Sample records for analysis mlsa scheme

  1. Complete Deletion of the Fucose Operon in Haemophilus influenzae Is Associated with a Cluster in Multilocus Sequence Analysis-Based Phylogenetic Group II Related to Haemophilus haemolyticus: Implications for Identification and Typing

    PubMed Central

    de Gier, Camilla; Kirkham, Lea-Ann S.

    2015-01-01

    Nonhemolytic variants of Haemophilus haemolyticus are difficult to differentiate from Haemophilus influenzae despite a wide difference in pathogenic potential. A previous investigation characterized a challenging set of 60 clinical strains using multiple PCRs for marker genes and described strains that could not be unequivocally identified as either species. We have analyzed the same set of strains by multilocus sequence analysis (MLSA) and near-full-length 16S rRNA gene sequencing. MLSA unambiguously allocated all study strains to either of the two species, while identification by 16S rRNA sequence was inconclusive for three strains. Notably, the two methods yielded conflicting identifications for two strains. Most of the “fuzzy species” strains were identified as H. influenzae that had undergone complete deletion of the fucose operon. Such strains, which are untypeable by the H. influenzae multilocus sequence type (MLST) scheme, have sporadically been reported and predominantly belong to a single branch of H. influenzae MLSA phylogenetic group II. We also found evidence of interspecies recombination between H. influenzae and H. haemolyticus within the 16S rRNA genes. Establishing an accurate method for rapid and inexpensive identification of H. influenzae is important for disease surveillance and treatment. PMID:26378279

  2. Diversity Analysis of Dairy and Nondairy Lactococcus lactis Isolates, Using a Novel Multilocus Sequence Analysis Scheme and (GTG)5-PCR Fingerprinting▿

    PubMed Central

    Rademaker, Jan L. W.; Herbet, Hélène; Starrenburg, Marjo J. C.; Naser, Sabri M.; Gevers, Dirk; Kelly, William J.; Hugenholtz, Jeroen; Swings, Jean; van Hylckama Vlieg, Johan E. T.

    2007-01-01

    The diversity of a collection of 102 lactococcus isolates including 91 Lactococcus lactis isolates of dairy and nondairy origin was explored using partial small subunit rRNA gene sequence analysis and limited phenotypic analyses. A subset of 89 strains of L. lactis subsp. cremoris and L. lactis subsp. lactis isolates was further analyzed by (GTG)5-PCR fingerprinting and a novel multilocus sequence analysis (MLSA) scheme. Two major genomic lineages within L. lactis were found. The L. lactis subsp. cremoris type-strain-like genotype lineage included both L. lactis subsp. cremoris and L. lactis subsp. lactis isolates. The other major lineage, with a L. lactis subsp. lactis type-strain-like genotype, comprised L. lactis subsp. lactis isolates only. A novel third genomic lineage represented two L. lactis subsp. lactis isolates of nondairy origin. The genomic lineages deviate from the subspecific classification of L. lactis that is based on a few phenotypic traits only. MLSA of six partial genes (atpA, encoding ATP synthase alpha subunit; pheS, encoding phenylalanine tRNA synthetase; rpoA, encoding RNA polymerase alpha chain; bcaT, encoding branched chain amino acid aminotransferase; pepN, encoding aminopeptidase N; and pepX, encoding X-prolyl dipeptidyl peptidase) revealed 363 polymorphic sites (total length, 1,970 bases) among 89 L. lactis subsp. cremoris and L. lactis subsp. lactis isolates with unique sequence types for most isolates. This allowed high-resolution cluster analysis in which dairy isolates form subclusters of limited diversity within the genomic lineages. The pheS DNA sequence analysis yielded two genetic groups dissimilar to the other genotyping analysis-based lineages, indicating a disparate acquisition route for this gene. PMID:17890345

  3. Diversity analysis of dairy and nondairy Lactococcus lactis isolates, using a novel multilocus sequence analysis scheme and (GTG)5-PCR fingerprinting.

    PubMed

    Rademaker, Jan L W; Herbet, Hélène; Starrenburg, Marjo J C; Naser, Sabri M; Gevers, Dirk; Kelly, William J; Hugenholtz, Jeroen; Swings, Jean; van Hylckama Vlieg, Johan E T

    2007-11-01

    The diversity of a collection of 102 lactococcus isolates including 91 Lactococcus lactis isolates of dairy and nondairy origin was explored using partial small subunit rRNA gene sequence analysis and limited phenotypic analyses. A subset of 89 strains of L. lactis subsp. cremoris and L. lactis subsp. lactis isolates was further analyzed by (GTG)(5)-PCR fingerprinting and a novel multilocus sequence analysis (MLSA) scheme. Two major genomic lineages within L. lactis were found. The L. lactis subsp. cremoris type-strain-like genotype lineage included both L. lactis subsp. cremoris and L. lactis subsp. lactis isolates. The other major lineage, with a L. lactis subsp. lactis type-strain-like genotype, comprised L. lactis subsp. lactis isolates only. A novel third genomic lineage represented two L. lactis subsp. lactis isolates of nondairy origin. The genomic lineages deviate from the subspecific classification of L. lactis that is based on a few phenotypic traits only. MLSA of six partial genes (atpA, encoding ATP synthase alpha subunit; pheS, encoding phenylalanine tRNA synthetase; rpoA, encoding RNA polymerase alpha chain; bcaT, encoding branched chain amino acid aminotransferase; pepN, encoding aminopeptidase N; and pepX, encoding X-prolyl dipeptidyl peptidase) revealed 363 polymorphic sites (total length, 1,970 bases) among 89 L. lactis subsp. cremoris and L. lactis subsp. lactis isolates with unique sequence types for most isolates. This allowed high-resolution cluster analysis in which dairy isolates form subclusters of limited diversity within the genomic lineages. The pheS DNA sequence analysis yielded two genetic groups dissimilar to the other genotyping analysis-based lineages, indicating a disparate acquisition route for this gene.

  4. Multilocus sequence analysis and rpoB sequencing of Mycobacterium abscessus (sensu lato) strains.

    PubMed

    Macheras, Edouard; Roux, Anne-Laure; Bastian, Sylvaine; Leão, Sylvia Cardoso; Palaci, Moises; Sivadon-Tardy, Valérie; Gutierrez, Cristina; Richter, Elvira; Rüsch-Gerdes, Sabine; Pfyffer, Gaby; Bodmer, Thomas; Cambau, Emmanuelle; Gaillard, Jean-Louis; Heym, Beate

    2011-02-01

    Mycobacterium abscessus, Mycobacterium bolletii, and Mycobacterium massiliense (Mycobacterium abscessus sensu lato) are closely related species that currently are identified by the sequencing of the rpoB gene. However, recent studies show that rpoB sequencing alone is insufficient to discriminate between these species, and some authors have questioned their current taxonomic classification. We studied here a large collection of M. abscessus (sensu lato) strains by partial rpoB sequencing (752 bp) and multilocus sequence analysis (MLSA). The final MLSA scheme developed was based on the partial sequences of eight housekeeping genes: argH, cya, glpK, gnd, murC, pgm, pta, and purH. The strains studied included the three type strains (M. abscessus CIP 104536(T), M. massiliense CIP 108297(T), and M. bolletii CIP 108541(T)) and 120 isolates recovered between 1997 and 2007 in France, Germany, Switzerland, and Brazil. The rpoB phylogenetic tree confirmed the existence of three main clusters, each comprising the type strain of one species. However, divergence values between the M. massiliense and M. bolletii clusters all were below 3% and between the M. abscessus and M. massiliense clusters were from 2.66 to 3.59%. The tree produced using the concatenated MLSA gene sequences (4,071 bp) also showed three main clusters, each comprising the type strain of one species. The M. abscessus cluster had a bootstrap value of 100% and was mostly compact. Bootstrap values for the M. massiliense and M. bolletii branches were much lower (71 and 61%, respectively), with the M. massiliense cluster having a fuzzy aspect. Mean (range) divergence values were 2.17% (1.13 to 2.58%) between the M. abscessus and M. massiliense clusters, 2.37% (1.5 to 2.85%) between the M. abscessus and M. bolletii clusters, and 2.28% (0.86 to 2.68%) between the M. massiliense and M. bolletii clusters. Adding the rpoB sequence to the MLSA-concatenated sequence (total sequence, 4,823 bp) had little effect on the clustering of strains. We found 10/120 (8.3%) isolates for which the concatenated MLSA gene sequence and rpoB sequence were discordant (e.g., M. massiliense MLSA sequence and M. abscessus rpoB sequence), suggesting the intergroup lateral transfers of rpoB. In conclusion, our study strongly supports the recent proposal that M. abscessus, M. massiliense, and M. bolletii should constitute a single species. Our findings also indicate that there has been a horizontal transfer of rpoB sequences between these subgroups, precluding the use of rpoB sequencing alone for the accurate identification of the two proposed M. abscessus subspecies.

  5. Multilocus Sequence Analysis and rpoB Sequencing of Mycobacterium abscessus (Sensu Lato) Strains▿

    PubMed Central

    Macheras, Edouard; Roux, Anne-Laure; Bastian, Sylvaine; Leão, Sylvia Cardoso; Palaci, Moises; Sivadon-Tardy, Valérie; Gutierrez, Cristina; Richter, Elvira; Rüsch-Gerdes, Sabine; Pfyffer, Gaby; Bodmer, Thomas; Cambau, Emmanuelle; Gaillard, Jean-Louis; Heym, Beate

    2011-01-01

    Mycobacterium abscessus, Mycobacterium bolletii, and Mycobacterium massiliense (Mycobacterium abscessus sensu lato) are closely related species that currently are identified by the sequencing of the rpoB gene. However, recent studies show that rpoB sequencing alone is insufficient to discriminate between these species, and some authors have questioned their current taxonomic classification. We studied here a large collection of M. abscessus (sensu lato) strains by partial rpoB sequencing (752 bp) and multilocus sequence analysis (MLSA). The final MLSA scheme developed was based on the partial sequences of eight housekeeping genes: argH, cya, glpK, gnd, murC, pgm, pta, and purH. The strains studied included the three type strains (M. abscessus CIP 104536T, M. massiliense CIP 108297T, and M. bolletii CIP 108541T) and 120 isolates recovered between 1997 and 2007 in France, Germany, Switzerland, and Brazil. The rpoB phylogenetic tree confirmed the existence of three main clusters, each comprising the type strain of one species. However, divergence values between the M. massiliense and M. bolletii clusters all were below 3% and between the M. abscessus and M. massiliense clusters were from 2.66 to 3.59%. The tree produced using the concatenated MLSA gene sequences (4,071 bp) also showed three main clusters, each comprising the type strain of one species. The M. abscessus cluster had a bootstrap value of 100% and was mostly compact. Bootstrap values for the M. massiliense and M. bolletii branches were much lower (71 and 61%, respectively), with the M. massiliense cluster having a fuzzy aspect. Mean (range) divergence values were 2.17% (1.13 to 2.58%) between the M. abscessus and M. massiliense clusters, 2.37% (1.5 to 2.85%) between the M. abscessus and M. bolletii clusters, and 2.28% (0.86 to 2.68%) between the M. massiliense and M. bolletii clusters. Adding the rpoB sequence to the MLSA-concatenated sequence (total sequence, 4,823 bp) had little effect on the clustering of strains. We found 10/120 (8.3%) isolates for which the concatenated MLSA gene sequence and rpoB sequence were discordant (e.g., M. massiliense MLSA sequence and M. abscessus rpoB sequence), suggesting the intergroup lateral transfers of rpoB. In conclusion, our study strongly supports the recent proposal that M. abscessus, M. massiliense, and M. bolletii should constitute a single species. Our findings also indicate that there has been a horizontal transfer of rpoB sequences between these subgroups, precluding the use of rpoB sequencing alone for the accurate identification of the two proposed M. abscessus subspecies. PMID:21106786

  6. Multilocus sequence analysis for assessment of phylogenetic diversity and biogeography in Thalassospira bacteria from diverse marine environments.

    PubMed

    Lai, Qiliang; Liu, Yang; Yuan, Jun; Du, Juan; Wang, Liping; Sun, Fengqin; Shao, Zongze

    2014-01-01

    Thalassospira bacteria are widespread and have been isolated from various marine environments. Less is known about their genetic diversity and biogeography, as well as their role in marine environments, many of them cannot be discriminated merely using the 16S rRNA gene. To address these issues, in this report, the phylogenetic analysis of 58 strains from seawater and deep sea sediments were carried out using the multilocus sequence analysis (MLSA) based on acsA, aroE, gyrB, mutL, rpoD and trpB genes, and the DNA-DNA hybridization (DDH) and average nucleotide identity (ANI) based on genome sequences. The MLSA analysis demonstrated that the 58 strains were clearly separated into 15 lineages, corresponding to seven validly described species and eight potential novel species. The DDH and ANI values further confirmed the validity of the MLSA analysis and eight potential novel species. The MLSA interspecies gap of the genus Thalassospira was determined to be 96.16-97.12% sequence identity on the basis of the combined analyses of the DDH and MLSA, while the ANIm interspecies gap was 95.76-97.20% based on the in silico DDH analysis. Meanwhile, phylogenetic analyses showed that the Thalassospira bacteria exhibited distribution pattern to a certain degree according to geographic regions. Moreover, they clustered together according to the habitats depth. For short, the phylogenetic analyses and biogeography of the Thalassospira bacteria were systematically investigated for the first time. These results will be helpful to explore further their ecological role and adaptive evolution in marine environments.

  7. Multilocus Sequence Analysis for Assessment of Phylogenetic Diversity and Biogeography in Thalassospira Bacteria from Diverse Marine Environments

    PubMed Central

    Yuan, Jun; Du, Juan; Wang, Liping; Sun, Fengqin; Shao, Zongze

    2014-01-01

    Thalassospira bacteria are widespread and have been isolated from various marine environments. Less is known about their genetic diversity and biogeography, as well as their role in marine environments, many of them cannot be discriminated merely using the 16S rRNA gene. To address these issues, in this report, the phylogenetic analysis of 58 strains from seawater and deep sea sediments were carried out using the multilocus sequence analysis (MLSA) based on acsA, aroE, gyrB, mutL, rpoD and trpB genes, and the DNA-DNA hybridization (DDH) and average nucleotide identity (ANI) based on genome sequences. The MLSA analysis demonstrated that the 58 strains were clearly separated into 15 lineages, corresponding to seven validly described species and eight potential novel species. The DDH and ANI values further confirmed the validity of the MLSA analysis and eight potential novel species. The MLSA interspecies gap of the genus Thalassospira was determined to be 96.16–97.12% sequence identity on the basis of the combined analyses of the DDH and MLSA, while the ANIm interspecies gap was 95.76–97.20% based on the in silico DDH analysis. Meanwhile, phylogenetic analyses showed that the Thalassospira bacteria exhibited distribution pattern to a certain degree according to geographic regions. Moreover, they clustered together according to the habitats depth. For short, the phylogenetic analyses and biogeography of the Thalassospira bacteria were systematically investigated for the first time. These results will be helpful to explore further their ecological role and adaptive evolution in marine environments. PMID:25198177

  8. Insights into the Emergent Bacterial Pathogen Cronobacter spp., Generated by Multilocus Sequence Typing and Analysis

    PubMed Central

    Joseph, Susan; Forsythe, Stephen J.

    2012-01-01

    Cronobacter spp. (previously known as Enterobacter sakazakii) is a bacterial pathogen affecting all age groups, with particularly severe clinical complications in neonates and infants. One recognized route of infection being the consumption of contaminated infant formula. As a recently recognized bacterial pathogen of considerable importance and regulatory control, appropriate detection, and identification schemes are required. The application of multilocus sequence typing (MLST) and analysis (MLSA) of the seven alleles atpD, fusA, glnS, gltB, gyrB, infB, and ppsA (concatenated length 3036 base pairs) has led to considerable advances in our understanding of the genus. This approach is supported by both the reliability of DNA sequencing over subjective phenotyping and the establishment of a MLST database which has open access and is also curated; http://www.pubMLST.org/cronobacter. MLST has been used to describe the diversity of the newly recognized genus, instrumental in the formal recognition of new Cronobacter species (C. universalis and C. condimenti) and revealed the high clonality of strains and the association of clonal complex 4 with neonatal meningitis cases. Clearly the MLST approach has considerable benefits over the use of non-DNA sequence based methods of analysis for newly emergent bacterial pathogens. The application of MLST and MLSA has dramatically enabled us to better understand this opportunistic bacterium which can cause irreparable damage to a newborn baby’s brain, and has contributed to improved control measures to protect neonatal health. PMID:23189075

  9. Multilocus genetics to reconstruct aeromonad evolution

    PubMed Central

    2012-01-01

    Background Aeromonas spp. are versatile bacteria that exhibit a wide variety of lifestyles. In an attempt to improve the understanding of human aeromonosis, we investigated whether clinical isolates displayed specific characteristics in terms of genetic diversity, population structure and mode of evolution among Aeromonas spp. A collection of 195 Aeromonas isolates from human, animal and environmental sources was therefore genotyped using multilocus sequence analysis (MLSA) based on the dnaK, gltA, gyrB, radA, rpoB, tsf and zipA genes. Results The MLSA showed a high level of genetic diversity among the population, and multilocus-based phylogenetic analysis (MLPA) revealed 3 major clades: the A. veronii, A. hydrophila and A. caviae clades, among the eleven clades detected. Lower genetic diversity was observed within the A. caviae clade as well as among clinical isolates compared to environmental isolates. Clonal complexes, each of which included a limited number of strains, mainly corresponded to host-associated subsclusters of strains, i.e., a fish-associated subset within A. salmonicida and 11 human-associated subsets, 9 of which included only disease-associated strains. The population structure was shown to be clonal, with modes of evolution that involved mutations in general and recombination events locally. Recombination was detected in 5 genes in the MLSA scheme and concerned approximately 50% of the STs. Therefore, these recombination events could explain the observed phylogenetic incongruities and low robustness. However, the MLPA globally confirmed the current systematics of the genus Aeromonas. Conclusions Evolution in the genus Aeromonas has resulted in exceptionally high genetic diversity. Emerging from this diversity, subsets of strains appeared to be host adapted and/or “disease specialized” while the A. caviae clade displayed an atypical tempo of evolution among aeromonads. Considering that A. salmonicida has been described as a genetically uniform pathogen that has adapted to fish through evolution from a variable ancestral population, we hypothesize that the population structure of aeromonads described herein suggested an ongoing process of adaptation to specialized niches associated with different degrees of advancement according to clades and clusters. PMID:22545815

  10. Diversity of Micromonospora strains isolated from nitrogen fixing nodules and rhizosphere of Pisum sativum analyzed by multilocus sequence analysis.

    PubMed

    Carro, Lorena; Spröer, Cathrin; Alonso, Pilar; Trujillo, Martha E

    2012-03-01

    It was recently reported that Micromonospora inhabits the intracellular tissues of nitrogen fixing nodules of the wild legume Lupinus angustifolius. To determine if Micromonospora populations are also present in nitrogen fixing nodules of cultivated legumes such as Pisum sativum, we carried out the isolation of this actinobacterium from P. sativum plants collected in two man-managed fields in the region of Castilla and León (Spain). In this work, we describe the isolation of 93 Micromonospora strains recovered from nitrogen fixing nodules and the rhizosphere of P. sativum. The genomic diversity of the strains was analyzed by amplified ribosomal DNA restriction analysis (ARDRA). Forty-six isolates and 34 reference strains were further analyzed using a multilocus sequence analysis scheme developed to address the phylogeny of the genus Micromonospora and to evaluate the species distribution in the two studied habitats. The MLSA results were evaluated by DNA-DNA hybridization to determine their usefulness for the delineation of Micromonospora at the species level. In most cases, DDH values below 70% were obtained with strains that shared a sequence similarity of 98.5% or less. Thus, MLSA studies clearly supported the established taxonomy of the genus Micromonospora and indicated that genomic species could be delineated as groups of strains that share > 98.5% sequence similarity based on the 5 genes selected. The species diversity of the strains isolated from both the rhizosphere and nodules was very high and in many cases the new strains could not be related to any of the currently described species. Copyright © 2011 Elsevier GmbH. All rights reserved.

  11. Fatal infection in three Grey Slender Lorises (Loris lydekkerianus nordicus) caused by clonally related Trueperella pyogenes.

    PubMed

    Nagib, Samy; Glaeser, Stefanie P; Eisenberg, Tobias; Sammra, Osama; Lämmler, Christoph; Kämpfer, Peter; Schauerte, Nicole; Geiger, Christina; Kaim, Ute; Prenger-Berninghoff, Ellen; Becker, André; Abdulmawjood, Amir

    2017-08-29

    Trueperella pyogenes is a worldwide known bacterium causing mastitis, abortion and various other pyogenic infections in domestic animals like ruminants and pigs. In this study we represent the first case report of three unusual fatal infections of Grey Slender Lorises caused by Trueperella pyogenes. Meanwhile, this study represents the first in-depth description of the multilocus sequence analysis (MLSA) on T. pyogenes species. Three Trueperella pyogenes were isolated from three different Grey Slender Lorises, which died within a period of two years at Frankfurt Zoo (Frankfurt am Main - Germany). The three Grey Slender Loris cases were suffering from severe sepsis and died from its complication. During the bacteriological investigation of the three cases, the T. pyogenes were isolated from different organisms in each case. The epidemiological relationship between the three isolates could be shown by four genomic DNA fingerprint methods (ERIC-PCR, BOX-PCR, (GTG) 5 -PCR, and RAPD-PCR) and by multilocus sequence analysis (MLSA) investigating four different housekeeping genes (fusA-tuf-metG-gyrA). In this study, we clearly showed by means of using three different rep-PCRs, by RAPD-PCR and by MLSA that the genomic fingerprinting of the investigated three T. pyogenes have the same clonal origin and are genetically identical. These results suggest that the same isolate contaminated the animal's facility and subsequently caused cross infection between the three different Grey Slender Lorises. To the best of our knowledge, this is the first epidemiological approach concentrating on T. pyogenes using MLSA.

  12. Deriving preference order of post-mining land-uses through MLSA framework: application of an outranking technique

    NASA Astrophysics Data System (ADS)

    Soltanmohammadi, Hossein; Osanloo, Morteza; Aghajani Bazzazi, Abbas

    2009-08-01

    This study intends to take advantage of a previously developed framework for mined land suitability analysis (MLSA) consisted of economical, social, technical and mine site factors to achieve a partial and also a complete pre-order of feasible post-mining land-uses. Analysis by an outranking multi-attribute decision-making (MADM) technique, called PROMETHEE (preference ranking organization method for enrichment evaluation), was taken into consideration because of its clear advantages on the field of MLSA as compared with MADM ranking techniques. Application of the proposed approach on a mined land can be completed through some successive steps. First, performance of the MLSA attributes is scored locally by each individual decision maker (DM). Then the assigned performance scores are normalized and the deviation amplitudes of non-dominated alternatives are calculated. Weights of the attributes are calculated by another MADM technique namely, analytical hierarchy process (AHP) in a separate procedure. Using the Gaussian preference function beside the weights, the preference indexes of the land-use alternatives are obtained. Calculation of the outgoing and entering flows of the alternatives and one by one comparison of these values will lead to partial pre-order of them and calculation of the net flows, will lead to a ranked preference for each land-use. At the final step, utilizing the PROMETHEE group decision support system which incorporates judgments of all the DMs, a consensual ranking can be derived. In this paper, preference order of post-mining land-uses for a hypothetical mined land has been derived according to judgments of one DM to reveal applicability of the proposed approach.

  13. Multilocus sequence analysis (MLSA) of Bradyrhizobium strains: revealing high diversity of tropical diazotrophic symbiotic bacteria.

    PubMed

    Delamuta, Jakeline Renata Marçon; Ribeiro, Renan Augusto; Menna, Pâmela; Bangel, Eliane Villamil; Hungria, Mariangela

    2012-04-01

    Symbiotic association of several genera of bacteria collectively called as rhizobia and plants belonging to the family Leguminosae (=Fabaceae) results in the process of biological nitrogen fixation, playing a key role in global N cycling, and also bringing relevant contributions to the agriculture. Bradyrhizobium is considered as the ancestral of all nitrogen-fixing rhizobial species, probably originated in the tropics. The genus encompasses a variety of diverse bacteria, but the diversity captured in the analysis of the 16S rRNA is often low. In this study, we analyzed twelve Bradyrhizobium strains selected from previous studies performed by our group for showing high genetic diversity in relation to the described species. In addition to the 16S rRNA, five housekeeping genes (recA, atpD, glnII, gyrB and rpoB) were analyzed in the MLSA (multilocus sequence analysis) approach. Analysis of each gene and of the concatenated housekeeping genes captured a considerably higher level of genetic diversity, with indication of putative new species. The results highlight the high genetic variability associated with Bradyrhizobium microsymbionts of a variety of legumes. In addition, the MLSA approach has proved to represent a rapid and reliable method to be employed in phylogenetic and taxonomic studies, speeding the identification of the still poorly known diversity of nitrogen-fixing rhizobia in the tropics.

  14. Genomic taxonomy of vibrios

    PubMed Central

    Thompson, Cristiane C; Vicente, Ana Carolina P; Souza, Rangel C; Vasconcelos, Ana Tereza R; Vesth, Tammi; Alves, Nelson; Ussery, David W; Iida, Tetsuya; Thompson, Fabiano L

    2009-01-01

    Background Vibrio taxonomy has been based on a polyphasic approach. In this study, we retrieve useful taxonomic information (i.e. data that can be used to distinguish different taxonomic levels, such as species and genera) from 32 genome sequences of different vibrio species. We use a variety of tools to explore the taxonomic relationship between the sequenced genomes, including Multilocus Sequence Analysis (MLSA), supertrees, Average Amino Acid Identity (AAI), genomic signatures, and Genome BLAST atlases. Our aim is to analyse the usefulness of these tools for species identification in vibrios. Results We have generated four new genome sequences of three Vibrio species, i.e., V. alginolyticus 40B, V. harveyi-like 1DA3, and V. mimicus strains VM573 and VM603, and present a broad analyses of these genomes along with other sequenced Vibrio species. The genome atlas and pangenome plots provide a tantalizing image of the genomic differences that occur between closely related sister species, e.g. V. cholerae and V. mimicus. The vibrio pangenome contains around 26504 genes. The V. cholerae core genome and pangenome consist of 1520 and 6923 genes, respectively. Pangenomes might allow different strains of V. cholerae to occupy different niches. MLSA and supertree analyses resulted in a similar phylogenetic picture, with a clear distinction of four groups (Vibrio core group, V. cholerae-V. mimicus, Aliivibrio spp., and Photobacterium spp.). A Vibrio species is defined as a group of strains that share > 95% DNA identity in MLSA and supertree analysis, > 96% AAI, ≤ 10 genome signature dissimilarity, and > 61% proteome identity. Strains of the same species and species of the same genus will form monophyletic groups on the basis of MLSA and supertree. Conclusion The combination of different analytical and bioinformatics tools will enable the most accurate species identification through genomic computational analysis. This endeavour will culminate in the birth of the online genomic taxonomy whereby researchers and end-users of taxonomy will be able to identify their isolates through a web-based server. This novel approach to microbial systematics will result in a tremendous advance concerning biodiversity discovery, description, and understanding. PMID:19860885

  15. Re-classification of Clavibacter michiganensis subspecies on the basis of whole-genome and multi-locus sequence analyses.

