response to the parametric driving, rather than by application of active feedback. We find operating points of the device for which this periodic signal is immune to frequency noise in the driving oscillator, providing a way to clean its phase noise. We present results for the effect of thermal noise to advance a broader understanding of the overall noise sensitivity and the fundamental operating limits. PMID:23004985

  14. Combining image-processing and image compression schemes

    NASA Technical Reports Server (NTRS)

    Greenspan, H.; Lee, M.-C.

    1995-01-01

    An investigation into the combining of image-processing schemes, specifically an image enhancement scheme, with existing compression schemes is discussed. Results are presented on the pyramid coding scheme, the subband coding scheme, and progressive transmission. Encouraging results are demonstrated for the combination of image enhancement and pyramid image coding schemes, especially at low bit rates. Adding the enhancement scheme to progressive image transmission allows enhanced visual perception at low resolutions. In addition, further progressing of the transmitted images, such as edge detection schemes, can gain from the added image resolution via the enhancement.

  15. An efficient authentication scheme for telecare medicine information systems.

    PubMed

    Zhu, Zhian

    2012-12-01

    To ensure patients' privacy, such as telephone number, medical record number, health information, etc., authentication schemes for telecare medicine information systems (TMIS) have been studied widely. Recently, Wei et al. proposed an efficient authentication scheme for TMIS. They claimed their scheme could resist various attacks. However, in this paper, we will show their scheme is vulnerable to an off-line password guessing attack when user's smart card is lost. To improve the security, we propose a new authentication scheme for TMIS. The analysis shows our scheme could overcome the weaknesses in Wei et al.'s scheme and has better performance than their scheme. PMID:22527784

  16. A classification scheme for risk assessment methods.

    SciTech Connect

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In Section 2 we provide context for this report

  17. A flexible gridding scheme for reservoir simulation

    SciTech Connect

    Verma, S.

    1995-12-31

    This paper describes a new control volume based finite difference scheme for petroleum reservoir simulation which can be used with unstructured grids. The numerical scheme to model fluid flow is shown to be easily used for Voronoi grids in 2D. It can also be used with certain geometrical limitations for 3D Voronoi grids. The scheme can be used without any significant limitations for triangle or tetrahedron based grids where control volumes are constructed around their vertices. It assumes uniform properties inside such control volumes. Full, anisotropic and asymmetric permeability tensor can be easily handled with the proposed method. The permeability tensor can vary from block to block. Thus it will be of great value in modeling fluid flow in reservoirs where principal directions of permeability varies between beds or within a bed. The paper also presents an analysis of some of the published flexible gridding schemes which use a control volume type algebraic approximation and demonstrate the advantages of the method presented here. The technique for grid construction is also discussed. Test results presented here demonstrate the need for proper representation of reservoir geometry to predict the correct flow behavior. The gridding scheme described in this paper achieves that purpose.

  18. Geophysical Inversion through Hierarchical Genetic Algorithm Scheme

    NASA Astrophysics Data System (ADS)

    Furman, Alex; Huisman, Johan A.

    2010-05-01

    Geophysical investigation is a powerful tool that allows non-invasive and non-destructive mapping of subsurface states and properties. However, non-uniqueness associated with the inversion process halts these methods from becoming of more quantitative use. One major direction researchers are going is constraining the inverse problem by hydrological observations and models. An alternative to the commonly used direct inversion methods are global optimization schemes (such as genetic algorithms and Monte Carlo Markov Chain methods). However, the major limitation here is the desired high resolution of the tomographic image, which leads to a large number of parameters and an unreasonably high computational effort when using global optimization schemes. One way to overcome these problems is to combine the advantages of both direct and global inversion methods through hierarchical inversion. That is, starting the inversion with relatively coarse resolution of parameters, achieving good inversion using one of the two inversion schemes (global or direct), and then refining the resolution and applying a combination of global and direct inversion schemes for the whole domain or locally. In this work we explore through synthetic case studies the option of using a global optimization scheme for inversion of electrical resistivity tomography data through hierarchical refinement of the model resolution.

  19. Identification Schemes from Key Encapsulation Mechanisms

    NASA Astrophysics Data System (ADS)

    Anada, Hiroaki; Arita, Seiko

    We propose a generic conversion from a key encapsulation mechanism (KEM) to an identification (ID) scheme. The conversion derives the security for ID schemes against concurrent man-in-the-middle (cMiM) attacks from the security for KEMs against adaptive chosen ciphertext attacks on one-wayness (one-way-CCA2). Then, regarding the derivation as a design principle of ID schemes, we develop a series of concrete one-way-CCA2 secure KEMs. We start with El Gamal KEM and prove it secure against non-adaptive chosen ciphertext attacks on one-wayness (one-way-CCA1) in the standard model. Then, we apply a tag framework with the algebraic trick of Boneh and Boyen to make it one-way-CCA2 secure based on the Gap-CDH assumption. Next, we apply the CHK transformation or a target collision resistant hash function to exit the tag framework. And finally, as it is better to rely on the CDH assumption rather than the Gap-CDH assumption, we apply the Twin DH technique of Cash, Kiltz and Shoup. The application is not “black box” and we do it by making the Twin DH technique compatible with the algebraic trick. The ID schemes obtained from our KEMs show the highest performance in both computational amount and message length compared with previously known ID schemes secure against concurrent man-in-the-middle attacks.

  20. The Nonlinear Characteristic scheme in X-Y geometries

    SciTech Connect

    Walters, W.F.; Wareing, T.A.

    1994-08-01

    The Nonlinear Characteristic (NC) scheme for solving the discrete-ordinates form of the transport equation has recently been introduced and used to analyze one-dimensional slab transport problems. The purpose of this paper is to determine the accuracy and positivity of the NC scheme as extended to solve two-dimensional X-Y problems. We compare the results obtained using the NC scheme to those obtained using the Bilinear Discontinuous (BLD) scheme, the Bilinear Nodal (BLN) scheme, Linear Characteristic scheme, and the Diamond Difference with Fixup (DD/F) scheme. As was found in one-dimensional applications, the NC scheme is strictly positive and as accurate or more accurate than the other schemes for all meshes examined. The accuracy of the NC scheme for coarse meshes is particularity outstanding compared to that of the other schemes.

  1. Dropout--Mertonian or reproduction scheme?

    PubMed

    Horowitz, T R

    1992-01-01

    This article reports on dropouts in four schools in Israel. Two main research questions were addressed: (1) Is it possible to identify a potential dropout through examination of his/her attitudes and competence before the actual act of leaving school? (2) Is there a difference between dropouts and persistent students in different educational settings (academic, vocational, agricultural, and comprehensive high schools)? Significant differences were found in the attitudes of persistent students and dropouts even before the act of dropping out occurred. In the vocational, comprehensive, and agricultural schools, the dropouts scored more positively on the self-estrangement, meaninglessness, and misfeasance scales. In the academic school, the dropouts scored positively on the anxiety scale. Results were interpreted in light of the Mertonian scheme of ends and means as well as the reproduction scheme. The Mertonian scheme was deemed more applicable.

  2. Campylobacter biotyping scheme of epidemiological value.

    PubMed Central

    Bolton, F J; Holt, A V; Hutchinson, D N

    1984-01-01

    A biotyping scheme has been developed which utilises 12 tests, including growth at 28 degrees C, hippurate hydrolysis, and 10 resistotyping tests. These tests are arranged in groups of three, and by assigning a numerical value to each positive test a four figure code is produced for each strain. The order of the tests is such that campylobacters are both speciated and biotyped . This scheme recognises Campylobacter jejuni, C coli, "C laridis ," C fetus fetus, and C fetus subspecies venerealis. The reproducibility of the biotyping technique and the stability of the biotype code have been determined by testing campylobacter reference strains. The routine application of the scheme has also been evaluated by biotyping 1000 recent campylobacter isolates, and the epidemiological value has been confirmed by testing serotyped isolates from several milk borne outbreaks. PMID:6373839

  3. A compositional classification scheme for meteoritic chondrules

    NASA Technical Reports Server (NTRS)

    Sears, Derek W. G.; Jie, LU; Benoit, Paul H.; Dehart, John M.; Lofgren, Gary E.

    1992-01-01

    A compositionally based classification scheme for chondrules is proposed that will help in systematizing the wealth of data available and disentangling the effects of nebular and subsequent processes. The classification is not by texture or the composition of a single phase, or a mixture of these two, but rather is a comprehensive, systematic approach which uses the composition of the two main chondrule components. This scheme is applicable to over 95 percent of the chondrules and is easily applied using an electron microprobe. It stresses the original diversity of the chondrules and the complex yet facile way in which they respond to parent-body metamorphism. Results using this classification scheme suggest that arguments against an important role of chondrules in determining the compositional trends of the chondrites have been premature.

  4. Cooling scheme for turbine hot parts

    DOEpatents

    Hultgren, Kent Goran; Owen, Brian Charles; Dowman, Steven Wayne; Nordlund, Raymond Scott; Smith, Ricky Lee

    2000-01-01

    A closed-loop cooling scheme for cooling stationary combustion turbine components, such as vanes, ring segments and transitions, is provided. The cooling scheme comprises: (1) an annular coolant inlet chamber, situated between the cylinder and blade ring of a turbine, for housing coolant before being distributed to the turbine components; (2) an annular coolant exhaust chamber, situated between the cylinder and the blade ring and proximate the annular coolant inlet chamber, for collecting coolant exhaust from the turbine components; (3) a coolant inlet conduit for supplying the coolant to said coolant inlet chamber; (4) a coolant exhaust conduit for directing coolant from said coolant exhaust chamber; and (5) a piping arrangement for distributing the coolant to and directing coolant exhaust from the turbine components. In preferred embodiments of the invention, the cooling scheme further comprises static seals for sealing the blade ring to the cylinder and flexible joints for attaching the blade ring to the turbine components.

  5. Upwind and symmetric shock-capturing schemes

    NASA Technical Reports Server (NTRS)

    Yee, H. C.

    1987-01-01

    The development of numerical methods for hyperbolic conservation laws has been a rapidly growing area for the last ten years. Many of the fundamental concepts and state-of-the-art developments can only be found in meeting proceedings or internal reports. This review paper attempts to give an overview and a unified formulation of a class of shock-capturing methods. Special emphasis is on the construction of the basic nonlinear scalar second-order schemes and the methods of extending these nonlinear scalar schemes to nonlinear systems via the extact Riemann solver, approximate Riemann solvers, and flux-vector splitting approaches. Generalization of these methods to efficiently include real gases and large systems of nonequilibrium flows is discussed. The performance of some of these schemes is illustrated by numerical examples for one-, two- and three-dimensional gas dynamics problems.

  6. Compression scheme for geophysical electromagnetic inversions

    NASA Astrophysics Data System (ADS)

    Abubakar, A.

    2014-12-01

    We have developed a model-compression scheme for improving the efficiency of the regularized Gauss-Newton inversion algorithm for geophysical electromagnetic applications. In this scheme, the unknown model parameters (the conductivity/resistivity distribution) are represented in terms of a basis such as Fourier and wavelet (Haar and Daubechies). By applying a truncation criterion, the model may then be approximated by a reduced number of basis functions, which is usually much less than the number of the model parameters. Further, because the geophysical electromagnetic measurements have low resolution, it is sufficient for inversion to only keep the low-spatial frequency part of the image. This model-compression scheme accelerates the computational time and also reduces the memory usage of the Gauss-Newton method. We are able to significantly reduce the algorithm computational complexity without compromising the quality of the inverted models.

  7. An adaptive Cartesian control scheme for manipulators

    NASA Technical Reports Server (NTRS)

    Seraji, H.

    1987-01-01

    A adaptive control scheme for direct control of manipulator end-effectors to achieve trajectory tracking in Cartesian space is developed. The control structure is obtained from linear multivariable theory and is composed of simple feedforward and feedback controllers and an auxiliary input. The direct adaptation laws are derived from model reference adaptive control theory and are not based on parameter estimation of the robot model. The utilization of feedforward control and the inclusion of auxiliary input are novel features of the present scheme and result in improved dynamic performance over existing adaptive control schemes. The adaptive controller does not require the complex mathematical model of the robot dynamics or any knowledge of the robot parameters or the payload, and is computationally fast for online implementation with high sampling rates.

  8. The Project for Intercomparison of Land-surface Parameterization Schemes

    NASA Technical Reports Server (NTRS)

    Henderson-Sellers, A.; Yang, Z.-L.; Dickinson, R. E.

    1993-01-01

    The Project for Intercomparison of Land-surface Parameterization Schemes (PILPS) is described and the first stage science plan outlined. PILPS is a project designed to improve the parameterization of the continental surface, especially the hydrological, energy, momentum, and carbon exchanges with the atmosphere. The PILPS Science Plan incorporates enhanced documentation, comparison, and validation of continental surface parameterization schemes by community participation. Potential participants include code developers, code users, and those who can provide datasets for validation and who have expertise of value in this exercise. PILPS is an important activity because existing intercomparisons, although piecemeal, demonstrate that there are significant differences in the formulation of individual processes in the available land surface schemes. These differences are comparable to other recognized differences among current global climate models such as cloud and convection parameterizations. It is also clear that too few sensitivity studies have been undertaken with the result that there is not yet enough information to indicate which simplifications or omissions are important for the near-surface continental climate, hydrology, and biogeochemistry. PILPS emphasizes sensitivity studies with and intercomparisons of existing land surface codes and the development of areally extensive datasets for their testing and validation.

  9. Steady-State Analysis Model for Advanced Fuel Cycle Schemes.

    2008-03-17

    Version 00 SMAFS was developed as a part of the study, "Advanced Fuel Cycles and Waste Management", which was performed during 2003-2005 by an ad-hoc expert group under the Nuclear Development Committee in the OECD/NEA. The model was designed for an efficient conduct of nuclear fuel cycle scheme cost analyses. It is simple, transparent and offers users the capability to track down cost analysis results. All the fuel cycle schemes considered in the model aremore » represented in a graphic format and all values related to a fuel cycle step are shown in the graphic interface, i.e., there are no hidden values embedded in the calculations. All data on the fuel cycle schemes considered in the study including mass flows, waste generation, cost data, and other data such as activities, decay heat and neutron sources of spent fuel and high-level waste along time are included in the model and can be displayed. The user can easily modify values of mass flows and/or cost parameters and see corresponding changes in the results. The model calculates: front-end fuel cycle mass flows such as requirements of enrichment and conversion services and natural uranium; mass of waste based on the waste generation parameters and the mass flow; and all costs.« less

  10. Steady-state Analysis Model for Advanced Fuelcycle Schemes

    2006-05-12

    The model was developed as a part of the study, "Advanced Fuel Cycles and Waste Management", which was performed during 2003—2005 by an ad-hoc expert group under the Nuclear Development Committee in the OECD/NEA. The model was designed for an efficient conduct of nuclear fuel cycle scheme cost analyses. It is simple, transparent and offers users the capability to track down the cost analysis results. All the fuel cycle schemes considered in the model aremore » represented in a graphic format and all values related to a fuel cycle step are shown in the graphic interface, i.e., there are no hidden values embedded in the calculations. All data on the fuel cycle schemes considered in the study including mass flows, waste generation, cost data, and other data such as activities, decay heat and neutron sources of spent fuel and high—level waste along time are included in the model and can be displayed. The user can modify easily the values of mass flows and/or cost parameters and see the corresponding changes in the results. The model calculates: front—end fuel cycle mass flows such as requirements of enrichment and conversion services and natural uranium; mass of waste based on the waste generation parameters and the mass flow; and all costs. It performs Monte Carlo simulations with changing the values of all unit costs within their respective ranges (from lower to upper bounds).« less

  11. Matching multistage schemes to viscous flow

    NASA Astrophysics Data System (ADS)

    Kleb, William Leonard

    A method to accelerate convergence to steady state by explicit time-marching schemes for the compressible Navier-Stokes equations is presented. The combination of cell-Reynolds-number-based multistage time stepping and local preconditioning makes solving steady-state viscous flow problems competitive with the convergence rates typically associated with implicit methods, without the associated memory penalty. Initially, various methods are investigated to extend the range of multistage schemes to diffusion-dominated cases. It is determined that the Chebyshev polynomials are well suited to serve as amplification factors for these schemes; however, creating a method that can bridge the continuum from convection-dominated to diffusion-dominated regimes proves troublesome, until the Manteuffel family of polynomials is uncovered. This transformation provides a smooth transition between the two extremes; and armed with this information, sets of multistage coefficients are created for a given spatial discretization as a function of cell Reynolds number according to various design criteria. As part of this process, a precise definition for the numerical time step is hammered out, something which up to this time, has been set via algebraic arguments only. Next are numerical tests of these sets of variable multistage coefficients. To isolate the effects of the variable multistage coefficients, the test case chosen is very simple: circular advection-diffusion. The numerical results support the analytical analysis by demonstrating an order of magnitude improvement in convergence rate for single-grid relaxation and a factor of three for multigrid relaxation. Building upon the success of the scalar case, preconditioning is applied to make the Navier-Stokes system of equations behave more nearly as a single scalar equation. Then, by applying the variable multistage coefficient scheme to a typical boundary-layer flow problem, the results affirm the benefits of local preconditioning

  12. An Improved Bulk Microphysical Scheme for Studying Precipitation Processes: Comparisons with Other Schemes

    NASA Technical Reports Server (NTRS)

    Tao, W. K.; Shi, J. J.; Lang, S.; Chen, S.; Hong, S-Y.; Peters-Lidard, C.

    2007-01-01

    Cloud microphysical processes play an important role in non-hydrostatic high-resolution simulations. Over the past decade both research and operational numerical weather prediction models have started using more complex cloud microphysical schemes that were originally developed for high-resolution cloud-resolving models. An improved bulk microphysical parameterization (adopted from the Goddard microphysics schemes) has recently implemented into the Weather Research and Forecasting (WRF) model. This bulk microphysical scheme has three different options --- 2ICE (cloud ice & snow), 3ICE-graupel (cloud ice, snow & graupel) and 3ICE-hail (cloud ice, snow & hail). High-resolution model simulations are conducted to examine the impact of microphysical schemes on two different weather events (a midlatitude linear convective system and an Atlantic hurricane). In addition, this bulk microphysical parameterization is compared with WIRF's three other bulk microphysical schemes.

  13. On the Dynamics of TVD Schemes

    NASA Technical Reports Server (NTRS)

    Yee, H. C.; Sweby, P. K.; Kutler, Paul (Technical Monitor)

    1994-01-01

    The dynamics of a class of TVD schemes for model hyperbolic and parabolic equations is studied numerically using a highly parallel supercomputer (CM-5). The objective is to utilize the highly parallel property of the CM-5 to reveal the reliable time step and entropy parameter ranges, and the degree of compressible flux limiters to avoid slow convergence and the production of nonphysical numerical solutions. We choose to study the nonlinear stability property of TVD schemes numerically since it is otherwise not amenable analytically.

  14. Engineering images designed by fractal subdivision scheme.

    PubMed

    Mustafa, Ghulam; Bari, Mehwish; Jamil, Saba

    2016-01-01

    This paper is concerned with the modeling of engineering images by the fractal properties of 6-point binary interpolating scheme. Association between the fractal behavior of the limit curve/surface and the parameter is obtained. The relationship between the subdivision parameter and the fractal dimension of the limit fractal curve of subdivision fractal is also presented. Numerical examples and visual demonstrations show that 6-point scheme is good choice for the generation of fractals for the modeling of fractal antennas, bearings, garari's and rock etc. PMID:27652066

  15. Security problem on arbitrated quantum signature schemes

    SciTech Connect

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  16. Security problem on arbitrated quantum signature schemes

    NASA Astrophysics Data System (ADS)

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-12-01

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  17. A Trade-off Traitor Tracing Scheme

    NASA Astrophysics Data System (ADS)

    Ohtake, Go; Ogawa, Kazuto; Hanaoka, Goichiro; Imai, Hideki

    There has been a wide-ranging discussion on the issue of content copyright protection in digital content distribution systems. Fiat and Tassa proposed the framework of dynamic traitor tracing. Their framework requires dynamic computation transactions according to the real-time responses of the pirate, and it presumes real-time observation of content redistribution. Therefore, it cannot be simply utilized in an application where such an assumption is not valid. In this paper, we propose a new scheme that provides the advantages of dynamic traitor tracing schemes and also overcomes their problems.

  18. Regularization schemes and the multiplicative anomaly

    NASA Astrophysics Data System (ADS)

    Evans, T. S.

    1999-06-01

    Elizalde, Vanzo, and Zerbini have shown that the effective action of two free Euclidean scalar fields in flat space contains a `multiplicative anomaly' when ζ-function regularization is used. This is related to the Wodzicki residue. I show that there is no anomaly when using a wide range of other regularization schemes and that the anomaly can be removed by an unusual choice of renormalization scales. I define new types of anomalies and show that they have similar properties. Thus multiplicative anomalies encode no novel physics. They merely illustrate some dangerous aspects of ζ-function and Schwinger proper time regularization schemes.

  19. ARQ scheme reinforced with past acknowledgement signals

    NASA Astrophysics Data System (ADS)

    Nakamura, Makoto; Takada, Yasushi

    An ARQ (automatic-repeat-request) scheme that can reduce the influence of backward channel errors for bidirectional data transmission systems is proposed. The main feature of the scheme is that both present and past acknowledgement signals are utilized to decide whether the data signals should be retransmitted or not. Throughput performance is analyzed in both go-back-N and selective-repeat ARQ. A small number of returned past acknowledgement signals are required to improve the throughput efficiency. For an ideal selective-repeat ARQ with an infinite buffer, increasing the number of returned past acknowledgement signals makes the throughput efficiency asymptotically close to the upper bound.

  20. Utilizing Kernelized Advection Schemes in Ocean Models

    NASA Astrophysics Data System (ADS)

    Zadeh, N.; Balaji, V.

    2008-12-01

    There has been a recent effort in the ocean model community to use a set of generic FORTRAN library routines for advection of scalar tracers in the ocean. In a collaborative project called Hybrid Ocean Model Environement (HOME), vastly different advection schemes (space-differencing schemes for advection equation) become available to modelers in the form of subroutine calls (kernels). In this talk we explore the possibility of utilizing ESMF data structures in wrapping these kernels so that they can be readily used in ESMF gridded components.

  1. Student Loans Schemes in Mauritius: Experience, Analysis and Scenarios

    ERIC Educational Resources Information Center

    Mohadeb, Praveen

    2006-01-01

    This study makes a comprehensive review of the situation of student loans schemes in Mauritius, and makes recommendations, based on best practices, for setting up a national scheme that attempts to avoid weaknesses identified in some of the loans schemes of other countries. It suggests that such a scheme would be cost-effective and beneficial both…

  2. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  3. Central difference TVD and TVB schemes for time dependent and steady state problems

    NASA Technical Reports Server (NTRS)

    Jorgenson, P.; Turkel, E.

    1992-01-01

    We use central differences to solve the time dependent Euler equations. The schemes are all advanced using a Runge-Kutta formula in time. Near shocks, a second difference is added as an artificial viscosity. This reduces the scheme to a first order upwind scheme at shocks. The switch that is used guarantees that the scheme is locally total variation diminishing (TVD). For steady state problems it is usually advantageous to relax this condition. Then small oscillations do not activate the switches and the convergence to a steady state is improved. To sharpen the shocks, different coefficients are needed for different equations and so a matrix valued dissipation is introduced and compared with the scalar viscosity. The connection between this artificial viscosity and flux limiters is shown. Any flux limiter can be used as the basis of a shock detector for an artificial viscosity. We compare the use of the van Leer, van Albada, mimmod, superbee, and the 'average' flux limiters for this central difference scheme. For time dependent problems, we need to use a small enough time step so that the CFL was less than one even though the scheme was linearly stable for larger time steps. Using a total variation bounded (TVB) Runge-Kutta scheme yields minor improvements in the accuracy.

  4. A Target Coverage Scheduling Scheme Based on Genetic Algorithms in Directional Sensor Networks

    PubMed Central

    Gil, Joon-Min; Han, Youn-Hee

    2011-01-01

    As a promising tool for monitoring the physical world, directional sensor networks (DSNs) consisting of a large number of directional sensors are attracting increasing attention. As directional sensors in DSNs have limited battery power and restricted angles of sensing range, maximizing the network lifetime while monitoring all the targets in a given area remains a challenge. A major technique to conserve the energy of directional sensors is to use a node wake-up scheduling protocol by which some sensors remain active to provide sensing services, while the others are inactive to conserve their energy. In this paper, we first address a Maximum Set Covers for DSNs (MSCD) problem, which is known to be NP-complete, and present a greedy algorithm-based target coverage scheduling scheme that can solve this problem by heuristics. This scheme is used as a baseline for comparison. We then propose a target coverage scheduling scheme based on a genetic algorithm that can find the optimal cover sets to extend the network lifetime while monitoring all targets by the evolutionary global search technique. To verify and evaluate these schemes, we conducted simulations and showed that the schemes can contribute to extending the network lifetime. Simulation results indicated that the genetic algorithm-based scheduling scheme had better performance than the greedy algorithm-based scheme in terms of maximizing network lifetime. PMID:22319387

  5. Seasonal activity and morphological changes in martian gullies

    USGS Publications Warehouse

    Dundas, Colin M.; Diniega, Serina; Hansen, Candice J.; Byrne, Shane; McEwen, Alfred S.