    PubMed

    Li, Xiang; Tambong, James; Yuan, Kat Xiaoli; Chen, Wen; Xu, Huimin; Lévesque, C André; De Boer, Solke H

    2018-01-01

    Although the genus Clavibacter was originally proposed to accommodate all phytopathogenic coryneform bacteria containing B2γ diaminobutyrate in the peptidoglycan, reclassification of all but one species into other genera has resulted in the current monospecific status of the genus. The single species in the genus, Clavibacter michiganensis, has multiple subspecies, which are all highly host-specific plant pathogens. Whole genome analysis based on average nucleotide identity and digital DNA-DNA hybridization as well as multi-locus sequence analysis (MLSA) of seven housekeeping genes support raising each of the C. michiganensis subspecies to species status. On the basis of whole genome and MLSA data, we propose the establishment of two new species and three new combinations: Clavibacter capsici sp. nov., comb. nov. and Clavibacter tessellarius sp. nov., comb. nov., and Clavibacter insidiosus comb. nov., Clavibacter nebraskensis comb. nov. and Clavibacter sepedonicus comb. nov.

  16. Re-classification of Clavibacter michiganensis subspecies on the basis of whole-genome and multi-locus sequence analyses

    PubMed Central

    Li, Xiang; Tambong, James; Yuan, Kat (Xiaoli); Chen, Wen; Xu, Huimin; Lévesque, C. André; De Boer, Solke H.

    2018-01-01

    Although the genus Clavibacter was originally proposed to accommodate all phytopathogenic coryneform bacteria containing B2γ diaminobutyrate in the peptidoglycan, reclassification of all but one species into other genera has resulted in the current monospecific status of the genus. The single species in the genus, Clavibacter michiganensis, has multiple subspecies, which are all highly host-specific plant pathogens. Whole genome analysis based on average nucleotide identity and digital DNA–DNA hybridization as well as multi-locus sequence analysis (MLSA) of seven housekeeping genes support raising each of the C. michiganensis subspecies to species status. On the basis of whole genome and MLSA data, we propose the establishment of two new species and three new combinations: Clavibacter capsici sp. nov., comb. nov. and Clavibacter tessellarius sp. nov., comb. nov., and Clavibacter insidiosus comb. nov., Clavibacter nebraskensis comb. nov. and Clavibacter sepedonicus comb. nov. PMID:29160202

  17. Taxonomic evaluation of Streptomyces albus and related species using multilocus sequence analysis and proposals to emend the description of Streptomyces albus and describe Streptomyces pathocidini sp. nov.

    PubMed Central

    Doroghazi, J. R.; Ju, K.-S.; Metcalf, W. W.

    2014-01-01

    In phylogenetic analyses of the genus Streptomyces using 16S rRNA gene sequences, Streptomyces albus subsp. albus NRRL B-1811T forms a cluster with five other species having identical or nearly identical 16S rRNA gene sequences. Moreover, the morphological and physiological characteristics of these other species, including Streptomyces almquistii NRRL B-1685T, Streptomyces flocculus NRRL B-2465T, Streptomyces gibsonii NRRL B-1335T and Streptomyces rangoonensis NRRL B-12378T are quite similar. This cluster is of particular taxonomic interest because Streptomyces albus is the type species of the genus Streptomyces. The related strains were subjected to multilocus sequence analysis (MLSA) utilizing partial sequences of the housekeeping genes atpD, gyrB, recA, rpoB and trpB and confirmation of previously reported phenotypic characteristics. The five strains formed a coherent cluster supported by a 100 % bootstrap value in phylogenetic trees generated from sequence alignments prepared by concatenating the sequences of the housekeeping genes, and identical tree topology was observed using various different tree-making algorithms. Moreover, all but one strain, S. flocculus NRRL B-2465T, exhibited identical sequences for all of the five housekeeping gene loci sequenced, but NRRL B-2465T still exhibited an MLSA evolutionary distance of 0.005 from the other strains, a value that is lower than the 0.007 MLSA evolutionary distance threshold proposed for species-level relatedness. These data support a proposal to reclassify S. almquistii, S. flocculus, S. gibsonii and S. rangoonensis as later heterotypic synonyms of S. albus with NRRL B-1811T as the type strain. The MLSA sequence database also demonstrated utility for quickly and conclusively confirming that numerous strains within the ARS Culture Collection had been previously misidentified as subspecies of S. albus and that Streptomyces albus subsp. pathocidicus should be redescribed as a novel species, Streptomyces pathocidini sp. nov., with the type strain NRRL B-24287T. PMID:24277863

  18. Optimization of Multilocus Sequence Analysis for Identification of Species in the Genus Vibrio

    PubMed Central

    Gabriel, Michael W.; Matsui, George Y.; Friedman, Robert

    2014-01-01

    Multilocus sequence analysis (MLSA) is an important method for identification of taxa that are not well differentiated by 16S rRNA gene sequences alone. In this procedure, concatenated sequences of selected genes are constructed and then analyzed. The effects that the number and the order of genes used in MLSA have on reconstruction of phylogenetic relationships were examined. The recA, rpoA, gapA, 16S rRNA gene, gyrB, and ftsZ sequences from 56 species of the genus Vibrio were used to construct molecular phylogenies, and these were evaluated individually and using various gene combinations. Phylogenies from two-gene sequences employing recA and rpoA in both possible gene orders were different. The addition of the gapA gene sequence, producing all six possible concatenated sequences, reduced the differences in phylogenies to degrees of statistical (bootstrap) support for some nodes. The overall statistical support for the phylogenetic tree, assayed on the basis of a reliability score (calculated from the number of nodes having bootstrap values of ≥80 divided by the total number of nodes) increased with increasing numbers of genes used, up to a maximum of four. No further improvement was observed from addition of the fifth gene sequence (ftsZ), and addition of the sixth gene (gyrB) resulted in lower proportions of strongly supported nodes. Reductions in the numbers of strongly supported nodes were also observed when maximum parsimony was employed for tree construction. Use of a small number of gene sequences in MLSA resulted in accurate identification of Vibrio species. PMID:24951781

  19. Multilocus sequence analysis reveals extensive genetic variety within Tenacibaculum spp. associated with ulcers in sea-farmed fish in Norway.

    PubMed

    Olsen, Anne Berit; Gulla, Snorre; Steinum, Terje; Colquhoun, Duncan J; Nilsen, Hanne K; Duchaud, Eric

    2017-06-01

    Skin ulcer development in sea-reared salmonids, commonly associated with Tenacibaculum spp., is a significant fish welfare- and economical problem in Norwegian aquaculture. A collection of 89 Tenacibaculum isolates was subjected to multilocus sequence analysis (MLSA). The isolates were retrieved from outbreaks of clinical disease in farms spread along the Norwegian coast line from seven different fish species over a period of 19 years. MLSA analysis reveals considerable genetic diversity, but allows identification of four main clades. One clade encompasses isolates belonging to the species T. dicentrarchi, whereas three clades encompass bacteria that likely represent novel, as yet undescribed species. The study identified T. maritimum in lumpsucker, T. ovolyticum in halibut, and has extended the host and geographic range for T. soleae, isolated from wrasse. The overall lack of clonality and host specificity, with some indication of geographical range restriction argue for local epidemics involving multiple strains. The diversity of Tenacibaculum isolates from fish displaying ulcerative disease may complicate vaccine development. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. New Multilocus Variable-Number Tandem-Repeat Analysis Tool for Surveillance and Local Epidemiology of Bacterial Leaf Blight and Bacterial Leaf Streak of Rice Caused by Xanthomonas oryzae

    PubMed Central

    Poulin, L.; Grygiel, P.; Magne, M.; Rodriguez-R, L. M.; Forero Serna, N.; Zhao, S.; El Rafii, M.; Dao, S.; Tekete, C.; Wonni, I.; Koita, O.; Pruvost, O.; Verdier, V.; Vernière, C.

    2014-01-01

    Multilocus variable-number tandem-repeat analysis (MLVA) is efficient for routine typing and for investigating the genetic structures of natural microbial populations. Two distinct pathovars of Xanthomonas oryzae can cause significant crop losses in tropical and temperate rice-growing countries. Bacterial leaf streak is caused by X. oryzae pv. oryzicola, and bacterial leaf blight is caused by X. oryzae pv. oryzae. For the latter, two genetic lineages have been described in the literature. We developed a universal MLVA typing tool both for the identification of the three X. oryzae genetic lineages and for epidemiological analyses. Sixteen candidate variable-number tandem-repeat (VNTR) loci were selected according to their presence and polymorphism in 10 draft or complete genome sequences of the three X. oryzae lineages and by VNTR sequencing of a subset of loci of interest in 20 strains per lineage. The MLVA-16 scheme was then applied to 338 strains of X. oryzae representing different pathovars and geographical locations. Linkage disequilibrium between MLVA loci was calculated by index association on different scales, and the 16 loci showed linear Mantel correlation with MLSA data on 56 X. oryzae strains, suggesting that they provide a good phylogenetic signal. Furthermore, analyses of sets of strains for different lineages indicated the possibility of using the scheme for deeper epidemiological investigation on small spatial scales. PMID:25398857

  1. Differentiation of Xylella fastidiosa Strains via Multilocus Sequence Analysis of Environmentally Mediated Genes (MLSA-E)

    PubMed Central

    Parker, Jennifer K.; Havird, Justin C.

    2012-01-01

    Isolates of the plant pathogen Xylella fastidiosa are genetically very similar, but studies on their biological traits have indicated differences in virulence and infection symptomatology. Taxonomic analyses have identified several subspecies, and phylogenetic analyses of housekeeping genes have shown broad host-based genetic differences; however, results are still inconclusive for genetic differentiation of isolates within subspecies. This study employs multilocus sequence analysis of environmentally mediated genes (MLSA-E; genes influenced by environmental factors) to investigate X. fastidiosa relationships and differentiate isolates with low genetic variability. Potential environmentally mediated genes, including host colonization and survival genes related to infection establishment, were identified a priori. The ratio of the rate of nonsynonymous substitutions to the rate of synonymous substitutions (dN/dS) was calculated to select genes that may be under increased positive selection compared to previously studied housekeeping genes. Nine genes were sequenced from 54 X. fastidiosa isolates infecting different host plants across the United States. Results of maximum likelihood (ML) and Bayesian phylogenetic (BP) analyses are in agreement with known X. fastidiosa subspecies clades but show novel within-subspecies differentiation, including geographic differentiation, and provide additional information regarding host-based isolate variation and specificity. dN/dS ratios of environmentally mediated genes, though <1 due to high sequence similarity, are significantly greater than housekeeping gene dN/dS ratios and correlate with increased sequence variability. MLSA-E can more precisely resolve relationships between closely related bacterial strains with low genetic variability, such as X. fastidiosa isolates. Discovering the genetic relationships between X. fastidiosa isolates will provide new insights into the epidemiology of populations of X. fastidiosa, allowing improved disease management in economically important crops. PMID:22194287

  2. Differentiation of Xylella fastidiosa strains via multilocus sequence analysis of environmentally mediated genes (MLSA-E).

    PubMed

    Parker, Jennifer K; Havird, Justin C; De La Fuente, Leonardo

    2012-03-01

    Isolates of the plant pathogen Xylella fastidiosa are genetically very similar, but studies on their biological traits have indicated differences in virulence and infection symptomatology. Taxonomic analyses have identified several subspecies, and phylogenetic analyses of housekeeping genes have shown broad host-based genetic differences; however, results are still inconclusive for genetic differentiation of isolates within subspecies. This study employs multilocus sequence analysis of environmentally mediated genes (MLSA-E; genes influenced by environmental factors) to investigate X. fastidiosa relationships and differentiate isolates with low genetic variability. Potential environmentally mediated genes, including host colonization and survival genes related to infection establishment, were identified a priori. The ratio of the rate of nonsynonymous substitutions to the rate of synonymous substitutions (dN/dS) was calculated to select genes that may be under increased positive selection compared to previously studied housekeeping genes. Nine genes were sequenced from 54 X. fastidiosa isolates infecting different host plants across the United States. Results of maximum likelihood (ML) and Bayesian phylogenetic (BP) analyses are in agreement with known X. fastidiosa subspecies clades but show novel within-subspecies differentiation, including geographic differentiation, and provide additional information regarding host-based isolate variation and specificity. dN/dS ratios of environmentally mediated genes, though <1 due to high sequence similarity, are significantly greater than housekeeping gene dN/dS ratios and correlate with increased sequence variability. MLSA-E can more precisely resolve relationships between closely related bacterial strains with low genetic variability, such as X. fastidiosa isolates. Discovering the genetic relationships between X. fastidiosa isolates will provide new insights into the epidemiology of populations of X. fastidiosa, allowing improved disease management in economically important crops.

  3. Impact of E-Cigarette Minimum Legal Sale Age Laws on Current Cigarette Smoking.

    PubMed

    Dutra, Lauren M; Glantz, Stanton A; Arrazola, René A; King, Brian A

    2018-05-01

    The purpose of this study was to use individual-level data to examine the relationship between e-cigarette minimum legal sale age (MLSA) laws and cigarette smoking among U.S. adolescents, adjusting for e-cigarette use. In 2016 and 2017, we regressed (logistic) current (past 30-day) cigarette smoking (from 2009-2014 National Youth Tobacco Surveys [NYTS]) on lagged (laws enacted each year counted for the following year) and unlagged (laws enacted January-June counted for that year) state e-cigarette MLSA laws prohibiting sales to youth aged <18 or <19 years (depending on the state). Models were adjusted for year and individual- (e-cigarette and other tobacco use, sex, race/ethnicity, and age) and state-level (smoke-free laws, cigarette taxes, medical marijuana legalization, income, and unemployment) covariates. Cigarette smoking was not significantly associated with lagged MLSA laws after adjusting for year (odds ratio [OR] = .87, 95% confidence interval [CI]: .73-1.03; p = .10) and covariates (OR = .85, .69-1.03; p = .10). Unlagged laws were significantly and negatively associated with cigarette smoking (OR = .84, .71-.98, p = .02), but not after adjusting for covariates (OR = .84, .70-1.01, p = .07). E-cigarette and other tobacco use, sex, race/ethnicity, age, and smoke-free laws were associated with cigarette smoking (p <.05). Results unadjusted for e-cigarette use and other tobacco use yielded a significant negative association between e-cigarette MLSA laws and cigarette smoking (lagged: OR = .78, .64-.93, p = .01; unlagged: OR = .80, .68-.95, p = .01). After adjusting for covariates, state e-cigarette MLSA laws did not affect youth cigarette smoking. Unadjusted for e-cigarette and other tobacco use, these laws were associated with lower cigarette smoking. Copyright © 2017 The Society for Adolescent Health and Medicine. All rights reserved.

  4. Genomic and Genetic Diversity within the Pseudomonas fluorescens Complex

    PubMed Central

    Garrido-Sanz, Daniel; Meier-Kolthoff, Jan P.; Göker, Markus; Martín, Marta; Rivilla, Rafael; Redondo-Nieto, Miguel

    2016-01-01

    The Pseudomonas fluorescens complex includes Pseudomonas strains that have been taxonomically assigned to more than fifty different species, many of which have been described as plant growth-promoting rhizobacteria (PGPR) with potential applications in biocontrol and biofertilization. So far the phylogeny of this complex has been analyzed according to phenotypic traits, 16S rDNA, MLSA and inferred by whole-genome analysis. However, since most of the type strains have not been fully sequenced and new species are frequently described, correlation between taxonomy and phylogenomic analysis is missing. In recent years, the genomes of a large number of strains have been sequenced, showing important genomic heterogeneity and providing information suitable for genomic studies that are important to understand the genomic and genetic diversity shown by strains of this complex. Based on MLSA and several whole-genome sequence-based analyses of 93 sequenced strains, we have divided the P. fluorescens complex into eight phylogenomic groups that agree with previous works based on type strains. Digital DDH (dDDH) identified 69 species and 75 subspecies within the 93 genomes. The eight groups corresponded to clustering with a threshold of 31.8% dDDH, in full agreement with our MLSA. The Average Nucleotide Identity (ANI) approach showed inconsistencies regarding the assignment to species and to the eight groups. The small core genome of 1,334 CDSs and the large pan-genome of 30,848 CDSs, show the large diversity and genetic heterogeneity of the P. fluorescens complex. However, a low number of strains were enough to explain most of the CDSs diversity at core and strain-specific genomic fractions. Finally, the identification and analysis of group-specific genome and the screening for distinctive characters revealed a phylogenomic distribution of traits among the groups that provided insights into biocontrol and bioremediation applications as well as their role as PGPR. PMID:26915094

  5. Population and genomic analysis of the genus Halorubrum

    PubMed Central

    Fullmer, Matthew S.; Soucy, Shannon M.; Swithers, Kristen S.; Makkay, Andrea M.; Wheeler, Ryan; Ventosa, Antonio; Gogarten, J. Peter; Papke, R. Thane

    2014-01-01

    The Halobacteria are known to engage in frequent gene transfer and homologous recombination. For stably diverged lineages to persist some checks on the rate of between lineage recombination must exist. We surveyed a group of isolates from the Aran-Bidgol endorheic lake in Iran and sequenced a selection of them. Multilocus Sequence Analysis (MLSA) and Average Nucleotide Identity (ANI) revealed multiple clusters (phylogroups) of organisms present in the lake. Patterns of intein and Clustered Regularly Interspaced Short Palindromic Repeats (CRISPRs) presence/absence and their sequence similarity, GC usage along with the ANI and the identities of the genes used in the MLSA revealed that two of these clusters share an exchange bias toward others in their phylogroup while showing reduced rates of exchange with other organisms in the environment. However, a third cluster, composed in part of named species from other areas of central Asia, displayed many indications of variability in exchange partners, from within the lake as well as outside the lake. We conclude that barriers to gene exchange exist between the two purely Aran-Bidgol phylogroups, and that the third cluster with members from other regions is not a single population and likely reflects an amalgamation of several populations. PMID:24782836

  6. Genomic insights into the taxonomic status of the Bacillus cereus group

    PubMed Central

    Liu, Yang; Lai, Qiliang; Göker, Markus; Meier-Kolthoff, Jan P.; Wang, Meng; Sun, Yamin; Wang, Lei; Shao, Zongze

    2015-01-01

    The identification and phylogenetic relationships of bacteria within the Bacillus cereus group are controversial. This study aimed at determining the taxonomic affiliations of these strains using the whole-genome sequence-based Genome BLAST Distance Phylogeny (GBDP) approach. The GBDP analysis clearly separated 224 strains into 30 clusters, representing eleven known, partially merged species and accordingly 19–20 putative novel species. Additionally, 16S rRNA gene analysis, a novel variant of multi-locus sequence analysis (nMLSA) and screening of virulence genes were performed. The 16S rRNA gene sequence was not sufficient to differentiate the bacteria within this group due to its high conservation. The nMLSA results were consistent with GBDP. Moreover, a fast typing method was proposed using the pycA gene, and where necessary, the ccpA gene. The pXO plasmids and cry genes were widely distributed, suggesting little correlation with the phylogenetic positions of the host bacteria. This might explain why classifications based on virulence characteristics proved unsatisfactory in the past. In summary, this is the first large-scale and systematic study of the taxonomic status of the bacteria within the B. cereus group using whole-genome sequences, and is likely to contribute to further insights into their pathogenicity, phylogeny and adaptation to diverse environments. PMID:26373441

  7. Pantoea allii sp. nov., isolated from onion plants and seed.

    PubMed

    Brady, Carrie L; Goszczynska, Teresa; Venter, Stephanus N; Cleenwerck, Ilse; De Vos, Paul; Gitaitis, Ronald D; Coutinho, Teresa A

    2011-04-01

    Eight yellow-pigmented, Gram-negative, rod-shaped, oxidase-negative, motile, facultatively anaerobic bacteria were isolated from onion seed in South Africa and from an onion plant exhibiting centre rot symptoms in the USA. The isolates were assigned to the genus Pantoea on the basis of phenotypic and biochemical tests. 16S rRNA gene sequence analysis and multilocus sequence analysis (MLSA), based on gyrB, rpoB, infB and atpD sequences, confirmed the allocation of the isolates to the genus Pantoea. MLSA further indicated that the isolates represented a novel species, which was phylogenetically most closely related to Pantoea ananatis and Pantoea stewartii. Amplified fragment length polymorphism analysis also placed the isolates into a cluster separate from P. ananatis and P. stewartii. Compared with type strains of species of the genus Pantoea that showed >97 % 16S rRNA gene sequence similarity with strain BD 390(T), the isolates exhibited 11-55 % whole-genome DNA-DNA relatedness, which confirmed the classification of the isolates in a novel species. The most useful phenotypic characteristics for the differentiation of the isolates from their closest phylogenetic neighbours are production of acid from amygdalin and utilization of adonitol and sorbitol. A novel species, Pantoea allii sp. nov., is proposed, with type strain BD 390(T) ( = LMG 24248(T)).

  8. Taxonomic evaluation of the genus Enterobacter based on multilocus sequence analysis (MLSA): proposal to reclassify E. nimipressuralis and E. amnigenus into Lelliottia gen. nov. as Lelliottia nimipressuralis comb. nov. and Lelliottia amnigena comb. nov., respectively, E. gergoviae and E. pyrinus into Pluralibacter gen. nov. as Pluralibacter gergoviae comb. nov. and Pluralibacter pyrinus comb. nov., respectively, E. cowanii, E. radicincitans, E. oryzae and E. arachidis into Kosakonia gen. nov. as Kosakonia cowanii comb. nov., Kosakonia radicincitans comb. nov., Kosakonia oryzae comb. nov. and Kosakonia arachidis comb. nov., respectively, and E. turicensis, E. helveticus and E. pulveris into Cronobacter as Cronobacter zurichensis nom. nov., Cronobacter helveticus comb. nov. and Cronobacter pulveris comb. nov., respectively, and emended description of the genera Enterobacter and Cronobacter.

    PubMed

    Brady, Carrie; Cleenwerck, Ilse; Venter, Stephanus; Coutinho, Teresa; De Vos, Paul

    2013-07-01

    The taxonomy of Enterobacter has a complicated history, with several species transferred to and from this genus. Classification of strains is difficult owing to its polyphyletic nature, based on 16S rRNA gene sequences. It has been previously acknowledged that Enterobacter contains species which should be transferred to other genera. In an attempt to resolve the taxonomy of Enterobacter, MLSA based on partial sequencing of protein-encoding genes (gyrB, rpoB, infB and atpD) was performed on the type strains and reference strains of Enterobacter, Cronobacter and Serratia species, as well as members of the closely related genera Citrobacter, Klebsiella, Kluyvera, Leclercia, Mangrovibacter, Raoultella and Yokenella. Phylogenetic analyses of the concatenated nucleotide sequences revealed that Enterobacter can be divided into five strongly supported MLSA groups, suggesting that the species should be reclassified into five different genera. Further support for this was provided by a concatenated amino acid tree, phenotypic characteristics and fatty acid profiles, enabling differentiation of the MLSA groups. Three novel genera are proposed: Lelliottia gen. nov., Pluralibacter gen. nov. and Kosakonia gen. nov. and the following new combinations: Lelliottia nimipressuralis comb. nov., Lelliottia amnigena comb. nov., Pluralibacter gergoviae comb. nov., Pluralibacter pyrinus comb. nov., Kosakonia cowanii comb. nov., Kosakonia radicincitans comb. nov., Kosakonia oryzae comb. nov., Kosakonia arachidis comb. nov., Cronobacter helveticus comb. nov. and Cronobacter pulveris comb. nov. Additionally, the novel epithet Cronobacter zurichensis nom. nov. is proposed for the reclassification of Enterobacter turicensis into the genus Cronobacter, as Cronobacter turicensis (Iversen et al., 2008) is already in use. Copyright © 2013 Elsevier GmbH. All rights reserved.

  9. Application of a Dot Blot Hybridization Platform to Assess Streptococcus uberis Population Structure in Dairy Herds

    PubMed Central

    Albuquerque, Pedro; Ribeiro, Niza; Almeida, Alexandre; Panschin, Irena; Porfirio, Afonso; Vales, Marta; Diniz, Francisca; Madeira, Helena; Tavares, Fernando

    2017-01-01

    Streptococcus uberis is considered one of the most important pathogens associated with bovine mastitis. While traditionally acknowledged as an environmental pathogen, S. uberis has been shown to adopt a contagious epidemiological pattern in several dairy herds. Since different control strategies are employed depending on the mode of transmission, in-depth studies of S. uberis populations are essential to determine the best practices to control this pathogen. In this work, we optimized and validated a dot blot platform, combined with automatic image analysis, to rapidly assess the population structure of infective S. uberis, and evaluated its efficiency when compared to multilocus sequence analysis (MLSA) genotyping. Two dairy herds with prevalent S. uberis infections were followed in a 6 month period, in order to collect and characterize isolates from cows with persistent infections. These herds, located in Portugal (Barcelos and Maia regions), had similar management practices, with the herd from Barcelos being smaller and having a better milking parlor management, since infected cow segregation was immediate. A total of 54 S. uberis isolates were obtained from 24 different cows from the two herds. To overcome operator-dependent analysis of the dot blots and increase the technique's consistency and reliability, the hybridization signals were converted into probability values, with average probabilities higher than 0.5 being considered positive results. These data allowed to confirm the isolates' identity as S. uberis using taxa-specific markers and to determine the presence of virulence- and antibiotic resistance-related genes. In addition, MLSA allowed to disclose the most prevalent S. uberis clonal lineages in both herds. Seven different clusters were identified, with Barcelos showing a high clonal diversity and Maia a dominant lineage infecting most cows, suggesting distinct epidemiological patterns, with S. uberis displaying an environmental or contagious transmission pattern depending on the herd. Overall, this work showed the utility of dot blot and MLSA to characterize population structure and epidemiological patterns of mastitis-causing S. uberis. This approach allowed to disclose prevalent virulence patterns and clonal lineages of S. uberis in two distinct herds, and gain insights on the impact of herd management practices on pathogen population structure. PMID:28174566

  10. Lactobacillus cypricasei Lawson et al. 2001 is a later heterotypic synonym of Lactobacillus acidipiscis Tanasupawat et al. 2000.

    PubMed

    Naser, Sabri M; Vancanneyt, Marc; Hoste, Bart; Snauwaert, Cindy; Swings, Jean

    2006-07-01

    The applicability of a multilocus sequence analysis (MLSA)-based identification system for lactobacilli was evaluated. Two housekeeping genes that code for the phenylalanyl-tRNA synthase alpha-subunit (pheS) and RNA polymerase alpha-subunit (rpoA) were sequenced and analysed for members of the Lactobacillus salivarius species group. The type strains of Lactobacillus acidipiscis and Lactobacillus cypricasei were investigated further using a third gene that encodes the alpha-subunit of ATP synthase (atpA). The MLSA data revealed close relatedness between L. acidipiscis and L. cypricasei, with 99.8-100 % pheS, rpoA and atpA gene sequence similarities. Comparison of the 16S rRNA gene sequences of the type strains of the two species confirmed the close relatedness (99.8 % gene sequence similarity) between the two taxa. Similar phenotypes and high DNA-DNA binding values in the range of 84 to 97.5 % confirmed that L. acidipiscis and L. cypricasei are synonymous species. On the basis of the present study, it is proposed that Lactobacillus cypricasei is a later heterotypic synonym of Lactobacillus acidipiscis.