    2012-01-01

    Recent studies of martian dune and non-dune gullies have suggested a seasonal control on present-day gully activity. The timing of current gully activity, especially activity involving the formation or modification of channels (which commonly have been taken as evidence of fluvial processes), has important implications regarding likely gully formation processes and necessary environmental conditions. In this study, we describe the results of frequent meter-scale monitoring of several active gully sites by the High Resolution Imaging Science Experiment (HiRISE) on the Mars Reconnaissance Orbiter (MRO). The aim is to better assess the scope and nature of current morphological changes and to provide improved constraints on timing of gully activity on both dune and non-dune slopes. Our observations indicate that (1) gully formation on Mars is ongoing today and (2) the most significant morphological changes are strongly associated with seasonal frost and defrosting activity. Observed changes include formation of all major components of typical gully landforms, although we have not observed alcove formation in coherent bedrock. These results reduce the need to invoke recent climate change or present-day groundwater seepage to explain the many martian gullies with pristine appearance.

  6. How Can Conceptual Schemes Change Teaching?

    ERIC Educational Resources Information Center

    Wickman, Per-Olof

    2012-01-01

    Lundqvist, Almqvist and Ostman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the "epistemological moves",…

  7. A classification scheme for LWR fuel assemblies

    SciTech Connect

    Moore, R.S.; Williamson, D.A.; Notz, K.J.

    1988-11-01

    With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs.

  8. Creating Culturally Sustainable Agri-Environmental Schemes

    ERIC Educational Resources Information Center

    Burton, Rob J. F.; Paragahawewa, Upananda Herath

    2011-01-01

    Evidence is emerging from across Europe that contemporary agri-environmental schemes are having only limited, if any, influence on farmers' long-term attitudes towards the environment. In this theoretical paper we argue that these approaches are not "culturally sustainable," i.e. the actions are not becoming embedded within farming cultures as…

  9. Harmonic generation with multiple wiggler schemes

    SciTech Connect

    Bonifacio, R.; De Salvo, L.; Pierini, P.

    1995-02-01

    In this paper the authors give a simple theoretical description of the basic physics of the single pass high gain free electron laser (FEL), describing in some detail the FEL bunching properties and the harmonic generation technique with a multiple-wiggler scheme or a high gain optical klystron configuration.

  10. Security of Invertible Media Authentication Schemes Revisited

    NASA Astrophysics Data System (ADS)

    Dönigus, Daniel; Endler, Stefan; Fischlin, Marc; Hülsing, Andreas; Jäger, Patrick; Lehmann, Anja; Podrazhansky, Sergey; Schipp, Sebastian; Tews, Erik; Vowe, Sven; Walthart, Matthias; Weidemann, Frederik

    Dittmann, Katzenbeisser, Schallhart and Veith (SEC 2005) introduced the notion of invertible media authentication schemes, embedding authentication data in media objects via invertible watermarks. These invertible watermarks allow to recover the original media object (given a secret encryption key), as required for example in some medical applications where the distortion must be removable.

  11. Sex-roles in Reading Schemes

    ERIC Educational Resources Information Center

    Lobban, Glenys

    1974-01-01

    Author contended that no broad-ranging study of the way sex-roles are presented in British reading schemes exists. In this article he described a preliminary study on sex-role content in readers in order to remedy this lack of information. (Author/RK)

  12. Configuration-Control Scheme Copes With Singularities

    NASA Technical Reports Server (NTRS)

    Seraji, Homayoun; Colbaugh, Richard D.

    1993-01-01

    Improved configuration-control scheme for robotic manipulator having redundant degrees of freedom suppresses large joint velocities near singularities, at expense of small trajectory errors. Provides means to enforce order of priority of tasks assigned to robot. Basic concept of configuration control of redundant robot described in "Increasing The Dexterity Of Redundant Robots" (NPO-17801).

  13. High Order Semi-Lagrangian Advection Scheme

    NASA Astrophysics Data System (ADS)

    Malaga, Carlos; Mandujano, Francisco; Becerra, Julian

    2014-11-01

    In most fluid phenomena, advection plays an important roll. A numerical scheme capable of making quantitative predictions and simulations must compute correctly the advection terms appearing in the equations governing fluid flow. Here we present a high order forward semi-Lagrangian numerical scheme specifically tailored to compute material derivatives. The scheme relies on the geometrical interpretation of material derivatives to compute the time evolution of fields on grids that deform with the material fluid domain, an interpolating procedure of arbitrary order that preserves the moments of the interpolated distributions, and a nonlinear mapping strategy to perform interpolations between undeformed and deformed grids. Additionally, a discontinuity criterion was implemented to deal with discontinuous fields and shocks. Tests of pure advection, shock formation and nonlinear phenomena are presented to show performance and convergence of the scheme. The high computational cost is considerably reduced when implemented on massively parallel architectures found in graphic cards. The authors acknowledge funding from Fondo Sectorial CONACYT-SENER Grant Number 42536 (DGAJ-SPI-34-170412-217).

  14. Cross-ontological analytics for alignment of different classification schemes

    DOEpatents

    Posse, Christian; Sanfilippo, Antonio P; Gopalan, Banu; Riensche, Roderick M; Baddeley, Robert L

    2010-09-28

    Quantification of the similarity between nodes in multiple electronic classification schemes is provided by automatically identifying relationships and similarities between nodes within and across the electronic classification schemes. Quantifying the similarity between a first node in a first electronic classification scheme and a second node in a second electronic classification scheme involves finding a third node in the first electronic classification scheme, wherein a first product value of an inter-scheme similarity value between the second and third nodes and an intra-scheme similarity value between the first and third nodes is a maximum. A fourth node in the second electronic classification scheme can be found, wherein a second product value of an inter-scheme similarity value between the first and fourth nodes and an intra-scheme similarity value between the second and fourth nodes is a maximum. The maximum between the first and second product values represents a measure of similarity between the first and second nodes.

  15. Probabilistic Performance Analysis of Fault Diagnosis Schemes

    NASA Astrophysics Data System (ADS)

    Wheeler, Timothy Josh

    The dissertation explores the problem of rigorously quantifying the performance of a fault diagnosis scheme in terms of probabilistic performance metrics. Typically, when the performance of a fault diagnosis scheme is of utmost importance, physical redundancy is used to create a highly reliable system that is easy to analyze. However, in this dissertation, we provide a general framework that applies to more complex analytically redundant or model-based fault diagnosis schemes. For each fault diagnosis problem in this framework, our performance metrics can be computed accurately in polynomial-time. First, we cast the fault diagnosis problem as a sequence of hypothesis tests. At each time, the performance of a fault diagnosis scheme is quantified by the probability that the scheme has chosen the correct hypothesis. The resulting performance metrics are joint probabilities. Using Bayes rule, we decompose these performance metrics into two parts: marginal probabilities that quantify the reliability of the system and conditional probabilities that quantify the performance of the fault diagnosis scheme. These conditional probabilities are used to draw connections between the fault diagnosis and the fields of medical diagnostic testing, signal detection, and general statistical decision theory. Second, we examine the problem of computing the performance metrics efficiently and accurately. To solve this problem, we examine each portion of the fault diagnosis problem and specify a set of sufficient assumptions that guarantee efficient computation. In particular, we provide a detailed characterization of the class of finite-state Markov chains that lead to tractable fault parameter models. To demonstrate that these assumptions enable efficient computation, we provide pseudocode algorithms and prove that their running time is indeed polynomial. Third, we consider fault diagnosis problems involving uncertain systems. The inclusion of uncertainty enlarges the class of systems

  16. Quantum Walk Schemes for Universal Quantum Computation

    NASA Astrophysics Data System (ADS)

    Underwood, Michael S.

    Random walks are a powerful tool for the efficient implementation of algorithms in classical computation. Their quantum-mechanical analogues, called quantum walks, hold similar promise. Quantum walks provide a model of quantum computation that has recently been shown to be equivalent in power to the standard circuit model. As in the classical case, quantum walks take place on graphs and can undergo discrete or continuous evolution, though quantum evolution is unitary and therefore deterministic until a measurement is made. This thesis considers the usefulness of continuous-time quantum walks to quantum computation from the perspectives of both their fundamental power under various formulations, and their applicability in practical experiments. In one extant scheme, logical gates are effected by scattering processes. The results of an exhaustive search for single-qubit operations in this model are presented. It is shown that the number of distinct operations increases exponentially with the number of vertices in the scattering graph. A catalogue of all graphs on up to nine vertices that implement single-qubit unitaries at a specific set of momenta is included in an appendix. I develop a novel scheme for universal quantum computation called the discontinuous quantum walk, in which a continuous-time quantum walker takes discrete steps of evolution via perfect quantum state transfer through small 'widget' graphs. The discontinuous quantum-walk scheme requires an exponentially sized graph, as do prior discrete and continuous schemes. To eliminate the inefficient vertex resource requirement, a computation scheme based on multiple discontinuous walkers is presented. In this model, n interacting walkers inhabiting a graph with 2n vertices can implement an arbitrary quantum computation on an input of length n, an exponential savings over previous universal quantum walk schemes. This is the first quantum walk scheme that allows for the application of quantum error correction

  17. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication. PMID

  18. High-resolution schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Harten, A.

    1982-01-01

    A class of new explicit second order accurate finite difference schemes for the computation of weak solutions of hyperbolic conservation laws is presented. These highly nonlinear schemes are obtained by applying a nonoscillatory first order accurae scheme to an appropriately modified flux function. The so derived second order accurate schemes achieve high resolution while preserving the robustness of the original nonoscillatory first order accurate scheme.

  19. Arbitrated quantum signature scheme based on reusable key

    NASA Astrophysics Data System (ADS)

    Yu, ChaoHua; Guo, GongDe; Lin, Song

    2014-11-01

    An arbitrated quantum signature scheme without using entangled states is proposed. In the scheme, by employing a classical hash function and random numbers, the secret keys of signer and receiver can be reused. It is shown that the proposed scheme is secure against several well-known attacks. Specifically, it can stand against the receiver's disavowal attack. Moreover, compared with previous relevant arbitrated quantum signature schemes, the scheme proposed has the advantage of less transmission complexity.

  20. Simple Numerical Schemes for the Korteweg-deVries Equation

    SciTech Connect

    C. J. McKinstrie; M. V. Kozlov

    2000-12-01

    Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves.

  1. Electricity storage using a thermal storage scheme

    SciTech Connect

    White, Alexander

    2015-01-22

    The increasing use of renewable energy technologies for electricity generation, many of which have an unpredictably intermittent nature, will inevitably lead to a greater demand for large-scale electricity storage schemes. For example, the expanding fraction of electricity produced by wind turbines will require either backup or storage capacity to cover extended periods of wind lull. This paper describes a recently proposed storage scheme, referred to here as Pumped Thermal Storage (PTS), and which is based on “sensible heat” storage in large thermal reservoirs. During the charging phase, the system effectively operates as a high temperature-ratio heat pump, extracting heat from a cold reservoir and delivering heat to a hot one. In the discharge phase the processes are reversed and it operates as a heat engine. The round-trip efficiency is limited only by process irreversibilities (as opposed to Second Law limitations on the coefficient of performance and the thermal efficiency of the heat pump and heat engine respectively). PTS is currently being developed in both France and England. In both cases, the schemes operate on the Joule-Brayton (gas turbine) cycle, using argon as the working fluid. However, the French scheme proposes the use of turbomachinery for compression and expansion, whereas for that being developed in England reciprocating devices are proposed. The current paper focuses on the impact of the various process irreversibilities on the thermodynamic round-trip efficiency of the scheme. Consideration is given to compression and expansion losses and pressure losses (in pipe-work, valves and thermal reservoirs); heat transfer related irreversibility in the thermal reservoirs is discussed but not included in the analysis. Results are presented demonstrating how the various loss parameters and operating conditions influence the overall performance.

  2. Information field dynamics for simulation scheme construction

    NASA Astrophysics Data System (ADS)

    Enßlin, Torsten A.

    2013-01-01

    Information field dynamics (IFD) is introduced here as a framework to derive numerical schemes for the simulation of physical and other fields without assuming a particular subgrid structure as many schemes do. IFD constructs an ensemble of nonparametric subgrid field configurations from the combination of the data in computer memory, representing constraints on possible field configurations, and prior assumptions on the subgrid field statistics. Each of these field configurations can formally be evolved to a later moment since any differential operator of the dynamics can act on fields living in continuous space. However, these virtually evolved fields need again a representation by data in computer memory. The maximum entropy principle of information theory guides the construction of updated data sets via entropic matching, optimally representing these field configurations at the later time. The field dynamics thereby become represented by a finite set of evolution equations for the data that can be solved numerically. The subgrid dynamics is thereby treated within auxiliary analytic considerations. The resulting scheme acts solely on the data space. It should provide a more accurate description of the physical field dynamics than simulation schemes constructed ad hoc, due to the more rigorous accounting of subgrid physics and the space discretization process. Assimilation of measurement data into an IFD simulation is conceptually straightforward since measurement and simulation data can just be merged. The IFD approach is illustrated using the example of a coarsely discretized representation of a thermally excited classical Klein-Gordon field. This should pave the way towards the construction of schemes for more complex systems like turbulent hydrodynamics.

  3. Information field dynamics for simulation scheme construction.

    PubMed

    Ensslin, Torsten A

    2013-01-01

    Information field dynamics (IFD) is introduced here as a framework to derive numerical schemes for the simulation of physical and other fields without assuming a particular subgrid structure as many schemes do. IFD constructs an ensemble of nonparametric subgrid field configurations from the combination of the data in computer memory, representing constraints on possible field configurations, and prior assumptions on the subgrid field statistics. Each of these field configurations can formally be evolved to a later moment since any differential operator of the dynamics can act on fields living in continuous space. However, these virtually evolved fields need again a representation by data in computer memory. The maximum entropy principle of information theory guides the construction of updated data sets via entropic matching, optimally representing these field configurations at the later time. The field dynamics thereby become represented by a finite set of evolution equations for the data that can be solved numerically. The subgrid dynamics is thereby treated within auxiliary analytic considerations. The resulting scheme acts solely on the data space. It should provide a more accurate description of the physical field dynamics than simulation schemes constructed ad hoc, due to the more rigorous accounting of subgrid physics and the space discretization process. Assimilation of measurement data into an IFD simulation is conceptually straightforward since measurement and simulation data can just be merged. The IFD approach is illustrated using the example of a coarsely discretized representation of a thermally excited classical Klein-Gordon field. This should pave the way towards the construction of schemes for more complex systems like turbulent hydrodynamics.

  4. Electricity storage using a thermal storage scheme

    NASA Astrophysics Data System (ADS)

    White, Alexander

    2015-01-01

    The increasing use of renewable energy technologies for electricity generation, many of which have an unpredictably intermittent nature, will inevitably lead to a greater demand for large-scale electricity storage schemes. For example, the expanding fraction of electricity produced by wind turbines will require either backup or storage capacity to cover extended periods of wind lull. This paper describes a recently proposed storage scheme, referred to here as Pumped Thermal Storage (PTS), and which is based on "sensible heat" storage in large thermal reservoirs. During the charging phase, the system effectively operates as a high temperature-ratio heat pump, extracting heat from a cold reservoir and delivering heat to a hot one. In the discharge phase the processes are reversed and it operates as a heat engine. The round-trip efficiency is limited only by process irreversibilities (as opposed to Second Law limitations on the coefficient of performance and the thermal efficiency of the heat pump and heat engine respectively). PTS is currently being developed in both France and England. In both cases, the schemes operate on the Joule-Brayton (gas turbine) cycle, using argon as the working fluid. However, the French scheme proposes the use of turbomachinery for compression and expansion, whereas for that being developed in England reciprocating devices are proposed. The current paper focuses on the impact of the various process irreversibilities on the thermodynamic round-trip efficiency of the scheme. Consideration is given to compression and expansion losses and pressure losses (in pipe-work, valves and thermal reservoirs); heat transfer related irreversibility in the thermal reservoirs is discussed but not included in the analysis. Results are presented demonstrating how the various loss parameters and operating conditions influence the overall performance.

  5. Scheme for Quantum Computing Immune to Decoherence

    NASA Technical Reports Server (NTRS)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report

  6. How might a statistical cloud scheme be coupled to a mass-flux convection scheme?

    SciTech Connect

    Klein, Stephen A.; Pincus, Robert; Hannay, Cecile; Xu, Kuan-man

    2004-09-27

    The coupling of statistical cloud schemes with mass-flux convection schemes is addressed. Source terms representing the impact of convection are derived within the framework of prognostic equations for the width and asymmetry of the probability distribution function of total water mixing ratio. The accuracy of these source terms is quantified by examining output from a cloud resolving model simulation of deep convection. Practical suggestions for inclusion of these source terms in large-scale models are offered.

  7. An authentication scheme for secure access to healthcare services.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  8. An authentication scheme for secure access to healthcare services.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS. PMID:23828650

  9. Annual report of the National Influenza Surveillance Scheme, 2004.

    PubMed

    Li, Janet; Hampson, Alan; Roche, Paul W; Yohannes, Keflemariam; Spencer, Jenean D

    2005-01-01

    The National Influenza Surveillance Scheme includes data on influenza-like illness from sentinel general practitioner practices, laboratory reports of influenza from National Notifiable Diseases Surveillance Scheme and absenteeism data from a national employer. In 2004, 2,116 cases of laboratory-confirmed influenza-like illness were reported, which was 41 per cent lower than the previous year. Peak activity was recorded in September, a month later than in 2003. Influenza A was again predominant while influenza B had an increased activity compared to the previous season. Four hundred and fifty-four isolates were antigenically analysed: 342 were A (H3N2 strain), 4 were A(H1N1 strain) strains and 108 were influenza B viruses. Further antigenic drift was seen in the A(H3N2) subtype with approximately one third of all isolates antigenically distinguishable from the A/Fujian/411/2002 reference strain. Vaccination coverage indicated that 79 per cent of Australians aged over 65 years received the 2004 influenza vaccine. PMID:16119760

  10. Multiple Access Schemes for Lunar Missions

    NASA Technical Reports Server (NTRS)

    Deutsch, Leslie; Hamkins, Jon; Stocklin, Frank J.

    2010-01-01

    Two years ago, the NASA Coding, Modulation, and Link Protocol (CMLP) study was completed. The study, led by the authors of this paper, recommended codes, modulation schemes, and desired attributes of link protocols for all space communication links in NASA's future space architecture. Portions of the NASA CMLP team were reassembled to resolve one open issue: the use of multiple access (MA) communication from the lunar surface. The CMLP-MA team analyzed and simulated two candidate multiple access schemes that were identified in the original CMLP study: Code Division MA (CDMA) and Frequency Division MA (FDMA) based on a bandwidth-efficient Continuous Phase Modulation (CPM) with a superimposed Pseudo-Noise (PN) ranging signal (CPM/PN). This paper summarizes the results of the analysis and simulation of the CMLP-MA study and describes the final recommendations.

  11. New communication schemes based on adaptive synchronization

    NASA Astrophysics Data System (ADS)

    Yu, Wenwu; Cao, Jinde; Wong, Kwok-Wo; Lü, Jinhu

    2007-09-01

    In this paper, adaptive synchronization with unknown parameters is discussed for a unified chaotic system by using the Lyapunov method and the adaptive control approach. Some communication schemes, including chaotic masking, chaotic modulation, and chaotic shift key strategies, are then proposed based on the modified adaptive method. The transmitted signal is masked by chaotic signal or modulated into the system, which effectively blurs the constructed return map and can resist this return map attack. The driving system with unknown parameters and functions is almost completely unknown to the attackers, so it is more secure to apply this method into the communication. Finally, some simulation examples based on the proposed communication schemes and some cryptanalysis works are also given to verify the theoretical analysis in this paper.

  12. Signal Processing Schemes for Doppler Global Velocimetry

    NASA Technical Reports Server (NTRS)

    Meyers, James F.; Lee, Joseph W.; Cavone, Angelo A.

    1991-01-01

    Two schemes for processing signals obtained from the Doppler global velocimeter are described. The analog approach is a simple, real time method for obtaining an RS-170 video signal containing the normalized intensity image. Pseudo colors are added using a monochromatic frame grabber producing a standard NTSC video signal that can be monitored and/or recorded. The digital approach is more complicated, but maintains the full resolution of the acquisition cameras with the capabilities to correct the signal image for pixel sensitivity variations and to remove of background light. Prototype circuits for each scheme are described and example results from the investigation of the vortical flow field above a 75-degree delta wing presented.

  13. A certification scheme for the boson sampler

    NASA Astrophysics Data System (ADS)

    Liu, Kai; Lund, Austin Peter; Gu, Yong-Jian; Ralph, Timothy Cameron

    2016-09-01

    Boson sampling can provide strong evidence that the computational power of a quantum computer outperforms a classical one via currently feasible linear optics experiments. However, how to identify an actual boson sampling device against any classical computing imposters is an ambiguous problem due to the computational complexity class in which boson sampling lies. The certification protocol based on bosonic bunching fails to rule out the so-called mean-field sampling. We propose a certification scheme to distinguish the boson sampling from the mean-field sampling for any random scattering matrices chosen via the Harr-measure. We numerically analyze our scheme and the influence of imperfect input states caused by non-simultaneous arrival photons.

  14. Trefftz difference schemes on irregular stencils

    SciTech Connect

    Tsukerman, Igor

    2010-04-20

    The recently developed Flexible Local Approximation MEthod (FLAME) produces accurate difference schemes by replacing the usual Taylor expansion with Trefftz functions - local solutions of the underlying differential equation. This paper advances and casts in a general form a significant modification of FLAME proposed recently by Pinheiro and Webb: a least-squares fit instead of the exact match of the approximate solution at the stencil nodes. As a consequence of that, FLAME schemes can now be generated on irregular stencils with the number of nodes substantially greater than the number of approximating functions. The accuracy of the method is preserved but its robustness is improved. For demonstration, the paper presents a number of numerical examples in 2D and 3D: electrostatic (magnetostatic) particle interactions, scattering of electromagnetic (acoustic) waves, and wave propagation in a photonic crystal. The examples explore the role of the grid and stencil size, of the number of approximating functions, and of the irregularity of the stencils.

  15. The Linear Bicharacteristic Scheme for Electromagnetics

    NASA Technical Reports Server (NTRS)

    Beggs, John H.

    2001-01-01

    The upwind leapfrog or Linear Bicharacteristic Scheme (LBS) has previously been implemented and demonstrated on electromagnetic wave propagation problems. This paper extends the Linear Bicharacteristic Scheme for computational electromagnetics to model lossy dielectric and magnetic materials and perfect electrical conductors. This is accomplished by proper implementation of the LBS for homogeneous lossy dielectric and magnetic media and for perfect electrical conductors. Heterogeneous media are modeled through implementation of surface boundary conditions and no special extrapolations or interpolations at dielectric material boundaries are required. Results are presented for one-dimensional model problems on both uniform and nonuniform grids, and the FDTD algorithm is chosen as a convenient reference algorithm for comparison. The results demonstrate that the explicit LBS is a dissipation-free, second-order accurate algorithm which uses a smaller stencil than the FDTD algorithm, yet it has approximately one-third the phase velocity error. The LBS is also more accurate on nonuniform grids.

  16. An improved WENO-Z scheme

    NASA Astrophysics Data System (ADS)

    Acker, F.; B. de R. Borges, R.; Costa, B.

    2016-05-01

    In this article, we show that for a WENO scheme to improve the numerical resolution of smooth waves, increasing to some extent the contribution of the substencils where the solution is less smooth is much more important than improving the accuracy at critical points. WENO-Z, for instance, achieved less dissipative results than classical WENO through the use of a high-order global smoothness measurement, τ, which increased the weights of less-smooth substencils. This time, we present a way of further increasing the relevance of less-smooth substencils by adding a new term to the WENO-Z weights that uses information which is already available in its formula. The improved scheme attains much better resolution at the smooth parts of the solution, while keeping the same numerical stability of the original WENO-Z at shocks and discontinuities.

  17. The Scheme of Beam Synchronization in MEIC

    SciTech Connect

    Zhang, Yuhong; Derbenev, Yaroslav S.; Hutton, Andrew M.

    2013-06-01

    Synchronizing colliding beams at single or multiple collision points is a critical R&D issue in the design of a medium energy electron-ion collider (MEIC) at Jefferson Lab. The path-length variation due to changes in the ion energy, which varies over 20 to 100 GeV, could be more than several times the bunch spacing. The scheme adopted in the present MEIC baseline is centered on varying the number of bunches (i.e., harmonic number) stored in the collider ring. This could provide a set of discrete energies for proton or ions such that the beam synchronization condition is satisfied. To cover the ion energy between these synchronized values, we further propose to vary simultaneously the electron ring circumference and the frequency of the RF systems in both collider rings. We also present in this paper the requirement of frequency tunability of SRF cavities to support the scheme.

  18. Improving the accuracy of central difference schemes

    NASA Technical Reports Server (NTRS)

    Turkel, Eli

    1988-01-01

    General difference approximations to the fluid dynamic equations require an artificial viscosity in order to converge to a steady state. This artificial viscosity serves two purposes. One is to suppress high frequency noise which is not damped by the central differences. The second purpose is to introduce an entropy-like condition so that shocks can be captured. These viscosities need a coefficient to measure the amount of viscosity to be added. In the standard scheme, a scalar coefficient is used based on the spectral radius of the Jacobian of the convective flux. However, this can add too much viscosity to the slower waves. Hence, it is suggested that a matrix viscosity be used. This gives an appropriate viscosity for each wave component. With this matrix valued coefficient, the central difference scheme becomes closer to upwind biased methods.

  19. Local discrimination scheme for some unitary operations

    NASA Astrophysics Data System (ADS)

    Cao, TianQing; Gao, Fei; Tian, GuoJing; Xie, ShuCui; Wen, QiaoYan

    2016-09-01

    It has been shown that for two different multipartite unitary operations U 1 and U 2, when tr( U 1 † U 2) = 0, they can always be perfectly distinguished by local operations and classical communication in the single-run scenario. However, how to find the detailed scheme to complete the local discrimination is still a fascinating problem. In this paper, aiming at some U 1 and U 2 acting on the bipartite and tripartite space respectively, especially for U 1 † U 2 locally unitary equivalent to the high dimensional X-type hermitian unitary matrix V with tr V = 0, we put forward the explicit local distinguishing schemes in the single-run scenario.

  20. Iterated upwind schemes for gas dynamics

    SciTech Connect

    Smolarkiewicz, Piotr K. Szmelter, Joanna

    2009-01-10

    A class of high-resolution schemes established in integration of anelastic equations is extended to fully compressible flows, and documented for unsteady (and steady) problems through a span of Mach numbers from zero to supersonic. The schemes stem from iterated upwind technology of the multidimensional positive definite advection transport algorithm (MPDATA). The derived algorithms employ standard and modified forms of the equations of gas dynamics for conservation of mass, momentum and either total or internal energy as well as potential temperature. Numerical examples from elementary wave propagation, through computational aerodynamics benchmarks, to atmospheric small- and large-amplitude acoustics with intricate wave-flow interactions verify the approach for both structured and unstructured meshes, and demonstrate its flexibility and robustness.

  1. Evolutionary Algorithm for Optimal Vaccination Scheme

    NASA Astrophysics Data System (ADS)

    Parousis-Orthodoxou, K. J.; Vlachos, D. S.

    2014-03-01

    The following work uses the dynamic capabilities of an evolutionary algorithm in order to obtain an optimal immunization strategy in a user specified network. The produced algorithm uses a basic genetic algorithm with crossover and mutation techniques, in order to locate certain nodes in the inputted network. These nodes will be immunized in an SIR epidemic spreading process, and the performance of each immunization scheme, will be evaluated by the level of containment that provides for the spreading of the disease.

  2. The Emergent Universe scheme and tunneling

    SciTech Connect

    Labraña, Pedro

    2014-07-23

    We present an alternative scheme for an Emergent Universe scenario, developed previously in Phys. Rev. D 86, 083524 (2012), where the universe is initially in a static state supported by a scalar field located in a false vacuum. The universe begins to evolve when, by quantum tunneling, the scalar field decays into a state of true vacuum. The Emergent Universe models are interesting since they provide specific examples of non-singular inflationary universes.

  3. Automatic-repeat-request error control schemes

    NASA Technical Reports Server (NTRS)

    Lin, S.; Costello, D. J., Jr.; Miller, M. J.

    1983-01-01

    Error detection incorporated with automatic-repeat-request (ARQ) is widely used for error control in data communication systems. This method of error control is simple and provides high system reliability. If a properly chosen code is used for error detection, virtually error-free data transmission can be attained. Various types of ARQ and hybrid ARQ schemes, and error detection using linear block codes are surveyed.

  4. Cryptanalysis of Quantum Blind Signature Scheme

    NASA Astrophysics Data System (ADS)

    Zuo, Huijuan

    2013-01-01

    In this paper, we study the cryptanalysis of two quantum blind signature schemes and one quantum proxy blind signature protocol. We show that in these protocols the verifier can forge the signature under known message attack. The attack strategies are described in detail respectively. This kind of problem deserves more research attention in the following related study. We further point out that the arbitrator should be involved in the procedure of any dispute and some discussions of these protocols are given.

  5. A weak blind signature scheme based on quantum cryptography

    NASA Astrophysics Data System (ADS)

    Wen, Xiaojun; Niu, Xiamu; Ji, Liping; Tian, Yuan

    2009-02-01

    In this paper, we present a weak blind signature scheme based on the correlation of EPR (Einstein-Padolsky-Rosen) pairs. Different from classical blind signature schemes and current quantum signature schemes, our quantum blind signature scheme could guarantee not only the unconditionally security but also the anonymity of the message owner. To achieve that, quantum key distribution and one-time pad are adopted in our scheme. Experimental analysis proved that our scheme have the characteristics of non-counterfeit, non-disavowal, blindness and traceability. It has a wide application to E-payment system, E-government, E-business, and etc.

  6. An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments

    NASA Astrophysics Data System (ADS)

    Jeon, Woongryul; Kim, Jeeyeon; Nam, Junghyun; Lee, Youngsook; Won, Dongho

    As anonymity increasingly becomes a necessary and legitimate aim in many applications, a number of anonymous authentication schemes have been suggested over the years. Among the many schemes is Lee and Kwon's password-based authentication scheme for wireless environments. Compared with previous schemes, Lee and Kwon's scheme not only improves anonymity by employing random temporary IDs but also provides user-friendliness by allowing human-memorable passwords. In this letter, we point out that Lee and Kwon's scheme, despite its many merits, is vulnerable to off-line password guessing attacks and a forgery attack. In addition, we show how to eliminate these vulnerabilities.

  7. Computing with high-resolution upwind schemes for hyperbolic equations

    NASA Technical Reports Server (NTRS)

    Chakravarthy, S. R.; Osher, S.

    1985-01-01

    Computational aspects of modern high-resolution upwind finite-difference schemes for hyperbolic systems of conservation laws are examined. An operational unification is demonstrated for constructing a wide class of flux-difference-split and flux-split schemes based on the design principles underlying total variation diminishing (TVD) schemes. Consideration is also given to TVD scheme design by preprocessing, the extension of preprocessing and postprocessing approaches to general control volumes, the removal of expansion shocks and 'glitches', relaxation methods for implicit TVD schemes, and a new family of high-accuracy TVD schemes.

  8. A modified F/A-18 in a distinctive red, white and blue paint scheme was showcased during formal roll

    NASA Technical Reports Server (NTRS)

    2002-01-01

    A modified F/A-18 in a distinctive red, white and blue paint scheme was showcased during formal rollout ceremonies for the Active Aeroelastic Wing flight research program at NASA's Dryden Flight Research Center on March 27, 2002.

  9. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    PubMed

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.

  10. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    PubMed

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks. PMID:24061705

  11. Location and Pressures Change Prediction of Bromo Volcano Magma Chamber Using Inversion Scheme

    NASA Astrophysics Data System (ADS)

    Kumalasari, Ratih; Srigutomo, Wahyu

    2016-08-01

    Bromo volcano is one of active volcanoes in Indonesia. It has erupted at least 50 times since 1775 and has been monitored by Global Positioning System (GPS) since 1989. We applied the Levenberg-Marquardt inversion scheme to estimate the physical parameters contributing to the surface deformation. Physical parameters obtained by the inversion scheme such as magma chamber location and volume change are useful in monitoring and predicting the activity of Bromo volcano. From our calculation it is revealed that the depth of the magma chamber d = 6307.6 m, radius of magma chamber α = 1098.6 m and pressure change ΔP ≈ 1.0 MPa.

  12. Uncertainty of Microphysics Schemes in CRMs

    NASA Astrophysics Data System (ADS)

    Tao, W. K.; van den Heever, S. C.; Wu, D.; Saleeby, S. M.; Lang, S. E.

    2015-12-01

    Microphysics is the framework through which to understand the links between interactive aerosol, cloud and precipitation processes. These processes play a critical role in the water and energy cycle. CRMs with advanced microphysics schemes have been used to study the interaction between aerosol, cloud and precipitation processes at high resolution. But, there are still many uncertainties associated with these microphysics schemes. This has arisen, in part, from the fact microphysical processes cannot be measured directly; instead, cloud properties, which can be measured, are and have been used to validate model results. The utilization of current and future global high-resolution models is rapidly increasing and are at what has been traditional CRM resolutions and are using microphysics schemes that were developed in traditional CRMs. A potential NASA satellite mission called the Cloud and Precipitation Processes Mission (CaPPM) is currently being planned for submission to the NASA Earth Science Decadal Survey. This mission could provide the necessary global estimates of cloud and precipitation properties with which to evaluate and improve dynamical and microphysical parameterizations and the feedbacks. In order to facilitate the development of this mission, CRM simulations have been conducted to identify microphysical processes responsible for the greatest uncertainties in CRMs. In this talk, we will present results from numerical simulations conducted using two CRMs (NU-WRF and RAMS) with different dynamics, radiation, land surface and microphysics schemes. Specifically, we will conduct sensitivity tests to examine the uncertainty of the some of the key ice processes (i.e. riming, melting, freezing and shedding) in these two-microphysics schemes. The idea is to quantify how these two different models' respond (surface rainfall and its intensity, strength of cloud drafts, LWP/IWP, convective-stratiform-anvil area distribution) to changes of these key ice

  13. Gender and power contestations over water use in irrigation schemes: Lessons from the lake Chilwa basin

    NASA Astrophysics Data System (ADS)

    Nkhoma, Bryson; Kayira, Gift

    2016-04-01

    Over the past two decades, Malawi has been adversely hit by climatic variability and changes, and irrigation schemes which rely mostly on water from rivers have been negatively affected. In the face of dwindling quantities of water, distribution and sharing of water for irrigation has been a source of contestations and conflicts. Women who constitute a significant section of irrigation farmers in schemes have been major culprits. The study seeks to analyze gender contestations and conflicts over the use of water in the schemes developed in the Lake Chilwa basin, in southern Malawi. Using oral and written sources as well as drawing evidence from participatory and field observations conducted at Likangala and Domasi irrigation schemes, the largest schemes in the basin, the study observes that women are not passive victims of male domination over the use of dwindling waters for irrigation farming. They have often used existing political and traditional structures developed in the management of water in the schemes to competitively gain monopoly over water. They have sometimes expressed their agency by engaging in irrigation activities that fall beyond the control of formal rules and regulations of irrigation agriculture. Other than being losers, women are winning the battle for water and land resources in the basin.

  14. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  15. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  16. An evaluation of a vocational training scheme for dental therapists (TVT).

    PubMed

    Bullock, A D; Falcon, H C; Mehra, S; Stearns, K

    2010-09-25

    Commissioned by NHS Education South Central (NESC) Postgraduate Dental Deanery, this work provided an external, independent formative evaluation of the Dental Therapists Vocational Training (TVT) scheme in its first year of operation. Undertaken between March-September 2009, the evaluation engaged with all those involved in the TVT scheme: the newly qualified dental therapists (n = 9; group discussion and questionnaire; portfolio extracts) and interviews with their trainers (n = 9), Associate Postgraduate Dental Dean and TVT Scheme Adviser. Most of those on the scheme did not feel well prepared for work at the point of initial qualification and benefitted from enhancement of confidence and skills. Although the number of treatments undertaken by each of the trainees varied considerably, there was commonality in terms of treatment types. Benefits for trainers included the opportunity to work with a dental therapist and develop a better understanding of their role. They praised the trainees' skills with nervous patients and children and their preventative work. A therapist on the team released the dentist for more complex treatments. Challenges related to the recruitment of trainees and trainers, the relative lack of knowledge about the work of dental therapists, concerns about maintaining the range of therapy skills and issues about UDA (unit of dental activity) distribution. There was widespread support for a mandatory TVT scheme. This scheme could be improved by providing further guidance on the amount and type of clinical experience required.

  17. A national survey of adult placement schemes in England: recruitment and retention of adult placement carers.

    PubMed

    Bernard, Sylvia

    2005-11-01

    Adult placement (AP) schemes and the carers they support have been, up to now, a largely invisible part of the social care workforce. Carers in particular fail to appear in workforce statistics. They provide a unique form of care to vulnerable people, under-pinned by values of extended family ('kinship') support. Little is known about the range of current activities of AP schemes and the carers they support. This study of AP schemes in England aimed to provide baseline data about the workforce, care provision, qualification levels, training and support issues, and recruitment and retention problems. Questionnaires were sent to all known schemes in England in both statutory and independent sectors. A final database of 130 schemes was compiled and of these, 124 contributed to the survey with complete or partial information. Variables relating to carers, and recruitment and retention problems experienced by schemes were analysed in detail. Age, gender and ethnic profiles of AP carers were described. Anecdotal evidence had suggested that the current regulatory system was leading to a loss of AP carers and/or an increasingly unregulated sector. Results from analyses supported this as the major reason given by schemes for the problems they had experienced in the last 12 months. Estimates of both the current level of registration and the numbers of carers cancelling their registration in the previous 12 months were made. Recently agreed regulatory changes aim to shift the burden of regulation from individual carers to AP schemes, and thereby ensure a consistent standard of assessment, training and support across England. Evidence from the survey provided support for such a move.

  18. The potential for social mobilisation in Bangladesh: the organisation and functioning of two health insurance schemes.

    PubMed

    Desmet, M; Chowdhury, A Q; Islam, M K

    1999-04-01

    Health insurance schemes are usually assessed according to technical indicators. This approach, however, neglects the dynamic perspective of insurance schemes as an element of people's mobilisation for participation in organising and managing health care delivery and financing. The first part of this paper describes the technical performance and the level of community involvement in management of the two largest health insurance schemes in Bangladesh, both in the rural areas and in the non-government sector. Part two discusses these achievements in light of the schemes' potential role as a mechanism for people's management of health care. A review of documents and key-informant interviews were conducted. Key findings include that (1) subscribers currently are not actively participating in scheme management. However, existing family groups, involved in credit programmes may serve as entry-points for interaction. This is sustained by the 'natural link' between health insurance as a means of spreading the risks of treatment costs and credit programmes as a means of decreasing the relative impact of illness on household income. (2) The schemes' role could be further enhanced, by improving their technical performance and applying health care systems elements with the input of all partners involved. These issues are avoidance of service duplication with other providers; better protection of the poorer households; inclusion of hospital care in the coverage package; simplification of scheme administration by introduction of episode-based co-payments instead of the current itemised ones and concentrating the schemes at the level of community-based services, which may be self-financed and also self-managed by the community, given available sensitisation, training and interaction. A shift to episode-based co-payments would also introduce solidarity among patients and among individuals at higher risk, such as pregnant women and under-fives. Finally, action-research is needed

  19. Multidimensional explicit difference schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Vanleer, B.

    1983-01-01

    First and second order explicit difference schemes are derived for a three dimensional hyperbolic system of conservation laws, without recourse to dimensional factorization. All schemes are upwind (backward) biased and optimally stable.

  20. Minimal dissipation hybrid bicompact schemes for hyperbolic equations

    NASA Astrophysics Data System (ADS)

    Bragin, M. D.; Rogov, B. V.

    2016-06-01

    New monotonicity-preserving hybrid schemes are proposed for multidimensional hyperbolic equations. They are convex combinations of high-order accurate central bicompact schemes and upwind schemes of first-order accuracy in time and space. The weighting coefficients in these combinations depend on the local difference between the solutions produced by the high- and low-order accurate schemes at the current space-time point. The bicompact schemes are third-order accurate in time, while having the fourth order of accuracy and the first difference order in space. At every time level, they can be solved by marching in each spatial variable without using spatial splitting. The upwind schemes have minimal dissipation among all monotone schemes constructed on a minimum space-time stencil. The hybrid schemes constructed has been successfully tested as applied to a number of two-dimensional gas dynamics benchmark problems.

  1. Multidimensional explicit difference schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Van Leer, B.

    1984-01-01

    First- and second-order explicit difference schemes are derived for a three-dimensional hyperbolic system of conservation laws, without recourse to dimensional factorization. All schemes are upwind biased and optimally stable.

  2. Connection Between the Lattice Boltzmann Equation and the Beam Scheme

    NASA Technical Reports Server (NTRS)

    Xu, Kun; Luo, Li-Shi

    1999-01-01

    In this paper we analyze and compare the lattice Boltzmann equation with the beam scheme in details. We notice the similarity and differences between the lattice Boltzmann equation and the beam scheme. We show that the accuracy of the lattice Boltzmann equation is indeed second order in space. We discuss the advantages and limitations of lattice Boltzmann equation and the beam scheme. Based on our analysis, we propose an improved multi-dimensional beam scheme.

  3. The Pharmaceutical Benefits Scheme 2003–2004

    PubMed Central

    Harvey, Ken J

    2005-01-01

    The Pharmaceutical Benefits Scheme (PBS) grew by 8% in 2003–04; a slower rate than the 12.0% pa average growth over the last decade. Nevertheless, the sustainability of the Scheme remained an ongoing concern given an aging population and the continued introduction of useful (but increasingly expensive) new medicines. There was also concern that the Australia-United States Free Trade Agreement could place further pressure on the Scheme. In 2003, as in 2002, the government proposed a 27% increase in PBS patient co-payments and safety-net thresholds in order to transfer more of the cost of the PBS from the government to consumers. While this measure was initially blocked by the Senate, the forthcoming election resulted in the Labor Party eventually supporting this policy. Recommendations of the Pharmaceutical Benefits Advisory Committee to list, not list or defer a decision to list a medicine on the PBS were made publicly available for the first time and the full cost of PBS medicines appeared on medicine labels if the price was greater than the co-payment. Pharmaceutical reform in Victorian public hospitals designed to minimise PBS cost-shifting was evaluated and extended to other States and Territories. Programs promoting the quality use of medicines were further developed coordinated by the National Prescribing Service, Australian Divisions of General Practice and the Pharmacy Guild of Australia. The extensive uptake of computerised prescribing software by GPs produced benefits but also problems. The latter included pharmaceutical promotion occurring at the time of prescribing, failure to incorporate key sources of objective therapeutic information in the software and gross variation in the ability of various programs to detect important drug-drug interactions. These issues remain to be tackled. PMID:15679896

  4. Motion feature extraction scheme for content-based video retrieval

    NASA Astrophysics Data System (ADS)

    Wu, Chuan; He, Yuwen; Zhao, Li; Zhong, Yuzhuo

    2001-12-01

    This paper proposes the extraction scheme of global motion and object trajectory in a video shot for content-based video retrieval. Motion is the key feature representing temporal information of videos. And it is more objective and consistent compared to other features such as color, texture, etc. Efficient motion feature extraction is an important step for content-based video retrieval. Some approaches have been taken to extract camera motion and motion activity in video sequences. When dealing with the problem of object tracking, algorithms are always proposed on the basis of known object region in the frames. In this paper, a whole picture of the motion information in the video shot has been achieved through analyzing motion of background and foreground respectively and automatically. 6-parameter affine model is utilized as the motion model of background motion, and a fast and robust global motion estimation algorithm is developed to estimate the parameters of the motion model. The object region is obtained by means of global motion compensation between two consecutive frames. Then the center of object region is calculated and tracked to get the object motion trajectory in the video sequence. Global motion and object trajectory are described with MPEG-7 parametric motion and motion trajectory descriptors and valid similar measures are defined for the two descriptors. Experimental results indicate that our proposed scheme is reliable and efficient.

  5. Vehicle Scheduling Schemes for Commercial and Emergency Logistics Integration

    PubMed Central

    Li, Xiaohui; Tan, Qingmei

    2013-01-01

    In modern logistics operations, large-scale logistics companies, besides active participation in profit-seeking commercial business, also play an essential role during an emergency relief process by dispatching urgently-required materials to disaster-affected areas. Therefore, an issue has been widely addressed by logistics practitioners and caught researchers' more attention as to how the logistics companies achieve maximum commercial profit on condition that emergency tasks are effectively and performed satisfactorily. In this paper, two vehicle scheduling models are proposed to solve the problem. One is a prediction-related scheme, which predicts the amounts of disaster-relief materials and commercial business and then accepts the business that will generate maximum profits; the other is a priority-directed scheme, which, firstly groups commercial and emergency business according to priority grades and then schedules both types of business jointly and simultaneously by arriving at the maximum priority in total. Moreover, computer-based simulations are carried out to evaluate the performance of these two models by comparing them with two traditional disaster-relief tactics in China. The results testify the feasibility and effectiveness of the proposed models. PMID:24391724

  6. A new configurational bias scheme for sampling supramolecular structures.

    PubMed

    De Gernier, Robin; Curk, Tine; Dubacheva, Galina V; Richter, Ralf P; Mognetti, Bortolo M

    2014-12-28

    We present a new simulation scheme which allows an efficient sampling of reconfigurable supramolecular structures made of polymeric constructs functionalized by reactive binding sites. The algorithm is based on the configurational bias scheme of Siepmann and Frenkel and is powered by the possibility of changing the topology of the supramolecular network by a non-local Monte Carlo algorithm. Such a plan is accomplished by a multi-scale modelling that merges coarse-grained simulations, describing the typical polymer conformations, with experimental results accounting for free energy terms involved in the reactions of the active sites. We test the new algorithm for a system of DNA coated colloids for which we compute the hybridisation free energy cost associated to the binding of tethered single stranded DNAs terminated by short sequences of complementary nucleotides. In order to demonstrate the versatility of our method, we also consider polymers functionalized by receptors that bind a surface decorated by ligands. In particular, we compute the density of states of adsorbed polymers as a function of the number of ligand-receptor complexes formed. Such a quantity can be used to study the conformational properties of adsorbed polymers useful when engineering adsorption with tailored properties. We successfully compare the results with the predictions of a mean field theory. We believe that the proposed method will be a useful tool to investigate supramolecular structures resulting from direct interactions between functionalized polymers for which efficient numerical methodologies of investigation are still lacking. PMID:25554182

  7. Regulatory schemes to achieve optimal flux partitioning in bacterial metabolism

    NASA Astrophysics Data System (ADS)

    Tang, Lei-Han; Yang, Zhu; Hui, Sheng; Kim, Pan-Jun; Li, Xue-Fei; Hwa, Terence

    2012-02-01

    The flux balance analysis (FBA) offers a way to compute the optimal performance of a given metabolic network when the maximum incoming flux of nutrient molecules and other essential ingredients for biosynthesis are specified. Here we report a theoretical and computational analysis of the network structure and regulatory interactions in an E. coli cell. An automated scheme is devised to simplify the network topology and to enumerate the independent flux degrees of freedom. The network organization revealed by the scheme enables a detailed interpretation of the three layers of metabolic regulation known in the literature: i) independent transcriptional regulation of biosynthesis and salvage pathways to render the network tree-like under a given nutrient condition; ii) allosteric end-product inhibition of enzyme activity at entry points of synthesis pathways for metabolic flux partitioning according to consumption; iii) homeostasis of currency and carrier compounds to maintain sufficient supply of global commodities. Using the amino-acid synthesis pathways as an example, we show that the FBA result can be reproduced with suitable implementation of the three classes of regulatory interactions with literature evidence.