  11. Comparison and Recovery of Escherichia coli and Thermotolerant Coliforms in Water with a Chromogenic Medium Incubated at 41 and 44.5°C

    PubMed Central

    Alonso, Jose L.; Soriano, Adela; Carbajo, Oscar; Amoros, Inmaculada; Garelick, Hemda

    1999-01-01

    This study compared the performance of a commercial chromogenic medium, CHROMagarECC (CECC), and CECC supplemented with sodium pyruvate (CECCP) with the membrane filtration lauryl sulfate-based medium (mLSA) for enumeration of Escherichia coli and non-E. coli thermotolerant coliforms (KEC). To establish that we could recover the maximum KEC and E. coli population, we compared two incubation temperature regimens, 41 and 44.5°C. Statistical analysis by the Fisher test of data did not demonstrate any statistically significant differences (P = 0.05) in the enumeration of E. coli for the different media (CECC and CECCP) and incubation temperatures. Variance analysis of data performed on KEC counts showed significant differences (P = 0.01) between KEC counts at 41 and 44.5°C on both CECC and CECCP. Analysis of variance demonstrated statistically significant differences (P = 0.05) in the enumeration of total thermotolerant coliforms (TTCs) on CECC and CECCP compared with mLSA. Target colonies were confirmed to be E. coli at a rate of 91.5% and KEC of likely fecal origin at a rate of 77.4% when using CECCP incubated at 41°C. The results of this study showed that CECCP agar incubated at 41°C is efficient for the simultaneous enumeration of E. coli and KEC from river and marine waters. PMID:10427079

  12. Composite Failure Analysis Handbook. Volume 2. Technical Handbook/ Part 2. Atlas of Fractographs

    DTIC Science & Technology

    1992-02-01

    ADDRESS( ES ) 8. PERFORMING ORGANIZATION Northrop Corporation REPORT NUMBER Aircraft Division One Northrop Avenue Hawthorne, California 90250-3277 9...SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS( ES ) 10. SPONSORING/ MONITORING Wright Laboratory (WL/MLSA) AGENCY REPORT NUMBER Materials Directorate...specimens of 0/90 laminates were tested in a Satec 25,000-lb capacity Universal test machine with the crosshead speed set at .001 in/min. Deflection

  13. Beta-hemolytic Streptococcus dysgalactiae strains isolated from horses are a genetically distinct population within the Streptococcus dysgalactiae taxon.

    PubMed

    Pinho, Marcos D; Erol, Erdal; Ribeiro-Gonçalves, Bruno; Mendes, Catarina I; Carriço, João A; Matos, Sandra C; Preziuso, Silvia; Luebke-Becker, Antina; Wieler, Lothar H; Melo-Cristino, Jose; Ramirez, Mario

    2016-08-17

    The pathogenic role of beta-hemolytic Streptococcus dysgalactiae in the equine host is increasingly recognized. A collection of 108 Lancefield group C (n = 96) or L (n = 12) horse isolates recovered in the United States and in three European countries presented multilocus sequence typing (MLST) alleles, sequence types and emm types (only 56% of the isolates could be emm typed) that were, with few exceptions, distinct from those previously found in human Streptococcus dysgalactiae subsp. equisimilis. Characterization of a subset of horse isolates by multilocus sequence analysis (MLSA) and 16S rRNA gene sequence showed that most equine isolates could also be differentiated from S. dysgalactiae strains from other animal species, supporting the existence of a horse specific genomovar. Draft genome information confirms the distinctiveness of the horse genomovar and indicates the presence of potentially horse-specific virulence factors. While this genomovar represents most of the isolates recovered from horses, a smaller MLST and MLSA defined sub-population seems to be able to cause infections in horses, other animals and humans, indicating that transmission between hosts of strains belonging to this group may occur.

  14. Population Genetic Analysis of Streptomyces albidoflavus Reveals Habitat Barriers to Homologous Recombination in the Diversification of Streptomycetes

    PubMed Central

    Cheng, Kun; Rong, Xiaoying; Pinto-Tomás, Adrián A.; Fernández-Villalobos, Marcela; Murillo-Cruz, Catalina

    2014-01-01

    Examining the population structure and the influence of recombination and ecology on microbial populations makes great sense for understanding microbial evolution and speciation. Streptomycetes are a diverse group of bacteria that are widely distributed in nature and a rich source of useful bioactive compounds; however, they are rarely subjected to population genetic investigations. In this study, we applied a five-gene-based multilocus sequence analysis (MLSA) scheme to 41 strains of Streptomyces albidoflavus derived from diverse sources, mainly insects, sea, and soil. Frequent recombination was detected in S. albidoflavus, supported by multiple lines of evidence from the pairwise homoplasy index (Φw) test, phylogenetic discordance, the Shimodaira-Hasegawa (SH) test, and network analysis, underpinning the predominance of homologous recombination within Streptomyces species. A strong habitat signal was also observed in both phylogenetic and Structure 2.3.3 analyses, indicating the importance of ecological difference in shaping the population structure. Moreover, all three habitat-associated groups, particularly the entomic group, demonstrated significantly reduced levels of gene flow with one another, generally revealing habitat barriers to recombination. Therefore, a combined effect of homologous recombination and ecology is inferred for S. albidoflavus, where dynamic evolution is at least partly balanced by the extent that differential distributions of strains among habitats limit genetic exchange. Our study stresses the significance of ecology in microbial speciation and reveals the coexistence of homologous recombination and ecological divergence in the evolution of streptomycetes. PMID:25416769

  15. Serratia oryzae sp. nov., isolated from rice stems.

    PubMed

    Zhang, Cai-Wen; Zhang, Jun; Zhao, Juan-Juan; Zhao, Xia; Zhao, Dong-Fang; Yin, Hua-Qun; Zhang, Xiao-Xia

    2017-08-01

    A novel endophytic bacterium, strain J11-6T, was isolated from rice stems. Its taxonomic position was investigated using a polyphasic approach. The novel strain was Gram-staining-negative, facultatively anaerobic, motile and rod-shaped. Although the results of phylogenetic analysis based on 16S rRNA gene sequences indicated that J11-6T represented a member of the genus Rahnella, multilocus sequence analysis (MLSA) on the basis of concatenated partial atpD, gyrB, rpoB and infB gene sequences showed a clear distinction of J11-6T from the type strains of species of the genus Rahnella but indicated that it lay within the clade of the genus Serratia. The phylogenetically closest species were Serratia fonticola and Serratia aquatilis on the basis of the results of the MLSA phylogenetic analysis. The predominant cellular fatty acids were C16 : 1ω7c (38.7 %) and C16 : 0 (25.0 %). The DNA G+C content was 53.2 mol%. The DNA-DNA relatedness was 17.4 % between J11-6T and Rahnella aquatilis CIP 78.65T, and 29.2 % between J11-6T and S. fonticola LMG 7882T which indicates that this strain represents a novel species of the genus Serratia. Characterization by genotypic and phenotypic analysis indicated that J11-6T (=ACCC 19934T=KCTC 52529T) represents a novel species of the genus Serratia, for which the name Serratia oryzae sp. nov. is proposed.

  16. Determining Clostridium difficile intra-taxa diversity by mining multilocus sequence typing databases.

    PubMed

    Muñoz, Marina; Ríos-Chaparro, Dora Inés; Patarroyo, Manuel Alfonso; Ramírez, Juan David

    2017-03-14

    Multilocus sequence typing (MLST) is a highly discriminatory typing strategy; it is reproducible and scalable. There is a MLST scheme for Clostridium difficile (CD), a gram positive bacillus causing different pathologies of the gastrointestinal tract. This work was aimed at describing the frequency of sequence types (STs) and Clades (C) reported and evalute the intra-taxa diversity in the CD MLST database (CD-MLST-db) using an MLSA approach. Analysis of 1778 available isolates showed that clade 1 (C1) was the most frequent worldwide (57.7%), followed by C2 (29.1%). Regarding sequence types (STs), it was found that ST-1, belonging to C2, was the most frequent. The isolates analysed came from 17 countries, mostly from the United Kingdom (UK) (1541 STs, 87.0%). The diversity of the seven housekeeping genes in the MLST scheme was evaluated, and alleles from the profiles (STs), for identifying CD population structure. It was found that adk and atpA are conserved genes allowing a limited amount of clusters to be discriminated; however, different genes such as drx, glyA and particularly sodA showed high diversity indexes and grouped CD populations in many clusters, suggesting that these genes' contribution to CD typing should be revised. It was identified that CD STs reported to date have a mostly clonal population structure with foreseen events of recombination; however, one group of STs was not assigned to a clade being highly different containing at least nine well-supported clusters, suggesting a greater amount of clades for CD. This study shows the usefulness of CD-MLST-db as a tool for studying CD distribution and population structure, identifying the need for reviewing the usefulness of sodA as housekeeping gene within the MLST scheme and suggesting the existence of a greater amount of CD clades. The study also shows the plausible exchange of genetic material between STs, contributing towards intra-taxa genetic diversity.

  17. Strains of the Group I Lineage of Acidovorax citrulli, the Causal Agent of Bacterial Fruit Blotch of Cucurbitaceous Crops, are Predominant in Brazil.

    PubMed

    Silva, Gustavo M; Souza, Ricardo M; Yan, Lichun; Júnior, Rui S; Medeiros, Flavio H V; Walcott, Ron R

    2016-12-01

    Bacterial fruit blotch (BFB), caused by the seedborne bacterium Acidovorax citrulli, is an economically important threat to cucurbitaceous crops worldwide. Since the first report of BFB in Brazil in 1990, outbreaks have occurred sporadically on watermelon and, more frequently, on melon, resulting in significant yield losses. At present, the genetic diversity and the population structure of A. citrulli strains in Brazil remain unclear. A collection of 74 A. citrulli strains isolated from naturally infected tissues of different cucurbit hosts in Brazil between 2000 and 2014 and 18 A. citrulli reference strains from other countries were compared by pulsed-field gel electrophoresis (PFGE), multilocus sequence analysis (MLSA) of housekeeping and virulence-associated genes, and pathogenicity tests on seedlings of different cucurbit species. The Brazilian population comprised predominantly group I strains (98%), regardless of the year of isolation, geographical region, or host. Whole-genome restriction digestion and PFGE analysis revealed that three unique and previously unreported A. citrulli haplotypes (assigned as haplotypes B22, B23, and B24) occurred in Brazil. The greatest diversity of A. citrulli (four haplotypes) was found among strains collected from the northeastern region of Brazil, which accounts for more than 90% of the country's melon production. MLSA clearly distinguished A. citrulli strains into two well-supported clades, in agreement with observations based on PFGE analysis. Five Brazilian A. citrulli strains, representing different group I haplotypes, were moderately aggressive on watermelon seedlings compared with four group II strains that were highly aggressive. In contrast, no significant differences in BFB severity were observed between group I and II A. citrulli strains on melon and squash seedlings. Finally, we observed a differential effect of temperature on in vitro growth of representative group I and II A. citrulli haplotypes. Specifically, of 18 group II strains tested, all grew at 40 and 41°C, whereas only 3 of 15 group I strains (haplotypes B8[P], B3[K], and B15) grew at 40°C. Three strains representing haplotype B8(P) were the only group I strains that grew at 41°C. These results contribute to a better understanding of the genetic diversity of A. citrulli associated with BFB outbreaks in Brazil, and reinforce the efficiency of MLSA and PFGE analysis for assessing population structure. This study also provides the first evidence to suggest that temperature might be a driver in the ecological adaptation of A. citrulli populations.

  18. Burkholderia puraquae sp. nov., a novel species of the Burkholderia cepacia complex isolated from hospital settings and agricultural soils.

    PubMed

    Martina, Pablo; Leguizamon, Mariana; Prieto, Claudia I; Sousa, Silvia A; Montanaro, Patricia; Draghi, Walter O; Stämmler, Maren; Bettiol, Marisa; de Carvalho, Carla C C R; Palau, Juliana; Figoli, Cecilia; Alvarez, Florencia; Benetti, Silvina; Lejona, Sergio; Vescina, Cecilia; Ferreras, Julián; Lasch, Peter; Lagares, Antonio; Zorreguieta, Angeles; Leitão, Jorge H; Yantorno, Osvaldo M; Bosch, Alejandra

    2018-01-01

    Bacteria from the Burkholderia cepacia complex (Bcc) are capable of causing severe infections in patients with cystic fibrosis (CF). These opportunistic pathogens are also widely distributed in natural and man-made environments. After a 12-year epidemiological surveillance involving Bcc bacteria from respiratory secretions of Argentinean patients with CF and from hospital settings, we found six isolates of the Bcc with a concatenated species-specific allele sequence that differed by more than 3 % from those of the Bcc with validly published names. According to the multilocus sequence analysis (MLSA), these isolates clustered with the agricultural soil strain, Burkholderia sp. PBP 78, which was already deposited in the PubMLST database. The isolates were examined using a polyphasic approach, which included 16S rRNA, recA, Matrix-assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF MS), DNA base composition, average nucleotide identities (ANIs), fatty acid profiles, and biochemical characterizations. The results of the present study demonstrate that the seven isolates represent a single novel species within the Bcc, for which the name Burkholderia puraquae sp. nov. is proposed. Burkholderia puraquae sp. nov. CAMPA 1040 T (=LMG 29660 T =DSM 103137 T ) was designated the type strain of the novel species, which can be differentiated from other species of the Bcc mainly from recA gene sequence analysis, MLSA, ANIb, MALDI-TOF MS analysis, and some biochemical tests, including the ability to grow at 42 °C, aesculin hydrolysis, and lysine decarboxylase and β-galactosidase activities.

  19. Exploring Microdiversity in Novel Kordia sp. (Bacteroidetes) with Proteorhodopsin from the Tropical Indian Ocean via Single Amplified Genomes

    PubMed Central

    Royo-Llonch, Marta; Ferrera, Isabel; Cornejo-Castillo, Francisco M.; Sánchez, Pablo; Salazar, Guillem; Stepanauskas, Ramunas; González, José M.; Sieracki, Michael E.; Speich, Sabrina; Stemmann, Lars; Pedrós-Alió, Carlos; Acinas, Silvia G.

    2017-01-01

    Marine Bacteroidetes constitute a very abundant bacterioplankton group in the oceans that plays a key role in recycling particulate organic matter and includes several photoheterotrophic members containing proteorhodopsin. Relatively few marine Bacteroidetes species have been described and, moreover, they correspond to cultured isolates, which in most cases do not represent the actual abundant or ecologically relevant microorganisms in the natural environment. In this study, we explored the microdiversity of 98 Single Amplified Genomes (SAGs) retrieved from the surface waters of the underexplored North Indian Ocean, whose most closely related isolate is Kordia algicida OT-1. Using Multi Locus Sequencing Analysis (MLSA) we found no microdiversity in the tested conserved phylogenetic markers (16S rRNA and 23S rRNA genes), the fast-evolving Internal Transcribed Spacer and the functional markers proteorhodopsin and the beta-subunit of RNA polymerase. Furthermore, we carried out a Fragment Recruitment Analysis (FRA) with marine metagenomes to learn about the distribution and dynamics of this microorganism in different locations, depths and size fractions. This analysis indicated that this taxon belongs to the rare biosphere, showing its highest abundance after upwelling-induced phytoplankton blooms and sinking to the deep ocean with large organic matter particles. This uncultured Kordia lineage likely represents a novel Kordia species (Kordia sp. CFSAG39SUR) that contains the proteorhodopsin gene and has a widespread spatial and vertical distribution. The combination of SAGs and MLSA makes a valuable approach to infer putative ecological roles of uncultured abundant microorganisms. PMID:28790980

  20. Basfia succiniciproducens gen. nov., sp. nov., a new member of the family Pasteurellaceae isolated from bovine rumen.

    PubMed

    Kuhnert, Peter; Scholten, Edzard; Haefner, Stefan; Mayor, Désirée; Frey, Joachim

    2010-01-01

    Gram-negative, coccoid, non-motile bacteria that are catalase-, urease- and indole-negative, facultatively anaerobic and oxidase-positive were isolated from the bovine rumen using an improved selective medium for members of the Pasteurellaceae. All strains produced significant amounts of succinic acid under anaerobic conditions with glucose as substrate. Phenotypic characterization and multilocus sequence analysis (MLSA) using 16S rRNA, rpoB, infB and recN genes were performed on seven independent isolates. All four genes showed high sequence similarity to their counterparts in the genome sequence of the patent strain MBEL55E, but less than 95 % 16S rRNA gene sequence similarity to any other species of the Pasteurellaceae. Genetically these strains form a very homogeneous group in individual as well as combined phylogenetic trees, clearly separated from other genera of the family from which they can also be separated based on phenotypic markers. Genome relatedness as deduced from the recN gene showed high interspecies similarities, but again low similarity to any of the established genera of the family. No toxicity towards bovine, human or fish cells was observed and no RTX toxin genes were detected in members of the new taxon. Based on phylogenetic clustering in the MLSA analysis, the low genetic similarity to other genera and the phenotypic distinction, we suggest to classify these bovine rumen isolates as Basfia succiniciproducens gen. nov., sp. nov. The type strain is JF4016(T) (=DSM 22022(T) =CCUG 57335(T)).

  1. Genetic diversity and symbiotic effectiveness of Bradyrhizobium strains nodulating selected annual grain legumes growing in Ethiopia.

    PubMed

    Degefu, Tulu; Wolde-Meskel, Endalkachew; Rasche, Frank

    2018-01-01

    Vigna unguiculata, Vigna radiata and Arachis hypogaea growing in Ethiopia are nodulated by a genetically diverse group of Bradyrhizobium strains. To determine the genetic identity and symbiotic effectiveness of these bacteria, a collection of 36 test strains originating from the root nodules of the three hosts was investigated using multilocus sequence analyses (MLSA) of core genes including 16S rRNA, recA, glnII, gyrB, atpD and dnaK. Sequence analysis of nodA and nifH genes along with tests for symbiotic effectiveness using δ 15 N analysis were also carried out. The phylogenetic trees derived from the MLSA grouped most test strains into four well-supported distinct positions designated as genospecies I-IV. The maximum likelihood (ML) tree that was constructed based on the nodA gene sequences separated the entire test strains into two lineages, where the majority of the test strains were clustered on one of a well-supported large branch that comprise Bradyrhizobium species from the tropics. This clearly suggested the monophyletic origin of the nodA genes within the bradyrhizobia of tropical origin. The δ 15 N-based symbiotic effectiveness test of seven selected strains revealed that strains GN100 (δ 15 N=0.73) and GN102 (δ 15 N=0.79) were highly effective nitrogen fixers when inoculated to cowpea, thus can be considered as inoculants in cowpea production. It was concluded that Ethiopian soils are a hotspot for rhizobial diversity. This calls for further research to unravel as yet unknown bradyrhizobia nodulating legume host species growing in the country. In this respect, prospective research should also address the mechanisms of symbiotic specificity that could lead to high nitrogen fixation in target legumes.

  2. Streptomyces aridus sp. nov., isolated from a high altitude Atacama Desert soil and emended description of Streptomyces noboritoensis Isono et al. 1957.

    PubMed

    Idris, Hamidah; Labeda, David P; Nouioui, Imen; Castro, Jean Franco; Del Carmen Montero-Calasanz, Maria; Bull, Alan T; Asenjo, Juan A; Goodfellow, Michael

    2017-05-01

    A polyphasic study was undertaken to determine the taxonomic status of a Streptomyces strain which had been isolated from a high altitude Atacama Desert soil and shown to have bioactive properties. The strain, isolate H9 T , was found to have chemotaxonomic, cultural and morphological properties that place it in the genus Streptomyces. 16S rRNA gene sequence analyses showed that the isolate forms a distinct branch at the periphery of a well-delineated subclade in the Streptomyces 16S rRNA gene tree together with the type strains of Streptomyces crystallinus, Streptomyces melanogenes and Streptomyces noboritoensis. Multi-locus sequence analysis (MLSA) based on five house-keeping gene alleles showed that isolate H9 T is closely related to the latter two type strains and to Streptomyces polyantibioticus NRRL B-24448 T . The isolate was distinguished readily from the type strains of S. melanogenes, S. noboritoensis and S. polyantibioticus using a combination of phenotypic properties. Consequently, the isolate is considered to represent a new species of Streptomyces for which the name Streptomyces aridus sp. nov. is proposed; the type strain is H9 T (=NCIMB 14965 T =NRRL B65268 T ). In addition, the MLSA and phenotypic data show that the S. melanogenes and S. noboritoensis type strains belong to a single species, it is proposed that S. melanogenes be recognised as a heterotypic synonym of S. noboritoensis for which an emended description is given.

  3. Vibrio trends in the ecology of the Venice lagoon.

    PubMed

    Rahman, Mohammad Shamsur; Martino, Maria Elena; Cardazzo, Barbara; Facco, Pierantonio; Bordin, Paola; Mioni, Renzo; Novelli, Enrico; Fasolato, Luca

    2014-04-01

    Vibrio is a very diverse genus that is responsible for different human and animal diseases. The accurate identification of Vibrio at the species level is important to assess the risks related to public health and diseases caused by aquatic organisms. The ecology of Vibrio spp., together with their genetic background, represents an important key for species discrimination and evolution. Thus, analyses of population structure and ecology association are necessary for reliable characterization of bacteria and to investigate whether bacterial species are going through adaptation processes. In this study, a population of Vibrionaceae was isolated from shellfish of the Venice lagoon and analyzed in depth to study its structure and distribution in the environment. A multilocus sequence analysis (MLSA) was developed on the basis of four housekeeping genes. Both molecular and biochemical approaches were used for species characterization, and the results were compared to assess the consistency of the two methods. In addition, strain ecology and the association between genetic information and environment were investigated through statistical models. The phylogenetic and population analyses achieved good species clustering, while biochemical identification was demonstrated to be imprecise. In addition, this study provided a fine-scale overview of the distribution of Vibrio spp. in the Venice lagoon, and the results highlighted a preferential association of the species toward specific ecological variables. These findings support the use of MLSA for taxonomic studies and demonstrate the need to consider environmental information to obtain broader and more accurate bacterial characterization.

  4. Vibrio Trends in the Ecology of the Venice Lagoon

    PubMed Central

    Rahman, Mohammad Shamsur; Cardazzo, Barbara; Facco, Pierantonio; Bordin, Paola; Mioni, Renzo; Novelli, Enrico; Fasolato, Luca

    2014-01-01

    Vibrio is a very diverse genus that is responsible for different human and animal diseases. The accurate identification of Vibrio at the species level is important to assess the risks related to public health and diseases caused by aquatic organisms. The ecology of Vibrio spp., together with their genetic background, represents an important key for species discrimination and evolution. Thus, analyses of population structure and ecology association are necessary for reliable characterization of bacteria and to investigate whether bacterial species are going through adaptation processes. In this study, a population of Vibrionaceae was isolated from shellfish of the Venice lagoon and analyzed in depth to study its structure and distribution in the environment. A multilocus sequence analysis (MLSA) was developed on the basis of four housekeeping genes. Both molecular and biochemical approaches were used for species characterization, and the results were compared to assess the consistency of the two methods. In addition, strain ecology and the association between genetic information and environment were investigated through statistical models. The phylogenetic and population analyses achieved good species clustering, while biochemical identification was demonstrated to be imprecise. In addition, this study provided a fine-scale overview of the distribution of Vibrio spp. in the Venice lagoon, and the results highlighted a preferential association of the species toward specific ecological variables. These findings support the use of MLSA for taxonomic studies and demonstrate the need to consider environmental information to obtain broader and more accurate bacterial characterization. PMID:24487545

  5. Development and applications of the EntomopathogenID MLSA database for use in agricultural systems

    USDA-ARS?s Scientific Manuscript database

    The current study reports the development and application of a publicly accessible, curated database of Hypocrealean entomopathogenic fungi sequence data. The goal was to provide a platform for users to easily access sequence data from reference strains. The database can be used to accurately identi...

  6. Genetic structure and evolution of the Leishmania genus in Africa and Eurasia: what does MLSA tell us.

    PubMed

    El Baidouri, Fouad; Diancourt, Laure; Berry, Vincent; Chevenet, François; Pratlong, Francine; Marty, Pierre; Ravel, Christophe

    2013-01-01

    Leishmaniasis is a complex parasitic disease from a taxonomic, clinical and epidemiological point of view. The role of genetic exchanges has been questioned for over twenty years and their recent experimental demonstration along with the identification of interspecific hybrids in natura has revived this debate. After arguing that genetic exchanges were exceptional and did not contribute to Leishmania evolution, it is currently proposed that interspecific exchanges could be a major driving force for rapid adaptation to new reservoirs and vectors, expansion into new parasitic cycles and adaptation to new life conditions. To assess the existence of gene flows between species during evolution we used MLSA-based (MultiLocus Sequence Analysis) approach to analyze 222 Leishmania strains from Africa and Eurasia to accurately represent the genetic diversity of this genus. We observed a remarkable congruence of the phylogenetic signal and identified seven genetic clusters that include mainly independent lineages which are accumulating divergences without any sign of recent interspecific recombination. From a taxonomic point of view, the strong genetic structuration of the different species does not question the current classification, except for species that cause visceral forms of leishmaniasis (L. donovani, L. infantum and L. archibaldi). Although these taxa cause specific clinical forms of the disease and are maintained through different parasitic cycles, they are not clearly distinct and form a continuum, in line with the concept of species complex already suggested for this group thirty years ago. These results should have practical consequences concerning the molecular identification of parasites and the subsequent therapeutic management of the disease.

  7. Vibrio aphrogenes sp. nov., in the Rumoiensis clade isolated from a seaweed.

    PubMed

    Tanaka, Mami; Endo, Shoko; Kotake, Fumihito; Al-Saari, Nurhidayu; Amin, A K M Rohul; Feng, Gao; Mino, Sayaka; Doi, Hidetaka; Ogura, Yoshitoshi; Hayashi, Tetsuya; Suda, Wataru; Hattori, Masahira; Yumoto, Isao; Sawabe, Toko; Sawabe, Tomoo; Araki, Toshiyoshi

    2017-01-01

    A novel strain Vibrio aphrogenes sp. nov. strain CA-1004T isolated from the surface of seaweed collected on the coast of Mie Prefecture in 1994 [1] was characterized using polyphasic taxonomy including multilocus sequence analysis (MLSA) and a genome based comparison. Both phylogenetic analyses on the basis of 16S rRNA gene sequences and MLSA based on eight protein-coding genes (gapA, gyrB, ftsZ, mreB, pyrH, recA, rpoA, and topA) showed the strain could be placed in the Rumoiensis clade in the genus Vibrio. Sequence similarities of the 16S rRNA gene and the multilocus genes against the Rumoiensis clade members, V. rumoiensis, V. algivorus, V. casei, and V. litoralis, were low enough to propose V. aphrogenes sp. nov. strain CA-1004T as a separate species. The experimental DNA-DNA hybridization data also revealed that the strain CA-1004T was separate from four known Rumoiensis clade species. The G+C content of the V. aphrogenes strain was determined as 42.1% based on the genome sequence. Major traits of the strain were non-motile, halophilic, fermentative, alginolytic, and gas production. A total of 27 traits (motility, growth temperature range, amylase, alginase and lipase productions, and assimilation of 19 carbon compounds) distinguished the strain from the other species in the Rumoiensis clade. The name V. aphrogenes sp. nov. is proposed for this species in the Rumoiensis clade, with CA-1004T as the type strain (JCM 31643T = DSM 103759T).