  8. Vehicle scheduling schemes for commercial and emergency logistics integration.

    PubMed

    Li, Xiaohui; Tan, Qingmei

    2013-01-01

    In modern logistics operations, large-scale logistics companies, besides active participation in profit-seeking commercial business, also play an essential role during an emergency relief process by dispatching urgently-required materials to disaster-affected areas. Therefore, an issue has been widely addressed by logistics practitioners and caught researchers' more attention as to how the logistics companies achieve maximum commercial profit on condition that emergency tasks are effectively and performed satisfactorily. In this paper, two vehicle scheduling models are proposed to solve the problem. One is a prediction-related scheme, which predicts the amounts of disaster-relief materials and commercial business and then accepts the business that will generate maximum profits; the other is a priority-directed scheme, which, firstly groups commercial and emergency business according to priority grades and then schedules both types of business jointly and simultaneously by arriving at the maximum priority in total. Moreover, computer-based simulations are carried out to evaluate the performance of these two models by comparing them with two traditional disaster-relief tactics in China. The results testify the feasibility and effectiveness of the proposed models. PMID:24391724

  9. A new configurational bias scheme for sampling supramolecular structures

    SciTech Connect

    De Gernier, Robin; Mognetti, Bortolo M.; Curk, Tine; Dubacheva, Galina V.; Richter, Ralf P.

    2014-12-28

    We present a new simulation scheme which allows an efficient sampling of reconfigurable supramolecular structures made of polymeric constructs functionalized by reactive binding sites. The algorithm is based on the configurational bias scheme of Siepmann and Frenkel and is powered by the possibility of changing the topology of the supramolecular network by a non-local Monte Carlo algorithm. Such a plan is accomplished by a multi-scale modelling that merges coarse-grained simulations, describing the typical polymer conformations, with experimental results accounting for free energy terms involved in the reactions of the active sites. We test the new algorithm for a system of DNA coated colloids for which we compute the hybridisation free energy cost associated to the binding of tethered single stranded DNAs terminated by short sequences of complementary nucleotides. In order to demonstrate the versatility of our method, we also consider polymers functionalized by receptors that bind a surface decorated by ligands. In particular, we compute the density of states of adsorbed polymers as a function of the number of ligand–receptor complexes formed. Such a quantity can be used to study the conformational properties of adsorbed polymers useful when engineering adsorption with tailored properties. We successfully compare the results with the predictions of a mean field theory. We believe that the proposed method will be a useful tool to investigate supramolecular structures resulting from direct interactions between functionalized polymers for which efficient numerical methodologies of investigation are still lacking.

  10. Vehicle scheduling schemes for commercial and emergency logistics integration.

    PubMed

    Li, Xiaohui; Tan, Qingmei

    2013-01-01

    In modern logistics operations, large-scale logistics companies, besides active participation in profit-seeking commercial business, also play an essential role during an emergency relief process by dispatching urgently-required materials to disaster-affected areas. Therefore, an issue has been widely addressed by logistics practitioners and caught researchers' more attention as to how the logistics companies achieve maximum commercial profit on condition that emergency tasks are effectively and performed satisfactorily. In this paper, two vehicle scheduling models are proposed to solve the problem. One is a prediction-related scheme, which predicts the amounts of disaster-relief materials and commercial business and then accepts the business that will generate maximum profits; the other is a priority-directed scheme, which, firstly groups commercial and emergency business according to priority grades and then schedules both types of business jointly and simultaneously by arriving at the maximum priority in total. Moreover, computer-based simulations are carried out to evaluate the performance of these two models by comparing them with two traditional disaster-relief tactics in China. The results testify the feasibility and effectiveness of the proposed models.

  11. Highly accurate adaptive finite element schemes for nonlinear hyperbolic problems

    NASA Astrophysics Data System (ADS)

    Oden, J. T.

    1992-08-01

    This document is a final report of research activities supported under General Contract DAAL03-89-K-0120 between the Army Research Office and the University of Texas at Austin from July 1, 1989 through June 30, 1992. The project supported several Ph.D. students over the contract period, two of which are scheduled to complete dissertations during the 1992-93 academic year. Research results produced during the course of this effort led to 6 journal articles, 5 research reports, 4 conference papers and presentations, 1 book chapter, and two dissertations (nearing completion). It is felt that several significant advances were made during the course of this project that should have an impact on the field of numerical analysis of wave phenomena. These include the development of high-order, adaptive, hp-finite element methods for elastodynamic calculations and high-order schemes for linear and nonlinear hyperbolic systems. Also, a theory of multi-stage Taylor-Galerkin schemes was developed and implemented in the analysis of several wave propagation problems, and was configured within a general hp-adaptive strategy for these types of problems. Further details on research results and on areas requiring additional study are given in the Appendix.

  12. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under...

  13. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under...

  14. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under...

  15. Dispersion-relation-preserving schemes for computational aeroacoustics

    NASA Technical Reports Server (NTRS)

    Tam, Christopher K. W.; Webb, Jay C.

    1992-01-01

    Finite difference schemes that have the same dispersion relations as the original partial differential equations are referred to as dispersion-relation-preserving (DRP) schemes. A method to construct time marching DRP schemes by optimizing the finite difference approximations of the space and time derivatives in the wave number and frequency space is presented. A sequence of numerical simulations is then performed.

  16. Developing and Rewarding Excellent Teachers: The Scottish Chartered Teacher Scheme

    ERIC Educational Resources Information Center

    Ingvarson, Lawrence

    2009-01-01

    The Scottish Chartered Teacher Scheme was designed to recognise and reward teachers who attained high standards of practice. The scheme emerged in 2001 as part of an agreement between government, local employing authorities and teacher organisations. Policies such as the chartered teacher scheme aim to benefit students in two main ways: by…

  17. 7 CFR 760.819 - Misrepresentation, scheme, or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation, scheme, or device. 760.819 Section....819 Misrepresentation, scheme, or device. (a) A person is ineligible to receive assistance under this part if it is determined that such person has: (1) Adopted any scheme or device that tends to...

  18. 7 CFR 1491.32 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1491.32 Section 1491.32 Agriculture... Administration § 1491.32 Scheme or device. (a) If it is determined by the NRCS that a cooperating entity has employed a scheme or device to defeat the purposes of this part, any part of any program payment...

  19. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device. (a) If it is determined by USDA that a participant has employed a scheme or device to defeat the...

  20. 7 CFR 795.17 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Scheme or device. 795.17 Section 795.17 Agriculture... PROVISIONS COMMON TO MORE THAN ONE PROGRAM PAYMENT LIMITATION General § 795.17 Scheme or device. All or any... person adopts or participates in adopting any scheme or device designed to evade or which has the...

  1. 7 CFR 1467.19 - Scheme and device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme and device. 1467.19 Section 1467.19... device. (a) If it is determined by the NRCS that a participant has employed a scheme or device to defeat... determined appropriate by NRCS. (b) A scheme or device includes, but is not limited to, coercion,...

  2. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under...

  3. 30 CFR 75.800-2 - Approved circuit schemes.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Approved circuit schemes. 75.800-2 Section 75... § 75.800-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuits required by § 75.800: (a) Ground check relays may be used...

  4. 30 CFR 75.800-2 - Approved circuit schemes.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Approved circuit schemes. 75.800-2 Section 75... § 75.800-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuits required by § 75.800: (a) Ground check relays may be used...

  5. 30 CFR 75.900-2 - Approved circuit schemes.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Approved circuit schemes. 75.900-2 Section 75... Alternating Current Circuits § 75.900-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuit required by § 75.900: (a) Ground check...

  6. 30 CFR 75.900-2 - Approved circuit schemes.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Approved circuit schemes. 75.900-2 Section 75... Alternating Current Circuits § 75.900-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuit required by § 75.900: (a) Ground check...

  7. 30 CFR 75.900-2 - Approved circuit schemes.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 1 2013-07-01 2013-07-01 false Approved circuit schemes. 75.900-2 Section 75... Alternating Current Circuits § 75.900-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuit required by § 75.900: (a) Ground check...

  8. 30 CFR 75.800-2 - Approved circuit schemes.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Approved circuit schemes. 75.800-2 Section 75... § 75.800-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuits required by § 75.800: (a) Ground check relays may be used...

  9. 30 CFR 75.900-2 - Approved circuit schemes.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Approved circuit schemes. 75.900-2 Section 75... Alternating Current Circuits § 75.900-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuit required by § 75.900: (a) Ground check...

  10. Recent developments in shock-capturing schemes

    NASA Technical Reports Server (NTRS)

    Harten, Ami

    1991-01-01

    The development of the shock capturing methodology is reviewed, paying special attention to the increasing nonlinearity in its design and its relation to interpolation. It is well-known that higher-order approximations to a discontinuous function generate spurious oscillations near the discontinuity (Gibbs phenomenon). Unlike standard finite-difference methods which use a fixed stencil, modern shock capturing schemes use an adaptive stencil which is selected according to the local smoothness of the solution. Near discontinuities this technique automatically switches to one-sided approximations, thus avoiding the use of discontinuous data which brings about spurious oscillations.

  11. Secure Biometric E-Voting Scheme

    NASA Astrophysics Data System (ADS)

    Ahmed, Taha Kh.; Aborizka, Mohamed

    The implementation of the e-voting becomes more substantial with the rapid increase of e-government development. The recent growth in communications and cryptographic techniques facilitate the implementation of e-voting. Many countries introduced e-voting systems; unfortunately most of these systems are not fully functional. In this paper we will present an e-voting scheme that covers most of the e-voting requirements, smart card and biometric recognition technology were implemented to guarantee voter's privacy and authentication.

  12. Numerical Schemes for Rough Parabolic Equations

    SciTech Connect

    Deya, Aurelien

    2012-04-15

    This paper is devoted to the study of numerical approximation schemes for a class of parabolic equations on (0,1) perturbed by a non-linear rough signal. It is the continuation of Deya (Electron. J. Probab. 16:1489-1518, 2011) and Deya et al. (Probab. Theory Relat. Fields, to appear), where the existence and uniqueness of a solution has been established. The approach combines rough paths methods with standard considerations on discretizing stochastic PDEs. The results apply to a geometric 2-rough path, which covers the case of the multidimensional fractional Brownian motion with Hurst index H>1/3.

  13. Level-scheme investigation of 33S

    NASA Astrophysics Data System (ADS)

    Gavrilov, G. Tz; Goutev, N.; Dimitrov, B. I.; Tonev, D.; Petkov, P.; de Angelis, G.; Recchia, F.; Farnea, E.; Ur, C. A.; Aydin, S.; Bizzeti, P. G.; Bizzeti-Sona, A. M.; Deloncle, I.; Gottardo, A.; Laftchiev, H.; Lunardi, S.; Mengoni, D.; Michelangoli, C.; Napoli, D. R.; Orlandi, R.; Sahin, E.; Stefanova, E. A.; Valente-Dobon, J. J.; Marinov, Tz K.; Yavahchova, M. S.

    2014-09-01

    An angular correlation experiment was carried out for 33 S at Laboratori Nazionali di Legnaro with the gamma-ray detector array GASP. The reaction used was 24Mg(14N,α p)33S at a beam energy of 40MeV. An analysis of DCO ratios and triple gamma coincidences was performed. So far, a new level depopulated by 3 γ -ray transitions has been found and its spin was determined. The work for further extension of the level scheme is in progress.

  14. A numerical scheme for ionizing shock waves

    SciTech Connect

    Aslan, Necdet . E-mail: naslan@yeditepe.edu.tr; Mond, Michael

    2005-12-10

    A two-dimensional (2D) visual computer code to solve the steady state (SS) or transient shock problems including partially ionizing plasma is presented. Since the flows considered are hypersonic and the resulting temperatures are high, the plasma is partially ionized. Hence the plasma constituents are electrons, ions and neutral atoms. It is assumed that all the above species are in thermal equilibrium, namely, that they all have the same temperature. The ionization degree is calculated from Saha equation as a function of electron density and pressure by means of a nonlinear Newton type root finding algorithms. The code utilizes a wave model and numerical fluctuation distribution (FD) scheme that runs on structured or unstructured triangular meshes. This scheme is based on evaluating the mesh averaged fluctuations arising from a number of waves and distributing them to the nodes of these meshes in an upwind manner. The physical properties (directions, strengths, etc.) of these wave patterns are obtained by a new wave model: ION-A developed from the eigen-system of the flux Jacobian matrices. Since the equation of state (EOS) which is used to close up the conservation laws includes electronic effects, it is a nonlinear function and it must be inverted by iterations to determine the ionization degree as a function of density and temperature. For the time advancement, the scheme utilizes a multi-stage Runge-Kutta (RK) algorithm with time steps carefully evaluated from the maximum possible propagation speed in the solution domain. The code runs interactively with the user and allows to create different meshes to use different initial and boundary conditions and to see changes of desired physical quantities in the form of color and vector graphics. The details of the visual properties of the code has been published before (see [N. Aslan, A visual fluctuation splitting scheme for magneto-hydrodynamics with a new sonic fix and Euler limit, J. Comput. Phys. 197 (2004) 1

  15. A Classification Scheme for Glaciological AVA Responses

    NASA Astrophysics Data System (ADS)

    Booth, A.; Emir, E.

    2014-12-01

    A classification scheme is proposed for amplitude vs. angle (AVA) responses as an aid to the interpretation of seismic reflectivity in glaciological research campaigns. AVA responses are a powerful tool in characterising the material properties of glacier ice and its substrate. However, before interpreting AVA data, careful true amplitude processing is required to constrain basal reflectivity and compensate amplitude decay mechanisms, including anelastic attenuation and spherical divergence. These fundamental processing steps can be difficult to design in cases of noisy data, e.g. where a target reflection is contaminated by surface wave energy (in the case of shallow glaciers) or by energy reflected from out of the survey plane. AVA methods have equally powerful usage in estimating the fluid fill of potential hydrocarbon reservoirs. However, such applications seldom use true amplitude data and instead consider qualitative AVA responses using a well-defined classification scheme. Such schemes are often defined in terms of the characteristics of best-fit responses to the observed reflectivity, e.g. the intercept (I) and gradient (G) of a linear approximation to the AVA data. The position of the response on a cross-plot of I and G then offers a diagnostic attribute for certain fluid types. We investigate the advantages in glaciology of emulating this practice, and develop a cross-plot based on the 3-term Shuey AVA approximation (using I, G, and a curvature term C). Model AVA curves define a clear lithification trend: AVA responses to stiff (lithified) substrates fall discretely into one quadrant of the cross-plot, with positive I and negative G, whereas those to fluid-rich substrates plot diagonally opposite (in the negative I and positive G quadrant). The remaining quadrants are unoccupied by plausible single-layer responses and may therefore be diagnostic of complex thin-layer reflectivity, and the magnitude and polarity of the C term serves as a further indicator

  16. Investigation of a monochromator scheme for SPEAR

    SciTech Connect

    Wille, K.; Chao, A.W.

    1984-08-01

    The possibility of mono-chromatizing SPEAR for the purpose of increasing the hadronic event rate at the narrow resonances was investigated. By using two pairs of electostatic skew quads in monochromator scheme it is found that the event rate can be increased by a factor of 2 for the mini beta optics assuming the luminosity is kept unchanged. An attempt to increase this enhancement factor by major rearrangements of the ring magnets has encountered serious optical difficulties; although enhancement factor of 8 seems possible in principle, this alternative is not recommended.

  17. Rabi resonances in the {lambda} excitation scheme

    SciTech Connect

    Godone, Aldo; Micalizio, Salvatore; Levi, Filippo

    2002-12-01

    We consider the interaction of a three-level system with phase-modulated resonant fields in the {lambda} excitation scheme. We treat theoretically the case of a sinusoidal phase modulation, a phase step perturbation, and a stochastic phase modulation. The appearance of a Rabi resonance both in the spectrum of the optical transmitted signal (electromagnetically induced transparency) and in the spectrum of the microwave emission (coherent population trapping maser) is considered in detail. All the theoretical results are compared with the analogous ones reported for the two-level system and with our experimental observations obtained for the case of rubidium in a buffer gas.

  18. LHC INTERACTION REGION CORRECTION SCHEME STUDIES

    SciTech Connect

    FISCHER,W.; PTITSIN,V.; WEI,J.

    1999-09-07

    In a companion paper the authors showed that the performance of the Large Hadron Collider (LHC) at collision energy is limited by the field quality of the interaction region quadrupoles and dipoles. In this situation, the dynamic aperture can be increased through local multipole correctors. Since the betatron phase advance is well defined for magnets that are located in regions of large beta functions, local corrections can be very effective and robust. They compare possible compensation schemes and propose a corrector layout to meet the required dynamic aperture performance.

  19. Finite-difference schemes for anisotropic diffusion

    SciTech Connect

    Es, Bram van; Koren, Barry; Blank, Hugo J. de

    2014-09-01

    In fusion plasmas diffusion tensors are extremely anisotropic due to the high temperature and large magnetic field strength. This causes diffusion, heat conduction, and viscous momentum loss, to effectively be aligned with the magnetic field lines. This alignment leads to different values for the respective diffusive coefficients in the magnetic field direction and in the perpendicular direction, to the extent that heat diffusion coefficients can be up to 10{sup 12} times larger in the parallel direction than in the perpendicular direction. This anisotropy puts stringent requirements on the numerical methods used to approximate the MHD-equations since any misalignment of the grid may cause the perpendicular diffusion to be polluted by the numerical error in approximating the parallel diffusion. Currently the common approach is to apply magnetic field-aligned coordinates, an approach that automatically takes care of the directionality of the diffusive coefficients. This approach runs into problems at x-points and at points where there is magnetic re-connection, since this causes local non-alignment. It is therefore useful to consider numerical schemes that are tolerant to the misalignment of the grid with the magnetic field lines, both to improve existing methods and to help open the possibility of applying regular non-aligned grids. To investigate this, in this paper several discretization schemes are developed and applied to the anisotropic heat diffusion equation on a non-aligned grid.

  20. Special Semaphore Scheme for UHF Spacecraft Communications

    NASA Technical Reports Server (NTRS)

    Butman, Stanley; Satorius, Edgar; Ilott, Peter

    2006-01-01

    A semaphore scheme has been devised to satisfy a requirement to enable ultrahigh- frequency (UHF) radio communication between a spacecraft descending from orbit to a landing on Mars and a spacecraft, in orbit about Mars, that relays communications between Earth and the lander spacecraft. There are also two subsidiary requirements: (1) to use UHF transceivers, built and qualified for operation aboard the spacecraft that operate with residual-carrier binary phase-shift-keying (BPSK) modulation at a selectable data rate of 8, 32, 128, or 256 kb/s; and (2) to enable low-rate signaling even when received signals become so weak as to prevent communication at the minimum BPSK rate of 8 kHz. The scheme involves exploitation of Manchester encoding, which is used in conjunction with residual-carrier modulation to aid the carrier-tracking loop. By choosing various sequences of 1s, 0s, or 1s alternating with 0s to be fed to the residual-carrier modulator, one would cause the modulator to generate sidebands at a fundamental frequency of 4 or 8 kHz and harmonics thereof. These sidebands would constitute the desired semaphores. In reception, the semaphores would be detected by a software demodulator.

  1. The Linear Bicharacteristic Scheme for Computational Electromagnetics

    NASA Technical Reports Server (NTRS)

    Beggs, John H.; Chan, Siew-Loong

    2000-01-01

    The upwind leapfrog or Linear Bicharacteristic Scheme (LBS) has previously been implemented and demonstrated on electromagnetic wave propagation problems. This paper extends the Linear Bicharacteristic Scheme for computational electromagnetics to treat lossy dielectric and magnetic materials and perfect electrical conductors. This is accomplished by proper implementation of the LBS for homogeneous lossy dielectric and magnetic media, and treatment of perfect electrical conductors (PECs) are shown to follow directly in the limit of high conductivity. Heterogeneous media are treated through implementation of surface boundary conditions and no special extrapolations or interpolations at dielectric material boundaries are required. Results are presented for one-dimensional model problems on both uniform and nonuniform grids, and the FDTD algorithm is chosen as a convenient reference algorithm for comparison. The results demonstrate that the explicit LBS is a dissipation-free, second-order accurate algorithm which uses a smaller stencil than the FDTD algorithm, yet it has approximately one-third the phase velocity error. The LBS is also more accurate on nonuniform grids.

  2. Gaussian translation operator in a multilevel scheme

    NASA Astrophysics Data System (ADS)

    Hansen, Thorkild B.; Borries, Oscar

    2015-08-01

    A multilevel computation scheme for time-harmonic fields in three dimensions will be formulated with a new Gaussian translation operator that decays exponentially outside a circular cone centered on the line connecting the source and observation groups. This Gaussian translation operator is directional and diagonal with its sharpness determined by a beam parameter. When the beam parameter is set to zero, the Gaussian translation operator reduces to the standard fast multipole method translation operator. The directionality of the Gaussian translation operator makes it possible to reduce the number of plane waves required to achieve a given accuracy. The sampling rate can be determined straightforwardly to achieve any desired accuracy. The use of the computation scheme will be illustrated through a near-field scanning problem where the far-field pattern of a source is determined from near-field measurements with a known probe. Here the Gaussian translation operator improves the condition number of the matrix equation that determines the far-field pattern. The Gaussian translation operator can also be used when the probe pattern is known only in one hemisphere, as is common in practice. Also, the Gaussian translation operator will be used to solve the scattering problem of the perfectly conducting sphere.

  3. Coupling Schemes in Terahertz Planar Metamaterials

    DOE PAGESBeta

    Roy Chowdhury, Dibakar; Singh, Ranjan; Taylor, Antoinette J.; Chen, Hou-Tong; Zhang, Weili; Azad, Abul K.

    2012-01-01

    We present a review of the different coupling schemes in a planar array of terahertz metamaterials. The gap-to-gap near-field capacitive coupling between split-ring resonators in a unit cell leads to either blue shift or red shift of the fundamental inductive-capacitive ( LC ) resonance, depending on the position of the split gap. The inductive coupling is enhanced by decreasing the inter resonator distance resulting in strong blue shifts of the LC resonance. We observe the LC resonance tuning only when the split-ring resonators are in close proximity of each other; otherwise, they appear to be uncoupled. Conversely, the higher-ordermore » resonances are sensitive to the smallest change in the inter particle distance or split-ring resonator orientation and undergo tremendous resonance line reshaping giving rise to a sharp subradiant resonance mode which produces hot spots useful for sensing applications. Most of the coupling schemes in a metamaterial are based on a near-field effect, though there also exists a mechanism to couple the resonators through the excitation of lowest-order lattice mode which facilitates the long-range radiative or diffractive coupling in the split-ring resonator plane leading to resonance line narrowing of the fundamental as well as the higher order resonance modes.« less

  4. Privacy protection schemes for fingerprint recognition systems

    NASA Astrophysics Data System (ADS)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  5. A closure scheme for chemical master equations.

    PubMed

    Smadbeck, Patrick; Kaznessis, Yiannis N

    2013-08-27

    Probability reigns in biology, with random molecular events dictating the fate of individual organisms, and propelling populations of species through evolution. In principle, the master probability equation provides the most complete model of probabilistic behavior in biomolecular networks. In practice, master equations describing complex reaction networks have remained unsolved for over 70 years. This practical challenge is a reason why master equations, for all their potential, have not inspired biological discovery. Herein, we present a closure scheme that solves the master probability equation of networks of chemical or biochemical reactions. We cast the master equation in terms of ordinary differential equations that describe the time evolution of probability distribution moments. We postulate that a finite number of moments capture all of the necessary information, and compute the probability distribution and higher-order moments by maximizing the information entropy of the system. An accurate order closure is selected, and the dynamic evolution of molecular populations is simulated. Comparison with kinetic Monte Carlo simulations, which merely sample the probability distribution, demonstrates this closure scheme is accurate for several small reaction networks. The importance of this result notwithstanding, a most striking finding is that the steady state of stochastic reaction networks can now be readily computed in a single-step calculation, without the need to simulate the evolution of the probability distribution in time.

  6. The "style scheme" grounds perception of paintings.

    PubMed

    Cela-Conde, Camilo J; Marty, Gisèle; Munar, Enric; Nadal, Marcos; Burges, Lucrecia

    2002-08-01

    We studied the formation of style scheme (identification of the style that characterizes an artist) presenting 100 participants aesthetic visual stimuli. Participants were Spanish university students who volunteered: 72 women, 28 men of mean age 22.8 yr. Among those 50 were enrolled in History of Art and 50 students in Psychology. Stimuli belonged to different categories--High Art (pictures of well-known artists, like Van Gogh)/Popular Art (decorative pictures like Christmas postcards) and Representational (pictures with explicit meaning content, like a landscape)/Abstract (pictures without explicit meaning content, like Pollock's colored stains). Analysis using Signal Detection Theory techniques focused on how participants discriminate representational and abstract pictures. With High Art stimuli, participants can better discriminate representational paintings than abstract ones. However, the difference in discrimination between representational and abstract pictures diminishes among participants studying History of Art. It seems that prior education in art favors forming style schemes and to some extent enables the participant to detect the "meaning" in High Art abstract paintings.