  8. Molecular Identification of Nocardia Isolates from Clinical Samples and an Overview of Human Nocardiosis in Brazil

    PubMed Central

    Baio, Paulo Victor Pereira; Ramos, Juliana Nunes; dos Santos, Louisy Sanches; Soriano, Morgana Fonseca; Ladeira, Elisa Martins; Souza, Mônica Cristina; Camello, Thereza Cristina Ferreira; Ribeiro, Marcio Garcia; Hirata Junior, Raphael; Vieira, Verônica Viana; Mattos-Guaraldi, Ana Luíza

    2013-01-01

    Background Nocardia sp. causes a variety of clinical presentations. The incidence of nocardiosis varies geographically according to several factors, such as the prevalence of HIV infections, transplants, neoplastic and rheumatic diseases, as well as climate, socio-economic conditions and laboratory procedures for Nocardia detection and identification. In Brazil the paucity of clinical reports of Nocardia infections suggests that this genus may be underestimated as a cause of human diseases and/or either neglected or misidentified in laboratory specimens. Accurate identification of Nocardia species has become increasingly important for clinical and epidemiological investigations. In this study, seven clinical Nocardia isolates were identified by multilocus sequence analysis (MLSA) and their antimicrobial susceptibility was also determined. Most Nocardia isolates were associated to pulmonary disease. Methodology/Principal Findings The majority of Brazilian human isolates in cases reported in literature were identified as Nocardia sp. Molecular characterization was used for species identification of Nocardia nova, Nocardia cyriacigeorgica, Nocardia asiatica and Nocardia exalbida/gamkensis. Data indicated that molecular analysis provided a different Nocardia speciation than the initial biochemical identification for most Brazilian isolates. All Nocardia isolates showed susceptibility to trimethoprim-sulfamethoxazole, the antimicrobial of choice in the treatment nocardiosis. N. nova isolated from different clinical specimens from one patient showed identical antimicrobial susceptibility patterns and two distinct clones. Conclusions/Significance Although Brazil is the world's fifth-largest country in terms of land mass and population, pulmonary, extrapulmonary and systemic forms of nocardiosis were reported in only 6 of the 26 Brazilian states from 1970 to 2013. A least 33.8% of these 46 cases of nocardiosis proved fatal. Interestingly, coinfection by two clones may occur in patients presenting nocardiosis. Nocardia infection may be more common throughout the Brazilian territory and in other developing tropical countries than is currently recognized and MLSA should be used more extensively as an effective method for Nocardia identification. PMID:24340116

  9. Streptomyces odonnellii sp. nov., a proteolytic streptomycete isolated from soil under cerrado (savanna) vegetation cover.

    PubMed

    Pereira, Pedro Henrique Freitas; Macrae, Andrew; Reinert, Fernanda; de Souza, Rodrigo Fonseca; Coelho, Rosalie Reed Rodrigues; Pötter, Gabrielle; Klenk, Hans-Peter; Labeda, David P

    2017-12-01

    A novel streptomycete, strain 594 T , isolated from Brazilian soil collected under cerrado (savanna) vegetation cover is described. Strain 594 T produced thermophilic chitinolytic proteases in assays containing feather meal and corn steep liquor as sole sources of carbon and nitrogen. The strain produced white to grey aerial mycelium and spiral chains of spiny-surfaced spores on the aerial mycelium and did not produce diffusible pigments. The ll-isomer of diaminopimelic acid was present in the cell wall and menaquinones were predominantly MK-9(H6) (52 %) and MK-9(H8) (30 %) with 6 % MK-9(H4) and slightly less than 1 % MK-9(H2). Polar lipids present were phosphatidylethanolamine, diphosphatidylglycerol, phosphatidylglycerol, phosphatidylinositol and an unknown phospholipid. The major fatty acids were anteiso-C15 : 0, anteiso-C16 : 0, anteiso-C14 : 0 and anteiso-C17 : 0. The G+C content of the genomic DNA was 70.4 mol%. Phylogenetic analysis of the nearly complete 16S rRNA gene sequence indicated that it differed from described Streptomyces species. Multilocus sequence analysis (MLSA) using five housekeeping genes (atpD, gyrB, rpoB, recA and trpB) comparing Streptomyces type strains showed that the MLSA distance of strain 594 T to the most closely related species was greater than the 0.007 threshold. The in silico DNA-DNA relatedness between the genome sequence of strain 594 T and that of the phylogenetically nearest species was well below the species level recommendation. There was thus multiple evidence justifying the description of this strain as representing a novel species, for which the name Streptomyces odonnellii sp. nov. is proposed. The type strain is 594 T (=IMPPG 594 T =DSM 41949 T =NRRL B-24891 T ).

  10. Serratia aquatilis sp. nov., isolated from drinking water systems.

    PubMed

    Kämpfer, Peter; Glaeser, Stefanie P

    2016-01-01

    A cream-white-pigmented, oxidase-negative bacterium (strain 2015-2462-01T), isolated from a drinking water system, was investigated in detail to determine its taxonomic position. Cells of the isolate were rod-shaped and stained Gram-negative. A comparison of the 16S rRNA gene sequence of strain 2015-2462-01T with sequences of the type strains of closely related species of the genus Serratia revealed highest similarity to Serratia fonticola (98.4 %), Serratia proteamaculans (97.8 %), Serratia liquefaciens and Serratia grimesii (both 97.7 %). 16S rRNA gene sequence similarities to all other Serratia species were below 97.4 %. Multilocus sequence analysis (MLSA) on the basis of concatenated partial gyrB, rpoB, infB and atpD gene sequences showed a clear distinction of strain 2015-2462-01T from the type strains of the closest related Serratia species. The fatty acid profile of the strain consisted of C16 : 1 ω7c, C16 : 0; C14 : 0 and C14 : 0 3-OH/iso-C16 : 1 I as major components. DNA-DNA hybridizations between 2015-2462-01T and S. fonticola ATCC 29844T resulted in a relatedness value of 27 % (reciprocal 20 %). This DNA-DNA hybridization result in combination with the MLSA results and the differential biochemical properties indicated that strain 2015-2462-01T represents a novel species of the genus Serratia, for which the name Serratia aquatilis sp. nov. is proposed. The type strain is 2015-2462-01T ( = LMG 29119T = CCM 8626T).

  11. Mesorhizobium shonense sp. nov., Mesorhizobium hawassense sp. nov. and Mesorhizobium abyssinicae sp. nov., isolated from root nodules of different agroforestry legume trees.

    PubMed

    Degefu, Tulu; Wolde-Meskel, Endalkachew; Liu, Binbin; Cleenwerck, Ilse; Willems, Anne; Frostegård, Åsa

    2013-05-01

    A total of 18 strains, representing members of the genus Mesorhizobium, obtained from root nodules of woody legumes growing in Ethiopia, have been previously shown, by multilocus sequence analysis (MLSA) of five housekeeping genes, to form three novel genospecies. In the present study, the phylogenetic relationship between representative strains of these three genospecies and the type strains of their closest phylogenetic neighbours Mesorhizobium plurifarium, Mesorhizobium amorphae, Mesorhizobium septentrionale and Mesorhizobium huakuii was further evaluated using a polyphasic taxonomic approach. In line with our earlier MLSA of other housekeeping genes, the phylogenetic trees derived from the atpD and glnII genes grouped the test strains into three well-supported, distinct lineages that exclude all defined species of the genus Mesorhizobium. The DNA-DNA relatedness between the representative strains of genospecies I-III and the type strains of their closest phylogenetic neighbours was low (≤59 %). They differed from each other and from their closest phylogenetic neighbours by the presence/absence of several fatty acids, or by large differences in the relative amounts of particular fatty acids. While showing distinctive features, they were generally able to utilize a wide range of substrates as sole carbon and nitrogen sources. The strains belonging to genospecies I, II and III therefore represent novel species for which we propose the names Mesorhizobium shonense sp. nov., Mesorhizobium hawassense sp. nov. and Mesorhizobium abyssinicae sp. nov. The isolates AC39a(T) ( = LMG 26966(T) = HAMBI 3295(T)), AC99b(T) ( = LMG 26968(T) = HAMBI 3301(T)) and AC98c(T) ( = LMG 26967(T) = HAMBI 3306(T)) are proposed as type strains for the respective novel species.

  12. Brucella papionis sp. nov., isolated from baboons (Papio spp.)

    PubMed Central

    Davison, Nicholas; Cloeckaert, Axel; Al Dahouk, Sascha; Zygmunt, Michel S.; Brew, Simon D.; Perrett, Lorraine L.; Koylass, Mark S.; Vergnaud, Gilles; Quance, Christine; Scholz, Holger C.; Dick, Edward J.; Hubbard, Gene; Schlabritz-Loutsevitch, Natalia E.

    2014-01-01

    Two Gram-negative, non-motile, non-spore-forming coccoid bacteria (strains F8/08-60T and F8/08-61) isolated from clinical specimens obtained from baboons (Papio spp.) that had delivered stillborn offspring were subjected to a polyphasic taxonomic study. On the basis of 16S rRNA gene sequence similarities, both strains, which possessed identical sequences, were assigned to the genus Brucella. This placement was confirmed by extended multilocus sequence analysis (MLSA), where both strains possessed identical sequences, and whole-genome sequencing of a representative isolate. All of the above analyses suggested that the two strains represent a novel lineage within the genus Brucella. The strains also possessed a unique profile when subjected to the phenotyping approach classically used to separate species of the genus Brucella, reacting only with Brucella A monospecific antiserum, being sensitive to the dyes thionin and fuchsin, being lysed by bacteriophage Wb, Bk2 and Fi phage at routine test dilution (RTD) but only partially sensitive to bacteriophage Tb, and with no requirement for CO2 and no production of H2S but strong urease activity. Biochemical profiling revealed a pattern of enzyme activity and metabolic capabilities distinct from existing species of the genus Brucella. Molecular analysis of the omp2 locus genes showed that both strains had a novel combination of two highly similar omp2b gene copies. The two strains shared a unique fingerprint profile of the multiple-copy Brucella-specific element IS711. Like MLSA, a multilocus variable number of tandem repeat analysis (MLVA) showed that the isolates clustered together very closely, but represent a distinct group within the genus Brucella. Isolates F8/08-60T and F8/08-61 could be distinguished clearly from all known species of the genus Brucellaand their biovars by both phenotypic and molecular properties. Therefore, by applying the species concept for the genus Brucellasuggested by the ICSP Subcommittee on the Taxonomy of Brucella, they represent a novel species within the genus Brucella, for which the name Brucella papionis sp. nov. is proposed, with the type strain F8/08-60T ( = NCTC 13660T = CIRMBP 0958T). PMID:25242540

  13. Vibrio chromosomes share common history.

    PubMed

    Kirkup, Benjamin C; Chang, LeeAnn; Chang, Sarah; Gevers, Dirk; Polz, Martin F

    2010-05-10

    While most gamma proteobacteria have a single circular chromosome, Vibrionales have two circular chromosomes. Horizontal gene transfer is common among Vibrios, and in light of this genetic mobility, it is an open question to what extent the two chromosomes themselves share a common history since their formation. Single copy genes from each chromosome (142 genes from chromosome I and 42 genes from chromosome II) were identified from 19 sequenced Vibrionales genomes and their phylogenetic comparison suggests consistent phylogenies for each chromosome. Additionally, study of the gene organization and phylogeny of the respective origins of replication confirmed the shared history. Thus, while elements within the chromosomes may have experienced significant genetic mobility, the backbones share a common history. This allows conclusions based on multilocus sequence analysis (MLSA) for one chromosome to be applied equally to both chromosomes.

  14. Molecular Identification and Susceptibility of Clinically Relevant Scedosporium spp. in China

    PubMed Central

    Wang, Hong; Wan, Zhe; Li, Ruoyu; Lu, Qiaoyun

    2015-01-01

    As various new sibling species within the Scedosporium spp. have been described recently, this study was conducted to investigate distribution and antifungal susceptibility profiles of the different species of Scedosporium spp. in China. Twenty-one clinical strains of Scedosporium from China and two strains from Japan were reidentified by MLSA. The analysis included BT2, CAL, RPB, SOD, and ACT and the combination of the five loci. Pseudallescheria boydii complex (17 strains) and S. apiospermum (6 strains) were identified. P. boydii complex included four closely related subgroups: P. boydii (9 strains), P. ellipsoidea (6 strains), P. fusoidea (1 strain), and P. angusta (1 strain). There were no significant differences in MICs for neither VOR, POS, nor AMB over all the five species in study. For itraconazole, intraspecific diversity was evident. PMID:26550562

  15. Molecular identification and susceptibility of clinically relevant Scedosporium spp. in China.

    PubMed

    Wang, Hong; Wan, Zhe; Li, Ruoyu; Lu, Qiaoyun; Yu, Jin

    2015-01-01

    As various new sibling species within the Scedosporium spp. have been described recently, this study was conducted to investigate distribution and antifungal susceptibility profiles of the different species of Scedosporium spp. in China. Twenty-one clinical strains of Scedosporium from China and two strains from Japan were reidentified by MLSA. The analysis included BT2, CAL, RPB, SOD, and ACT and the combination of the five loci. Pseudallescheria boydii complex (17 strains) and S. apiospermum (6 strains) were identified. P. boydii complex included four closely related subgroups: P. boydii (9 strains), P. ellipsoidea (6 strains), P. fusoidea (1 strain), and P. angusta (1 strain). There were no significant differences in MICs for neither VOR, POS, nor AMB over all the five species in study. For itraconazole, intraspecific diversity was evident.

  16. Bradyrhizobium sacchari sp. nov., a legume nodulating bacterium isolated from sugarcane roots.

    PubMed

    de Matos, Gustavo Feitosa; Zilli, Jerri Edson; de Araújo, Jean Luiz Simões; Parma, Marcia Maria; Melo, Itamar Soares; Radl, Viviane; Baldani, José Ivo; Rouws, Luc Felicianus Marie

    2017-11-01

    Members of the genus Bradyrhizobium are well-known as nitrogen-fixing microsymbionts of a wide variety of leguminous species, but they have also been found in different environments, notably as endophytes in non-legumes such as sugarcane. This study presents a detailed polyphasic characterization of four Bradyrhizobium strains (type strain BR 10280 T ), previously isolated from roots of sugarcane in Brazil. 16S rRNA sequence analysis, multilocus sequence analysis (MLSA) and analysis of the 16S-23S rRNA internal transcribed spacer showed that these strains form a novel clade close to, but different from B. huanghuaihaiense strain CCBAU 23303 T . Average nucleotide identity (ANI) analyses confirmed that BR 10280 T represents a novel species. Phylogenetic analysis based on nodC gene sequences also placed the strains close to CCBAU 23303 T , but different from this latter strain, the sugarcane strains did not nodulate soybean, although they effectively nodulated Vigna unguiculata, Cajanus cajan and Macroptilium atropurpureum. Physiological traits are in agreement with the placement of the strains in the genus Bradyrhizobium as a novel species for which the name Bradyrhizobium sacchari sp. nov. is proposed.

  17. Comparative evolutionary genomics of Corynebacterium with special reference to codon and amino acid usage diversities.

    PubMed

    Pal, Shilpee; Sarkar, Indrani; Roy, Ayan; Mohapatra, Pradeep K Das; Mondal, Keshab C; Sen, Arnab

    2018-02-01

    The present study has been aimed to the comparative analysis of high GC composition containing Corynebacterium genomes and their evolutionary study by exploring codon and amino acid usage patterns. Phylogenetic study by MLSA approach, indel analysis and BLAST matrix differentiated Corynebacterium species in pathogenic and non-pathogenic clusters. Correspondence analysis on synonymous codon usage reveals that, gene length, optimal codon frequencies and tRNA abundance affect the gene expression of Corynebacterium. Most of the optimal codons as well as translationally optimal codons are C ending i.e. RNY (R-purine, N-any nucleotide base, and Y-pyrimidine) and reveal translational selection pressure on codon bias of Corynebacterium. Amino acid usage is affected by hydrophobicity, aromaticity, protein energy cost, etc. Highly expressed genes followed the cost minimization hypothesis and are less diverged at their synonymous positions of codons. Functional analysis of core genes shows significant difference in pathogenic and non-pathogenic Corynebacterium. The study reveals close relationship between non-pathogenic and opportunistic pathogenic Corynebaterium as well as between molecular evolution and survival niches of the organism.

  18. Draft Whole Genome Sequence Analyses on Pseudomonas syringae pv. actinidiae Hypersensitive Response Negative Strains Detected from Kiwifruit Bleeding Sap Samples.

    PubMed

    Biondi, Enrico; Zamorano, Alan; Vega, Ernesto; Ardizzi, Stefano; Sitta, Davide; De Salvador, Flavio Roberto; Campos-Vargas, Reinaldo; Meneses, Claudio; Perez, Set; Bertaccini, Assunta; Fiore, Nicola

    2018-05-01

    Kiwifruit bleeding sap samples, collected in Italian and Chilean orchards from symptomatic and asymptomatic plants, were evaluated for the presence of Pseudomonas syringae pv. actinidiae, the causal agent of bacterial canker. The saps were sampled during the spring in both hemispheres, before the bud sprouting, during the optimal time window for the collection of an adequate volume of sample for the early detection of the pathogen, preliminarily by molecular assays, and then through its direct isolation and identification. The results of molecular analyses showed more effectiveness in the P. syringae pv. actinidiae detection when compared with those of microbiological analyses through the pathogen isolation on the nutritive and semiselective media selected. The bleeding sap analyses allowed the isolation and identification of two hypersensitive response (HR) negative and hypovirulent P. syringae pv. actinidiae strains from different regions in Italy. Moreover, multilocus sequence analysis (MLSA) and whole genome sequence (WGS) were carried out on selected Italian and Chilean P. syringae pv. actinidiae virulent strains to verify the presence of genetic variability compared with the HR negative strains and to compare the variability of selected gene clusters between strains isolated in both countries. All the strains showed the lack of argK and coronatine gene clusters as reported for the biovar 3 P. syringae pv. actinidiae strains. Despite the biologic differences obtained in the tobacco bioassays and in pathogenicity assays, the MLSA and WGS analyses did not show significant differences between the WGS of the HR negative and HR positive strains; the difference, on the other hand, between PAC_ICE sequences of Italian and Chilean P. syringae pv. actinidiae strains was confirmed. The inability of the hypovirulent strains IPV-BO 8893 and IPV-BO 9286 to provoke HR in tobacco and the low virulence shown in this host could not be associated with mutations or recombinations in T3SS island.

  19. Draft Genomes, Phylogenetic Reconstruction, and Comparative Genomics of Two Novel Cohabiting Bacterial Symbionts Isolated from Frankliniella occidentalis

    PubMed Central

    Facey, Paul D.; Méric, Guillaume; Hitchings, Matthew D.; Pachebat, Justin A.; Hegarty, Matt J.; Chen, Xiaorui; Morgan, Laura V.A.; Hoeppner, James E.; Whitten, Miranda M.A.; Kirk, William D.J.; Dyson, Paul J.; Sheppard, Sam K.; Sol, Ricardo Del

    2015-01-01

    Obligate bacterial symbionts are widespread in many invertebrates, where they are often confined to specialized host cells and are transmitted directly from mother to progeny. Increasing numbers of these bacteria are being characterized but questions remain about their population structure and evolution. Here we take a comparative genomics approach to investigate two prominent bacterial symbionts (BFo1 and BFo2) isolated from geographically separated populations of western flower thrips, Frankliniella occidentalis. Our multifaceted approach to classifying these symbionts includes concatenated multilocus sequence analysis (MLSA) phylogenies, ribosomal multilocus sequence typing (rMLST), construction of whole-genome phylogenies, and in-depth genomic comparisons. We showed that the BFo1 genome clusters more closely to species in the genus Erwinia, and is a putative close relative to Erwinia aphidicola. BFo1 is also likely to have shared a common ancestor with Erwinia pyrifoliae/Erwinia amylovora and the nonpathogenic Erwinia tasmaniensis and genetic traits similar to Erwinia billingiae. The BFo1 genome contained virulence factors found in the genus Erwinia but represented a divergent lineage. In contrast, we showed that BFo2 belongs within the Enterobacteriales but does not group closely with any currently known bacterial species. Concatenated MLSA phylogenies indicate that it may have shared a common ancestor to the Erwinia and Pantoea genera, and based on the clustering of rMLST genes, it was most closely related to Pantoea ananatis but represented a divergent lineage. We reconstructed a core genome of a putative common ancestor of Erwinia and Pantoea and compared this with the genomes of BFo bacteria. BFo2 possessed none of the virulence determinants that were omnipresent in the Erwinia and Pantoea genera. Taken together, these data are consistent with BFo2 representing a highly novel species that maybe related to known Pantoea. PMID:26185096

  20. Draft Genomes, Phylogenetic Reconstruction, and Comparative Genomics of Two Novel Cohabiting Bacterial Symbionts Isolated from Frankliniella occidentalis.

    PubMed

    Facey, Paul D; Méric, Guillaume; Hitchings, Matthew D; Pachebat, Justin A; Hegarty, Matt J; Chen, Xiaorui; Morgan, Laura V A; Hoeppner, James E; Whitten, Miranda M A; Kirk, William D J; Dyson, Paul J; Sheppard, Sam K; Del Sol, Ricardo

    2015-07-15

    Obligate bacterial symbionts are widespread in many invertebrates, where they are often confined to specialized host cells and are transmitted directly from mother to progeny. Increasing numbers of these bacteria are being characterized but questions remain about their population structure and evolution. Here we take a comparative genomics approach to investigate two prominent bacterial symbionts (BFo1 and BFo2) isolated from geographically separated populations of western flower thrips, Frankliniella occidentalis. Our multifaceted approach to classifying these symbionts includes concatenated multilocus sequence analysis (MLSA) phylogenies, ribosomal multilocus sequence typing (rMLST), construction of whole-genome phylogenies, and in-depth genomic comparisons. We showed that the BFo1 genome clusters more closely to species in the genus Erwinia, and is a putative close relative to Erwinia aphidicola. BFo1 is also likely to have shared a common ancestor with Erwinia pyrifoliae/Erwinia amylovora and the nonpathogenic Erwinia tasmaniensis and genetic traits similar to Erwinia billingiae. The BFo1 genome contained virulence factors found in the genus Erwinia but represented a divergent lineage. In contrast, we showed that BFo2 belongs within the Enterobacteriales but does not group closely with any currently known bacterial species. Concatenated MLSA phylogenies indicate that it may have shared a common ancestor to the Erwinia and Pantoea genera, and based on the clustering of rMLST genes, it was most closely related to Pantoea ananatis but represented a divergent lineage. We reconstructed a core genome of a putative common ancestor of Erwinia and Pantoea and compared this with the genomes of BFo bacteria. BFo2 possessed none of the virulence determinants that were omnipresent in the Erwinia and Pantoea genera. Taken together, these data are consistent with BFo2 representing a highly novel species that maybe related to known Pantoea. © The Author(s) 2015. Published by Oxford University Press on behalf of the Society for Molecular Biology and Evolution.

  1. Streptomyces amphotericinicus sp. nov., an amphotericin-producing actinomycete isolated from the head of an ant (Camponotus japonicus Mayr).

    PubMed

    Cao, Tingting; Mu, Shan; Lu, Chang; Zhao, Shanshan; Li, Dongmei; Yan, Kai; Xiang, Wensheng; Liu, Chongxi

    2017-12-01

    A novel actinomycete, designated strain 1H-SSA8 T , was isolated from the head of an ant (Camponotus japonicus Mayr) and was found to produce amphotericin. A polyphasic approach was employed to determine the status of strain 1H-SSA8 T . Morphological and chemotaxonomic characteristics were consistent with those of members of the genus Streptomyces. The menaquinones detected were MK-9(H6), MK-9(H8) and MK-9(H4). The phospholipid profile consisted of diphosphatidylglycerol, phosphatidylmethylethanolamine, phosphatidylethanolamine and phosphatidylinositol mannoside. The major fatty acids were identified as iso-C16 : 0, C16 : 0, C15 : 0 and anteiso-C15 : 0. Analysis of the 16S rRNA gene sequence showed that strain 1H-SSA8 T belongs to the genus Streptomyces with high sequence similarity to Streptomyces ramulosus NRRL B-2714 T (99.2 %). Two tree-making algorithms based on 16S rRNA gene sequences showed that the isolate formed a phyletic line with Streptomyces himastatinicus ATCC 53653 T (98.7 %). The MLSA utilizing partial sequences of the housekeeping genes (atpD, gyrB, recA, rpoB and trpB) also supported the position. However, evolutionary distances were higher than the 0.007 MLSA evolutionary distance threshold proposed for species-level relatedness. Moreover, the low level of DNA-DNA relatedness and phenotypic differences allowed the novel isolate to be differentiated from its most closely related strain S. ramulosus NRRL B-2714 T and strain S. himastatinicus ATCC 53653 T . It is concluded that the organism can be classified as representing a novel species of the genus Streptomyces, for which the name Streptomyces amphotericinicus sp. nov. is proposed. The type strain is 1H-SSA8 T (=CGMCC 4.7350 T =DSM 103128 T ).

  2. Brucella papionis sp. nov., isolated from baboons (Papio spp.).

    PubMed

    Whatmore, Adrian M; Davison, Nicholas; Cloeckaert, Axel; Al Dahouk, Sascha; Zygmunt, Michel S; Brew, Simon D; Perrett, Lorraine L; Koylass, Mark S; Vergnaud, Gilles; Quance, Christine; Scholz, Holger C; Dick, Edward J; Hubbard, Gene; Schlabritz-Loutsevitch, Natalia E

    2014-12-01

    Two Gram-negative, non-motile, non-spore-forming coccoid bacteria (strains F8/08-60(T) and F8/08-61) isolated from clinical specimens obtained from baboons (Papio spp.) that had delivered stillborn offspring were subjected to a polyphasic taxonomic study. On the basis of 16S rRNA gene sequence similarities, both strains, which possessed identical sequences, were assigned to the genus Brucella. This placement was confirmed by extended multilocus sequence analysis (MLSA), where both strains possessed identical sequences, and whole-genome sequencing of a representative isolate. All of the above analyses suggested that the two strains represent a novel lineage within the genus Brucella. The strains also possessed a unique profile when subjected to the phenotyping approach classically used to separate species of the genus Brucella, reacting only with Brucella A monospecific antiserum, being sensitive to the dyes thionin and fuchsin, being lysed by bacteriophage Wb, Bk2 and Fi phage at routine test dilution (RTD) but only partially sensitive to bacteriophage Tb, and with no requirement for CO2 and no production of H2S but strong urease activity. Biochemical profiling revealed a pattern of enzyme activity and metabolic capabilities distinct from existing species of the genus Brucella. Molecular analysis of the omp2 locus genes showed that both strains had a novel combination of two highly similar omp2b gene copies. The two strains shared a unique fingerprint profile of the multiple-copy Brucella-specific element IS711. Like MLSA, a multilocus variable number of tandem repeat analysis (MLVA) showed that the isolates clustered together very closely, but represent a distinct group within the genus Brucella. Isolates F8/08-60(T) and F8/08-61 could be distinguished clearly from all known species of the genus Brucella and their biovars by both phenotypic and molecular properties. Therefore, by applying the species concept for the genus Brucella suggested by the ICSP Subcommittee on the Taxonomy of Brucella, they represent a novel species within the genus Brucella, for which the name Brucella papionis sp. nov. is proposed, with the type strain F8/08-60(T) ( = NCTC 13660(T) = CIRMBP 0958(T)). Crown Copyright 2014. Reproduced with the permission of the Controller of Her Majesty's Stationery Office/Queen's Printer for Scotland and AHVLA.