  7. A group signature scheme based on quantum teleportation

    NASA Astrophysics Data System (ADS)

    Wen, Xiaojun; Tian, Yuan; Ji, Liping; Niu, Xiamu

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  8. Quantum election scheme based on anonymous quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhou, Rui-Rui; Yang, Li

    2012-08-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible.

  9. Compact finite difference schemes with spectral-like resolution

    NASA Technical Reports Server (NTRS)

    Lele, Sanjiva K.

    1992-01-01

    The present finite-difference schemes for the evaluation of first-order, second-order, and higher-order derivatives yield improved representation of a range of scales and may be used on nonuniform meshes. Various boundary conditions may be invoked, and both accurate interpolation and spectral-like filtering can be accomplished by means of schemes for derivatives at mid-cell locations. This family of schemes reduces to the Pade schemes when the maximal formal accuracy constraint is imposed with a specific computational stencil. Attention is given to illustrative applications of these schemes in fluid dynamics.

  10. On the security of arbitrated quantum signature schemes

    NASA Astrophysics Data System (ADS)

    Li, Qin; Li, Chengqing; Wen, Zhonghua; Zhao, Weizhong; Chan, Wai Hong

    2013-01-01

    Due to the potential capability of providing unconditional security, arbitrated quantum signature (AQS) schemes, whose implementation depends on the participation of a trusted third party, received intense attention in the past decade. Recently, some typical AQS schemes were cryptanalyzed and improved. In this paper, we analyze the security property of some AQS schemes and show that all the previous AQS schemes, no matter whether original or improved, are still insecure in the sense that the messages and the corresponding signatures can be exchanged among different receivers, allowing the receivers to deny having accepted the signature of an appointed message. Some further improved methods on the AQS schemes are also discussed.

  11. On the monotonicity of multidimensional finite difference schemes

    NASA Astrophysics Data System (ADS)

    Kovyrkina, O.; Ostapenko, V.

    2016-10-01

    The classical concept of monotonicity, introduced by Godunov for linear one-dimensional difference schemes, is extended to multidimensional case. Necessary and sufficient conditions of monotonicity are obtained for linear multidimensional difference schemes of first order. The constraints on the numerical viscosity are given that ensure the monotonicity of a difference scheme in the multidimensional case. It is proposed a modification of the second order multidimensional CABARET scheme that preserves the monotonicity of one-dimensional discrete solutions and, as a result, ensures higher smoothness in the computation of multidimensional discontinuous solutions. The results of two-dimensional test computations illustrating the advantages of the modified CABARET scheme are presented.

  12. Exploring the Perceptions of Success in an Exercise Referral Scheme: A Mixed Method Investigation

    ERIC Educational Resources Information Center

    Mills, Hayley; Crone, Diane; James, David V. B.; Johnston, Lynne H.

    2012-01-01

    Background: Exercise referral schemes feature as one of the prevalent primary care physical activity interventions in the United Kingdom, without extensive understanding of how those involved in providing and participating view success. The present research explores and reveals the constituents of "success," through comparison, contradiction, and…

  13. An evaluation of RAMS radiation schemes by field measurements

    SciTech Connect

    Zhong, S; Doran, J C

    1994-02-01

    At present, two radiation schemes are used in RAMS: the Mahrer and Pielke (M-P) scheme and the Chen and Cotton (C-C) scheme. The M-P scheme requires little computational expense, but does not include the radiative effects of liquid water or ice; the C-C scheme accounts for the radiative effects of liquid water and ice but is fairly expensive computationally. For simulations with clouds, the C-C scheme is obviously a better choice, but for clear sky conditions, RAMS users face a decision regarding which radiation scheme to use. It has been noted that the choice of radiation scheme may result in significantly different results for the same case. To examine the differences in the radiative fluxes and the boundary-layer structure corresponding to the two radiation schemes in RAMS we have carried out a study where Rams was used to simulate the same case with two different radiation schemes. The modeled radiative fluxes by the two schemes were then compared with the field measurements. A description of the observations and the case study, a comparison and discussion of the results, and a summary and conclusions follow.

  14. Implicit Space-Time Conservation Element and Solution Element Schemes

    NASA Technical Reports Server (NTRS)

    Chang, Sin-Chung; Himansu, Ananda; Wang, Xiao-Yen

    1999-01-01

    Artificial numerical dissipation is in important issue in large Reynolds number computations. In such computations, the artificial dissipation inherent in traditional numerical schemes can overwhelm the physical dissipation and yield inaccurate results on meshes of practical size. In the present work, the space-time conservation element and solution element method is used to construct new and accurate implicit numerical schemes such that artificial numerical dissipation will not overwhelm physical dissipation. Specifically, these schemes have the property that numerical dissipation vanishes when the physical viscosity goes to zero. These new schemes therefore accurately model the physical dissipation even when it is extremely small. The new schemes presented are two highly accurate implicit solvers for a convection-diffusion equation. The two schemes become identical in the pure convection case, and in the pure diffusion case. The implicit schemes are applicable over the whole Reynolds number range, from purely diffusive equations to convection-dominated equations with very small viscosity. The stability and consistency of the schemes are analysed, and some numerical results are presented. It is shown that, in the inviscid case, the new schemes become explicit and their amplification factors are identical to those of the Leapfrog scheme. On the other hand, in the pure diffusion case, their principal amplification factor becomes the amplification factor of the Crank-Nicolson scheme.

  15. Total Variation Diminishing (TVD) schemes of uniform accuracy

    NASA Technical Reports Server (NTRS)

    Hartwich, PETER-M.; Hsu, Chung-Hao; Liu, C. H.

    1988-01-01

    Explicit second-order accurate finite-difference schemes for the approximation of hyperbolic conservation laws are presented. These schemes are nonlinear even for the constant coefficient case. They are based on first-order upwind schemes. Their accuracy is enhanced by locally replacing the first-order one-sided differences with either second-order one-sided differences or central differences or a blend thereof. The appropriate local difference stencils are selected such that they give TVD schemes of uniform second-order accuracy in the scalar, or linear systems, case. Like conventional TVD schemes, the new schemes avoid a Gibbs phenomenon at discontinuities of the solution, but they do not switch back to first-order accuracy, in the sense of truncation error, at extrema of the solution. The performance of the new schemes is demonstrated in several numerical tests.

  16. Well-balanced schemes for the Euler equations with gravitation

    NASA Astrophysics Data System (ADS)

    Käppeli, R.; Mishra, S.

    2014-02-01

    Well-balanced high-order finite volume schemes are designed to approximate the Euler equations with gravitation. The schemes preserve discrete equilibria, corresponding to a large class of physically stable hydrostatic steady states. Based on a novel local hydrostatic reconstruction, the derived schemes are well-balanced for any consistent numerical flux for the Euler equations. The form of the hydrostatic reconstruction is both very simple and computationally efficient as it requires no analytical or numerical integration. Moreover, as required by many interesting astrophysical scenarios, the schemes are applicable beyond the ideal gas law. Both first- and second-order accurate versions of the schemes and their extension to multi-dimensional equilibria are presented. Several numerical experiments demonstrating the superior performance of the well-balanced schemes, as compared to standard finite volume schemes, are also presented.

  17. Defrosting Polar Dunes--Changes Over a 26-Day Period

    NASA Technical Reports Server (NTRS)

    1999-01-01

    As the retreat of the south polar winter frost cap became visible in June 1999, high resolution images from the Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC) began to show dark spots forming on the surfaces of frost-covered sand dunes. Immediately, the MOC science team began to plan to observe several dune fields more than once, should that opportunity arise, so that the evolution of these dark spots could be documented and studied. Such work will eventually lead to abetter understanding of how the martian polar caps retreat as winter ends and spring unfolds in each hemisphere.

    MGS is in a polar orbit, which means that, unlike many other places on Mars, the spacecraft has more opportunities to take pictures of the same place. Dune fields near 87o latitude can be repeatedly viewed; dunes near the equator are not likely to be photographed more than once during the entire MGS mission.

    The pictures presented here show changes on a set of nearly pear-shaped sand dunes located on the floor of an unnamed crater at 59oS, 353oW. The picture on the left shows the dunes as they appeared on June 19, 1999, the picture on the right shows the same dunes on July 15, 1999. The dark spots in the June 19picture--indicating areas where frost has sublimed away--became larger by July 15th. In addition, new spots had appeared as of mid-July. If possible, these dunes will be photographed by MOC again in mid-August and each month until the frost is gone.

    The pictures shown in (B) (above) are expanded views of portions of the pictures in (A). The 200 meter scale bar equals 656 feet; the 100 meter bar is 328 feet (109 yards) long. All images are illuminated from the upper left; north is toward the upper right.

    Malin Space Science Systems and the California Institute of Technology built the MOC using spare hardware from the Mars Observer mission. MSSS operates the camera from its facilities in San Diego, CA. The Jet Propulsion Laboratory's Mars Surveyor Operations Project operates the Mars Global Surveyor spacecraft with its industrial partner, Lockheed Martin Astronautics, from facilities in Pasadena, CA and Denver, CO.

  18. EXPERIMENTAL INVESTIGATION OF DEFROST USING WARM LIQUID REFRIGERANT

    EPA Science Inventory

    This paper reports the results from laboratory tests of a low-temperature supermarket refrigeration system with two open and two reach-in display cases. Tests were performed at condensing temperatures ranging from 10 to 40 C and at an evaporating temperature of -34 C. The perfo...

  19. Self-defrosting recuperative air-to-air heat exchanger

    DOEpatents

    Drake, Richard L.

    1993-01-01

    A heat exchanger includes a stationary spirally or concentrically wound heat exchanger core with rotating baffles on upper and lower ends thereof. The rotating baffles include rotating inlets and outlets which are in communication with respective fixed inlets and outlets via annuli. The rotation of the baffles causes a concurrent rotation of the temperature distribution within the stationary exchanger core, thereby preventing frost build-up in some applications and preventing the formation of hot spots in other applications.

  20. Self-defrosting recuperative air-to-air heat exchanger

    DOEpatents

    Drake, R.L.

    1993-12-28

    A heat exchanger is described which includes a stationary spirally or concentrically wound heat exchanger core with rotating baffles on upper and lower ends thereof. The rotating baffles include rotating inlets and outlets which are in communication with respective fixed inlets and outlets via annuli. The rotation of the baffles causes a concurrent rotation of the temperature distribution within the stationary exchanger core, thereby preventing frost build-up in some applications and preventing the formation of hot spots in other applications. 3 figures.

  1. The sensitivity of polar ozone depletion to proposed geoengineering schemes.

    PubMed

    Tilmes, Simone; Müller, Rolf; Salawitch, Ross

    2008-05-30

    The large burden of sulfate aerosols injected into the stratosphere by the eruption of Mount Pinatubo in 1991 cooled Earth and enhanced the destruction of polar ozone in the subsequent few years. The continuous injection of sulfur into the stratosphere has been suggested as a "geoengineering" scheme to counteract global warming. We use an empirical relationship between ozone depletion and chlorine activation to estimate how this approach might influence polar ozone. An injection of sulfur large enough to compensate for surface warming caused by the doubling of atmospheric CO2 would strongly increase the extent of Arctic ozone depletion during the present century for cold winters and would cause a considerable delay, between 30 and 70 years, in the expected recovery of the Antarctic ozone hole.

  2. New scheme for polarimetric glucose sensing without polarizers

    NASA Astrophysics Data System (ADS)

    Winkler, Amy M.; Bonnema, Garret T.; Barton, Jennifer K.

    2010-02-01

    Polarimetric glucose sensing is a promising method for noninvasive estimation of blood glucose concentration. Published methods of polarimetric glucose sensing generally rely on measuring the rotation of light as it traverses the aqueous humor of the eye. In this article, an interferometer is described that can detect polarization changes due to glucose without the use of polarization control or polarization analyzing elements. Without polarizers, this system is sensitive to optical activity, inherent to glucose, but minimally sensitive to linear retardance, inherent to the cornea. The underlying principle of the system was experimentally verified using spectral domain optical coherence tomography. A detection scheme involving amplitude modulation was simulated, demonstrating sensitivity to clinically relevant glucose concentrations and an acceptable error due to time varying linear birefringence of the cornea using Clarke Error Grid Analysis.

  3. Block-classified motion compensation scheme for digital video

    SciTech Connect

    Zafar, S.; Zhang, Ya-Qin; Jabbari, B.

    1996-03-01

    A novel scheme for block-based motion compensation is introduced in which a block is classified according to the energy that is directly related to the motion activity it represents. This classification allows more flexibility in controlling the bit rate arid the signal-to-noise ratio and results in a reduction in motion search complexity. The method introduced is not dependent on the particular type of motion search algorithm implemented and can thus be used with any method assuming that the underlying matching criteria used is minimum absolute difference. It has been shown that the method is superior to a simple motion compensation algorithm where all blocks are motion compensated regardless of the energy resulting after the displaced difference.

  4. The sensitivity of polar ozone depletion to proposed geoengineering schemes.

    PubMed

    Tilmes, Simone; Müller, Rolf; Salawitch, Ross

    2008-05-30

    The large burden of sulfate aerosols injected into the stratosphere by the eruption of Mount Pinatubo in 1991 cooled Earth and enhanced the destruction of polar ozone in the subsequent few years. The continuous injection of sulfur into the stratosphere has been suggested as a "geoengineering" scheme to counteract global warming. We use an empirical relationship between ozone depletion and chlorine activation to estimate how this approach might influence polar ozone. An injection of sulfur large enough to compensate for surface warming caused by the doubling of atmospheric CO2 would strongly increase the extent of Arctic ozone depletion during the present century for cold winters and would cause a considerable delay, between 30 and 70 years, in the expected recovery of the Antarctic ozone hole. PMID:18436741

  5. Buckley's Scheme of Schemes as a Foundation for Teaching Family Systems Theory.

    ERIC Educational Resources Information Center

    Duncan, Barry L.; Fraser, J. Scott

    1987-01-01

    Urges emphasis on the development of a strong system theory base upon which future practitioners and researchers can build. Advocates the use of Buckley's hierarchical scheme as a teaching tool to provide an understandable, yet broadly applicable, theory base for graduate students in an introductory family therapy course. Outlines an effective…

  6. On smoothing of the Crank-Nicolson scheme and higher order schemes for pricing barrier options

    NASA Astrophysics Data System (ADS)

    Wade, B. A.; Khaliq, A. Q. M.; Yousuf, M.; Vigo-Aguiar, J.; Deininger, R.

    2007-07-01

    Most option pricing problems have nonsmooth payoffs or discontinuous derivatives at the exercise price. Discrete barrier options have not only nonsmooth payoffs but also time dependent discontinuities. In pricing barrier options, certain aspects are triggered if the asset price becomes too high or too low. Standard smoothing schemes used to solve problems with nonsmooth payoff do not work well for discrete barrier options because of discontinuities introduced in the time domain when each barrier is applied. Moreover, these unwanted oscillations become worse when estimating the hedging parameters, e.g., Delta and Gamma. We have an improved smoothing strategy for the Crank-Nicolson method which is unique in achieving optimal order convergence for barrier option problems. Numerical experiments are discussed for one asset and two asset problems. Time evolution graphs are obtained for one asset problems to show how option prices change with respect to time. This smoothing strategy is then extended to higher order methods using diagonal (m,m)--Pade main schemes under a smoothing strategy of using as damping schemes the (0,2m-1) subdiagonal Pade schemes.

  7. An efficient compression scheme for bitmap indices

    SciTech Connect

    Wu, Kesheng; Otoo, Ekow J.; Shoshani, Arie

    2004-04-13

    When using an out-of-core indexing method to answer a query, it is generally assumed that the I/O cost dominates the overall query response time. Because of this, most research on indexing methods concentrate on reducing the sizes of indices. For bitmap indices, compression has been used for this purpose. However, in most cases, operations on these compressed bitmaps, mostly bitwise logical operations such as AND, OR, and NOT, spend more time in CPU than in I/O. To speedup these operations, a number of specialized bitmap compression schemes have been developed; the best known of which is the byte-aligned bitmap code (BBC). They are usually faster in performing logical operations than the general purpose compression schemes, but, the time spent in CPU still dominates the total query response time. To reduce the query response time, we designed a CPU-friendly scheme named the word-aligned hybrid (WAH) code. In this paper, we prove that the sizes of WAH compressed bitmap indices are about two words per row for large range of attributes. This size is smaller than typical sizes of commonly used indices, such as a B-tree. Therefore, WAH compressed indices are not only appropriate for low cardinality attributes but also for high cardinality attributes.In the worst case, the time to operate on compressed bitmaps is proportional to the total size of the bitmaps involved. The total size of the bitmaps required to answer a query on one attribute is proportional to the number of hits. These indicate that WAH compressed bitmap indices are optimal. To verify their effectiveness, we generated bitmap indices for four different datasets and measured the response time of many range queries. Tests confirm that sizes of compressed bitmap indices are indeed smaller than B-tree indices, and query processing with WAH compressed indices is much faster than with BBC compressed indices, projection indices and B-tree indices. In addition, we also verified that the average query response time

  8. Quantification of numerical diffusivity due to TVD schemes in the advection equation

    NASA Astrophysics Data System (ADS)

    Bidadi, Shreyas; Rani, Sarma L.

    2014-03-01

    In this study, the numerical diffusivity νnum inherent to the Roe-MUSCL scheme has been quantified for the scalar advection equation. The Roe-MUSCL scheme employed is a combination of: (1) the standard extension of the original Roe's formulation to the advection equation, and (2) van Leer's Monotone Upwind Scheme for Conservation Laws (MUSCL) technique that applies a linear variable reconstruction in a cell along with a scaled limiter function. An explicit expression is derived for the numerical diffusivity in terms of the limiter function, the distance between the cell centers on either side of a face, and the face-normal velocity. The numerical diffusivity formulation shows that a scaled limiter function is more appropriate for MUSCL in order to consistently recover the central-differenced flux at the maximum value of the limiter. The significance of the scaling factor is revealed when the Roe-MUSCL scheme, originally developed for 1-D scenarios, is applied to 2-D scalar advection problems. It is seen that without the scaling factor, the MUSCL scheme may not necessarily be monotonic in multi-dimensional scenarios. Numerical diffusivities of the minmod, superbee, van Leer and Barth-Jesperson TVD limiters were quantified for four problems: 1-D advection of a step function profile, and 2-D advection of step, sinusoidal, and double-step profiles. For all the cases, it is shown that the superbee scheme provides the lowest numerical diffusivity that is also most confined to the vicinity of the discontinuity. The minmod scheme is the most diffusive, as well as active in regions away from high gradients. As expected, the grid resolution study demonstrates that the magnitude and the spatial extent of the numerical diffusivity decrease with increasing resolution.

  9. Efficient Conservative Reformulation Schemes for Lithium Intercalation

    SciTech Connect

    Urisanga, PC; Rife, D; De, S; Subramanian, VR

    2015-02-18

    Porous electrode theory coupled with transport and reaction mechanisms is a widely used technique to model Li-ion batteries employing an appropriate discretization or approximation for solid phase diffusion with electrode particles. One of the major difficulties in simulating Li-ion battery models is the need to account for solid phase diffusion in a second radial dimension r, which increases the computation time/cost to a great extent. Various methods that reduce the computational cost have been introduced to treat this phenomenon, but most of them do not guarantee mass conservation. The aim of this paper is to introduce an inherently mass conserving yet computationally efficient method for solid phase diffusion based on Lobatto III A quadrature. This paper also presents coupling of the new solid phase reformulation scheme with a macro-homogeneous porous electrode theory based pseudo 20 model for Li-ion battery. (C) The Author(s) 2015. Published by ECS. All rights reserved.

  10. Plastics waste trashes German recycling scheme

    SciTech Connect

    Chynoweth, E.

    1993-06-30

    Plastics waste is causing a major headache for Duales System Deutschland (DSD: Bonn), one of Europe`s groundbreaking national packaging recycling programs. Five of Germany`s states have threatened to withdraw from the plan mainly because of the lack of plastics recycling capacity, says a DSD spokeswoman. {open_quotes}The pace of establishing recycling capacity does not meet the zeal in collection.{close_quotes} she notes. In addition, the organization has been crippled by a lack of funds. It claims that up to half the subscribers to the scheme - who pay a fee to display a green dot on packaging - are either irregular payers or not paying fees in proportion to their use of the green dot. The cost of setting up and paying for plastics recycling - not originally part of DSD`s responsibility - is also hurting the organization.

  11. The upgraded scheme of Hefei Light Source

    SciTech Connect

    Li Weimin; Xu Hongliang; Wang Lin; Feng Guangyao; Zhang Shancai; Hao Hao

    2010-06-23

    To enhance the performance of Hefei Light Source, which was designed and constructed two decades ago, an upgrade project would be carried out in the near future. The detail upgrade scheme was described in this paper. Firstly, the magnet lattice of storage ring should be reconstructed with 4 DBA cells, whose advantages are lower beam emittance and more straight section available for insertion devices. Secondly, the beam diagnostics, main power supply, transverse and longitudinal multi-bunch feedback, beam control and manipulation system would be upgrade to improve the beam orbit stability. Finally, the injection system of storage ring and injector, which is composed of electron linac and beam transfer line, would be updated in order to assure smooth beam accumulation process under new low emittance lattice. With above improvement, it is hopeful to increase the brilliance of Hefei Light Source by two orders approximately. After three-year upgrade project, the performance of HLS would meet the demands of advanced SR users.

  12. Recycling scheme for twin BWRs reactors

    SciTech Connect

    Ramirez-Sanchez, J. R.; Perry, R. T.; Gustavo Alonso, V.; Javier Palacios, H.

    2006-07-01

    To asses the advantages of reprocess and recycle the spent fuel from nuclear power reactors, against a once through policy, a MOX fuel design is proposed to match a generic scenario for twin BWRs and establish a fuel management scheme. Calculations for the amount of fuel that the plants will use during 40 years of operation were done, and an evaluation of costs using constant money method for each option applying current prices for uranium and services were made. Finally a comparison between the options was made, resulting that even the current high prices of uranium, still the recycling option is more expensive that the once through alternative. But reprocessing could be an alternative to reduce the amount of spent fuel stored in the reactor pools. (authors)

  13. Production scheme for deep water hydrate deposits

    SciTech Connect

    Rose, W.; Pfannkuch, H.O.

    1982-09-01

    There is substantial evidence that enormous natural gas hydrate deposits are entrapped in the bottom sediments underlying many of the deep waters that cover the earth, as well as in subsurface permafrost sediments of the polar regions. This paper addresses the important but largely ignored question of how to recover natural gas from the deep water bottom occurrences. The first problem is to gain access to the resource, the second to promote decomposition of the hydrate, and the third is to collect and bring the exsolved gas to the surface. A scheme assumed to be technically feasible involves the use of closely-spaced flexible hoses imbedded to protrude through the underside of the hydrate layer through which warm water can be circulated downwards and recovered gas brought upwards from and to surface floating platforms equipped with pumps, compressors, conversion facilities, storage vessels and pipeline manifolds.

  14. Relaxation schemes for spectral multigrid methods

    NASA Technical Reports Server (NTRS)

    Phillips, Timothy N.

    1987-01-01

    The effectiveness of relaxation schemes for solving the systems of algebraic equations which arise from spectral discretizations of elliptic equations is examined. Iterative methods are an attractive alternative to direct methods because Fourier transform techniques enable the discrete matrix-vector products to be computed almost as efficiently as for corresponding but sparse finite difference discretizations. Preconditioning is found to be essential for acceptable rates of convergence. Preconditioners based on second-order finite difference methods are used. A comparison is made of the performance of different relaxation methods on model problems with a variety of conditions specified around the boundary. The investigations show that iterations based on incomplete LU decompositions provide the most efficient methods for solving these algebraic systems.

  15. Doping Scheme of Semiconducting Atomic Chains

    NASA Technical Reports Server (NTRS)

    Toshishige, Yamada; Saini, Subhash (Technical Monitor)

    1998-01-01

    Atomic chains, precise structures of atomic scale created on an atomically regulated substrate surface, are candidates for future electronics. A doping scheme for intrinsic semiconducting Mg chains is considered. In order to suppress the unwanted Anderson localization and minimize the deformation of the original band shape, atomic modulation doping is considered, which is to place dopant atoms beside the chain periodically. Group I atoms are donors, and group VI or VII atoms are acceptors. As long as the lattice constant is long so that the s-p band crossing has not occurred, whether dopant atoms behave as donors or acceptors is closely related to the energy level alignment of isolated atomic levels. Band structures are calculated for Br-doped (p-type) and Cs-doped (n-type) Mg chains using the tight-binding theory with universal parameters, and it is shown that the band deformation is minimized and only the Fermi energy position is modified.