  3. Microbial genomic taxonomy

    PubMed Central

    2013-01-01

    A need for a genomic species definition is emerging from several independent studies worldwide. In this commentary paper, we discuss recent studies on the genomic taxonomy of diverse microbial groups and a unified species definition based on genomics. Accordingly, strains from the same microbial species share >95% Average Amino Acid Identity (AAI) and Average Nucleotide Identity (ANI), >95% identity based on multiple alignment genes, <10 in Karlin genomic signature, and > 70% in silico Genome-to-Genome Hybridization similarity (GGDH). Species of the same genus will form monophyletic groups on the basis of 16S rRNA gene sequences, Multilocus Sequence Analysis (MLSA) and supertree analysis. In addition to the established requirements for species descriptions, we propose that new taxa descriptions should also include at least a draft genome sequence of the type strain in order to obtain a clear outlook on the genomic landscape of the novel microbe. The application of the new genomic species definition put forward here will allow researchers to use genome sequences to define simultaneously coherent phenotypic and genomic groups. PMID:24365132

  4. Diverse Mesorhizobium bacteria nodulate native Astragalus and Oxytropis in arctic and subarctic areas in Eurasia.

    PubMed

    Ampomah, Osei Yaw; Mousavi, Seyed Abdollah; Lindström, Kristina; Huss-Danell, Kerstin

    2017-01-01

    Rhizobia nodulating native Astragalus and Oxytropis spp. in Northern Europe are not well-studied. In this study, we isolated bacteria from nodules of four Astragalus spp. and two Oxytropis spp. from the arctic and subarctic regions of Sweden and Russia. The phylogenetic analyses were performed by using sequences of three housekeeping genes (16S rRNA, rpoB and recA) and two accessory genes (nodC and nifH). The results of our multilocus sequence analysis (MLSA) of the three housekeeping genes tree showed that all the 13 isolates belonged to the genus Mesorhizobium and were positioned in six clades. Our concatenated housekeeping gene tree also suggested that the isolates nodulating Astragalus inopinatus, Astragalus frigidus, Astragalus alpinus ssp. alpinus and Oxytropis revoluta might be designated as four new Mesorhizobium species. The 13 isolates were grouped in three clades in the nodC and nifH trees. 15 N analysis suggested that the legumes in association with these isolates were actively fixing nitrogen. Copyright © 2016 Elsevier GmbH. All rights reserved.

  5. Proposal of Vespertiliibacter pulmonis gen. nov., sp. nov. and two genomospecies as new members of the family Pasteurellaceae isolated from European bats.

    PubMed

    Mühldorfer, Kristin; Speck, Stephanie; Wibbelt, Gudrun

    2014-07-01

    Five bacterial strains isolated from bats of the family Vespertilionidae were characterized by phenotypic tests and multilocus sequence analysis (MLSA) using the 16S rRNA gene and four housekeeping genes (rpoA, rpoB, infB, recN). Phylogenetic analyses of individual and combined datasets indicated that the five strains represent a monophyletic cluster within the family Pasteurellaceae. Comparison of 16S rRNA gene sequences demonstrated a high degree of similarity (98.3-99.9%) among the group of bat-derived strains, while searches in nucleotide databases indicated less than 96% sequence similarity to known members of the Pasteurellaceae. The housekeeping genes rpoA, rpoB, infB and recN provided higher resolution compared with the 16S rRNA gene and subdivided the group according to the bat species from which the strains were isolated. Three strains derived from noctule bats shared 98.6-100% sequence similarity in all four genes investigated, whereas, based on rpoB, infB and recN gene sequences, 91.8-96% similarity was observed with and between the remaining two strains isolated from a serotine bat and a pipistrelle bat, respectively. Genome relatedness as deduced from recN gene sequences correlated well with the results of MLSA and indicated that the five strains represent a new genus. Based on these results, it is proposed to classify the five strains derived from bats within Vespertiliibacter pulmonis gen. nov., sp. nov. (the type species), Vespertiliibacter genomospecies 1 and Vespertiliibacter genomospecies 2. The genus can be distinguished phenotypically from recognized genera of the Pasteurellaceae by at least three characteristics. All strains are nutritionally fastidious and require a chemically defined supplement with NAD for growth. The DNA G+C content of strain E127/08(T) is 38.2 mol%. The type strain of Vespertiliibacter pulmonis gen. nov., sp. nov. is E127/08(T) ( = CCUG 64585(T) = DSM 27238(T)). The reference strains of Vespertiliibacter genomospecies 1 and 2 are E145/08 and E157/08, respectively. © 2014 IUMS.

  6. Actinomyces succiniciruminis sp. nov. and Actinomyces glycerinitolerans sp. nov., two novel organic acid-producing bacteria isolated from rumen.

    PubMed

    Palakawong N A, Susakul; Pristaš, Peter; Hrehová, Ludmila; Javorský, Peter; Stams, Alfons J M; Plugge, Caroline M

    2016-10-01

    Two bacterial strains, Am4 and G10 were isolated from rumen fluid of different ruminants: cow (Holstein-Friesian) and sheep (Slovenskè merino), respectively. They were isolated from different hosts and regions, but showed 99.2% similarity of the 16S rRNA genes. Both strains are versatile and ferment various sugars to mainly succinate and lactate and small amounts of acetate and formate. The 16S rRNA sequences of Am4 and G10 revealed that they belonged to the genus Actinomyces, and are related to Actinomyces ruminicola JCM 13352 T with 97.0% and 97.4% similarity, respectively. DDH showed strain Am4 and G10 had only 55.8 and 43.3% similarity with the Actinomyces ruminicola JCM 13352 T , and had 69.9% similarity among each other. Comparing strain Am4 and G10, gANI value and dDDH were 92.9% and 68.6%, respectively. Additionally, AAI between the strains was 95.8%. MLSA of housekeeping genes showed difference of metG and pheS. The G+C% contents of strain Am4 and G10 were 69.8% and 68.5%, respectively. MK-10(H 4 ) was the principal quinone for strain Am4 (82%) and G10 (91%) with small amounts of MK-10(H 8 ) and MK-10(H 6 ) for both strains. Only MK-9(H 4 ) was detected in strain Am4. MALDI-TOF analysis of protein profiles also revealed that Am4 and G10 are different from each other and from Actinomyces ruminicola JCM 13352 T . Based on phylogenetic and physiological characteristics, together with genome comparison and MLSA we propose two novel species in the genus Actinomyces: Actinomyces succiniciruminis sp. nov. (type strain Am4 T =TISTR 2317 T =DSM 10376 T ) and Actinomyces glycerinitolerans sp. nov. (type strain G10 T =TISTR 2318 T =DSM 10377 T ). Copyright © 2016 The Authors. Published by Elsevier GmbH.. All rights reserved.

  7. Reconstruction of truncated TCT and SPECT data from a right-angle dual-camera system for myocardial SPECT

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tsui, B.M.W.; Frey, E.C.; Lalush, D.S.

    1996-12-31

    We investigated methods to accurately reconstruct 180{degrees} truncated TCT and SPECT projection data obtained from a right-angle dual-camera SPECT system for myocardial SPECT with attenuation compensation. The 180{degrees} data reconstruction methods would permit substantial savings in transmission data acquisition time. Simulation data from the 3D MCAT phantom and clinical data from large patients were used in the evaluation study. Different transmission reconstruction methods including the FBP, transmission ML-EM, transmission ML-SA, and BIT algorithms with and without using the body contour as support, were used in the TCT image reconstructions. The accuracy of both the TCT and attenuation compensated SPECT imagesmore » were evaluated for different degrees of truncation and noise levels. We found that using the FBP reconstructed TCT images resulted in higher count density in the left ventricular (LV) wall of the attenuation compensated SPECT images. The LV wall count density obtained using the iteratively reconstructed TCT images with and without support were similar to each other and were more accurate than that using the FBP. However, the TCT images obtained with support show fewer image artifacts than without support. Among the iterative reconstruction algorithms, the ML-SA algorithm provides the most accurate reconstruction but is the slowest. The BIT algorithm is the fastest but shows the most image artifacts. We conclude that accurate attenuation compensated images can be obtained with truncated 180{degrees} data from large patients using a right-angle dual-camera SPECT system.« less

  8. Trait Differentiation within the Fungus-Feeding (Mycophagous) Bacterial Genus Collimonas

    PubMed Central

    Ballhausen, Max-Bernhard; Vandamme, Peter; de Boer, Wietse

    2016-01-01

    The genus Collimonas consists of facultative, fungus-feeding (mycophagous) bacteria. To date, 3 species (C. fungivorans, C. pratensis and C. arenae) have been described and over 100 strains have been isolated from different habitats. Functional traits of Collimonas bacteria that are potentially involved in interactions with soil fungi mostly negatively (fungal inhibition e.g.), but also positively (mineral weathering e.g.), affect fungal fitness. We hypothesized that variation in such traits between Collimonas strains leads to different mycophagous bacterial feeding patterns. We investigated a) whether phylogenetically closely related Collimonas strains possess similar traits, b) how far phylogenetic resolution influences the detection of phylogenetic signal (possession of similar traits by related strains) and c) if there is a pattern of co-occurrence among the studied traits. We measured genetically encoded (nifH genes, antifungal collimomycin gene cluster e.g.) as well as phenotypically expressed traits (chitinase- and siderophore production, fungal inhibition and others) and related those to a high-resolution phylogeny (MLSA), constructed by sequencing the housekeeping genes gyrB and rpoB and concatenating those with partial 16S rDNA sequences. Additionally, high-resolution and 16S rDNA derived phylogenies were compared. We show that MLSA is superior to 16SrDNA phylogeny when analyzing trait distribution and relating it to phylogeny at fine taxonomic resolution (a single bacterial genus). We observe that several traits involved in the interaction of collimonads and their host fungus (fungal inhibition e.g.) carry phylogenetic signal. Furthermore, we compare Collimonas trait possession with sister genera like Herbaspirillum and Janthinobacterium. PMID:27309848

  9. Reassessment of the taxonomic position of Burkholderia andropogonis and description of Robbsia andropogonis gen. nov., comb. nov.

    PubMed

    Lopes-Santos, Lucilene; Castro, Daniel Bedo Assumpção; Ferreira-Tonin, Mariana; Corrêa, Daniele Bussioli Alves; Weir, Bevan Simon; Park, Duckchul; Ottoboni, Laura Maria Mariscal; Neto, Júlio Rodrigues; Destéfano, Suzete Aparecida Lanza

    2017-06-01

    The phylogenetic classification of the species Burkholderia andropogonis within the Burkholderia genus was reassessed using 16S rRNA gene phylogenetic analysis and multilocus sequence analysis (MLSA). Both phylogenetic trees revealed two main groups, named A and B, strongly supported by high bootstrap values (100%). Group A encompassed all of the Burkholderia species complex, whi.le Group B only comprised B. andropogonis species, with low percentage similarities with other species of the genus, from 92 to 95% for 16S rRNA gene sequences and 83% for conserved gene sequences. Average nucleotide identity (ANI), tetranucleotide signature frequency, and percentage of conserved proteins POCP analyses were also carried out, and in the three analyses B. andropogonis showed lower values when compared to the other Burkholderia species complex, near 71% for ANI, from 0.484 to 0.724 for tetranucleotide signature frequency, and around 50% for POCP, reinforcing the distance observed in the phylogenetic analyses. Our findings provide an important insight into the taxonomy of B. andropogonis. It is clear from the results that this bacterial species exhibits genotypic differences and represents a new genus described herein as Robbsia andropogonis gen. nov., comb. nov.

  10. Members of a new subgroup of Streptococcus anginosus harbor virulence related genes previously observed in Streptococcus pyogenes.

    PubMed

    Babbar, Anshu; Kumar, Venkatesan Naveen; Bergmann, René; Barrantes, Israel; Pieper, Dietmar H; Itzek, Andreas; Nitsche-Schmitz, D Patric

    2017-04-01

    Conventionally categorized as commensals, the Streptococci of the species S. anginosus are facultative human pathogens that are difficult to diagnose and often overlooked. Furthermore, detailed investigation and diagnosis of S. anginosus infections is hampered by unexplored taxonomy and widely elusive molecular pathogenesis. To explore their pathogenic potential, S. anginosus isolates collected from patients of two geographical locations (Vellore, India and Leipzig, Germany) were subjected to multi-locus sequence analysis (MLSA). This analysis revealed the potential presence of a new distinct clade of the species S. anginosus, tentatively termed here as genomosubspecies vellorensis. A complementary PCR-based screening for S. pyogenes virulence factor as well as antibiotic resistance genes revealed not only the presence of superantigen- and extracellular DNase coding genes identical to corresponding genes of S. pyogenes, but also of erythromycin and tetracycline resistance genes in the genomes of the analyzed S. anginosus isolates, thus posing a matter of significant health concern. Identification of new pathogenic S. anginosus strains capable of causing difficult to treat infections may pose additional challenges to the diagnosis and treatment of Streptococcus based infections. Copyright © 2017 Elsevier GmbH. All rights reserved.

  11. Genome sequencing identifies Listeria fleischmannii subsp. coloradonensis subsp. nov., isolated from a ranch.

    PubMed

    den Bakker, Henk C; Manuel, Clyde S; Fortes, Esther D; Wiedmann, Martin; Nightingale, Kendra K

    2013-09-01

    Twenty Listeria-like isolates were obtained from environmental samples collected on a cattle ranch in northern Colorado; all of these isolates were found to share an identical partial sigB sequence, suggesting close relatedness. The isolates were similar to members of the genus Listeria in that they were Gram-stain-positive, short rods, oxidase-negative and catalase-positive; the isolates were similar to Listeria fleischmannii because they were non-motile at 25 °C. 16S rRNA gene sequencing for representative isolates and whole genome sequencing for one isolate was performed. The genome of the type strain of Listeria fleischmannii (strain LU2006-1(T)) was also sequenced. The draft genomes were very similar in size and the average MUMmer nucleotide identity across 91% of the genomes was 95.16%. Genome sequence data were used to design primers for a six-gene multi-locus sequence analysis (MLSA) scheme. Phylogenies based on (i) the near-complete 16S rRNA gene, (ii) 31 core genes and (iii) six housekeeping genes illustrated the close relationship of these Listeria-like isolates to Listeria fleischmannii LU2006-1(T). Sufficient genetic divergence of the Listeria-like isolates from the type strain of Listeria fleischmannii and differing phenotypic characteristics warrant these isolates to be classified as members of a distinct infraspecific taxon, for which the name Listeria fleischmannii subsp. coloradonensis subsp. nov. is proposed. The type strain is TTU M1-001(T) ( =BAA-2414(T) =DSM 25391(T)). The isolates of Listeria fleischmannii subsp. coloradonensis subsp. nov. differ from the nominate subspecies by the inability to utilize melezitose, turanose and sucrose, and the ability to utilize inositol. The results also demonstrate the utility of whole genome sequencing to facilitate identification of novel taxa within a well-described genus. The genomes of both subspecies of Listeria fleischmannii contained putative enhancin genes; the Listeria fleischmannii subsp. coloradonensis subsp. nov. genome also encoded a putative mosquitocidal toxin. The presence of these genes suggests possible adaptation to an insect host, and further studies are needed to probe niche adaptation of Listeria fleischmannii.

  12. Multilocus Sequence Analysis of Nectar Pseudomonads Reveals High Genetic Diversity and Contrasting Recombination Patterns

    PubMed Central

    Álvarez-Pérez, Sergio; de Vega, Clara; Herrera, Carlos M.

    2013-01-01

    The genetic and evolutionary relationships among floral nectar-dwelling Pseudomonas ‘sensu stricto’ isolates associated to South African and Mediterranean plants were investigated by multilocus sequence analysis (MLSA) of four core housekeeping genes (rrs, gyrB, rpoB and rpoD). A total of 35 different sequence types were found for the 38 nectar bacterial isolates characterised. Phylogenetic analyses resulted in the identification of three main clades [nectar groups (NGs) 1, 2 and 3] of nectar pseudomonads, which were closely related to five intrageneric groups: Pseudomonas oryzihabitans (NG 1); P. fluorescens, P. lutea and P. syringae (NG 2); and P. rhizosphaerae (NG 3). Linkage disequilibrium analysis pointed to a mostly clonal population structure, even when the analysis was restricted to isolates from the same floristic region or belonging to the same NG. Nevertheless, signatures of recombination were observed for NG 3, which exclusively included isolates retrieved from the floral nectar of insect-pollinated Mediterranean plants. In contrast, the other two NGs comprised both South African and Mediterranean isolates. Analyses relating diversification to floristic region and pollinator type revealed that there has been more unique evolution of the nectar pseudomonads within the Mediterranean region than would be expected by chance. This is the first work analysing the sequence of multiple loci to reveal geno- and ecotypes of nectar bacteria. PMID:24116076

  13. Uncommonly isolated clinical Pseudomonas: identification and phylogenetic assignation.

    PubMed

    Mulet, M; Gomila, M; Ramírez, A; Cardew, S; Moore, E R B; Lalucat, J; García-Valdés, E

    2017-02-01

    Fifty-two Pseudomonas strains that were difficult to identify at the species level in the phenotypic routine characterizations employed by clinical microbiology laboratories were selected for genotypic-based analysis. Species level identifications were done initially by partial sequencing of the DNA dependent RNA polymerase sub-unit D gene (rpoD). Two other gene sequences, for the small sub-unit ribosonal RNA (16S rRNA) and for DNA gyrase sub-unit B (gyrB) were added in a multilocus sequence analysis (MLSA) study to confirm the species identifications. These sequences were analyzed with a collection of reference sequences from the type strains of 161 Pseudomonas species within an in-house multi-locus sequence analysis database. Whole-cell matrix-assisted laser-desorption/ionization time-of-flight mass spectrometry (MALDI-TOF MS) analyses of these strains complemented the DNA sequenced-based phylogenetic analyses and were observed to be in accordance with the results of the sequence data. Twenty-three out of 52 strains were assigned to 12 recognized species not commonly detected in clinical specimens and 29 (56 %) were considered representatives of at least ten putative new species. Most strains were distributed within the P. fluorescens and P. aeruginosa lineages. The value of rpoD sequences in species-level identifications for Pseudomonas is emphasized. The correct species identifications of clinical strains is essential for establishing the intrinsic antibiotic resistance patterns and improved treatment plans.

  14. Pseudomonas aestus sp. nov., a plant growth-promoting bacterium isolated from mangrove sediments.

    PubMed

    Vasconcellos, Rafael L F; Santos, Suikinai Nobre; Zucchi, Tiago Domingues; Silva, Fábio Sérgio Paulino; Souza, Danilo Tosta; Melo, Itamar Soares

    2017-10-01

    Strain CMAA 1215 T , a Gram-reaction-negative, aerobic, catalase positive, polarly flagellated, motile, rod-shaped (0.5-0.8 × 1.3-1.9 µm) bacterium, was isolated from mangrove sediments, Cananéia Island, Brazil. Analysis of the 16S rRNA gene sequences showed that strain CMAA 1215 T forms a distinct phyletic line within the Pseudomonas putida subclade, being closely related to P. plecoglossicida ATCC 700383 T , P. monteilii NBRC 103158 T , and P. taiwanensis BCRC 17751 T of sequence similarity of 98.86, 98.73, and 98.71%, respectively. Genomic comparisons of the strain CMAA 1215 T with its closest phylogenetic type strains using average nucleotide index (ANI) and DNA:DNA relatedness approaches revealed 84.3-85.3% and 56.0-63.0%, respectively. A multilocus sequence analysis (MLSA) performed concatenating 16S rRNA, gyrB and rpoB gene sequences from the novel species was related with Pseudomonas putida subcluster and formed a new phylogenetic lineage. The phenotypic, physiological, biochemical, and genetic characteristics support the assignment of CMAA 1215 T to the genus Pseudomonas, representing a novel species. The name Pseudomonas aestus sp.nov. is proposed, with CMAA 1215 T (=NRRL B-653100 T  = CBMAI 1962 T ) as the type strain.

  15. Pantoea ananatis Genetic Diversity Analysis Reveals Limited Genomic Diversity as Well as Accessory Genes Correlated with Onion Pathogenicity.

    PubMed

    Stice, Shaun P; Stumpf, Spencer D; Gitaitis, Ron D; Kvitko, Brian H; Dutta, Bhabesh

    2018-01-01

    Pantoea ananatis is a member of the family Enterobacteriaceae and an enigmatic plant pathogen with a broad host range. Although P. ananatis strains can be aggressive on onion causing foliar necrosis and onion center rot, previous genomic analysis has shown that P. ananatis lacks the primary virulence secretion systems associated with other plant pathogens. We assessed a collection of fifty P. ananatis strains collected from Georgia over three decades to determine genetic factors that correlated with onion pathogenic potential. Previous genetic analysis studies have compared strains isolated from different hosts with varying diseases potential and isolation sources. Strains varied greatly in their pathogenic potential and aggressiveness on different cultivated Allium species like onion, leek, shallot, and chive. Using multi-locus sequence analysis (MLSA) and repetitive extragenic palindrome repeat (rep)-PCR techniques, we did not observe any correlation between onion pathogenic potential and genetic diversity among strains. Whole genome sequencing and pan-genomic analysis of a sub-set of 10 strains aided in the identification of a novel series of genetic regions, likely plasmid borne, and correlating with onion pathogenicity observed on single contigs of the genetic assemblies. We named these loci Onion Virulence Regions (OVR) A-D. The OVR loci contain genes involved in redox regulation as well as pectate lyase and rhamnogalacturonase genes. Previous studies have not identified distinct genetic loci or plasmids correlating with onion foliar pathogenicity or pathogenicity on a single host pathosystem. The lack of focus on a single host system for this phytopathgenic disease necessitates the pan-genomic analysis performed in this study.

  16. Pantoea ananatis Genetic Diversity Analysis Reveals Limited Genomic Diversity as Well as Accessory Genes Correlated with Onion Pathogenicity

    PubMed Central

    Stice, Shaun P.; Stumpf, Spencer D.; Gitaitis, Ron D.; Kvitko, Brian H.; Dutta, Bhabesh

    2018-01-01

    Pantoea ananatis is a member of the family Enterobacteriaceae and an enigmatic plant pathogen with a broad host range. Although P. ananatis strains can be aggressive on onion causing foliar necrosis and onion center rot, previous genomic analysis has shown that P. ananatis lacks the primary virulence secretion systems associated with other plant pathogens. We assessed a collection of fifty P. ananatis strains collected from Georgia over three decades to determine genetic factors that correlated with onion pathogenic potential. Previous genetic analysis studies have compared strains isolated from different hosts with varying diseases potential and isolation sources. Strains varied greatly in their pathogenic potential and aggressiveness on different cultivated Allium species like onion, leek, shallot, and chive. Using multi-locus sequence analysis (MLSA) and repetitive extragenic palindrome repeat (rep)-PCR techniques, we did not observe any correlation between onion pathogenic potential and genetic diversity among strains. Whole genome sequencing and pan-genomic analysis of a sub-set of 10 strains aided in the identification of a novel series of genetic regions, likely plasmid borne, and correlating with onion pathogenicity observed on single contigs of the genetic assemblies. We named these loci Onion Virulence Regions (OVR) A-D. The OVR loci contain genes involved in redox regulation as well as pectate lyase and rhamnogalacturonase genes. Previous studies have not identified distinct genetic loci or plasmids correlating with onion foliar pathogenicity or pathogenicity on a single host pathosystem. The lack of focus on a single host system for this phytopathgenic disease necessitates the pan-genomic analysis performed in this study. PMID:29491851

  17. Symbiotic Burkholderia Species Show Diverse Arrangements of nif/fix and nod Genes and Lack Typical High-Affinity Cytochrome cbb3 Oxidase Genes.

    PubMed

    De Meyer, Sofie E; Briscoe, Leah; Martínez-Hidalgo, Pilar; Agapakis, Christina M; de-Los Santos, Paulina Estrada; Seshadri, Rekha; Reeve, Wayne; Weinstock, George; O'Hara, Graham; Howieson, John G; Hirsch, Ann M

    2016-08-01

    Genome analysis of fourteen mimosoid and four papilionoid beta-rhizobia together with fourteen reference alpha-rhizobia for both nodulation (nod) and nitrogen-fixing (nif/fix) genes has shown phylogenetic congruence between 16S rRNA/MLSA (combined 16S rRNA gene sequencing and multilocus sequence analysis) and nif/fix genes, indicating a free-living diazotrophic ancestry of the beta-rhizobia. However, deeper genomic analysis revealed a complex symbiosis acquisition history in the beta-rhizobia that clearly separates the mimosoid and papilionoid nodulating groups. Mimosoid-nodulating beta-rhizobia have nod genes tightly clustered in the nodBCIJHASU operon, whereas papilionoid-nodulating Burkholderia have nodUSDABC and nodIJ genes, although their arrangement is not canonical because the nod genes are subdivided by the insertion of nif and other genes. Furthermore, the papilionoid Burkholderia spp. contain duplications of several nod and nif genes. The Burkholderia nifHDKEN and fixABC genes are very closely related to those found in free-living diazotrophs. In contrast, nifA is highly divergent between both groups, but the papilionoid species nifA is more similar to alpha-rhizobia nifA than to other groups. Surprisingly, for all Burkholderia, the fixNOQP and fixGHIS genes required for cbb3 cytochrome oxidase production and assembly are missing. In contrast, symbiotic Cupriavidus strains have fixNOQPGHIS genes, revealing a divergence in the evolution of two distinct electron transport chains required for nitrogen fixation within the beta-rhizobia.

  18. Xanthomonas prunicola sp. nov., a novel pathogen that affects nectarine (Prunus persica var. nectarina) trees.

    PubMed

    López, María M; Lopez-Soriano, Pablo; Garita-Cambronero, Jerson; Beltrán, Carmen; Taghouti, Geraldine; Portier, Perrine; Cubero, Jaime; Fischer-Le Saux, Marion; Marco-Noales, Ester

    2018-06-01

    Three isolates obtained from symptomatic nectarine trees (Prunus persica var. nectarina) cultivated in Murcia, Spain, which showed yellow and mucoid colonies similar to Xanthomonas arboricola pv. pruni, were negative after serological and real-time PCR analyses for this pathogen. For that reason, these isolates were characterized following a polyphasic approach that included both phenotypic and genomic methods. By sequence analysis of the 16S rRNA gene, these novel strains were identified as members of the genus Xanthomonas, and by multilocus sequence analysis (MLSA) they were clustered together in a distinct group that showed similarity values below 95 % with the rest of the species of this genus. Whole-genome comparisons of the average nucleotide identity (ANI) of genomes of the strains showed less than 91 % average nucleotide identity with all other species of the genus Xanthomonas. Additionally, phenotypic characterization based on API 20 NE, API 50 CH and BIOLOG tests differentiated the strains from the species of the genus Xanthomonas described previously. Moreover, the three strains were confirmed to be pathogenic on peach (Prunus persica), causing necrotic lesions on leaves. On the basis of these results, the novel strains represent a novel species of the genus Xanthomonas, for which the name Xanthomonas prunicola is proposed. The type strain is CFBP 8353 (=CECT 9404=IVIA 3287.1).

  19. Advanced Microbial Taxonomy Combined with Genome-Based-Approaches Reveals that Vibrio astriarenae sp. nov., an Agarolytic Marine Bacterium, Forms a New Clade in Vibrionaceae.

    PubMed

    Al-Saari, Nurhidayu; Gao, Feng; Rohul, Amin A K M; Sato, Kazumichi; Sato, Keisuke; Mino, Sayaka; Suda, Wataru; Oshima, Kenshiro; Hattori, Masahira; Ohkuma, Moriya; Meirelles, Pedro M; Thompson, Fabiano L; Thompson, Cristiane; Filho, Gilberto M A; Gomez-Gil, Bruno; Sawabe, Toko; Sawabe, Tomoo

    2015-01-01

    Advances in genomic microbial taxonomy have opened the way to create a more universal and transparent concept of species but is still in a transitional stage towards becoming a defining robust criteria for describing new microbial species with minimum features obtained using both genome and classical polyphasic taxonomies. Here we performed advanced microbial taxonomies combined with both genome-based and classical approaches for new agarolytic vibrio isolates to describe not only a novel Vibrio species but also a member of a new Vibrio clade. Two novel vibrio strains (Vibrio astriarenae sp. nov. C7T and C20) showing agarolytic, halophilic and fermentative metabolic activity were isolated from a seawater sample collected in a coral reef in Okinawa. Intraspecific similarities of the isolates were identical in both sequences on the 16S rRNA and pyrH genes, but the closest relatives on the molecular phylogenetic trees on the basis of 16S rRNA and pyrH gene sequences were V. hangzhouensis JCM 15146T (97.8% similarity) and V. agarivorans CECT 5085T (97.3% similarity), respectively. Further multilocus sequence analysis (MLSA) on the basis of 8 protein coding genes (ftsZ, gapA, gyrB, mreB, pyrH, recA, rpoA, and topA) obtained by the genome sequences clearly showed the V. astriarenae strain C7T and C20 formed a distinct new clade protruded next to V. agarivorans CECT 5085T. The singleton V. agarivorans has never been included in previous MLSA of Vibrionaceae due to the lack of some gene sequences. Now the gene sequences are completed and analysis of 100 taxa in total provided a clear picture describing the association of V. agarivorans into pre-existing concatenated network tree and concluded its relationship to our vibrio strains. Experimental DNA-DNA hybridization (DDH) data showed that the strains C7T and C20 were conspecific but were separated from all of the other Vibrio species related on the basis of both 16S rRNA and pyrH gene phylogenies (e.g., V. agarivorans CECT 5085T, V. hangzhouensis JCM 15146T V. maritimus LMG 25439T, and V. variabilis LMG 25438T). In silico DDH data also supported the genomic relationship. The strains C7T also had less than 95% average amino acid identity (AAI) and average nucleotide identity (ANI) towards V. maritimus C210, V. variabilis C206, and V. mediterranei AK1T, V. brasiliensis LMG 20546T, V. orientalis ATCC 33934T, and V. sinaloensis DSM 21326. The name Vibrio astriarenae sp. nov. is proposed with C7 as the type strains. Both V. agarivorans CECT 5058T and V. astriarenae C7T are members of the newest clade of Vibrionaceae named Agarivorans.

  20. Phylogenetic multilocus sequence analysis of indigenous slow-growing rhizobia nodulating cowpea (Vigna unguiculata L.) in Greece.

    PubMed

    Tampakaki, Anastasia P; Fotiadis, Christos T; Ntatsi, Georgia; Savvas, Dimitrios

    2017-04-01

    Cowpea (Vigna unguiculata) is a promiscuous grain legume, capable of establishing efficient symbiosis with diverse symbiotic bacteria, mainly slow-growing rhizobial species belonging to the genus Bradyrhizobium. Although much research has been done on cowpea-nodulating bacteria in various countries around the world, little is known about the genetic and symbiotic diversity of indigenous cowpea rhizobia in European soils. In the present study, the genetic and symbiotic diversity of indigenous rhizobia isolated from field-grown cowpea nodules in three geographically different Greek regions were studied. Forty-five authenticated strains were subjected to a polyphasic approach. ERIC-PCR based fingerprinting analysis grouped the isolates into seven groups and representative strains of each group were further analyzed. The analysis of the rrs gene showed that the strains belong to different species of the genus Bradyrhizobium. The analysis of the 16S-23S IGS region showed that the strains from each geographic region were characterized by distinct IGS types which may represent novel phylogenetic lineages, closely related to the type species of Bradyrhizobium pachyrhizi, Bradyrhizobium ferriligni and Bradyrhizobium liaoningense. MLSA analysis of three housekeeping genes (recA, glnII, and gyrB) showed the close relatedness of our strains with B. pachyrhizi PAC48 T and B. liaoningense USDA 3622 T and confirmed that the B. liaoningense-related isolate VUEP21 may constitute a novel species within Bradyrhizobium. Moreover, symbiotic gene phylogenies, based on nodC and nifH genes, showed that the B. pachyrhizi-related isolates belonged to symbiovar vignae, whereas the B. liaoningense-related isolates may represent a novel symbiovar. Copyright © 2017 Elsevier GmbH. All rights reserved.

  1. Examination of Spectral Transformations on Spectral Mixture Analysis

    NASA Astrophysics Data System (ADS)

    Deng, Y.; Wu, C.

    2018-04-01

    While many spectral transformation techniques have been applied on spectral mixture analysis (SMA), few study examined their necessity and applicability. This paper focused on exploring the difference between spectrally transformed schemes and untransformed scheme to find out which transformed scheme performed better in SMA. In particular, nine spectrally transformed schemes as well as untransformed scheme were examined in two study areas. Each transformed scheme was tested 100 times using different endmember classes' spectra under the endmember model of vegetation- high albedo impervious surface area-low albedo impervious surface area-soil (V-ISAh-ISAl-S). Performance of each scheme was assessed based on mean absolute error (MAE). Statistical analysis technique, Paired-Samples T test, was applied to test the significance of mean MAEs' difference between transformed and untransformed schemes. Results demonstrated that only NSMA could exceed the untransformed scheme in all study areas. Some transformed schemes showed unstable performance since they outperformed the untransformed scheme in one area but weakened the SMA result in another region.

  2. Highly diverse recombining populations of Vibrio cholerae and Vibrio parahaemolyticus in French Mediterranean coastal lagoons

    PubMed Central

    Esteves, Kévin; Mosser, Thomas; Aujoulat, Fabien; Hervio-Heath, Dominique; Monfort, Patrick; Jumas-Bilak, Estelle

    2015-01-01

    Vibrio parahaemolyticus and Vibrio cholerae are ubiquitous to estuarine and marine environments. These two species found in Mediterranean coastal systems can induce infections in humans. Environmental isolates of V. cholerae (n = 109) and V. parahaemolyticus (n = 89) sampled at different dates, stations and water salinities were investigated for virulence genes and by a multilocus sequence-based analysis (MLSA). V. cholerae isolates were all ctxA negative and only one isolate of V. parahaemolyticus displayed trh2 gene. Most Sequence Types (ST) corresponded to unique ST isolated at one date or one station. Frequent recombination events were detected among different pathogenic species, V. parahaemolyticus, V. cholerae, Vibrio mimicus, and Vibrio metoecus. Recombination had a major impact on the diversification of lineages. The genetic diversity assessed by the number of ST/strain was higher in low salinity condition for V. parahaemolyticus and V. cholerae whereas the frequency of recombination events in V. cholerae was lower in low salinity condition. Mediterranean coastal lagoon systems housed V. cholerae and V. parahaemolyticus with genetic diversities equivalent to the worldwide diversity described so far. The presence of STs found in human infections as well as the frequency of recombination events in environmental vibrios populations could predict a potential epidemiological risk. PMID:26236294

  3. Bioaccessible Antioxidants in Milk Fermented by Bifidobacterium longum subsp. longum Strains

    PubMed Central

    Gagnon, Mérilie; Savard, Patricia; Rivière, Audrey; LaPointe, Gisèle

    2015-01-01

    Bifidobacterium longum subsp. longum is among the dominant species of the human gastrointestinal microbiota and could thus have potential as probiotics. New targets such as antioxidant properties have interest for beneficial effects on health. The objective of this study was to evaluate the bioaccessibility of antioxidants in milk fermented by selected B. longum subsp. longum strains during in vitro dynamic digestion. The antioxidant capacity of cell extracts from 38 strains, of which 32 belong to B. longum subsp. longum, was evaluated with the ORAC (oxygen radical absorbance capacity) method. On the basis of screening and gene sequence typing by multilocus locus sequence analysis (MLSA), five strains were chosen for fermenting reconstituted skim milk. Antioxidant capacity varied among the strains tested (P = 0.0009). Two strains of B. longum subsp. longum (CUETM 172 and 171) showed significantly higher ORAC values than the other bifidobacteria strains. However, there does not appear to be a relationship between gene sequence types and antioxidant capacity. The milk fermented by each of the five strains selected (CUETM 268, 172, 245, 247, or PRO 16-10) did not have higher initial ORAC values compared to the nonfermented milk samples. However, higher bioaccessibility of antioxidants in fermented milk (175–358%) was observed during digestion. PMID:25802836

  4. 'Streptomyces caelicus', an antibiotic-producing species of the genus Streptomyces, and Streptomyces canchipurensis Li et al. 2015 are later heterotypic synonyms of Streptomyces muensis Ningthoujam et al. 2014.

    PubMed

    Wink, Joachim; Schumann, Peter; Atasayar, Ewelina; Klenk, Hans-Peter; Zaburannyi, Nestor; Westermann, Martin; Martin, Karin; Glaeser, Stefanie P; Kämpfer, Peter

    2017-04-01

    'Streptomyces caelicus' DSM 40835 was first reported as the producer of the antibiotic griselimycin by some coworkers of Rhone Poulenc in 1971. The project on isolation of the antibiotic compound was stopped because of the bad solubility and selectivity of the compound towards Mycobacteria. At Sanofi-Aventis, Germany, the project was re-evaluated in 2007 and the gene cluster of griselimycin could be identified, characterized and was patented in 2013. At this time, 'S. caelicus' was an invalid name. During the strain characterization work, it was found that 'S. caelicus' belongs to the group of species of the genus Streptomyces which show an unusual heterogeneity of the 16S rRNA gene sequences. However, high 16S rRNA gene sequence similarities to Streptomyces muensis JCM 17576T and Streptomyces canchipurensis JCM 17575T were obvious. Here, we present a comparative description of 'Streptomyces caelicus' DS 9461 (=DSM 40835=NCCB 100592) with S. muensis and S. canchipurensis by use of a polyphasic taxonomy approach and additional comparison of some housekeeping genes by multilocus sequence analysis (MLSA). An emended description of Streptomyces muensis is provided as a result of this work.

  5. Spatial eigensolution analysis of energy-stable flux reconstruction schemes and influence of the numerical flux on accuracy and robustness

    NASA Astrophysics Data System (ADS)

    Mengaldo, Gianmarco; De Grazia, Daniele; Moura, Rodrigo C.; Sherwin, Spencer J.

    2018-04-01

    This study focuses on the dispersion and diffusion characteristics of high-order energy-stable flux reconstruction (ESFR) schemes via the spatial eigensolution analysis framework proposed in [1]. The analysis is performed for five ESFR schemes, where the parameter 'c' dictating the properties of the specific scheme recovered is chosen such that it spans the entire class of ESFR methods, also referred to as VCJH schemes, proposed in [2]. In particular, we used five values of 'c', two that correspond to its lower and upper bounds and the others that identify three schemes that are linked to common high-order methods, namely the ESFR recovering two versions of discontinuous Galerkin methods and one recovering the spectral difference scheme. The performance of each scheme is assessed when using different numerical intercell fluxes (e.g. different levels of upwinding), ranging from "under-" to "over-upwinding". In contrast to the more common temporal analysis, the spatial eigensolution analysis framework adopted here allows one to grasp crucial insights into the diffusion and dispersion properties of FR schemes for problems involving non-periodic boundary conditions, typically found in open-flow problems, including turbulence, unsteady aerodynamics and aeroacoustics.

  6. Image encryption based on a delayed fractional-order chaotic logistic system

    NASA Astrophysics Data System (ADS)

    Wang, Zhen; Huang, Xia; Li, Ning; Song, Xiao-Na

    2012-05-01

    A new image encryption scheme is proposed based on a delayed fractional-order chaotic logistic system. In the process of generating a key stream, the time-varying delay and fractional derivative are embedded in the proposed scheme to improve the security. Such a scheme is described in detail with security analyses including correlation analysis, information entropy analysis, run statistic analysis, mean-variance gray value analysis, and key sensitivity analysis. Experimental results show that the newly proposed image encryption scheme possesses high security.

  7. [Identification and drug susceptibility testing of Mycobacterium thermoresistibile and Mycobacterium elephantis isolated from a cow with mastitis].

    PubMed

    Li, W B; Ji, L Y; Xu, D L; Liu, H C; Zhao, X Q; Wu, Y M; Wan, K L

    2018-05-10

    Objective: To understand the etiological characteristics and drug susceptibility of Mycobacterium thermoresistibile and Mycobacterium elephantis isolated from a cow with mastitis and provide evidence for the prevention and control of infectious mastitis in cows. Methods: The milk sample was collected from a cow with mastitis, which was pretreated with 4 % NaOH and inoculated with L-J medium for Mycobacterium isolation. The positive cultures were initially identified by acid-fast staining and multi-loci PCR, then Mycobacterium species was identified by the multiple loci sequence analysis (MLSA) with 16S rRNA , hsp65 , ITS and SodA genes. The drug sensitivity of the isolates to 27 antibiotics was tested by alamar blue assay. Results: Two anti-acid stain positive strains were isolated from the milk of a cow with mastitis, which were identified as non- tuberculosis mycobacterium by multi-loci PCR, and multi-loci nucleic acid sequence analysis indicated that one strain was Mycobacterium thermoresistibile and another one was Mycobacterium elephantis . The results of the drug susceptibility test showed that the two strains were resistant to most antibiotics, including rifampicin and isoniazid, but they were sensitive to amikacin, moxifloxacin, levofloxacin, ethambutol, streptomycin, tobramycin, ciprofloxacin and linezolid. Conclusions: Mycobacterium thermoresistibile and Mycobacterium elephantis were isolated in a cow with mastitis and the drug susceptibility spectrum of the pathogens were unique. The results of the study can be used as reference for the prevention and control the infection in cows.

  8. Erwinia gerundensis sp. nov., a cosmopolitan epiphyte originally isolated from pome fruit trees.

    PubMed

    Rezzonico, Fabio; Smits, Theo H M; Born, Yannick; Blom, Jochen; Frey, Jürg E; Goesmann, Alexander; Cleenwerck, Ilse; de Vos, Paul; Bonaterra, Anna; Duffy, Brion; Montesinos, Emilio

    2016-03-01

    A survey to obtain potential antagonists of pome fruit tree diseases yielded two yellow epiphytic bacterial isolates morphologically similar to Pantoea agglomerans , but showing no biocontrol activity. Whole-cell MALDI-TOF mass spectrometry and analysis of 16S rRNA gene and gyrB sequences suggested the possibility of a novel species with a phylogenetic position in either the genus Pantoea or the genus Erwinia . Multi-locus sequence analysis (MLSA) placed the two strains in the genus Erwinia and supported their classification as a novel species. The strains showed general phenotypic characteristics typical of this genus and results of DNA-DNA hybridizations confirmed that they represent a single novel species. Both strains showed a DNA G+C content, as determined by HPLC, of 54.5 mol% and could be discriminated from phylogenetically related species of the genus Erwinia by their ability to utilize potassium gluconate, potassium 2-ketogluconate, maltose, melibiose and raffinose. Whole-genome sequencing of strain EM595 T revealed the presence of a chromosomal carotenoid biosynthesis gene cluster similar to those found in species of the genera Cronobacter and Pantoea that explains the pigmentation of the strain, which is atypical for the genus Erwinia . Additional strains belonging to the same species were recovered from different plant hosts in three different continents, revealing the cosmopolitan nature of this epiphyte. The name Erwinia gerundensis sp. nov. is proposed, with EM595 T ( = LMG 28990 T  = CCOS 903 T ) as the designated type strain.

  9. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

    PubMed

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-04-25

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.

  10. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks

    PubMed Central

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-01-01

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.’s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme. PMID:28441331

  11. Error determination of a successive correction type objective analysis scheme. [for surface meteorological data

    NASA Technical Reports Server (NTRS)

    Smith, D. R.; Leslie, F. W.

    1984-01-01

    The Purdue Regional Objective Analysis of the Mesoscale (PROAM) is a successive correction type scheme for the analysis of surface meteorological data. The scheme is subjected to a series of experiments to evaluate its performance under a variety of analysis conditions. The tests include use of a known analytic temperature distribution to quantify error bounds for the scheme. Similar experiments were conducted using actual atmospheric data. Results indicate that the multiple pass technique increases the accuracy of the analysis. Furthermore, the tests suggest appropriate values for the analysis parameters in resolving disturbances for the data set used in this investigation.

  12. A Study on the Security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework.

    PubMed

    Wang, Yuan-Gen; Zhu, Guopu; Kwong, Sam; Shi, Yun-Qing

    2017-08-23

    Security analysis is a very important issue for digital watermarking. Several years ago, according to Kerckhoffs' principle, the famous four security levels, namely insecurity, key security, subspace security, and stego-security, were defined for spread-spectrum (SS) embedding schemes in the framework of watermarked-only attack. However, up to now there has been little application of the definition of these security levels to the theoretical analysis of the security of SS embedding schemes, due to the difficulty of the theoretical analysis. In this paper, based on the security definition, we present a theoretical analysis to evaluate the security levels of five typical SS embedding schemes, which are the classical SS, the improved SS (ISS), the circular extension of ISS, the nonrobust and robust natural watermarking, respectively. The theoretical analysis of these typical SS schemes are successfully performed by taking advantage of the convolution of probability distributions to derive the probabilistic models of watermarked signals. Moreover, simulations are conducted to illustrate and validate our theoretical analysis. We believe that the theoretical and practical analysis presented in this paper can bridge the gap between the definition of the four security levels and its application to the theoretical analysis of SS embedding schemes.

  13. Asymptotic analysis of discrete schemes for non-equilibrium radiation diffusion

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cui, Xia, E-mail: cui_xia@iapcm.ac.cn; Yuan, Guang-wei; Shen, Zhi-jun

    Motivated by providing well-behaved fully discrete schemes in practice, this paper extends the asymptotic analysis on time integration methods for non-equilibrium radiation diffusion in [2] to space discretizations. Therein studies were carried out on a two-temperature model with Larsen's flux-limited diffusion operator, both the implicitly balanced (IB) and linearly implicit (LI) methods were shown asymptotic-preserving. In this paper, we focus on asymptotic analysis for space discrete schemes in dimensions one and two. First, in construction of the schemes, in contrast to traditional first-order approximations, asymmetric second-order accurate spatial approximations are devised for flux-limiters on boundary, and discrete schemes with second-ordermore » accuracy on global spatial domain are acquired consequently. Then by employing formal asymptotic analysis, the first-order asymptotic-preserving property for these schemes and furthermore for the fully discrete schemes is shown. Finally, with the help of manufactured solutions, numerical tests are performed, which demonstrate quantitatively the fully discrete schemes with IB time evolution indeed have the accuracy and asymptotic convergence as theory predicts, hence are well qualified for both non-equilibrium and equilibrium radiation diffusion. - Highlights: • Provide AP fully discrete schemes for non-equilibrium radiation diffusion. • Propose second order accurate schemes by asymmetric approach for boundary flux-limiter. • Show first order AP property of spatially and fully discrete schemes with IB evolution. • Devise subtle artificial solutions; verify accuracy and AP property quantitatively. • Ideas can be generalized to 3-dimensional problems and higher order implicit schemes.« less

  14. New Insights on Taxonomy, Phylogeny and Population Genetics of Leishmania (Viannia) Parasites Based on Multilocus Sequence Analysis

    PubMed Central

    Boité, Mariana C.; Mauricio, Isabel L.; Miles, Michael A.; Cupolillo, Elisa

    2012-01-01

    The Leishmania genus comprises up to 35 species, some with status still under discussion. The multilocus sequence typing (MLST)—extensively used for bacteria—has been proposed for pathogenic trypanosomatids. For Leishmania, however, a detailed analysis and revision on the taxonomy is still required. We have partially sequenced four housekeeping genes—glucose-6-phosphate dehydrogenase (G6PD), 6-phosphogluconate dehydrogenase (6PGD), mannose phosphate isomerase (MPI) and isocitrate dehydrogenase (ICD)—from 96 Leishmania (Viannia) strains and assessed their discriminatory typing capacity. The fragments had different degrees of diversity, and are thus suitable to be used in combination for intra- and inter-specific inferences. Species-specific single nucleotide polymorphisms were detected, but not for all species; ambiguous sites indicating heterozygosis were observed, as well as the putative homozygous donor. A large number of haplotypes were detected for each marker; for 6PGD a possible ancestral allele for L. (Viannia) was found. Maximum parsimony-based haplotype networks were built. Strains of different species, as identified by multilocus enzyme electrophoresis (MLEE), formed separated clusters in each network, with exceptions. NeighborNet of concatenated sequences confirmed species-specific clusters, suggesting recombination occurring in L. braziliensis and L. guyanensis. Phylogenetic analysis indicates L. lainsoni and L. naiffi as the most divergent species and does not support L. shawi as a distinct species, placing it in the L. guyanensis cluster. BURST analysis resulted in six clonal complexes (CC), corresponding to distinct species. The L. braziliensis strains evaluated correspond to one widely geographically distributed CC and another restricted to one endemic area. This study demonstrates the value of systematic multilocus sequence analysis (MLSA) for determining intra- and inter-species relationships and presents an approach to validate the species status of some entities. Furthermore, it contributes to the phylogeny of L. (Viannia) and might be helpful for epidemiological and population genetics analysis based on haplotype/diplotype determinations and inferences. PMID:23133690

  15. Phylogenetic Analysis and Polyphasic Characterization of Clavibacter michiganensis Strains Isolated from Tomato Seeds Reveal that Nonpathogenic Strains Are Distinct from C. michiganensis subsp. michiganensis

    PubMed Central

    Durand, Karine; Orgeur, Geoffrey; Balidas, Samuel; Fricot, Céline; Bonneau, Sophie; Quillévéré, Anne; Audusseau, Corinne; Olivier, Valérie; Grimault, Valérie; Mathis, René

    2012-01-01

    The genus Clavibacter comprises one species and five subspecies of plant-pathogenic bacteria, four of which are classified as quarantine organisms due to the high economic threat they pose. Clavibacter michiganensis subsp. michiganensis is one of the most important pathogens of tomato, but the recommended diagnostic tools are not satisfactory due to false-negative and/or -positive results. To provide a robust analysis of the genetic relatedness among a worldwide collection of C. michiganensis subsp. michiganensis strains, relatives (strains from the four other C. michiganensis subspecies), and nonpathogenic Clavibacter-like strains isolated from tomato, we performed multilocus sequence-based analysis and typing (MLSA and MLST) based on six housekeeping genes (atpD, dnaK, gyrB, ppK, recA, and rpoB). We compared this “framework” with phenotypic and genotypic characteristics such as pathogenicity on tomato, reaction to two antisera by immunofluorescence and to five PCR identification tests, and the presence of four genes encoding the main C. michiganensis subsp. michiganensis pathogenicity determinants. We showed that C. michiganensis subsp. michiganensis is monophyletic and is distinct from its closest taxonomic neighbors. The nonpathogenic Clavibacter-like strains were identified as C. michiganensis using 16S rRNA gene sequencing. These strains, while cross-reacting with C. michiganensis subsp. michiganensis identification tools, are phylogenetically distinct from the pathogenic strains but belong to the C. michiganensis clade. C. michiganensis subsp. michiganensis clonal complexes linked strains from highly diverse geographical origins and also strains isolated over long periods of time in the same location. This illustrates the importance of seed transmission in the worldwide dispersion of this pathogen and its survival and adaptation abilities in a new environment once introduced. PMID:23001675

  16. A phylogenomic approach to bacterial subspecies classification: proof of concept in Mycobacterium abscessus.

    PubMed

    Tan, Joon Liang; Khang, Tsung Fei; Ngeow, Yun Fong; Choo, Siew Woh

    2013-12-13

    Mycobacterium abscessus is a rapidly growing mycobacterium that is often associated with human infections. The taxonomy of this species has undergone several revisions and is still being debated. In this study, we sequenced the genomes of 12 M. abscessus strains and used phylogenomic analysis to perform subspecies classification. A data mining approach was used to rank and select informative genes based on the relative entropy metric for the construction of a phylogenetic tree. The resulting tree topology was similar to that generated using the concatenation of five classical housekeeping genes: rpoB, hsp65, secA, recA and sodA. Additional support for the reliability of the subspecies classification came from the analysis of erm41 and ITS gene sequences, single nucleotide polymorphisms (SNPs)-based classification and strain clustering demonstrated by a variable number tandem repeat (VNTR) assay and a multilocus sequence analysis (MLSA). We subsequently found that the concatenation of a minimal set of three median-ranked genes: DNA polymerase III subunit alpha (polC), 4-hydroxy-2-ketovalerate aldolase (Hoa) and cell division protein FtsZ (ftsZ), is sufficient to recover the same tree topology. PCR assays designed specifically for these genes showed that all three genes could be amplified in the reference strain of M. abscessus ATCC 19977T. This study provides proof of concept that whole-genome sequence-based data mining approach can provide confirmatory evidence of the phylogenetic informativeness of existing markers, as well as lead to the discovery of a more economical and informative set of markers that produces similar subspecies classification in M. abscessus. The systematic procedure used in this study to choose the informative minimal set of gene markers can potentially be applied to species or subspecies classification of other bacteria.

  17. Phylogenetic analysis and polyphasic characterization of Clavibacter michiganensis strains isolated from tomato seeds reveal that nonpathogenic strains are distinct from C. michiganensis subsp. michiganensis.

    PubMed

    Jacques, Marie-Agnès; Durand, Karine; Orgeur, Geoffrey; Balidas, Samuel; Fricot, Céline; Bonneau, Sophie; Quillévéré, Anne; Audusseau, Corinne; Olivier, Valérie; Grimault, Valérie; Mathis, René

    2012-12-01

    The genus Clavibacter comprises one species and five subspecies of plant-pathogenic bacteria, four of which are classified as quarantine organisms due to the high economic threat they pose. Clavibacter michiganensis subsp. michiganensis is one of the most important pathogens of tomato, but the recommended diagnostic tools are not satisfactory due to false-negative and/or -positive results. To provide a robust analysis of the genetic relatedness among a worldwide collection of C. michiganensis subsp. michiganensis strains, relatives (strains from the four other C. michiganensis subspecies), and nonpathogenic Clavibacter-like strains isolated from tomato, we performed multilocus sequence-based analysis and typing (MLSA and MLST) based on six housekeeping genes (atpD, dnaK, gyrB, ppK, recA, and rpoB). We compared this "framework" with phenotypic and genotypic characteristics such as pathogenicity on tomato, reaction to two antisera by immunofluorescence and to five PCR identification tests, and the presence of four genes encoding the main C. michiganensis subsp. michiganensis pathogenicity determinants. We showed that C. michiganensis subsp. michiganensis is monophyletic and is distinct from its closest taxonomic neighbors. The nonpathogenic Clavibacter-like strains were identified as C. michiganensis using 16S rRNA gene sequencing. These strains, while cross-reacting with C. michiganensis subsp. michiganensis identification tools, are phylogenetically distinct from the pathogenic strains but belong to the C. michiganensis clade. C. michiganensis subsp. michiganensis clonal complexes linked strains from highly diverse geographical origins and also strains isolated over long periods of time in the same location. This illustrates the importance of seed transmission in the worldwide dispersion of this pathogen and its survival and adaptation abilities in a new environment once introduced.