  16. Pointing Reference Scheme for Free-Space Optical Communications Systems

    NASA Technical Reports Server (NTRS)

    Wright, Malcolm; Ortiz, Gerardo; Jeganathan, Muthu

    2006-01-01

    A scheme is proposed for referencing the propagation direction of the transmit laser signal in pointing a free-space optical communications terminal. This recently developed scheme enables the use of low-cost, commercial silicon-based sensors for tracking the direction of the transmit laser, regardless of the transmit wavelength. Compared with previous methods, the scheme offers some advantages of less mechanical and optical complexity and avoids expensive and exotic sensor technologies. In free-space optical communications, the transmit beam must be accurately pointed toward the receiver in order to maintain the communication link. The current approaches to achieve this function call for part of the transmit beam to be split off and projected onto an optical sensor used to infer the pointed direction. This requires that the optical sensor be sensitive to the wavelength of the transmit laser. If a different transmit wavelength is desired, for example to obtain a source capable of higher data rates, this can become quite impractical because of the unavailability or inefficiency of sensors at these wavelengths. The innovation proposed here decouples this requirement by allowing any transmit wavelength to be used with any sensor. We have applied this idea to a particular system that transmits at the standard telecommunication wavelength of 1,550 nm and uses a silicon-based sensor, sensitive from 0.5 to 1.0 micrometers, to determine the pointing direction. The scheme shown in the figure involves integrating a low-power 980-nm reference or boresight laser beam coupled to the 1,550-nm transmit beam via a wavelength-division-multiplexed fiber coupler. Both of these signals propagate through the optical fiber where they achieve an extremely high level of co-alignment before they are launched into the telescope. The telescope uses a dichroic beam splitter to reflect the 980- nm beam onto the silicon image sensor (a quad detector, charge-coupled device, or active

  17. Investigation of Near Shannon Limit Coding Schemes

    NASA Technical Reports Server (NTRS)

    Kwatra, S. C.; Kim, J.; Mo, Fan

    1999-01-01

    Turbo codes can deliver performance that is very close to the Shannon limit. This report investigates algorithms for convolutional turbo codes and block turbo codes. Both coding schemes can achieve performance near Shannon limit. The performance of the schemes is obtained using computer simulations. There are three sections in this report. First section is the introduction. The fundamental knowledge about coding, block coding and convolutional coding is discussed. In the second section, the basic concepts of convolutional turbo codes are introduced and the performance of turbo codes, especially high rate turbo codes, is provided from the simulation results. After introducing all the parameters that help turbo codes achieve such a good performance, it is concluded that output weight distribution should be the main consideration in designing turbo codes. Based on the output weight distribution, the performance bounds for turbo codes are given. Then, the relationships between the output weight distribution and the factors like generator polynomial, interleaver and puncturing pattern are examined. The criterion for the best selection of system components is provided. The puncturing pattern algorithm is discussed in detail. Different puncturing patterns are compared for each high rate. For most of the high rate codes, the puncturing pattern does not show any significant effect on the code performance if pseudo - random interleaver is used in the system. For some special rate codes with poor performance, an alternative puncturing algorithm is designed which restores their performance close to the Shannon limit. Finally, in section three, for iterative decoding of block codes, the method of building trellis for block codes, the structure of the iterative decoding system and the calculation of extrinsic values are discussed.

  18. Semi-Passive Chemical Oxidation Schemes for the Long-Term Treatment of Contaminants

    SciTech Connect

    Schwartz, Frank

    2004-12-01

    In situ chemical oxidation or ISCO schemes involve the addition of a chemical oxidant, such as potassium permanganate (KMnO4), which destroys chlorinated solvents like TCE in a straightforward reaction. Although ISCO is now regarded as a developing technology in an industrial sense, beyond active flushing schemes, there have been relatively limited investigations in how ISCO might be better used. Our previous study showed that KMnO4 flushing approaches often would be frustrated by the inability to control the delivery of the treatment fluid due to precipitation of low-permeability reaction by-product like MnO2 and other problems. It was therefore suggested that development of a new ISCO scheme that can provide both destruction efficiencies and plugging control would be required.

  19. Approaches for providing target values to improve usefulness of external quality assessment scheme. The Spanish experience.

    PubMed

    Ricós, C; Alvarez, V; Hernández, A; Jimenez, C V; Minchinela, J; Perich, C; Simon, M; Serrano, M

    1993-01-01

    The aim of this communication is to highlight the specific aspects of external quality assessment schemes that need to be discussed in a European context: target values, transferability of results and accredit of laboratories. The Spanish situation is presented here. The most reliable way to provide target values is to analyse the control samples by reference methods. However, it is not possible for the majority of national schemes and other approaches are presently used: the verification of consensus means is a practicable solution adopted in Spain. An initial network involving selected routine laboratories has been developed, to attain transferability of results. The traceability of routine calibrators from certified reference materials should be demonstrated. To accredit laboratories for licensing is a complex activity that should consider many aspects, results from the national quality assessment scheme bring one. A scoring system is being used in Spain for guidance, and the complete guidelines are under preparation.

  20. State of the art of control schemes for smart systems featuring magneto-rheological materials

    NASA Astrophysics Data System (ADS)

    Choi, Seung-Bok; Li, Weihua; Yu, Miao; Du, Haiping; Fu, Jie; Do, Phu Xuan

    2016-04-01

    This review presents various control strategies for application systems utilizing smart magneto-rheological fluid (MRF) and magneto-rheological elastomers (MRE). It is well known that both MRF and MRE are actively studied and applied to many practical systems such as vehicle dampers. The mandatory requirements for successful applications of MRF and MRE include several factors: advanced material properties, optimal mechanisms, suitable modeling, and appropriate control schemes. Among these requirements, the use of an appropriate control scheme is a crucial factor since it is the final action stage of the application systems to achieve the desired output responses. There are numerous different control strategies which have been applied to many different application systems of MRF and MRE, summarized in this review. In the literature review, advantages and disadvantages of each control scheme are discussed so that potential researchers can develop more effective strategies to achieve higher control performance of many application systems utilizing magneto-rheological materials.

  1. MIMO transmit scheme based on morphological perceptron with competitive learning.

    PubMed

    Valente, Raul Ambrozio; Abrão, Taufik

    2016-08-01

    This paper proposes a new multi-input multi-output (MIMO) transmit scheme aided by artificial neural network (ANN). The morphological perceptron with competitive learning (MP/CL) concept is deployed as a decision rule in the MIMO detection stage. The proposed MIMO transmission scheme is able to achieve double spectral efficiency; hence, in each time-slot the receiver decodes two symbols at a time instead one as Alamouti scheme. Other advantage of the proposed transmit scheme with MP/CL-aided detector is its polynomial complexity according to modulation order, while it becomes linear when the data stream length is greater than modulation order. The performance of the proposed scheme is compared to the traditional MIMO schemes, namely Alamouti scheme and maximum-likelihood MIMO (ML-MIMO) detector. Also, the proposed scheme is evaluated in a scenario with variable channel information along the frame. Numerical results have shown that the diversity gain under space-time coding Alamouti scheme is partially lost, which slightly reduces the bit-error rate (BER) performance of the proposed MP/CL-NN MIMO scheme. PMID:27135805

  2. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    PubMed

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  3. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    PubMed

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards. PMID:23967037

  4. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    PubMed

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  5. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    PubMed

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%. PMID:27091755

  6. Security analysis and improvements of arbitrated quantum signature schemes

    NASA Astrophysics Data System (ADS)

    Zou, Xiangfu; Qiu, Daowen

    2010-10-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  7. Intelligent Power Swing Detection Scheme to Prevent False Relay Tripping Using S-Transform

    NASA Astrophysics Data System (ADS)

    Mohamad, Nor Z.; Abidin, Ahmad F.; Musirin, Ismail

    2014-06-01

    Distance relay design is equipped with out-of-step tripping scheme to ensure correct distance relay operation during power swing. The out-of-step condition is a consequence result from unstable power swing. It requires proper detection of power swing to initiate a tripping signal followed by separation of unstable part from the entire power system. The distinguishing process of unstable swing from stable swing poses a challenging task. This paper presents an intelligent approach to detect power swing based on S-Transform signal processing tool. The proposed scheme is based on the use of S-Transform feature of active power at the distance relay measurement point. It is demonstrated that the proposed scheme is able to detect and discriminate the unstable swing from stable swing occurring in the system. To ascertain validity of the proposed scheme, simulations were carried out with the IEEE 39 bus system and its performance has been compared with the wavelet transform-based power swing detection scheme.

  8. Efficacy of clinically relevant temozolomide dosing schemes in glioblastoma cancer stem cell lines.

    PubMed

    Beier, Dagmar; Schriefer, Beate; Brawanski, Konstantin; Hau, Peter; Weis, Joachim; Schulz, Jörg B; Beier, Christoph P

    2012-08-01

    The effectiveness of temozolomide (TMZ) dosing schemes and the "rechallenge" of recurrent glioblastoma (GBM) with TMZ are controversial. We therefore compared the efficacy of different TMZ dosing schemes against GBM cancer stem cell (CSC) lines in vitro. In O(6)-methyl-guanidine-methyl-transferase (MGMT)-negative CSC lines, all schedules (1 day on/27 days off, 5 days on/23 days off, 7 days on/7 days off, 21 days on/7 days off, continuous low-dose TMZ) depleted clonogenic cells. In TMZ-resistant CSC lines, the 7 days on/7 days off scheme showed higher toxicity as compared with the other schemes. However, clinically feasible concentrations remained ineffective in highly resistant CSC lines. In addition, none of the schedules induced long-term depletion of clonogenic cells even at the highest concentrations (up to 250 μM). After sublethal TMZ treatment for 5 days, TMZ rechallenge of recovering CSC lines remained effective. Our data advocate CSC lines as in vitro model to address clinical questions. Using this model, our data suggest the effectiveness of TMZ in MGMT-negative CSC lines and support the concept of TMZ rechallenge. The 7 days on/7 days off scheme consistently showed the best activity of all schedules in TMZ-resistant CSC lines.

  9. Activities.

    ERIC Educational Resources Information Center

    Kincaid, Charlene; And Others

    1993-01-01

    Presents an activity in which students collect and organize data from a real-world simulation of the scientific concept of half life. Students collect data using a marble sifter, analyze the data using a graphing calculator, and determine an appropriate mathematical model. Includes reproducible worksheets. (MDH)

  10. Activities.

    ERIC Educational Resources Information Center

    Mathematics Teacher, 1982

    1982-01-01

    The material presented is designed to help students explore geometric patterns involving Fibonnaci numbers and the golden ratio, and to aid in review of basic geometry skills. Worksheet masters intended for duplication are provided. Suggestions are made of possible classroom extensions to the initial activities. (MP)

  11. Variationally consistent discretization schemes and numerical algorithms for contact problems

    NASA Astrophysics Data System (ADS)

    Wohlmuth, Barbara

    We consider variationally consistent discretization schemes for mechanical contact problems. Most of the results can also be applied to other variational inequalities, such as those for phase transition problems in porous media, for plasticity or for option pricing applications from finance. The starting point is to weakly incorporate the constraint into the setting and to reformulate the inequality in the displacement in terms of a saddle-point problem. Here, the Lagrange multiplier represents the surface forces, and the constraints are restricted to the boundary of the simulation domain. Having a uniform inf-sup bound, one can then establish optimal low-order a priori convergence rates for the discretization error in the primal and dual variables. In addition to the abstract framework of linear saddle-point theory, complementarity terms have to be taken into account. The resulting inequality system is solved by rewriting it equivalently by means of the non-linear complementarity function as a system of equations. Although it is not differentiable in the classical sense, semi-smooth Newton methods, yielding super-linear convergence rates, can be applied and easily implemented in terms of a primal-dual active set strategy. Quite often the solution of contact problems has a low regularity, and the efficiency of the approach can be improved by using adaptive refinement techniques. Different standard types, such as residual- and equilibrated-based a posteriori error estimators, can be designed based on the interpretation of the dual variable as Neumann boundary condition. For the fully dynamic setting it is of interest to apply energy-preserving time-integration schemes. However, the differential algebraic character of the system can result in high oscillations if standard methods are applied. A possible remedy is to modify the fully discretized system by a local redistribution of the mass. Numerical results in two and three dimensions illustrate the wide range of

  12. A novel quantum group signature scheme without using entangled states

    NASA Astrophysics Data System (ADS)

    Xu, Guang-Bao; Zhang, Ke-Jia

    2015-07-01

    In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

  13. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  14. An improved authentication scheme for telecare medicine information systems.

    PubMed

    Wei, Jianghong; Hu, Xuexian; Liu, Wenfen

    2012-12-01

    The telecare medicine information system enables or supports health-care delivery services. In order to safeguard patients' privacy, such as telephone number, medical record number, health information, etc., a secure authentication scheme will thus be in demand. Recently, Wu et al. proposed a smart card based password authentication scheme for the telecare medicine information system. Later, He et al. pointed out that Wu et al.'s scheme could not resist impersonation attacks and insider attacks, and then presented a new scheme. In this paper, we show that both of them fail to achieve two-factor authentication as smart card based password authentication schemes should achieve. We also propose an improved authentication scheme for the telecare medicine information system, and demonstrate that the improved one satisfies the security requirements of two-factor authentication and is also efficient. PMID:22374237

  15. An arbitrated quantum signature scheme with fast signing and verifying

    NASA Astrophysics Data System (ADS)

    Liu, Feng; Qin, Su-Juan; Su, Qi

    2013-11-01

    Existing arbitrated quantum signature (AQS) schemes are almost all based on the Leung quantum one-time pad (L-QOTP) algorithm. In these schemes, the receiver can achieve an existential forgery of the sender's signatures under the known message attack, and the sender can successfully disavow any of her/his signatures by a simple attack. In this paper, a solution of solving the problems is given, through designing a new QOTP algorithm relying largely on inserting decoy states into fixed insertion positions. Furthermore, we present an AQS scheme with fast signing and verifying, which is based on the new QOTP algorithm. It is just using single particle states and is unconditional secure. To fulfill the functions of AQS schemes, our scheme needs a significantly lower computational costs than that required by other AQS schemes based on the L-QOTP algorithm.

  16. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card. PMID:23321972

  17. Attitude determination using an adaptive multiple model filtering Scheme

    NASA Astrophysics Data System (ADS)

    Lam, Quang; Ray, Surendra N.

    1995-05-01

    Attitude determination has been considered as a permanent topic of active research and perhaps remaining as a forever-lasting interest for spacecraft system designers. Its role is to provide a reference for controls such as pointing the directional antennas or solar panels, stabilizing the spacecraft or maneuvering the spacecraft to a new orbit. Least Square Estimation (LSE) technique was utilized to provide attitude determination for the Nimbus 6 and G. Despite its poor performance (estimation accuracy consideration), LSE was considered as an effective and practical approach to meet the urgent need and requirement back in the 70's. One reason for this poor performance associated with the LSE scheme is the lack of dynamic filtering or 'compensation'. In other words, the scheme is based totally on the measurements and no attempts were made to model the dynamic equations of motion of the spacecraft. We propose an adaptive filtering approach which employs a bank of Kalman filters to perform robust attitude estimation. The proposed approach, whose architecture is depicted, is essentially based on the latest proof on the interactive multiple model design framework to handle the unknown of the system noise characteristics or statistics. The concept fundamentally employs a bank of Kalman filter or submodel, instead of using fixed values for the system noise statistics for each submodel (per operating condition) as the traditional multiple model approach does, we use an on-line dynamic system noise identifier to 'identify' the system noise level (statistics) and update the filter noise statistics using 'live' information from the sensor model. The advanced noise identifier, whose architecture is also shown, is implemented using an advanced system identifier. To insure the robust performance for the proposed advanced system identifier, it is also further reinforced by a learning system which is implemented (in the outer loop) using neural networks to identify other unknown

  18. A comparison of SPH schemes for the compressible Euler equations

    NASA Astrophysics Data System (ADS)

    Puri, Kunal; Ramachandran, Prabhu

    2014-01-01

    We review the current state-of-the-art Smoothed Particle Hydrodynamics (SPH) schemes for the compressible Euler equations. We identify three prototypical schemes and apply them to a suite of test problems in one and two dimensions. The schemes are in order, standard SPH with an adaptive density kernel estimation (ADKE) technique introduced Sigalotti et al. (2008) [44], the variational SPH formulation of Price (2012) [33] (referred herein as the MPM scheme) and the Godunov type SPH (GSPH) scheme of Inutsuka (2002) [12]. The tests investigate the accuracy of the inviscid discretizations, shock capturing ability and the particle settling behavior. The schemes are found to produce nearly identical results for the 1D shock tube problems with the MPM and GSPH schemes being the most robust. The ADKE scheme requires parameter values which must be tuned to the problem at hand. We propose an addition of an artificial heating term to the GSPH scheme to eliminate unphysical spikes in the thermal energy at the contact discontinuity. The resulting modification is simple and can be readily incorporated in existing codes. In two dimensions, the differences between the schemes is more evident with the quality of results determined by the particle distribution. In particular, the ADKE scheme shows signs of particle clumping and irregular motion for the 2D strong shock and Sedov point explosion tests. The noise in particle data is linked with the particle distribution which remains regular for the Hamiltonian formulations (MPM and GSPH) and becomes irregular for the ADKE scheme. In the interest of reproducibility, we make available our implementation of the algorithms and test problems discussed in this work.

  19. A mirror based scheme of a laser projection microscope

    NASA Astrophysics Data System (ADS)

    Gubarev, F. A.; Li, Lin; Klenovskii, M. S.

    2016-04-01

    The paper discusses the design of a laser projection microscope with a mirror-based scheme of image formation. It is shown that the laser projection microscope with the mirror-based scheme of image formation is well suited for distant objects monitoring. This scheme allowed obtaining a field of view of more than 3 cm at the distance of 4 m from the brightness amplifier

  20. Numerical schemes for a model for nonlinear dispersive waves

    NASA Technical Reports Server (NTRS)

    Bona, J. L.; Pritchard, W. G.; Scott, L. R.

    1985-01-01

    A description is given of a number of numerical schemes to solve an evolution equation (Korteweg-deVries) that arises when modelling the propagation of water waves in a channel. The discussion also includes the results of numerical experiments made with each of the schemes. It is suggested, on the basis of these experiments, that one of the schemes may have (discrete) solitary-wave solutions.

  1. Multilevel programmable logic array schemes for microprogrammed automata

    SciTech Connect

    Barkalov, A.A.

    1995-03-01

    Programmable logic arrays (PLAs) provide an efficient tool for implementation of logic schemes of microprogrammed automata (MPA). The number of PLAs in the MPA logic scheme can be minimized by increasing the number of levels. In this paper, we analyze the structures of multilevel schemes of Mealy automata, propose a number of new structures, consider the corresponding correctness conditions, and examine some problems that must be solved in order to satisfy these conditions.

  2. Scheme for atomic-state teleportation between two bad cavities

    SciTech Connect

    Zheng Shibiao; Guo Guangcan

    2006-03-15

    A scheme is presented for the long-distance teleportation of an unknown atomic state between two separated cavities. Our scheme works in the regime where the atom-cavity coupling strength is smaller than the cavity decay rate. Thus the requirement on the quality factor of the cavities is greatly relaxed. Furthermore, the fidelity of our scheme is not affected by the detection inefficiency and atomic decay. These advantages are important in view of experiments.

  3. Effects of sparse sampling schemes on image quality in low-dose CT

    SciTech Connect

    Abbas, Sajid; Lee, Taewon; Cho, Seungryong; Shin, Sukyoung; Lee, Rena

    2013-11-15

    Purpose: Various scanning methods and image reconstruction algorithms are actively investigated for low-dose computed tomography (CT) that can potentially reduce a health-risk related to radiation dose. Particularly, compressive-sensing (CS) based algorithms have been successfully developed for reconstructing images from sparsely sampled data. Although these algorithms have shown promises in low-dose CT, it has not been studied how sparse sampling schemes affect image quality in CS-based image reconstruction. In this work, the authors present several sparse-sampling schemes for low-dose CT, quantitatively analyze their data property, and compare effects of the sampling schemes on the image quality.Methods: Data properties of several sampling schemes are analyzed with respect to the CS-based image reconstruction using two measures: sampling density and data incoherence. The authors present five different sparse sampling schemes, and simulated those schemes to achieve a targeted dose reduction. Dose reduction factors of about 75% and 87.5%, compared to a conventional scan, were tested. A fully sampled circular cone-beam CT data set was used as a reference, and sparse sampling has been realized numerically based on the CBCT data.Results: It is found that both sampling density and data incoherence affect the image quality in the CS-based reconstruction. Among the sampling schemes the authors investigated, the sparse-view, many-view undersampling (MVUS)-fine, and MVUS-moving cases have shown promising results. These sampling schemes produced images with similar image quality compared to the reference image and their structure similarity index values were higher than 0.92 in the mouse head scan with 75% dose reduction.Conclusions: The authors found that in CS-based image reconstructions both sampling density and data incoherence affect the image quality, and suggest that a sampling scheme should be devised and optimized by use of these indicators. With this strategic

  4. JOURNAL SCOPE GUIDELINES: Paper classification scheme

    NASA Astrophysics Data System (ADS)

    2005-06-01

    This scheme is used to clarify the journal's scope and enable authors and readers to more easily locate the appropriate section for their work. For each of the sections listed in the scope statement we suggest some more detailed subject areas which help define that subject area. These lists are by no means exhaustive and are intended only as a guide to the type of papers we envisage appearing in each section. We acknowledge that no classification scheme can be perfect and that there are some papers which might be placed in more than one section. We are happy to provide further advice on paper classification to authors upon request (please email jphysa@iop.org). 1. Statistical physics numerical and computational methods statistical mechanics, phase transitions and critical phenomena quantum condensed matter theory Bose-Einstein condensation strongly correlated electron systems exactly solvable models in statistical mechanics lattice models, random walks and combinatorics field-theoretical models in statistical mechanics disordered systems, spin glasses and neural networks nonequilibrium systems network theory 2. Chaotic and complex systems nonlinear dynamics and classical chaos fractals and multifractals quantum chaos classical and quantum transport cellular automata granular systems and self-organization pattern formation biophysical models 3. Mathematical physics combinatorics algebraic structures and number theory matrix theory classical and quantum groups, symmetry and representation theory Lie algebras, special functions and orthogonal polynomials ordinary and partial differential equations difference and functional equations integrable systems soliton theory functional analysis and operator theory inverse problems geometry, differential geometry and topology numerical approximation and analysis geometric integration computational methods 4. Quantum mechanics and quantum information theory coherent states eigenvalue problems supersymmetric quantum mechanics

  5. The constant displacement scheme for tracking particles in heterogeneous aquifers

    SciTech Connect

    Wen, X.H.; Gomez-Hernandez, J.J.

    1996-01-01

    Simulation of mass transport by particle tracking or random walk in highly heterogeneous media may be inefficient from a computational point of view if the traditional constant time step scheme is used. A new scheme which adjusts automatically the time step for each particle according to the local pore velocity, so that each particle always travels a constant distance, is shown to be computationally faster for the same degree of accuracy than the constant time step method. Using the constant displacement scheme, transport calculations in a 2-D aquifer model, with nature log-transmissivity variance of 4, can be 8.6 times faster than using the constant time step scheme.

  6. A cancellable and fuzzy fingerprint scheme for mobile computing security

    NASA Astrophysics Data System (ADS)

    Yang, Wencheng; Xi, Kai; Li, Cai

    2012-09-01

    Fingerprint recognition provides an effective user authentication solution for mobile computing systems. However, as a fingerprint template protection scheme, fingerprint fuzzy vault is subject to cross-matching attacks, since the same finger might be registered for various applications. In this paper, we propose a fingerprint-based biometric security scheme named the cancellable and fuzzy fingerprint scheme, which combines a cancellable non-linear transformation with the client/server version of fuzzy vault, to address the cross-matching attack in a mobile computing system. Experimental results demonstrate that our scheme can provide reliable and secure protection to the mobile computing system while achieving an acceptable matching performance.

  7. Error function attack of chaos synchronization based encryption schemes.

    PubMed

    Wang, Xingang; Zhan, Meng; Lai, C-H; Gang, Hu

    2004-03-01

    Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the error function attack is presented systematically and used to evaluate system security. We define a quantitative measure (quality factor) of the effective applicability of a chaos encryption scheme, which takes into account the security, the encryption speed, and the robustness against channel noise. A comparison is made of several encryption schemes and it is found that a scheme based on one-way coupled chaotic map lattices performs outstandingly well, as judged from quality factor.