  18. Multilocus sequence analysis of Thermoanaerobacter isolates reveals recombining, but differentiated, populations from geothermal springs of the Uzon Caldera, Kamchatka, Russia

    PubMed Central

    Wagner, Isaac D.; Varghese, Litty B.; Hemme, Christopher L.; Wiegel, Juergen

    2013-01-01

    Thermal environments have island-like characteristics and provide a unique opportunity to study population structure and diversity patterns of microbial taxa inhabiting these sites. Strains having ≥98% 16S rRNA gene sequence similarity to the obligately anaerobic Firmicutes Thermoanaerobacter uzonensis were isolated from seven geothermal springs, separated by up to 1600 m, within the Uzon Caldera (Kamchatka, Russian Far East). The intraspecies variation and spatial patterns of diversity for this taxon were assessed by multilocus sequence analysis (MLSA) of 106 strains. Analysis of eight protein-coding loci (gyrB, lepA, leuS, pyrG, recA, recG, rplB, and rpoB) revealed that all loci were polymorphic and that nucleotide substitutions were mostly synonymous. There were 148 variable nucleotide sites across 8003 bp concatenates of the protein-coding loci. While pairwise FST values indicated a small but significant level of genetic differentiation between most subpopulations, there was a negligible relationship between genetic divergence and spatial separation. Strains with the same allelic profile were only isolated from the same hot spring, occasionally from consecutive years, and single locus variant (SLV) sequence types were usually derived from the same spring. While recombination occurred, there was an “epidemic” population structure in which a particular T. uzonensis sequence type rose in frequency relative to the rest of the population. These results demonstrate spatial diversity patterns for an anaerobic bacterial species in a relative small geographic location and reinforce the view that terrestrial geothermal springs are excellent places to look for biogeographic diversity patterns regardless of the involved distances. PMID:23801987

  19. Comparison of the co-gasification of sewage sludge and food wastes and cost-benefit analysis of gasification- and incineration-based waste treatment schemes.

    PubMed

    You, Siming; Wang, Wei; Dai, Yanjun; Tong, Yen Wah; Wang, Chi-Hwa

    2016-10-01

    The compositions of food wastes and their co-gasification producer gas were compared with the existing data of sewage sludge. Results showed that food wastes are more favorable than sewage sludge for co-gasification based on residue generation and energy output. Two decentralized gasification-based schemes were proposed to dispose of the sewage sludge and food wastes in Singapore. Monte Carlo simulation-based cost-benefit analysis was conducted to compare the proposed schemes with the existing incineration-based scheme. It was found that the gasification-based schemes are financially superior to the incineration-based scheme based on the data of net present value (NPV), benefit-cost ratio (BCR), and internal rate of return (IRR). Sensitivity analysis was conducted to suggest effective measures to improve the economics of the schemes. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. The GEMPAK Barnes objective analysis scheme

    NASA Technical Reports Server (NTRS)

    Koch, S. E.; Desjardins, M.; Kocin, P. J.

    1981-01-01

    GEMPAK, an interactive computer software system developed for the purpose of assimilating, analyzing, and displaying various conventional and satellite meteorological data types is discussed. The objective map analysis scheme possesses certain characteristics that allowed it to be adapted to meet the analysis needs GEMPAK. Those characteristics and the specific adaptation of the scheme to GEMPAK are described. A step-by-step guide for using the GEMPAK Barnes scheme on an interactive computer (in real time) to analyze various types of meteorological datasets is also presented.

  1. Autoimmunity to Tropomyosin-Specific Peptides Induced by Mycobacterium leprae in Leprosy Patients: Identification of Mimicking Proteins.

    PubMed

    Singh, Itu; Yadav, Asha Ram; Mohanty, Keshar Kunja; Katoch, Kiran; Sharma, Prashant; Pathak, Vinay Kumar; Bisht, Deepa; Gupta, Umesh D; Sengupta, Utpal

    2018-01-01

    It has been shown earlier that there is a rise in the levels of autoantibodies and T cell response to cytoskeletal proteins in leprosy. Our group recently demonstrated a rise in both T and B cell responses to keratin and myelin basic protein in all types of leprosy patients and their associations in type 1 reaction (T1R) group of leprosy. In this study, we investigated the association of levels of autoantibodies and lymphoproliferation against myosin in leprosy patients across the spectrum and tried to find out the mimicking proteins or epitopes between host protein and protein/s of Mycobacterium leprae . One hundred and sixty-nine leprosy patients and 55 healthy controls (HC) were enrolled in the present study. Levels of anti-myosin antibodies and T-cell responses against myosin were measured by ELISA and lymphoproliferation assay, respectively. Using 2-D gel electrophoresis, western blot and MALDI-TOF/TOF antibody-reactive spots were identified. Three-dimensional structure of mimicking proteins was modeled by online server. B cell epitopes of the proteins were predicted by BCPREDS server 1.0 followed by identification of mimicking epitopes. Mice of inbred BALB/c strain were hyperimmunized with M. leprae soluble antigen (MLSA) and splenocytes and lymph node cells of these animals were adoptively transferred to naïve mice. Highest level of anti-myosin antibodies was noted in sera of T1R leprosy patients. We observed significantly higher levels of lymphoproliferative response ( p  < 0.05) with myosin in all types of leprosy patients compared to HC. Further, hyperimmunization of inbred BALB/c strain of female mice and rabbit with MLSA revealed that both hyperimmunized rabbit and mice evoked heightened levels of antibodies against myosin and this autoimmune response could be adoptively transferred from hyperimmunized to naïve mice. Tropomyosin was found to be mimicking with ATP-dependent Clp protease ATP-binding subunit of M. leprae . We found four mimicking epitopes between these sequences. These data suggest that these mimicking proteins tropomyosin and ATP-dependent Clp protease ATP-binding subunit of M. leprae or more precisely mimicking epitopes (four B cell epitopes) might be responsible for extensive tissue damage during type1 reaction in leprosy.

  2. Analysis and design of numerical schemes for gas dynamics. 2: Artificial diffusion and discrete shock structure

    NASA Technical Reports Server (NTRS)

    Jameson, Antony

    1994-01-01

    The effect of artificial diffusion on discrete shock structures is examined for a family of schemes which includes scalar diffusion, convective upwind and split pressure (CUSP) schemes, and upwind schemes with characteristics splitting. The analysis leads to conditions on the diffusive flux such that stationary discrete shocks can contain a single interior point. The simplest formulation which meets these conditions is a CUSP scheme in which the coefficients of the pressure differences is fully determined by the coefficient of convective diffusion. It is also shown how both the characteristic and CUSP schemes can be modified to preserve constant stagnation enthalpy in steady flow, leading to four variants, the E and H-characteristic schemes, and the E and H-CUSP schemes. Numerical results are presented which confirm the properties of these schemes.

  3. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    PubMed

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to other related schemes. As a result, our scheme is very appropriate for practical applications in TMIS.

  4. Research on multi-user encrypted search scheme in cloud environment

    NASA Astrophysics Data System (ADS)

    Yu, Zonghua; Lin, Sui

    2017-05-01

    Aiming at the existing problems of multi-user encrypted search scheme in cloud computing environment, a basic multi-user encrypted scheme is proposed firstly, and then the basic scheme is extended to an anonymous hierarchical management authority. Compared with most of the existing schemes, the scheme not only to achieve the protection of keyword information, but also to achieve the protection of user identity privacy; the same time, data owners can directly control the user query permissions, rather than the cloud server. In addition, through the use of a special query key generation rules, to achieve the hierarchical management of the user's query permissions. The safety analysis shows that the scheme is safe and that the performance analysis and experimental data show that the scheme is practicable.

  5. Implementation analysis of RC5 algorithm on Preneel-Govaerts-Vandewalle (PGV) hashing schemes using length extension attack

    NASA Astrophysics Data System (ADS)

    Siswantyo, Sepha; Susanti, Bety Hayat

    2016-02-01

    Preneel-Govaerts-Vandewalle (PGV) schemes consist of 64 possible single-block-length schemes that can be used to build a hash function based on block ciphers. For those 64 schemes, Preneel claimed that 4 schemes are secure. In this paper, we apply length extension attack on those 4 secure PGV schemes which use RC5 algorithm in its basic construction to test their collision resistance property. The attack result shows that the collision occurred on those 4 secure PGV schemes. Based on the analysis, we indicate that Feistel structure and data dependent rotation operation in RC5 algorithm, XOR operations on the scheme, along with selection of additional message block value also give impact on the collision to occur.

  6. Genetic and Genomic Diversity Studies of Acacia Symbionts in Senegal Reveal New Species of Mesorhizobium with a Putative Geographical Pattern

    PubMed Central

    Diouf, Fatou; Diouf, Diegane; Klonowska, Agnieszka; Le Queré, Antoine; Bakhoum, Niokhor; Fall, Dioumacor; Neyra, Marc; Parrinello, Hugues; Diouf, Mayecor; Ndoye, Ibrahima; Moulin, Lionel

    2015-01-01

    Acacia senegal (L) Willd. and Acacia seyal Del. are highly nitrogen-fixing and moderately salt tolerant species. In this study we focused on the genetic and genomic diversity of Acacia mesorhizobia symbionts from diverse origins in Senegal and investigated possible correlations between the genetic diversity of the strains, their soil of origin, and their tolerance to salinity. We first performed a multi-locus sequence analysis on five markers gene fragments on a collection of 47 mesorhizobia strains of A. senegal and A. seyal from 8 localities. Most of the strains (60%) clustered with the M. plurifarium type strain ORS 1032T, while the others form four new clades (MSP1 to MSP4). We sequenced and assembled seven draft genomes: four in the M. plurifarium clade (ORS3356, ORS3365, STM8773 and ORS1032T), one in MSP1 (STM8789), MSP2 (ORS3359) and MSP3 (ORS3324). The average nucleotide identities between these genomes together with the MLSA analysis reveal three new species of Mesorhizobium. A great variability of salt tolerance was found among the strains with a lack of correlation between the genetic diversity of mesorhizobia, their salt tolerance and the soils samples characteristics. A putative geographical pattern of A. senegal symbionts between the dryland north part and the center of Senegal was found, reflecting adaptations to specific local conditions such as the water regime. However, the presence of salt does not seem to be an important structuring factor of Mesorhizobium species. PMID:25658650

  7. Delineation of Streptococcus dysgalactiae, Its Subspecies, and Its Clinical and Phylogenetic Relationship to Streptococcus pyogenes

    PubMed Central

    Jensen, Anders

    2012-01-01

    The taxonomic status and structure of Streptococcus dysgalactiae have been the object of much confusion. Bacteria belonging to this species are usually referred to as Lancefield group C or group G streptococci in clinical settings in spite of the fact that these terms lack precision and prevent recognition of the exact clinical relevance of these bacteria. The purpose of this study was to develop an improved basis for delineation and identification of the individual species of the pyogenic group of streptococci in the clinical microbiology laboratory, with a special focus on S. dysgalactiae. We critically reexamined the genetic relationships of the species S. dysgalactiae, Streptococcus pyogenes, Streptococcus canis, and Streptococcus equi, which may share Lancefield group antigens, by phylogenetic reconstruction based on multilocus sequence analysis (MLSA) and 16S rRNA gene sequences and by emm typing combined with phenotypic characterization. Analysis of concatenated sequences of seven genes previously used for examination of viridans streptococci distinguished robust and coherent clusters. S. dysgalactiae consists of two separate clusters consistent with the two recognized subspecies dysgalactiae and equisimilis. Both taxa share alleles with S. pyogenes in several housekeeping genes, which invalidates identification based on single-locus sequencing. S. dysgalactiae, S. canis, and S. pyogenes constitute a closely related branch within the genus Streptococcus indicative of recent descent from a common ancestor, while S. equi is highly divergent from other species of the pyogenic group streptococci. The results provide an improved basis for identification of clinically important pyogenic group streptococci and explain the overlapping spectrum of infections caused by the species associated with humans. PMID:22075580

  8. Diversity and Distribution of Phenol Oxidase Producing Fungi from Soda Lake and Description of Curvularia lonarensis sp. nov.

    PubMed

    Sharma, Rahul; Prakash, Om; Sonawane, Mahesh S; Nimonkar, Yogesh; Golellu, Priyanka B; Sharma, Rohit

    2016-01-01

    Soda lake is hyper alkaline and saline habitat located in closed craters with high evaporation rate. In current study fungal diversity from water and sediment samples of a soda lake (Lonar lake) located in Buldhana district of Maharashtra, India was investigated using extensive culturomics approach and mimicking the natural conditions of Lonar lake in culture media. A total of 104 diverse isolates of extremophilic fungi were recovered from this study and phylogenetically characterized by internal transcribed spacer (ITS) region sequencing. In addition, due to important role of phenol oxidase, and peroxidase in degradation of toxic phenol, lignin, etc., all isolated pure cultures were also screened for extracellular phenol oxidase and peroxidase production potential. Diversity analysis indicated that different groups of extremophilic fungi are present in the water and sediment samples of Lonar lake. A total of 38 species of fungi belonging to 18-different genera were recovered. Out of 104 isolates 32 showed ≤97% sequences similarity, which were morphologically different and could be potential novel isolates of extremophilic fungi. However, out of 104 isolates only 14 showed the extracellular phenol oxidase production potentials at alkaline pH. Curvularia sp. strain MEF018 showed highest phenol oxidase production at alkaline condition and had low sequence similarity with previously characterized species (96% with Curvularia pseudorobusta ). Taxonomic characterization (morphological and physiological) and multi locus sequence analysis (MLSA) using combined alignment of ITS-LSU- gpd of strain MEF018 showed that it is a novel species of the genus Curvularia and hence proposed as Curvularia lonarensis sp. nov.

  9. Diversity and Distribution of Phenol Oxidase Producing Fungi from Soda Lake and Description of Curvularia lonarensis sp. nov.

    PubMed Central

    Sharma, Rahul; Prakash, Om; Sonawane, Mahesh S.; Nimonkar, Yogesh; Golellu, Priyanka B.; Sharma, Rohit

    2016-01-01

    Soda lake is hyper alkaline and saline habitat located in closed craters with high evaporation rate. In current study fungal diversity from water and sediment samples of a soda lake (Lonar lake) located in Buldhana district of Maharashtra, India was investigated using extensive culturomics approach and mimicking the natural conditions of Lonar lake in culture media. A total of 104 diverse isolates of extremophilic fungi were recovered from this study and phylogenetically characterized by internal transcribed spacer (ITS) region sequencing. In addition, due to important role of phenol oxidase, and peroxidase in degradation of toxic phenol, lignin, etc., all isolated pure cultures were also screened for extracellular phenol oxidase and peroxidase production potential. Diversity analysis indicated that different groups of extremophilic fungi are present in the water and sediment samples of Lonar lake. A total of 38 species of fungi belonging to 18-different genera were recovered. Out of 104 isolates 32 showed ≤97% sequences similarity, which were morphologically different and could be potential novel isolates of extremophilic fungi. However, out of 104 isolates only 14 showed the extracellular phenol oxidase production potentials at alkaline pH. Curvularia sp. strain MEF018 showed highest phenol oxidase production at alkaline condition and had low sequence similarity with previously characterized species (96% with Curvularia pseudorobusta). Taxonomic characterization (morphological and physiological) and multi locus sequence analysis (MLSA) using combined alignment of ITS-LSU-gpd of strain MEF018 showed that it is a novel species of the genus Curvularia and hence proposed as Curvularia lonarensis sp. nov. PMID:27920761

  10. Bioconversion of α-chitin into N-acetyl-glucosamine using chitinases produced by marine-derived Aeromonas caviae isolates.

    PubMed

    Cardozo, Flávio Augusto; Gonzalez, Juan Miguel; Feitosa, Valker Araujo; Pessoa, Adalberto; Rivera, Irma Nelly Gutierrez

    2017-10-27

    N-Acetyl-D-glucosamine (GlcNAc) is a monosaccharide with great application potential in the food, cosmetic, pharmaceutical, and biomaterial areas. GlcNAc is currently produced by chemical hydrolysis of chitin, but the current processes are environmentally unfriendly, have low yield and high cost. This study demonstrates the potential to produce GlcNAc from α-chitin using chitinases of ten marine-derived Aeromonas isolates as a sustainable alternative to the current chemical process. The isolates were characterized as Aeromonas caviae by multilocus sequence analysis (MLSA) using six housekeeping genes (gltA, groL, gyrB, metG, ppsA, and recA), not presented the virulence genes verified (alt, act, ast, ahh1, aer, aerA, hlyA, ascV and ascFG), but showed hemolytic activity on blood agar. GlcNAc was produced at 37 °C, pH 5.0, 2% (w/v) colloidal chitin and crude chitinase extracts (0.5 U mL -1 ) by all the isolates with yields from 14 to 85% at 6 h, 17-89% at 12 h and 19-93% after 24 h. The highest yield of GlcNAc was observed by A. caviae CH129 (93%). This study demonstrates one of the most efficient chitin enzymatic hydrolysis procedures and A. caviae isolates with great potential for chitinases expression and GlcNAc production.

  11. Qualitative analysis scheme based on the properties of ion exchangers (in French)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Machiroux, R.; Merciny, E.; Schreiber, A.

    1973-01-01

    A systematic scheme of qualitative analysis of some cations is presented. For didactic purposes the properties of cationic and anionic ion exchangers were used. At the present time, this scheme is limited to 23 ions, including Sr. (auth)

  12. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments

    PubMed Central

    Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.’s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.’s scheme still has weaknesses. In this paper, we show that Moon et al.’s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient. PMID:29121050

  13. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.

    PubMed

    Guo, Hua; Wang, Pei; Zhang, Xiyong; Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.'s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.'s scheme still has weaknesses. In this paper, we show that Moon et al.'s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient.

  14. A Bayesian network coding scheme for annotating biomedical information presented to genetic counseling clients.

    PubMed

    Green, Nancy

    2005-04-01

    We developed a Bayesian network coding scheme for annotating biomedical content in layperson-oriented clinical genetics documents. The coding scheme supports the representation of probabilistic and causal relationships among concepts in this domain, at a high enough level of abstraction to capture commonalities among genetic processes and their relationship to health. We are using the coding scheme to annotate a corpus of genetic counseling patient letters as part of the requirements analysis and knowledge acquisition phase of a natural language generation project. This paper describes the coding scheme and presents an evaluation of intercoder reliability for its tag set. In addition to giving examples of use of the coding scheme for analysis of discourse and linguistic features in this genre, we suggest other uses for it in analysis of layperson-oriented text and dialogue in medical communication.

  15. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    PubMed

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  16. Convergence Analysis of the Graph Allen-Cahn Scheme

    DTIC Science & Technology

    2016-02-01

    CONVERGENCE ANALYSIS OF THE GRAPH ALLEN-CAHN SCHEME ∗ XIYANG LUO† AND ANDREA L. BERTOZZI† Abstract. Graph partitioning problems have a wide range of...optimization, convergence and monotonicity are shown for a class of schemes under a graph-independent timestep restriction. We also analyze the effects of...spectral truncation, a common technique used to save computational cost. Convergence of the scheme with spectral truncation is also proved under a

  17. Gas Evolution Dynamics in Godunov-Type Schemes and Analysis of Numerical Shock Instability

    NASA Technical Reports Server (NTRS)

    Xu, Kun

    1999-01-01

    In this paper we are going to study the gas evolution dynamics of the exact and approximate Riemann solvers, e.g., the Flux Vector Splitting (FVS) and the Flux Difference Splitting (FDS) schemes. Since the FVS scheme and the Kinetic Flux Vector Splitting (KFVS) scheme have the same physical mechanism and similar flux function, based on the analysis of the discretized KFVS scheme the weakness and advantage of the FVS scheme are closely observed. The subtle dissipative mechanism of the Godunov method in the 2D case is also analyzed, and the physical reason for shock instability, i.e., carbuncle phenomena and odd-even decoupling, is presented.

  18. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    PubMed

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  19. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    PubMed Central

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887

  20. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    PubMed Central

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  1. Optimal rotated staggered-grid finite-difference schemes for elastic wave modeling in TTI media

    NASA Astrophysics Data System (ADS)

    Yang, Lei; Yan, Hongyong; Liu, Hong

    2015-11-01

    The rotated staggered-grid finite-difference (RSFD) is an effective approach for numerical modeling to study the wavefield characteristics in tilted transversely isotropic (TTI) media. But it surfaces from serious numerical dispersion, which directly affects the modeling accuracy. In this paper, we propose two different optimal RSFD schemes based on the sampling approximation (SA) method and the least-squares (LS) method respectively to overcome this problem. We first briefly introduce the RSFD theory, based on which we respectively derive the SA-based RSFD scheme and the LS-based RSFD scheme. Then different forms of analysis are used to compare the SA-based RSFD scheme and the LS-based RSFD scheme with the conventional RSFD scheme, which is based on the Taylor-series expansion (TE) method. The contrast in numerical accuracy analysis verifies the greater accuracy of the two proposed optimal schemes, and indicates that these schemes can effectively widen the wavenumber range with great accuracy compared with the TE-based RSFD scheme. Further comparisons between these two optimal schemes show that at small wavenumbers, the SA-based RSFD scheme performs better, while at large wavenumbers, the LS-based RSFD scheme leads to a smaller error. Finally, the modeling results demonstrate that for the same operator length, the SA-based RSFD scheme and the LS-based RSFD scheme can achieve greater accuracy than the TE-based RSFD scheme, while for the same accuracy, the optimal schemes can adopt shorter difference operators to save computing time.

  2. Forcing scheme analysis for the axisymmetric lattice Boltzmann method under incompressible limit.

    PubMed

    Zhang, Liangqi; Yang, Shiliang; Zeng, Zhong; Chen, Jie; Yin, Linmao; Chew, Jia Wei

    2017-04-01

    Because the standard lattice Boltzmann (LB) method is proposed for Cartesian Navier-Stokes (NS) equations, additional source terms are necessary in the axisymmetric LB method for representing the axisymmetric effects. Therefore, the accuracy and applicability of the axisymmetric LB models depend on the forcing schemes adopted for discretization of the source terms. In this study, three forcing schemes, namely, the trapezium rule based scheme, the direct forcing scheme, and the semi-implicit centered scheme, are analyzed theoretically by investigating their derived macroscopic equations in the diffusive scale. Particularly, the finite difference interpretation of the standard LB method is extended to the LB equations with source terms, and then the accuracy of different forcing schemes is evaluated for the axisymmetric LB method. Theoretical analysis indicates that the discrete lattice effects arising from the direct forcing scheme are part of the truncation error terms and thus would not affect the overall accuracy of the standard LB method with general force term (i.e., only the source terms in the momentum equation are considered), but lead to incorrect macroscopic equations for the axisymmetric LB models. On the other hand, the trapezium rule based scheme and the semi-implicit centered scheme both have the advantage of avoiding the discrete lattice effects and recovering the correct macroscopic equations. Numerical tests applied for validating the theoretical analysis show that both the numerical stability and the accuracy of the axisymmetric LB simulations are affected by the direct forcing scheme, which indicate that forcing schemes free of the discrete lattice effects are necessary for the axisymmetric LB method.

  3. An analysis of hydrogen production via closed-cycle schemes. [thermochemical processings from water

    NASA Technical Reports Server (NTRS)

    Chao, R. E.; Cox, K. E.

    1975-01-01

    A thermodynamic analysis and state-of-the-art review of three basic schemes for production of hydrogen from water: electrolysis, thermal water-splitting, and multi-step thermochemical closed cycles is presented. Criteria for work-saving thermochemical closed-cycle processes are established, and several schemes are reviewed in light of such criteria. An economic analysis is also presented in the context of energy costs.

  4. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.

  5. A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.

  6. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.

    PubMed

    Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru

    2016-10-01

    Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security verification of our scheme using the widely accepted AVISPA tool. High security and extra functionality features allow our proposed scheme to be applicable for telecare medicine information systems which is used for e-health care medical applications. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  7. Student Loans Schemes in Mauritius: Experience, Analysis and Scenarios

    ERIC Educational Resources Information Center

    Mohadeb, Praveen

    2006-01-01

    This study makes a comprehensive review of the situation of student loans schemes in Mauritius, and makes recommendations, based on best practices, for setting up a national scheme that attempts to avoid weaknesses identified in some of the loans schemes of other countries. It suggests that such a scheme would be cost-effective and beneficial both…

  8. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

    PubMed Central

    Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme. PMID:24892078

  9. A robust and effective smart-card-based remote user authentication mechanism using hash function.

    PubMed

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.

  10. Gaining qualitative insight into the subjective experiences of adherers to an exercise referral scheme: A thematic analysis.

    PubMed

    Eynon, Michael John; O'Donnell, Christopher; Williams, Lynn

    2016-07-01

    Nine adults who had completed an exercise referral scheme participated in a semi-structured interview to uncover the key psychological factors associated with adherence to the scheme. Through thematic analysis, an exercise identity emerged to be a major factor associated with adherence to the scheme, which was formed of a number of underpinning constructs including changes in self-esteem, changes in self-efficacy and changes in self-regulatory strategies. Also, an additional theme of transitions in motivation to exercise was identified, showing participants' motivation to alter from extrinsic to intrinsic reasons to exercise during the scheme.

  11. Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Li, Xiong

    2015-11-01

    The E-health care systems employ IT infrastructure for maximizing health care resources utilization as well as providing flexible opportunities to the remote patient. Therefore, transmission of medical data over any public networks is necessary in health care system. Note that patient authentication including secure data transmission in e-health care system is critical issue. Although several user authentication schemes for accessing remote services are available, their security analysis show that none of them are free from relevant security attacks. We reviewed Das et al.'s scheme and demonstrated their scheme lacks proper protection against several security attacks such as user anonymity, off-line password guessing attack, smart card theft attack, user impersonation attack, server impersonation attack, session key discloser attack. In order to overcome the mentioned security pitfalls, this paper proposes an anonymity preserving remote patient authentication scheme usable in E-health care systems. We then validated the security of the proposed scheme using BAN logic that ensures secure mutual authentication and session key agreement. We also presented the experimental results of the proposed scheme using AVISPA software and the results ensure that our scheme is secure under OFMC and CL-AtSe models. Moreover, resilience of relevant security attacks has been proved through both formal and informal security analysis. The performance analysis and comparison with other schemes are also made, and it has been found that the proposed scheme overcomes the security drawbacks of the Das et al.'s scheme and additionally achieves extra security requirements.