  8. Novel adsorption distillation hybrid scheme for propane/propylene separation

    SciTech Connect

    Kumar, R.; Golden, T.C.; White, T.R.; Rokicki, A. )

    1992-12-01

    A novel adsorption-distillation hybrid scheme is proposed for propane/propylene separation. The suggested scheme has potential for saving up to [approximately]50% energy and [approximately]15-30% in capital costs as compared with current technology. The key concept of the proposed scheme is to separate olefins from alkanes by adsorption and then separate individual olefins and alkanes by simple distillation, thereby eliminating energy intensive and expensive olefin-alkane distillation. A conceptual flow schematic for the proposed hybrid scheme and potential savings are outlined.s

  9. Studies of Inviscid Flux Schemes for Acoustics and Turbulence Problems

    NASA Technical Reports Server (NTRS)

    Morris, Chris

    2013-01-01

    Five different central difference schemes, based on a conservative differencing form of the Kennedy and Gruber skew-symmetric scheme, were compared with six different upwind schemes based on primitive variable reconstruction and the Roe flux. These eleven schemes were tested on a one-dimensional acoustic standing wave problem, the Taylor-Green vortex problem and a turbulent channel flow problem. The central schemes were generally very accurate and stable, provided the grid stretching rate was kept below 10%. As near-DNS grid resolutions, the results were comparable to reference DNS calculations. At coarser grid resolutions, the need for an LES SGS model became apparent. There was a noticeable improvement moving from CD-2 to CD-4, and higher-order schemes appear to yield clear benefits on coarser grids. The UB-7 and CU-5 upwind schemes also performed very well at near-DNS grid resolutions. The UB-5 upwind scheme does not do as well, but does appear to be suitable for well-resolved DNS. The UF-2 and UB-3 upwind schemes, which have significant dissipation over a wide spectral range, appear to be poorly suited for DNS or LES.

  10. Optimal coding schemes for conflict-free channel access

    NASA Astrophysics Data System (ADS)

    Browning, Douglas W.; Thomas, John B.

    1989-10-01

    A method is proposed for conflict-free access of a broadcast channel. The method uses a variable-length coding scheme to determine which user gains access to the channel. For an idle channel, an equation for optimal expected overhead is derived and a coding scheme that produces optimal codes is presented. Algorithms for generating optimal codes for access on a busy channel are discussed. Suboptimal schemes are found that perform in a nearly optimal fashion. The method is shown to be superior in performance to previously developed conflict-free channel access schemes.

  11. A Electronic Voting Scheme Achieved by Using Quantum Proxy Signature

    NASA Astrophysics Data System (ADS)

    Cao, Hai-Jing; Ding, Li-Yuan; Yu, Yao-Feng; Li, Peng-Fei

    2016-09-01

    In this paper, we propose a new electronic voting scheme using Bell entangled states as quantum channels. This scheme is based on quantum proxy signature. The voter Alice, vote management center Bob, teller Charlie and scrutineer Diana only perform single particle measurement to realize the electronic voting process. So the scheme reduces the technical difficulty and increases operation efficiency. It can be easily realized. We use quantum key distribution and one-time pad to guarantee its unconditional security. The scheme uses the physical characteristics of quantum mechanics to guarantee its anonymity, verifiability, unforgetability and undeniability.

  12. A composite scheme for gas dynamics in Lagrangian coordinates

    SciTech Connect

    Shashkov, M.; Wendroff, B.

    1999-04-10

    One cycle of a composite finite difference scheme is defined as several time steps of an oscillatory scheme such as Lax-Wendroff followed by one step of a diffusive scheme such as Lax-Friedrichs. The authors apply this idea to gas dynamics in Lagrangian coordinates. They show numerical results in two dimensions for Noh`s infinite strength shock problem and the Sedov blast wave problem, and for several one-dimensional problems including a Riemann problem with a contact discontinuity. For Noh`s problem the composite scheme produces a better result than that obtained with a more conventional Lagrangian code.

  13. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    NASA Astrophysics Data System (ADS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-02-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme.

  14. Electronic entanglement purification scheme enhanced by charge detections

    SciTech Connect

    Feng Xunli; Kwek, L. C.; Oh, C.H.

    2005-06-15

    We present an entanglement purification scheme for the mixed entangled states of electrons with the aid of charge detections. Our scheme adopts the electronic polarizing beam splitters rather than the controlled-NOT (CNOT) operations, but the total successful probability of our scheme can reach the quantity as large as that of the the CNOT-operation-based protocol and twice as large as that of linear-optics-based protocol for the purification of photonic entangled states. Thus our scheme can achieve a high successful probability without the usage of CNOT operations.

  15. An Efficient Variable-Length Data-Compression Scheme

    NASA Technical Reports Server (NTRS)

    Cheung, Kar-Ming; Kiely, Aaron B.

    1996-01-01

    Adaptive variable-length coding scheme for compression of stream of independent and identically distributed source data involves either Huffman code or alternating run-length Huffman (ARH) code, depending on characteristics of data. Enables efficient compression of output of lossless or lossy precompression process, with speed and simplicity greater than those of older coding schemes developed for same purpose. In addition, scheme suitable for parallel implementation on hardware with modular structure, provides for rapid adaptation to changing data source, compatible with block orientation to alleviate memory requirements, ensures efficiency over wide range of entropy, and easily combined with such other communication schemes as those for containment of errors and for packetization.

  16. On a fourth order accurate implicit finite difference scheme for hyperbolic conservation laws. II - Five-point schemes

    NASA Technical Reports Server (NTRS)

    Harten, A.; Tal-Ezer, H.

    1981-01-01

    This paper presents a family of two-level five-point implicit schemes for the solution of one-dimensional systems of hyperbolic conservation laws, which generalized the Crank-Nicholson scheme to fourth order accuracy (4-4) in both time and space. These 4-4 schemes are nondissipative and unconditionally stable. Special attention is given to the system of linear equations associated with these 4-4 implicit schemes. The regularity of this system is analyzed and efficiency of solution-algorithms is examined. A two-datum representation of these 4-4 implicit schemes brings about a compactification of the stencil to three mesh points at each time-level. This compact two-datum representation is particularly useful in deriving boundary treatments. Numerical results are presented to illustrate some properties of the proposed scheme.

  17. MultiScheme: a parallel-processing system based on MIT (Massachusetts Institute of Technology) scheme. Doctoral thesis

    SciTech Connect

    Miller, J.S.

    1987-09-01

    MultiScheme is a fully operational parallel-programming system based upon the Scheme dialect of Lisp. Like its Lisp ancestors, MultiScheme provides a conducive environment for prototyping and testing new linguistic structures and programming methodologies. MultiScheme supports a diverse community of users who have a wide range of interests in parallel programming. MultiScheme's flexible support for system-based experiments in parallel processing has enabled it to serve as a development vehicle for university and industrial research. At the same time, MultiScheme is sufficiently robust, and supports a sufficiently wide range of parallel-processing applications, that it has become the base for a commercial product, the Butterfly Lisp System produced by BBN Advanced Computers, Inc.

  18. Concentric scheme of monkey auditory cortex

    NASA Astrophysics Data System (ADS)

    Kosaki, Hiroko; Saunders, Richard C.; Mishkin, Mortimer

    2003-04-01

    The cytoarchitecture of the rhesus monkey's auditory cortex was examined using immunocytochemical staining with parvalbumin, calbindin-D28K, and SMI32, as well as staining for cytochrome oxidase (CO). The results suggest that Kaas and Hackett's scheme of the auditory cortices can be extended to include five concentric rings surrounding an inner core. The inner core, containing areas A1 and R, is the most densely stained with parvalbumin and CO and can be separated on the basis of laminar patterns of SMI32 staining into lateral and medial subdivisions. From the inner core to the fifth (outermost) ring, parvalbumin staining gradually decreases and calbindin staining gradually increases. The first ring corresponds to Kaas and Hackett's auditory belt, and the second, to their parabelt. SMI32 staining revealed a clear border between these two. Rings 2 through 5 extend laterally into the dorsal bank of the superior temporal sulcus. The results also suggest that the rostral tip of the outermost ring adjoins the rostroventral part of the insula (area Pro) and the temporal pole, while the caudal tip adjoins the ventral part of area 7a.

  19. Scheme for accelerating quantum tunneling dynamics

    NASA Astrophysics Data System (ADS)

    Khujakulov, Anvar; Nakamura, Katsuhiro

    2016-02-01

    We propose a scheme of the exact fast forwarding of standard quantum dynamics for a charged particle. The present idea allows the acceleration of both the amplitude and the phase of the wave function throughout the fast-forward time range and is distinct from that of Masuda and Nakamura [Proc. R. Soc. A 466, 1135 (2010), 10.1098/rspa.2009.0446], which enabled acceleration of only the amplitude of the wave function on the way. We apply the proposed method to the quantum tunneling phenomena and obtain the electromagnetic field to ensure the rapid penetration of wave functions through a tunneling barrier. Typical examples described here are (1) an exponential wave packet passing through the δ -function barrier and (2) the opened Moshinsky shutter with a δ -function barrier just behind the shutter. We elucidate the tunneling current in the vicinity of the barrier and find a remarkable enhancement of the tunneling rate (tunneling power) due to the fast forwarding. In the case of a very high barrier, in particular, we present the asymptotic analysis and exhibit a suitable driving force to recover a recognizable tunneling current. The analysis is also carried out on the exact acceleration of macroscopic quantum tunneling with use of the nonlinear Schrödinger equation, which accommodates a tunneling barrier.

  20. Date attachable offline electronic cash scheme.

    PubMed

    Fan, Chun-I; Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  1. Environmental endocrine disruptors: A proposed classification scheme

    SciTech Connect

    Fur, P.L. de; Roberts, J.

    1995-12-31

    A number of chemicals known to act on animal systems through the endocrine system have been termed environmental endocrine disruptors. This group includes some of the PCBs and TCDDs, as well as lead, mercury and a large number of pesticides. The common feature is that the chemicals interact with endogenous endocrine systems at the cellular and/or molecular level to alter normal processes that are controlled or regulated by hormones. Although the existence of artificial or environmental estrogens (e.g. chlordecone and DES) has been known for some time, recent data indicate that this phenomenon is widespread. Indeed, anti-androgens have been held responsible for reproductive dysfunction in alligator populations in Florida. But the significance of endocrine disruption was recognized by pesticide manufacturers when insect growth regulators were developed to interfere with hormonal control of growth. Controlling, regulating or managing these chemicals depends in no small part on the ability to identify, screen or otherwise know that a chemical is an endocrine disrupter. Two possible classifications schemes are: using the effects caused in an animal, or animals as an exposure indicator; and using a known screen for the point of contact with the animal. The former would require extensive knowledge of cause and effect relationships in dozens of animal groups; the latter would require a screening tool comparable to an estrogen binding assay. The authors present a possible classification based on chemicals known to disrupt estrogenic, androgenic and ecdysone regulated hormonal systems.

  2. Date attachable offline electronic cash scheme.

    PubMed

    Fan, Chun-I; Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling. PMID:24982931

  3. Date Attachable Offline Electronic Cash Scheme

    PubMed Central

    Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling. PMID:24982931

  4. Multi-rate time stepping schemes for hydro-geomechanical model for subsurface methane hydrate reservoirs

    NASA Astrophysics Data System (ADS)

    Gupta, Shubhangi; Wohlmuth, Barbara; Helmig, Rainer

    2016-05-01

    We present an extrapolation-based semi-implicit multi-rate time stepping (MRT) scheme and a compound-fast MRT scheme for a naturally partitioned, multi-time-scale hydro-geomechanical hydrate reservoir model. We evaluate the performance of the two MRT methods compared to an iteratively coupled solution scheme and discuss their advantages and disadvantages. The performance of the two MRT methods is evaluated in terms of speed-up and accuracy by comparison to an iteratively coupled solution scheme. We observe that the extrapolation-based semi-implicit method gives a higher speed-up but is strongly dependent on the relative time scales of the latent (slow) and active (fast) components. On the other hand, the compound-fast method is more robust and less sensitive to the relative time scales, but gives lower speed up as compared to the semi-implicit method, especially when the relative time scales of the active and latent components are comparable.

  5. A Self-Adaptive Behavior-Aware Recruitment Scheme for Participatory Sensing.

    PubMed

    Zeng, Yuanyuan; Li, Deshi

    2015-01-01

    Participatory sensing services utilizing the abundant social participants with sensor-enabled handheld smart device resources are gaining high interest nowadays. One of the challenges faced is the recruitment of participants by fully utilizing their daily activity behavior with self-adaptiveness toward the realistic application scenarios. In the paper, we propose a self-adaptive behavior-aware recruitment scheme for participatory sensing. People are assumed to join the sensing tasks along with their daily activity without pre-defined ground truth or any instructions. The scheme is proposed to model the tempo-spatial behavior and data quality rating to select participants for participatory sensing campaign. Based on this, the recruitment is formulated as a linear programming problem by considering tempo-spatial coverage, data quality, and budget. The scheme enables one to check and adjust the recruitment strategy adaptively according to application scenarios. The evaluations show that our scheme provides efficient sensing performance as stability, low-cost, tempo-spatial correlation and self-adaptiveness. PMID:26389910

  6. A Self-Adaptive Behavior-Aware Recruitment Scheme for Participatory Sensing

    PubMed Central

    Zeng, Yuanyuan; Li, Deshi

    2015-01-01

    Participatory sensing services utilizing the abundant social participants with sensor-enabled handheld smart device resources are gaining high interest nowadays. One of the challenges faced is the recruitment of participants by fully utilizing their daily activity behavior with self-adaptiveness toward the realistic application scenarios. In the paper, we propose a self-adaptive behavior-aware recruitment scheme for participatory sensing. People are assumed to join the sensing tasks along with their daily activity without pre-defined ground truth or any instructions. The scheme is proposed to model the tempo-spatial behavior and data quality rating to select participants for participatory sensing campaign. Based on this, the recruitment is formulated as a linear programming problem by considering tempo-spatial coverage, data quality, and budget. The scheme enables one to check and adjust the recruitment strategy adaptively according to application scenarios. The evaluations show that our scheme provides efficient sensing performance as stability, low-cost, tempo-spatial correlation and self-adaptiveness. PMID:26389910

  7. Splitting based finite volume schemes for ideal MHD equations

    NASA Astrophysics Data System (ADS)

    Fuchs, F. G.; Mishra, S.; Risebro, N. H.

    2009-02-01

    We design finite volume schemes for the equations of ideal magnetohydrodynamics (MHD) and based on splitting these equations into a fluid part and a magnetic induction part. The fluid part leads to an extended Euler system with magnetic forces as source terms. This set of equations are approximated by suitable two- and three-wave HLL solvers. The magnetic part is modeled by the magnetic induction equations which are approximated using stable upwind schemes devised in a recent paper [F. Fuchs, K.H. Karlsen, S. Mishra, N.H. Risebro, Stable upwind schemes for the Magnetic Induction equation. Math. Model. Num. Anal., Available on conservation laws preprint server, submitted for publication, URL: ]. These two sets of schemes can be combined either component by component, or by using an operator splitting procedure to obtain a finite volume scheme for the MHD equations. The resulting schemes are simple to design and implement. These schemes are compared with existing HLL type and Roe type schemes for MHD equations in a series of numerical experiments. These tests reveal that the proposed schemes are robust and have a greater numerical resolution than HLL type solvers, particularly in several space dimensions. In fact, the numerical resolution is comparable to that of the Roe scheme on most test problems with the computational cost being at the level of a HLL type solver. Furthermore, the schemes are remarkably stable even at very fine mesh resolutions and handle the divergence constraint efficiently with low divergence errors.

  8. A Review of the Case of a Levy-Grant Scheme (LGS) in the UK Construction Industry

    ERIC Educational Resources Information Center

    Abdel-Wahab, Mohamed; Dainty, Andrew; Ison, Stephen

    2010-01-01

    A Levy-Grant Scheme (LGS) has existed in the UK construction industry since 1964 to provide financial support for companies undertaking training activities. Despite the support of the LGS for various training activities, notably apprenticeships, the construction industry continues to suffer from both labour shortages and an under-investment in…

  9. The Impact of Hospital Payment Schemes on Healthcare and Mortality: Evidence from Hospital Payment Reforms in OECD Countries.

    PubMed

    Wubulihasimu, Parida; Brouwer, Werner; van Baal, Pieter

    2016-08-01

    In this study, aggregate-level panel data from 20 Organization for Economic Cooperation and Development countries over three decades (1980-2009) were used to investigate the impact of hospital payment reforms on healthcare output and mortality. Hospital payment schemes were classified as fixed-budget (i.e. not directly based on activities), fee-for-service (FFS) or patient-based payment (PBP) schemes. The data were analysed using a difference-in-difference model that allows for a structural change in outcomes due to payment reform. The results suggest that FFS schemes increase the growth rate of healthcare output, whereas PBP schemes positively affect life expectancy at age 65 years. However, these results should be interpreted with caution, as results are sensitive to model specification. Copyright © 2015 John Wiley & Sons, Ltd. PMID:26080792

  10. An improved SPH scheme for cosmological simulations

    NASA Astrophysics Data System (ADS)

    Beck, A. M.; Murante, G.; Arth, A.; Remus, R.-S.; Teklu, A. F.; Donnert, J. M. F.; Planelles, S.; Beck, M. C.; Förster, P.; Imgrund, M.; Dolag, K.; Borgani, S.

    2016-01-01

    We present an implementation of smoothed particle hydrodynamics (SPH) with improved accuracy for simulations of galaxies and the large-scale structure. In particular, we implement and test a vast majority of SPH improvement in the developer version of GADGET-3. We use the Wendland kernel functions, a particle wake-up time-step limiting mechanism and a time-dependent scheme for artificial viscosity including high-order gradient computation and shear flow limiter. Additionally, we include a novel prescription for time-dependent artificial conduction, which corrects for gravitationally induced pressure gradients and improves the SPH performance in capturing the development of gas-dynamical instabilities. We extensively test our new implementation in a wide range of hydrodynamical standard tests including weak and strong shocks as well as shear flows, turbulent spectra, gas mixing, hydrostatic equilibria and self-gravitating gas clouds. We jointly employ all modifications; however, when necessary we study the performance of individual code modules. We approximate hydrodynamical states more accurately and with significantly less noise than standard GADGET-SPH. Furthermore, the new implementation promotes the mixing of entropy between different fluid phases, also within cosmological simulations. Finally, we study the performance of the hydrodynamical solver in the context of radiative galaxy formation and non-radiative galaxy cluster formation. We find galactic discs to be colder and more extended and galaxy clusters showing entropy cores instead of steadily declining entropy profiles. In summary, we demonstrate that our improved SPH implementation overcomes most of the undesirable limitations of standard GADGET-SPH, thus becoming the core of an efficient code for large cosmological simulations.

  11. Description scheme for video editing work

    NASA Astrophysics Data System (ADS)

    Ruiloba, Rosa I.; Joly, Philippe

    2001-03-01

    This article presents a Description Scheme (DS) to describe the audio-visual documents from the video editing work point of view. This DS is based on edition techniques used in the video edition domain. The main objective of this DS is to provide a complete, modular and extensible description of the structure of the video documents based on editing process. This VideoEditing DS is generic in the sense that it may be used in a large number of applications such as video document indexing and analysis, description of Edit Decision List and elaboration of editing patterns. It is based on accurate and complete definitions of shots and transition effects required for video document analysis applications. The VideoEditing DS allows three levels of description : analytic, synthetic and semantic. In the DS, the higher (resp. the lower) is the element of description, the more analytic (resp. synthetic) is the information. %Phil This DS allows describing the editing work made by editing boards, using more detailed descriptors of Shots and Transition DSs. These elements are provided to define editing patterns that allow several possible reconstructions of movies depending on, for example, the target audience. A part of the video description made with this DS may be automatically produced by the video to shots segmentation algorithms (analytic DSs ) or by editing software, at the same time the edition work is made. This DS gives an answer to the needs related to the exchange of editing work descriptions between editing softwares. At the same time, the same DS provide an analytic description of editing work which is complementary to existing standards for Edit Decision Lists like SMPTE or AAF.

  12. On schemes of combinatorial transcription logic

    NASA Astrophysics Data System (ADS)

    Buchler, Nicolas E.; Gerland, Ulrich; Hwa, Terence

    2003-04-01

    Cells receive a wide variety of cellular and environmental signals, which are often processed combinatorially to generate specific genetic responses. Here we explore theoretically the potentials and limitations of combinatorial signal integration at the level of cis-regulatory transcription control. Our analysis suggests that many complex transcription-control functions of the type encountered in higher eukaryotes are already implementable within the much simpler bacterial transcription system. Using a quantitative model of bacterial transcription and invoking only specific protein-DNA interaction and weak glue-like interaction between regulatory proteins, we show explicit schemes to implement regulatory logic functions of increasing complexity by appropriately selecting the strengths and arranging the relative positions of the relevant protein-binding DNA sequences in the cis-regulatory region. The architectures that emerge are naturally modular and evolvable. Our results suggest that the transcription regulatory apparatus is a "programmable" computing machine, belonging formally to the class of Boltzmann machines. Crucial to our results is the ability to regulate gene expression at a distance. In bacteria, this can be achieved for isolated genes via DNA looping controlled by the dimerization of DNA-bound proteins. However, if adopted extensively in the genome, long-distance interaction can cause unintentional intergenic cross talk, a detrimental side effect difficult to overcome by the known bacterial transcription-regulation systems. This may be a key factor limiting the genome-wide adoption of complex transcription control in bacteria. Implications of our findings for combinatorial transcription control in eukaryotes are discussed. Abbreviations: TF, transcription factor RNAP, RNA polymerase DNF, disjunctive normal form CNF, conjunctive normal form

  13. High order WENO scheme for computational cosmology

    NASA Astrophysics Data System (ADS)

    Roy, Ishani

    2010-11-01

    This doctoral dissertation is concerned with the formulation and application of a high order accurate numerical algorithm suitable in solving complex multi dimensional equations and the application of this algorithm to a problem in Astrophysics. The algorithm is designed with the aim of resolving solutions of partial differential equations with sharp fronts propagating with time. This high order accurate class of numerical technique is called a Weighted Essentially Non Oscillatory (WENO) method and is well suited for shock capturing in solving conservation laws. The numerical approximation method, in the algorithm, is coupled with high order time marching as well as integration techniques designed to reduce computational cost. This numerical algorithm is used in several applications in computational cosmology to help understand questions about certain physical phenomena which occurred during the formation and evolution of first generation stars. The thesis is divided broadly in terms of the algorithm and its application to the different galactic processes. The first chapter deals with the astrophysical problem and offers an introduction to the numerical algorithm. In chapter 2 we outline the mathematical model and the various functions and parameters associated with the model. We also give a brief description of the relevant physical phenomena and the conservation laws associated with them. In chapter 3, we give a detailed description of the higher order algorithm and its formulation. We also highlight the special techniques incorporated in the algorithm in order to make it more suitable for handling cases which are computationally intensive. In the later chapters, 4-7, we explore in detail the physical processes and the different applications of our numerical scheme. We calculate different results such as the time scale of a temperature coupling mechanism, radiation and intensity changes etc. Different tests are also performed to illustrate the stability and

  14. Generalized formulation of TVD Lax-Wendroff schemes

    NASA Technical Reports Server (NTRS)

    Roe, P. L.

    1984-01-01

    The work of Davis which imports the concept of total variation diminution (TVD) into non-upwinded, Lax-Wendroff type schemes is reformulated in a way which is easier to analyze. The analysis reveals a class of TVD schemes not observed by Davis. Only the case of one dimensional linear advection is treated.

  15. Extricating Justification Scheme Theory in Middle School Mathematical Problem Solving

    ERIC Educational Resources Information Center

    Matteson, Shirley; Capraro, Mary Margaret; Capraro, Robert M.; Lincoln, Yvonna S.

    2012-01-01

    Twenty middle grades students were interviewed to gain insights into their reasoning about problem-solving strategies using a Problem Solving Justification Scheme as our theoretical lens and the basis for our analysis. The scheme was modified from the work of Harel and Sowder (1998) making it more broadly applicable and accounting for research…

  16. Stable explicit schemes for equations of Schroedinger type

    NASA Technical Reports Server (NTRS)

    Mickens, Ronald E.

    1989-01-01

    A method for constructing explicit finite-difference schemes which can be used to solve Schroedinger-type partial-differential equations is presented. A forward Euler scheme that is conditionally stable is given by the procedure. The results presented are based on the analysis of the simplest Schroedinger type equation.

  17. 7 CFR 1410.60 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1410.60 Section 1410.60 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION RESERVE PROGRAM § 1410.60 Scheme or device....

  18. Second-order accurate difference schemes on highly irregular meshes

    SciTech Connect

    Manteuffel, T.A.; White, A.B. Jr.

    1988-01-01

    In this paper compact-as-possible second-order accurate difference schemes will be constructed for boundary-value problems of arbitrary order on highly irregular meshes. It will be shown that for equations of order (K) these schemes will have truncation error of order (3/endash/K). This phenomena is known as supraconvergence. 7 refs.

  19. A FRACTAL-BASED STOCHASTIC INTERPOLATION SCHEME IN SUBSURFACE HYDROLOGY

    EPA Science Inventory

    The need for a realistic and rational method for interpolating sparse data sets is widespread. Real porosity and hydraulic conductivity data do not vary smoothly over space, so an interpolation scheme that preserves irregularity is desirable. Such a scheme based on the properties...

  20. Accuracy study of the IDO scheme by Fourier analysis

    NASA Astrophysics Data System (ADS)

    Imai, Yohsuke; Aoki, Takayuki

    2006-09-01

    The numerical accuracy of the Interpolated Differential Operator (IDO) scheme is studied with Fourier analysis for the solutions of Partial Differential Equations (PDEs): advection, diffusion, and Poisson equations. The IDO scheme solves governing equations not only for physical variable but also for first-order spatial derivative. Spatial discretizations are based on Hermite interpolation functions with both of them. In the Fourier analysis for the IDO scheme, the Fourier coefficients of the physical variable and the first-order derivative are coupled by the equations derived from the governing equations. The analysis shows the IDO scheme resolves all the wavenumbers with higher accuracy than the fourth-order Finite Difference (FD) and Compact Difference (CD) schemes for advection equation. In particular, for high wavenumbers, the accuracy is superior to that of the sixth-order Combined Compact Difference (CCD) scheme. The diffusion and Poisson equations are also more accurately solved in comparison with the FD and CD schemes. These results show that the IDO scheme guarantees highly resolved solutions for all the terms of fluid flow equations.

  1. A Pilot CAI Scheme for the Malaysian Secondary Education System.

    ERIC Educational Resources Information Center

    Rao, A. Kanakaratnam; Rao, G. S.

    1982-01-01

    A multi-phase computer aided instruction (CAI) scheme for Malaysian Secondary Schools and Matriculation Centres attached to local universities is presented as an aid for improving instruction and for solving some problems presently faced by the Malaysian Secondary Education System. Some approaches for successful implementation of a CAI scheme are…

  2. Resolution-optimised nonlinear scheme for secondary derivatives

    NASA Astrophysics Data System (ADS)

    Li, Li; Yu, Changping; Chen, Zhe; Li, Xinliang

    2016-02-01

    A 5-point-stencil optimised nonlinear scheme with spectral-like resolution within the whole wave number range for secondary derivatives is devised. The proposed scheme can compensate for the dissipation deficiency of traditional linear schemes and suppress the spurious energy accumulation that occurs at high wave numbers, both of which are frequently encountered in large eddy simulation. The new scheme is composed of a linear fourth-order central scheme term and an artificial viscosity term. These two terms are connected by a nonlinear weight. The proposed nonlinear weight is designed based on Fourier analysis, rather than Taylor analysis, to guarantee a spectral-like resolution. Moreover, the accuracy is not affected by the optimisation, and the new scheme reaches fourth-order accuracy. The new scheme is tested numerically using the one-dimensional diffusion problem, one-dimensional steady viscous Burger's shock, two-dimensional vortex decaying, three-dimensional isotropic decaying turbulence and fully developed turbulent channel flow. All the tests confirm that the new scheme has spectral-like resolution and can improve the accuracy of the energy spectrum, dissipation rate and high-order statistics of turbulent flows.

  3. Increasing Employability: An Evaluation of the Fullemploy Training Scheme.

    ERIC Educational Resources Information Center

    Pearn, M. A.; Munene, J.

    The Fullemploy Training Scheme is an experiment designed to overcome problems encountered by disadvantaged youth in Britain's Manpower Services Commission's job training program. The aim of the scheme is to bring minority disadvantaged young people into a special office skills training course which would combine vocational training with…

  4. Distinguishing Schemes and Tasks in Children's Development of Multiplicative Reasoning

    ERIC Educational Resources Information Center

    Tzur, Ron; Johnson, Heather L.; McClintock, Evan; Kenney, Rachael H.; Xin, Yan P.; Si, Luo; Woordward, Jerry; Hord, Casey; Jin, Xianyan

    2013-01-01

    We present a synthesis of findings from constructivist teaching experiments regarding six schemes children construct for reasoning multiplicatively and tasks to promote them. We provide a task-generating platform game, depictions of each scheme, and supporting tasks. Tasks must be distinguished from children's thinking, and learning situations…

  5. Second-order accurate nonoscillatory schemes for scalar conservation laws

    NASA Technical Reports Server (NTRS)

    Huynh, Hung T.

    1989-01-01

    Explicit finite difference schemes for the computation of weak solutions of nonlinear scalar conservation laws is presented and analyzed. These schemes are uniformly second-order accurate and nonoscillatory in the sense that the number of extrema of the discrete solution is not increasing in time.

  6. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 1 2011-01-01 2011-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture Office of the Secretary of Agriculture HIGHLY ERODIBLE LAND AND WETLAND CONSERVATION General Provisions § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person...

  7. 7 CFR 1467.19 - Scheme and device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Scheme and device. 1467.19 Section 1467.19 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS WETLANDS RESERVE PROGRAM § 1467.19 Scheme...

  8. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 1 2012-01-01 2012-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture Office of the Secretary of Agriculture HIGHLY ERODIBLE LAND AND WETLAND CONSERVATION General Provisions § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person...

  9. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture Office of the Secretary of Agriculture HIGHLY ERODIBLE LAND AND WETLAND CONSERVATION General Provisions § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person...

  10. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 1 2013-01-01 2013-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture Office of the Secretary of Agriculture HIGHLY ERODIBLE LAND AND WETLAND CONSERVATION General Provisions § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person...

  11. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 1 2014-01-01 2014-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture Office of the Secretary of Agriculture HIGHLY ERODIBLE LAND AND WETLAND CONSERVATION General Provisions § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person...

  12. 7 CFR 623.21 - Scheme and device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 623.21 Section 623.21 Agriculture Regulations of the Department of Agriculture (Continued) NATURAL RESOURCES CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE WATER RESOURCES EMERGENCY WETLANDS RESERVE PROGRAM § 623.21 Scheme and device. (a) If it...

  13. 7 CFR 625.19 - Scheme and device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 625.19 Section 625.19 Agriculture Regulations of the Department of Agriculture (Continued) NATURAL RESOURCES CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE WATER RESOURCES HEALTHY FORESTS RESERVE PROGRAM § 625.19 Scheme and device. (a) If it...

  14. Performance improvement of robots using a learning control scheme

    NASA Technical Reports Server (NTRS)

    Krishna, Ramuhalli; Chiang, Pen-Tai; Yang, Jackson C. S.

    1987-01-01

    Many applications of robots require that the same task be repeated a number of times. In such applications, the errors associated with one cycle are also repeated every cycle of the operation. An off-line learning control scheme is used here to modify the command function which would result in smaller errors in the next operation. The learning scheme is based on a knowledge of the errors and error rates associated with each cycle. Necessary conditions for the iterative scheme to converge to zero errors are derived analytically considering a second order servosystem model. Computer simulations show that the errors are reduced at a faster rate if the error rate is included in the iteration scheme. The results also indicate that the scheme may increase the magnitude of errors if the rate information is not included in the iteration scheme. Modification of the command input using a phase and gain adjustment is also proposed to reduce the errors with one attempt. The scheme is then applied to a computer model of a robot system similar to PUMA 560. Improved performance of the robot is shown by considering various cases of trajectory tracing. The scheme can be successfully used to improve the performance of actual robots within the limitations of the repeatability and noise characteristics of the robot.

  15. LDPC-PPM Coding Scheme for Optical Communication

    NASA Technical Reports Server (NTRS)

    Barsoum, Maged; Moision, Bruce; Divsalar, Dariush; Fitz, Michael

    2009-01-01

    In a proposed coding-and-modulation/demodulation-and-decoding scheme for a free-space optical communication system, an error-correcting code of the low-density parity-check (LDPC) type would be concatenated with a modulation code that consists of a mapping of bits to pulse-position-modulation (PPM) symbols. Hence, the scheme is denoted LDPC-PPM. This scheme could be considered a competitor of a related prior scheme in which an outer convolutional error-correcting code is concatenated with an interleaving operation, a bit-accumulation operation, and a PPM inner code. Both the prior and present schemes can be characterized as serially concatenated pulse-position modulation (SCPPM) coding schemes. Figure 1 represents a free-space optical communication system based on either the present LDPC-PPM scheme or the prior SCPPM scheme. At the transmitting terminal, the original data (u) are processed by an encoder into blocks of bits (a), and the encoded data are mapped to PPM of an optical signal (c). For the purpose of design and analysis, the optical channel in which the PPM signal propagates is modeled as a Poisson point process. At the receiving terminal, the arriving optical signal (y) is demodulated to obtain an estimate (a^) of the coded data, which is then processed by a decoder to obtain an estimate (u^) of the original data.

  16. Comment on "Quantum Signature Scheme with Weak Arbitrator"

    NASA Astrophysics Data System (ADS)

    Kang, Min-Sung; Hong, Chang-Ho; Heo, Jino; Lim, Jong-In; Yang, Hyung-Jin

    2014-06-01

    This comment explains that the quantum signature scheme proposed by Ming-Xing Luo et al. (in Int. J. Theor. Phys. 51:2134, 2012) cannot satisfy the signature requirements. The comment presents methods of possible attacks by forgers, while also demonstrating that it is difficult to proceed by the normal protocol because of some errors in the formula of the scheme.

  17. A high-speed distortionless predictive image-compression scheme

    NASA Technical Reports Server (NTRS)

    Cheung, K.-M.; Smyth, P.; Wang, H.

    1990-01-01

    A high-speed distortionless predictive image-compression scheme that is based on differential pulse code modulation output modeling combined with efficient source-code design is introduced. Experimental results show that this scheme achieves compression that is very close to the difference entropy of the source.

  18. Review of the Assistance for Isolated Children Scheme.

    ERIC Educational Resources Information Center

    Tomlinson, D. G.; Tannock, P. D.

    A total of 3,732 recipients of Assistance for Isolated Children (AIC) allowances during 1979 and 1980 received questionnaires and parents of 313 families were interviewed to determine who benefitted from the AIC Scheme, what use was made of the AIC allowance, what effect did the AIC Scheme appear to have had, and what anomalies existed in relation…

  19. Convergence Acceleration for Multistage Time-Stepping Schemes

    NASA Technical Reports Server (NTRS)

    Swanson, R. C.; Turkel, Eli L.; Rossow, C-C; Vasta, V. N.

    2006-01-01

    The convergence of a Runge-Kutta (RK) scheme with multigrid is accelerated by preconditioning with a fully implicit operator. With the extended stability of the Runge-Kutta scheme, CFL numbers as high as 1000 could be used. The implicit preconditioner addresses the stiffness in the discrete equations associated with stretched meshes. Numerical dissipation operators (based on the Roe scheme, a matrix formulation, and the CUSP scheme) as well as the number of RK stages are considered in evaluating the RK/implicit scheme. Both the numerical and computational efficiency of the scheme with the different dissipation operators are discussed. The RK/implicit scheme is used to solve the two-dimensional (2-D) and three-dimensional (3-D) compressible, Reynolds-averaged Navier-Stokes equations. In two dimensions, turbulent flows over an airfoil at subsonic and transonic conditions are computed. The effects of mesh cell aspect ratio on convergence are investigated for Reynolds numbers between 5.7 x 10(exp 6) and 100.0 x 10(exp 6). Results are also obtained for a transonic wing flow. For both 2-D and 3-D problems, the computational time of a well-tuned standard RK scheme is reduced at least a factor of four.

  20. On the novel chaotic secure communication scheme design

    NASA Astrophysics Data System (ADS)

    Wang, B.; Zhong, S. M.; Dong, X. C.

    2016-10-01

    In this paper, the problem on the chaotic secure communication is discussed. First a new dual channel transmission mechanism is presented and used in secure communication scheme design, then the channel-switching techniques are adopted to further improve the security of information transmission. Finally some typical numerical simulations are carried out to demonstrate the effectiveness of the proposed secure communication scheme.

  1. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device....

  2. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device....

  3. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device....

  4. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device....

  5. A Learning Scheme for Information Retrieval in Hypertext.

    ERIC Educational Resources Information Center

    Savoy, Jacques

    1994-01-01

    Proposes a new learning algorithm to improve the retrieval effectiveness of the search system used in the hypertext environment using an extended Boolean model with links to improve the ranking of retrieved items. Highlights include the basic retrieval scheme, the learning scheme, and a review of basic probabilistic retrieval models. (Contains 32…

  6. New User Support in the University Network with DACS Scheme

    ERIC Educational Resources Information Center

    Odagiri, Kazuya; Yaegashi, Rihito; Tadauchi, Masaharu; Ishii, Naohiro

    2007-01-01

    Purpose: The purpose of this paper is to propose and examine the new user support in university network. Design/methodology/approach: The new user support is realized by use of DACS (Destination Addressing Control System) Scheme which manages a whole network system through communication control on a client computer. This DACS Scheme has been…

  7. Quantum secret sharing schemes and reversibility of quantum operations

    SciTech Connect

    Ogawa, Tomohiro; Sasaki, Akira; Iwamoto, Mitsugu; Yamamoto, Hirosuke

    2005-09-15

    Quantum secret sharing schemes encrypting a quantum state into a multipartite entangled state are treated. The lower bound on the dimension of each share given by Gottesman [Phys. Rev. A 61, 042311 (2000)] is revisited based on a relation between the reversibility of quantum operations and the Holevo information. We also propose a threshold ramp quantum secret sharing scheme and evaluate its coding efficiency.

  8. Ranking Schemes in Hybrid Boolean Systems: A New Approach.

    ERIC Educational Resources Information Center

    Savoy, Jacques

    1997-01-01

    Suggests a new ranking scheme especially adapted for hypertext environments in order to produce more effective retrieval results and still use Boolean search strategies. Topics include Boolean ranking schemes; single-term indexing and term weighting; fuzzy set theory extension; and citation indexing. (64 references) (Author/LRW)

  9. Receptivity of a TVD Scheme in Incompressible Flow Analysis

    NASA Astrophysics Data System (ADS)

    Shin, Byeong Rog

    A TVD upwind scheme originally designed for compressible flow is applied to the SMAC finite-difference method for incompressible flow analysis. The receptivity and validity of this application are investigated by an evaluation of the accuracy, stability and convergence rate for the SMAC method combined with the TVD scheme. Using this method, three-dimensional developing entry flows through a square-curved duct are calculated and compared with available experimental data as well as some computational results obtained by QUICKs and third-order upwind schemes. Such comparisons show that the numerical method applying the TVD scheme has the highest computational efficiency without a sharp loss of accuracy, resulting in confidence in the application this scheme to incompressible flow computations.

  10. Comparison of Several Dissipation Algorithms for Central Difference Schemes

    NASA Technical Reports Server (NTRS)

    Swanson, R. C.; Radespiel, R.; Turkel, E.

    1997-01-01

    Several algorithms for introducing artificial dissipation into a central difference approximation to the Euler and Navier Stokes equations are considered. The focus of the paper is on the convective upwind and split pressure (CUSP) scheme, which is designed to support single interior point discrete shock waves. This scheme is analyzed and compared in detail with scalar and matrix dissipation (MATD) schemes. Resolution capability is determined by solving subsonic, transonic, and hypersonic flow problems. A finite-volume discretization and a multistage time-stepping scheme with multigrid are used to compute solutions to the flow equations. Numerical results are also compared with either theoretical solutions or experimental data. For transonic airfoil flows the best accuracy on coarse meshes for aerodynamic coefficients is obtained with a simple MATD scheme.

  11. A Secure and Efficient Threshold Group Signature Scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Yansheng; Wang, Xueming; Qiu, Gege

    The paper presents a secure and efficient threshold group signature scheme aiming at two problems of current threshold group signature schemes: conspiracy attack and inefficiency. Scheme proposed in this paper takes strategy of separating designed clerk who is responsible for collecting and authenticating each individual signature from group, the designed clerk don't participate in distribution of group secret key and has his own public key and private key, designed clerk needs to sign part information of threshold group signature after collecting signatures. Thus verifier has to verify signature of the group after validating signature of the designed clerk. This scheme is proved to be secure against conspiracy attack at last and is more efficient by comparing with other schemes.

  12. The construction of high-accuracy schemes for acoustic equations

    NASA Technical Reports Server (NTRS)

    Tang, Lei; Baeder, James D.

    1995-01-01

    An accuracy analysis of various high order schemes is performed from an interpolation point of view. The analysis indicates that classical high order finite difference schemes, which use polynomial interpolation, hold high accuracy only at nodes and are therefore not suitable for time-dependent problems. Thus, some schemes improve their numerical accuracy within grid cells by the near-minimax approximation method, but their practical significance is degraded by maintaining the same stencil as classical schemes. One-step methods in space discretization, which use piecewise polynomial interpolation and involve data at only two points, can generate a uniform accuracy over the whole grid cell and avoid spurious roots. As a result, they are more accurate and efficient than multistep methods. In particular, the Cubic-Interpolated Psuedoparticle (CIP) scheme is recommended for computational acoustics.

  13. A river flow routing scheme for general circulation models

    NASA Astrophysics Data System (ADS)

    Arora, Vivek K.; Chiew, Francis H. S.; Grayson, Rodger B.

    1999-06-01

    The routing of runoff estimates from General Circulation Models (GCMs) is important to model river flow from large river basins and to estimate freshwater inflow into the oceans. Present routing approaches use arbitrary constants and empirical equations to determine travel times between the GCM grid cells. A new river flow routing scheme is developed, which uses physical catchment and river channel information and river discharge data. The scheme uses surface runoff and deep percolation data from land surface parameterization schemes, and routing is performed via linear surface and groundwater reservoirs. Geomorphological relationships between mean annual river discharge and other physical variables are used to interpolate existing information to define the channel morphology for the digital river networks at the routing model resolution. Applications of the routing scheme to the Mississippi and Amazon River Basins indicate that it performs adequately. The scheme does not require the calibration of parameters and can thus be easily used in GCMs.

  14. Factorizable Upwind Schemes: The Triangular Unstructured Grid Formulation

    NASA Technical Reports Server (NTRS)

    Sidilkover, David; Nielsen, Eric J.

    2001-01-01

    The upwind factorizable schemes for the equations of fluid were introduced recently. They facilitate achieving the Textbook Multigrid Efficiency (TME) and are expected also to result in the solvers of unparalleled robustness. The approach itself is very general. Therefore, it may well become a general framework for the large-scale, Computational Fluid Dynamics. In this paper we outline the triangular grid formulation of the factorizable schemes. The derivation is based on the fact that the factorizable schemes can be expressed entirely using vector notation. without explicitly mentioning a particular coordinate frame. We, describe the resulting discrete scheme in detail and present some computational results verifying the basic properties of the scheme/solver.

  15. On Approximate Factorization Schemes for Solving the Full Potential Equation

    NASA Technical Reports Server (NTRS)

    Holst, Terry L.

    1997-01-01

    An approximate factorization scheme based on the AF2 algorithm is presented for solving the three-dimensional full potential equation for the transonic flow about isolated wings. Two spatial discretization variations are presented, one using a hybrid first-order/second-order-accurate scheme and the second using a fully second-order-accurate scheme. The present algorithm utilizes a C-H grid topology to map the flow field about the wing. One version of the AF2 iteration scheme is used on the upper wing surface and another slightly modified version is used on the lower surface. These two algorithm variations are then connected at the wing leading edge using a local iteration technique. The resulting scheme has improved linear stability characteristics and improved time-like damping characteristics relative to previous implementations of the AF2 algorithm. The presentation is highlighted with a grid refinement study and a number of numerical results.

  16. A new antiproton beam transfer scheme without coalescing

    SciTech Connect

    Weiren Chou et al.

    2003-06-04

    An effective way to increase the luminosity in the Fermilab Tevatron collider program Run2 is to improve the overall antiproton transfer efficiency. During antiproton coalescing in the Main Injector (MI), about 10-15% particles get lost. This loss could be avoided in a new antiproton transfer scheme that removes coalescing from the process. Moreover, this scheme would also eliminate emittance dilution due to coalescing. This scheme uses a 2.5 MHz RF system to transfer antiprotons from the Accumulator to the Main Injector. It is then followed by a bunch rotation in the MI to shorten the bunch length so that it can be captured by a 53 MHz RF bucket. Calculations and ESME simulations show that this scheme works. No new hardware is needed to implement this scheme.

  17. Improved-efficiency DSMC collision-partner selection schemes.

    SciTech Connect

    Gallis, Michail A.; Torczynski, John Robert

    2010-11-01

    The effect of collision-partner selection schemes on the accuracy and the efficiency of the Direct Simulation Monte Carlo (DSMC) method of Bird is investigated. Several schemes to reduce the total discretization error as a function of the mean collision separation and the mean collision time are examined. These include the historically first sub-cell scheme, the more recent nearest-neighbor scheme, and various near-neighbor schemes, which are evaluated for their effect on the thermal conductivity for Fourier flow. Their convergence characteristics as a function of spatial and temporal discretization and the number of simulators per cell are compared to the convergence characteristics of the sophisticated and standard DSMC algorithms. Improved performance is obtained if the population from which possible collision partners are selected is an appropriate fraction of the population of the cell.

  18. Completely anonymous multi-recipient signcryption scheme with public verification.

    PubMed

    Pang, Liaojun; Li, Huixian; Gao, Lu; Wang, Yumin

    2013-01-01

    Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer's anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer's and the recipient's anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer's and the recipient's anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant. PMID:23675490

  19. Comparison of two schemes for derivation of atmospheric motion vectors

    NASA Astrophysics Data System (ADS)

    Xu, J.; Holmlund, K.; Zhang, Q.; Schmetz, J.

    2002-07-01

    This paper presents the operational scheme of the National Satellite Meteorological Center (NSMC) of the China Meteorological Administration (CMA) to derive atmospheric motion vectors. The NSMC scheme is compared with a method developed at the European Organization for the Exploitation of Meteorological Satellites (EUMETSAT) in preparation for Meteosat Second Generation. Both schemes employ similar basic principles in terms of feature tracking and height assignment, however there are also some important differences. Furthermore, the EUMETSAT scheme assigns quality indicators to each wind vector at the end of the processing chain, whereas the NMSC scheme has inbuilt quality checking at different processing steps allowing for reinstatement of winds rejected by a first quality check. The evaluation of the performance is gained from two periods: a week in January and a week in July 1999. European Centre for Medium-Range Weather Forecast analyses and radiosonde data are used as independent data for evaluation of the two schemes. It is shown that correlating infrared image data with water vapor data before height adjustment, as performed in the NSMC scheme, has a great potential to better distinguish high and low cloud and to provide high-density wind fields. The utilization of radiative transfer calculations for the estimation of the height of thin clouds in the EUMETSAT scheme is shown to be imperative for good quality wind fields. Finally, the feature of the EUMETSAT scheme to assign quality indicators improves the utility of the wind vectors for use in numerical weather prediction models. It is suggested that a combination of the different features of both schemes potentially provide highly increased spatial density in the wind field with improved quality.

  20. A class of the van Leer-type transport schemes and its application to the moisture transport in a general circulation model

    SciTech Connect

    Lin, Shian-Jiann; Chao, W.C.; Sud, Y.C.; Walker, G.K. )

    1994-07-01

    A generalized form of the second-order van Leer transport scheme is derived. Several constraints to the implied subgrid linear distribution are discussed. A very simple positive-definite scheme can be derived directly from the generalized form. A monotonic version of these scheme is applied to the Goddard Laboratory for Atmospheres (GLA) general circulation model (GCM) for the moisture transport calculations, replacing the original fourth-order center-differencing scheme. Comparisons with the original scheme are made in idealized tests as well as in a summer climate simulation using the full GLA GCM. A distinct advantage of the monotonic transport scheme is its ability to transport sharp gradients without producing spurious oscillations and unphysical negative mixing ratio. Within the context of low-resolution climate simulations, the aforementioned characteristics are demonstrated to be very beneficial in regions where cumulus convection is active. The model-produced precipitation pattern using the new transport scheme is more coherently organized both in time and in space, and correlates better with observations. The side effect of the filling algorithm used in conjunction with the original scheme is also discussed, in the context of idealized tests. The major weakness of the proposed transport scheme with a local monotonic constraint is its substantial implicit diffusion at low resolution. Alternative constraints are discussed to counter this problem. 34 refs., 13 figs., 1 tab.