  12. Multi-Hierarchical Gray Correlation Analysis Applied in the Selection of Green Building Design Scheme

    NASA Astrophysics Data System (ADS)

    Wang, Li; Li, Chuanghong

    2018-02-01

    As a sustainable form of ecological structure, green building is widespread concerned and advocated in society increasingly nowadays. In the survey and design phase of preliminary project construction, carrying out the evaluation and selection of green building design scheme, which is in accordance with the scientific and reasonable evaluation index system, can improve the ecological benefits of green building projects largely and effectively. Based on the new Green Building Evaluation Standard which came into effect on January 1, 2015, the evaluation index system of green building design scheme is constructed taking into account the evaluation contents related to the green building design scheme. We organized experts who are experienced in construction scheme optimization to mark and determine the weight of each evaluation index through the AHP method. The correlation degree was calculated between each evaluation scheme and ideal scheme by using multilevel gray relational analysis model and then the optimal scheme was determined. The feasibility and practicability of the evaluation method are verified by introducing examples.

  13. Design and Analysis of a Dynamic Mobility Management Scheme for Wireless Mesh Network

    PubMed Central

    Roy, Sudipta

    2013-01-01

    Seamless mobility management of the mesh clients (MCs) in wireless mesh network (WMN) has drawn a lot of attention from the research community. A number of mobility management schemes such as mesh network with mobility management (MEMO), mesh mobility management (M3), and wireless mesh mobility management (WMM) have been proposed. The common problem with these schemes is that they impose uniform criteria on all the MCs for sending route update message irrespective of their distinct characteristics. This paper proposes a session-to-mobility ratio (SMR) based dynamic mobility management scheme for handling both internet and intranet traffic. To reduce the total communication cost, this scheme considers each MC's session and mobility characteristics by dynamically determining optimal threshold SMR value for each MC. A numerical analysis of the proposed scheme has been carried out. Comparison with other schemes shows that the proposed scheme outperforms MEMO, M3, and WMM with respect to total cost. PMID:24311982

  14. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

    PubMed Central

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  15. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    PubMed

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-07-14

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

  16. Finite time step and spatial grid effects in δf simulation of warm plasmas

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sturdevant, Benjamin J., E-mail: benjamin.j.sturdevant@gmail.com; Department of Applied Mathematics, University of Colorado at Boulder, Boulder, CO 80309; Parker, Scott E.

    2016-01-15

    This paper introduces a technique for analyzing time integration methods used with the particle weight equations in δf method particle-in-cell (PIC) schemes. The analysis applies to the simulation of warm, uniform, periodic or infinite plasmas in the linear regime and considers the collective behavior similar to the analysis performed by Langdon for full-f PIC schemes [1,2]. We perform both a time integration analysis and spatial grid analysis for a kinetic ion, adiabatic electron model of ion acoustic waves. An implicit time integration scheme is studied in detail for δf simulations using our weight equation analysis and for full-f simulations usingmore » the method of Langdon. It is found that the δf method exhibits a CFL-like stability condition for low temperature ions, which is independent of the parameter characterizing the implicitness of the scheme. The accuracy of the real frequency and damping rate due to the discrete time and spatial schemes is also derived using a perturbative method. The theoretical analysis of numerical error presented here may be useful for the verification of simulations and for providing intuition for the design of new implicit time integration schemes for the δf method, as well as understanding differences between δf and full-f approaches to plasma simulation.« less

  17. The construction of high-accuracy schemes for acoustic equations

    NASA Technical Reports Server (NTRS)

    Tang, Lei; Baeder, James D.

    1995-01-01

    An accuracy analysis of various high order schemes is performed from an interpolation point of view. The analysis indicates that classical high order finite difference schemes, which use polynomial interpolation, hold high accuracy only at nodes and are therefore not suitable for time-dependent problems. Thus, some schemes improve their numerical accuracy within grid cells by the near-minimax approximation method, but their practical significance is degraded by maintaining the same stencil as classical schemes. One-step methods in space discretization, which use piecewise polynomial interpolation and involve data at only two points, can generate a uniform accuracy over the whole grid cell and avoid spurious roots. As a result, they are more accurate and efficient than multistep methods. In particular, the Cubic-Interpolated Psuedoparticle (CIP) scheme is recommended for computational acoustics.

  18. The Anatomy of a Mathematical Proof: Implications for Analyses with Toulmin's Scheme

    ERIC Educational Resources Information Center

    Simpson, Adrian

    2015-01-01

    A model solution to a proof question on an examination is explored and subjected to a detailed analysis in terms of Toulmin's scheme of argumentation. In doing so, the ways in which the scheme has been variously used in the mathematics education and philosophical literature are contrasted. The analysis raises a number of issues concerning the…

  19. An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity

    PubMed Central

    Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability. PMID:24350272

  20. An improved biometrics-based remote user authentication scheme with user anonymity.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.

  1. Rhizobium altiplani sp. nov., isolated from effective nodules on Mimosa pudica growing in untypically alkaline soil in central Brazil.

    PubMed

    Baraúna, Alexandre C; Rouws, Luc F M; Simoes-Araujo, Jean L; Dos Reis Junior, Fábio B; Iannetta, Pietro P M; Maluk, Marta; Goi, Silvia R; Reis, Veronica M; James, Euan K; Zilli, Jerri E

    2016-10-01

    Root nodule bacteria were isolated from nodules on Mimosa pudica L. growing in neutral-alkaline soils from the Distrito Federal in central Brazil. The 16S rRNA gene sequence analysis of 10 strains placed them into the genus Rhizobium with the closest neighbouring species (each with 99 % similarity) being Rhizobium grahamii, Rhizobium cauense, Rhizobium mesoamericanum and Rhizobium tibeticum. This high similarity, however, was not confirmed by multi-locus sequence analysis (MLSA) using three housekeeping genes (recA, glnII and rpoB), which revealed R. mesoamericanum CCGE 501T to be the closest type strain (92 % sequence similarity or less). Chemotaxonomic data, including fatty acid profiles [with majority being C19 : 0 cyclo ω8c and summed feature 8 (C18 : 1ω7c/C18 : 1ω6c)], DNA G+C content (57.6 mol%), and carbon compound utilization patterns supported the placement of the novel strains in the genus Rhizobium. Results of average nucleotide identity (ANI) differentiated the novel strains from the closest species of the genus Rhizobium, R. mesoamericanum, R. grahamii and R. tibeticum with 89.0, 88.1 and 87.8 % similarity, respectively. The symbiotic genes essential for nodulation (nodC) and nitrogen fixation (nifH) were most similar (99-100 %) to those of R. mesoamericanum, another Mimosa-nodulating species. Based on the current data, these 10 strains represent a novel species of the genus Rhizobium for which the name Rhizobium altiplani sp. nov. is proposed. The type strain is BR 10423T (=HAMBI 3664T).

  2. Pseudomonas moraviensis subsp. stanleyae, a bacterial endophyte of hyperaccumulator Stanleya pinnata, is capable of efficient selenite reduction to elemental selenium under aerobic conditions.

    PubMed

    Staicu, L C; Ackerson, C J; Cornelis, P; Ye, L; Berendsen, R L; Hunter, W J; Noblitt, S D; Henry, C S; Cappa, J J; Montenieri, R L; Wong, A O; Musilova, L; Sura-de Jong, M; van Hullebusch, E D; Lens, P N L; Reynolds, R J B; Pilon-Smits, E A H

    2015-08-01

    To identify bacteria with high selenium tolerance and reduction capacity for bioremediation of wastewater and nanoselenium particle production. A bacterial endophyte was isolated from the selenium hyperaccumulator Stanleya pinnata (Brassicaceae) growing on seleniferous soils in Colorado, USA. Based on fatty acid methyl ester analysis and multi-locus sequence analysis (MLSA) using 16S rRNA, gyrB, rpoB and rpoD genes, the isolate was identified as a subspecies of Pseudomonas moraviensis (97.3% nucleotide identity) and named P. moraviensis stanleyae. The isolate exhibited extreme tolerance to SeO3(2-) (up to 120 mmol l(-1)) and SeO4(2-) (>150 mmol l(-1)). Selenium oxyanion removal from growth medium was measured by microchip capillary electrophoresis (detection limit 95 nmol l(-1) for SeO3(2-) and 13 nmol l(-1) for SeO4(2-)). Within 48 h, P. moraviensis stanleyae aerobically reduced SeO3(2-) to red Se(0) from 10 mmol l(-1) to below the detection limit (removal rate 0.27 mmol h(-1) at 30 °C); anaerobic SeO3(2-) removal was slower. No SeO4(2-) removal was observed. Pseudomonas moraviensis stanleyae stimulated the growth of crop species Brassica juncea by 70% with no significant effect on Se accumulation. Pseudomonas moraviensis stanleyae can tolerate extreme levels of selenate and selenite and can deplete high levels of selenite under aerobic and anaerobic conditions. Pseudomonas moraviensis subsp. stanleyae may be useful for stimulating plant growth and for the treatment of Se-laden wastewater. © 2015 The Society for Applied Microbiology.

  3. Identification and characterization of Vibrio harveyi associated with diseased abalone Haliotis diversicolor.

    PubMed

    Jiang, Qingru; Shi, Liuyang; Ke, Caihuan; You, Weiwei; Zhao, Jing

    2013-03-26

    Mass mortality of farmed small abalone Haliotis diversicolor occurred in Fujian, China, from 2009 to 2011. Among isolates obtained from moribund abalones, the dominant species AP37 exhibited the strongest virulence. After immersion challenge with 106 CFU ml-1 of AP37, abalone mortalities of 0, 53 and 67% were induced at water temperatures of 20°C, 24°C, and 28°C, respectively. Following intramuscular injection, AP37 showed a low LD50 (median lethal concentration) value of 2.9 × 102 CFU g-1 (colony forming units per gram abalone wet body weight). The LT50 (median lethal time) values were 5.2 h for 1 × 106 CFU abalone-1, 8.4 h for 1 × 105 CFU abalone-1, and 21.5 h for 1 × 104 CFU abalone-1. For further analysis of virulence, AP37 was screened for the production of extracellular factors. The results showed that various factors including presence of flagella and production of extracellular enzymes, such as lipase, phospholipase and haemolysin, could be responsible for pathogenesis. Based on its 16S rRNA gene sequence, strain AP37 showed >98.8% similarity to Vibrio harveyi, V. campbellii, V. parahaemolyticus, V. alginolyticus, V. natriegens and V. rotiferianus, so it could not be identified by this method. However, multi-locus sequence analysis (MLSA) of concatenated sequences, including the rpoD, rctB, gyrB, toxR and pyrH genes, identified strain AP37 as V. harveyi. Phenotypic characters of AP37 were identified by API 20E. In antibiotic susceptibility tests, strain AP37 exhibited susceptibility to 7 antibiotics and resistance to 13. This is the first report of a V. harveyi-related species being linked with the mass mortality of adult abalone H. diversicolor in southern China.

  4. Emendation of Propionibacterium acnes subsp. acnes (Deiko et al. 2015) and proposal of Propionibacterium acnes type II as Propionibacterium acnes subsp. defendens subsp. nov.

    PubMed

    McDowell, Andrew; Barnard, Emma; Liu, Jared; Li, Huiying; Patrick, Sheila

    2016-12-01

    Recently, it has been proposed that strains of Propionibacterium acnes from the type III genetic division should be classified as P. acnessubsp. elongatum subsp. nov., with strains from the type I and II divisions collectively classified as P. acnessubsp. acnes subsp. nov. Under such a taxonomic re-appraisal, we believe that types I and II should also have their own separate rank of subspecies. In support of this, we describe a polyphasic taxonomic study based on the analysis of publicly available multilocus and whole-genome sequence datasets, alongside a systematic review of previously published phylogenetic, genomic, phenotypic and clinical data. Strains of types I and II form highly distinct clades on the basis of multilocus sequence analysis (MLSA) and whole-genome phylogenetic reconstructions. In silico or digital DNA-DNA similarity values also fall within the 70-80 % boundary recommended for bacterial subspecies. Furthermore, we see important differences in genome content, including the presence of an active CRISPR/Cas system in type II strains, but not type I, and evidence for increasing linkage equilibrium within the separate divisions. Key biochemical differences include positive test results for β-haemolytic, neuraminidase and sorbitol fermentation activities with type I strains, but not type II. We now propose that type I strains should be classified as P. acnessubsp. acnes subsp. nov., and type II as P. acnessubsp. defendens subsp. nov. The type strain of P. acnessubsp. acnes subsp. nov. is NCTC 737T (=ATCC 6919T=JCM 6425T=DSM 1897T=CCUG 1794T), while the type strain of P. acnessubsp. defendens subsp. nov. is ATCC 11828 (=JCM 6473=CCUG 6369).

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ahn, Anne-Catherine; Meier-Kolthoff, Jan P.; Overmars, Lex

    Thioalkalivibrio is a genus of obligate chemolithoautotrophic haloalkaliphilic sulfur-oxidizing bacteria. Their habitat are soda lakes which are dual extreme environments with a pH range from 9.5 to 11 and salt concentrations up to saturation. More than 100 strains of this genus have been isolated from various soda lakes all over the world, but only ten species have been effectively described yet. Therefore, the assignment of the remaining strains to either existing or novel species is important and will further elucidate their genomic diversity as well as give a better general understanding of this genus. Recently, the genomes of 76 Thioalkalivibriomore » strains were sequenced. On these, we applied different methods including (i) 16S rRNA gene sequence analysis, (ii) Multilocus Sequence Analysis (MLSA) based on eight housekeeping genes, (iii) Average Nucleotide Identity based on BLAST (ANI b) and MUMmer (ANI m ), (iv) Tetranucleotide frequency correlation coefficients (TETRA), (v) digital DNA:DNA hybridization (dDDH) as well as (vi) nucleotide- and amino acid-based Genome BLAST Distance Phylogeny (GBDP) analyses. We detected a high genomic diversity by revealing 15 new "genomic" species and 16 new "genomic" subspecies in addition to the ten already described species. Phylogenetic and phylogenomic analyses showed that the genus is not monophyletic, because four strains were clearly separated from the other Thioalkalivibrio by type strains from other genera. Therefore, it is recommended to classify the latter group as a novel genus. The biogeographic distribution of Thioalkalivibrio suggested that the different "genomic" species can be classified as candidate disjunct or candidate endemic species. This study is a detailed genome-based classification and identification of members within the genus Thioalkalivibrio. However, future phenotypical and chemotaxonomical studies will be needed for a full species description of this genus.« less

  6. Genomic diversity within the haloalkaliphilic genus Thioalkalivibrio

    DOE PAGES

    Ahn, Anne-Catherine; Meier-Kolthoff, Jan P.; Overmars, Lex; ...

    2017-03-10

    Thioalkalivibrio is a genus of obligate chemolithoautotrophic haloalkaliphilic sulfur-oxidizing bacteria. Their habitat are soda lakes which are dual extreme environments with a pH range from 9.5 to 11 and salt concentrations up to saturation. More than 100 strains of this genus have been isolated from various soda lakes all over the world, but only ten species have been effectively described yet. Therefore, the assignment of the remaining strains to either existing or novel species is important and will further elucidate their genomic diversity as well as give a better general understanding of this genus. Recently, the genomes of 76 Thioalkalivibriomore » strains were sequenced. On these, we applied different methods including (i) 16S rRNA gene sequence analysis, (ii) Multilocus Sequence Analysis (MLSA) based on eight housekeeping genes, (iii) Average Nucleotide Identity based on BLAST (ANI b) and MUMmer (ANI m ), (iv) Tetranucleotide frequency correlation coefficients (TETRA), (v) digital DNA:DNA hybridization (dDDH) as well as (vi) nucleotide- and amino acid-based Genome BLAST Distance Phylogeny (GBDP) analyses. We detected a high genomic diversity by revealing 15 new "genomic" species and 16 new "genomic" subspecies in addition to the ten already described species. Phylogenetic and phylogenomic analyses showed that the genus is not monophyletic, because four strains were clearly separated from the other Thioalkalivibrio by type strains from other genera. Therefore, it is recommended to classify the latter group as a novel genus. The biogeographic distribution of Thioalkalivibrio suggested that the different "genomic" species can be classified as candidate disjunct or candidate endemic species. This study is a detailed genome-based classification and identification of members within the genus Thioalkalivibrio. However, future phenotypical and chemotaxonomical studies will be needed for a full species description of this genus.« less

  7. Vibrio japonicus sp. nov., a novel member of the Nereis clade in the genus Vibrio isolated from the coast of Japan

    PubMed Central

    2017-01-01

    A novel Vibrio strain, JCM 31412T, was isolated from seawater collected from the Inland Sea (Setonaikai), Japan, and characterized as a Gram-negative, oxidase-positive, catalase-negative, facultatively anaerobic, motile, ovoid-shaped bacterium with one polar flagellum. Based on 16S rDNA gene identity, strain JCM 31412T showed a close relationship with type strains of Vibrio brasiliensis (LMG 20546T, 98.2% identity), V. harveyi (NBRC 15634T, 98.2%), V. caribbeanicus (ATCC BAA-2122T, 97.8%) and V. proteolyticus (NBRC 13287T, 97.8%). The G+C content of strain JCM 31412T DNA was 46.8%. Multi-locus sequence analysis (MLSA) of eight loci (ftsZ, gapA, gyrB, mreB, pyrH, recA, rpoA and topA; 5535bp) further clustered strain JCM 31412T in the Nereis clade, genus Vibrio. Phenotypically, strain JCM 31412T differed from the closest related Vibrio species in its utilization of melibiose and raffinose, and its lack of casein and gelatin hydrolysis. It was further differentiated based on its fatty acid composition, specifically properties of C12:03OH and summed features, which were significantly different from those of V. brasiliensis, V. nigripulchritudo and V. caribbeanicus type strains. Overall, the results of DNA-DNA hybridization, and physiological and biochemical analysis differentiated strain JCM 31412T from other described species of the genus Vibrio. Based on these polyphasic taxonomic findings, it was therefore concluded that JCM 31412T was a novel Vibrio species, for which the name Vibrio japonicus sp. nov. was proposed, with JCM 31412T (= LMG 29636T = ATCC TSD-62T) as the type strain. PMID:28231272

  8. Comparative genomics of Roseobacter clade bacteria isolated from the accessory nidamental gland of Euprymna scolopes

    PubMed Central

    Collins, Andrew J.; Fullmer, Matthew S.; Gogarten, Johann P.; Nyholm, Spencer V.

    2015-01-01

    The accessory nidamental gland (ANG) of the female Hawaiian bobtail squid, Euprymna scolopes, houses a consortium of bacteria including members of the Flavobacteriales, Rhizobiales, and Verrucomicrobia but is dominated by members of the Roseobacter clade (Rhodobacterales) within the Alphaproteobacteria. These bacteria are deposited into the jelly coat of the squid’s eggs, however, the function of the ANG and its bacterial symbionts has yet to be elucidated. In order to gain insight into this consortium and its potential role in host reproduction, we cultured 12 Rhodobacterales isolates from ANGs of sexually mature female squid and sequenced their genomes with Illumina sequencing technology. For taxonomic analyses, the ribosomal proteins of 79 genomes representing both roseobacters and non-roseobacters along with a separate MLSA analysis of 33 housekeeping genes from Roseobacter organisms placed all 12 isolates from the ANG within two groups of a single Roseobacter clade. Average nucelotide identity analysis suggests the ANG isolates represent three genera (Leisingera, Ruegeria, and Tateyamaria) comprised of seven putative species groups. All but one of the isolates contains a predicted Type VI secretion system, which has been shown to be important in secreting signaling and/or effector molecules in host–microbe associations and in bacteria–bacteria interactions. All sequenced genomes also show potential for secondary metabolite production, and are predicted to be involved with the production of acyl homoserine lactones (AHLs) and/or siderophores. An AHL bioassay confirmed AHL production in three tested isolates and from whole ANG homogenates. The dominant symbiont, Leisingera sp. ANG1, showed greater viability in iron-limiting conditions compared to other roseobacters, possibly due to higher levels of siderophore production. Future comparisons will try to elucidate novel metabolic pathways of the ANG symbionts to understand their putative role in host development. PMID:25755651

  9. Phase-Image Encryption Based on 3D-Lorenz Chaotic System and Double Random Phase Encoding

    NASA Astrophysics Data System (ADS)

    Sharma, Neha; Saini, Indu; Yadav, AK; Singh, Phool

    2017-12-01

    In this paper, an encryption scheme for phase-images based on 3D-Lorenz chaotic system in Fourier domain under the 4f optical system is presented. The encryption scheme uses a random amplitude mask in the spatial domain and a random phase mask in the frequency domain. Its inputs are phase-images, which are relatively more secure as compared to the intensity images because of non-linearity. The proposed scheme further derives its strength from the use of 3D-Lorenz transform in the frequency domain. Although the experimental setup for optical realization of the proposed scheme has been provided, the results presented here are based on simulations on MATLAB. It has been validated for grayscale images, and is found to be sensitive to the encryption parameters of the Lorenz system. The attacks analysis shows that the key-space is large enough to resist brute-force attack, and the scheme is also resistant to the noise and occlusion attacks. Statistical analysis and the analysis based on correlation distribution of adjacent pixels have been performed to test the efficacy of the encryption scheme. The results have indicated that the proposed encryption scheme possesses a high level of security.

  10. Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06

    NASA Astrophysics Data System (ADS)

    Park, Jong Hwan; Lee, Dong Hoon

    In 2006, Chatterjee and Sarkar proposed a hierarchical identity-based encryption (HIBE) scheme which can support an unbounded number of identity levels. This property is particularly useful in providing forward secrecy by embedding time components within hierarchical identities. In this paper we show that their scheme does not provide the claimed property. Our analysis shows that if the number of identity levels becomes larger than the value of a fixed public parameter, an unintended receiver can reconstruct a new valid ciphertext and decrypt the ciphertext using his or her own private key. The analysis is similarly applied to a multi-receiver identity-based encryption scheme presented as an application of Chatterjee and Sarkar's HIBE scheme.

  11. ONU Power Saving Scheme for EPON System

    NASA Astrophysics Data System (ADS)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  12. Security analysis of boolean algebra based on Zhang-Wang digital signature scheme

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zheng, Jinbin, E-mail: jbzheng518@163.com

    2014-10-06

    In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software.

  13. High diversity of Bradyrhizobium strains isolated from several legume species and land uses in Brazilian tropical ecosystems.

    PubMed

    Azarias Guimarães, Amanda; Florentino, Ligiane Aparecida; Alves Almeida, Kize; Lebbe, Liesbeth; Barroso Silva, Karina; Willems, Anne; de Souza Moreira, Fatima Maria

    2015-09-01

    The genus Bradyrhizobium stands out among nitrogen-fixing legume-nodulating bacteria because it predominates among the efficient microsymbionts of forest, forage, and green manure legume species, as well as important species of grain legumes, such as soybean, cowpea, and peanut. Therefore, the diversity of Bradyrhizobium strains is a relevant resource from environmental and economic perspectives, and strains isolated from diverse legume species and land uses in Brazilian tropical ecosystems were assessed in this study. To accomplish this, sequences of four housekeeping genes (atpD, dnaK, gyrB, and recA) were individually analysed, with the first three also being considered using multilocus sequence analysis (MLSA). The sensitivity of the strains to different antibiotics, their tolerance to different levels of salinity, and their ability to nodulate soybean plants were also measured. The phylogenetic trees based on each individual gene, and on the concatenated housekeeping genes, revealed several strain clusters separated from any currently described species. The Bradyrhizobium strains studied were generally resistant to antibiotics. All strains were able to grow at salinity levels of up to 0.5% NaCl, whereas only strains UFLA03-142, UFLA03-143, UFLA03-145, and UFLA03-146 grew in the presence of 1% NaCl. Together, the results indicated that some of the strains studied were potential novel species, indicating that the various soils and ecosystems in Brazil may harbour an as yet unknown diversity of rhizobia. Copyright © 2015 Elsevier GmbH. All rights reserved.

  14. Equivalency testing of TTC Tergitol 7 agar (ISO 9308-1:2000) with five culture media for the detection of E. coli in water samples in Greece.

    PubMed

    Mavridou, A; Smeti, E; Mandilara, G; Mandilara, G; Boufa, P; Vagiona-Arvanitidou, M; Vantarakis, A; Vassilandonopoulou, G; Pappa, O; Roussia, V; Tzouanopoulos, A; Livadara, M; Aisopou, I; Maraka, V; Nikolaou, E; Mandilara, G

    2010-01-01

    In this study ten laboratories in Greece compared the performance of reference method TTC Tergitol 7 Agar (with the additional test of beta-glucuronidase production) with five alternative methods, to detect E. coli in water, in line with European Water Directive recommendations. The samples were prepared by spiking drinking water with sewage effluent following a standard protocol. Chlorinated and non-chlorinated samples were used. The statistical analysis was based on the mean relative difference of confirmed counts and was performed in line with ISO 17994. The results showed that in total, three of the alternative methods (Chromocult Coliform agar, Membrane Lauryl Sulfate agar and Trypton Bilex-glucuronidase medium) were not different from TTC Tergitol 7 agar (TTC Tergitol 7 agar vs Chromocult Coliform agar, 294 samples, mean RD% 5.55; vs MLSA, 302 samples, mean RD% 1; vs TBX, 297 samples, mean RD% -2.78). The other two alternative methods (Membrane Faecal coliform medium and Colilert 18/ Quantitray) gave significantly higher counts than TTC Tergitol 7 agar (TTC Tergitol 7 agar vs MFc, 303 samples, mean RD% 8.81; vs Colilert-18/Quantitray, 76 samples, mean RD% 18.91). In other words, the alternative methods generated performance that was as reliable as, or even better than, the reference method. This study will help laboratories in Greece overcome culture and counting problems deriving from the EU reference method for E. coli counts in water samples.

  15. Improvement of a Quantum Proxy Blind Signature Scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-02-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  16. Improvement of a Quantum Proxy Blind Signature Scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  17. Integrated optical 3D digital imaging based on DSP scheme

    NASA Astrophysics Data System (ADS)

    Wang, Xiaodong; Peng, Xiang; Gao, Bruce Z.

    2008-03-01

    We present a scheme of integrated optical 3-D digital imaging (IO3DI) based on digital signal processor (DSP), which can acquire range images independently without PC support. This scheme is based on a parallel hardware structure with aid of DSP and field programmable gate array (FPGA) to realize 3-D imaging. In this integrated scheme of 3-D imaging, the phase measurement profilometry is adopted. To realize the pipeline processing of the fringe projection, image acquisition and fringe pattern analysis, we present a multi-threads application program that is developed under the environment of DSP/BIOS RTOS (real-time operating system). Since RTOS provides a preemptive kernel and powerful configuration tool, with which we are able to achieve a real-time scheduling and synchronization. To accelerate automatic fringe analysis and phase unwrapping, we make use of the technique of software optimization. The proposed scheme can reach a performance of 39.5 f/s (frames per second), so it may well fit into real-time fringe-pattern analysis and can implement fast 3-D imaging. Experiment results are also presented to show the validity of proposed scheme.

  18. An ocean data assimilation system and reanalysis of the World Ocean hydrophysical fields

    NASA Astrophysics Data System (ADS)

    Zelenko, A. A.; Vil'fand, R. M.; Resnyanskii, Yu. D.; Strukov, B. S.; Tsyrulnikov, M. D.; Svirenko, P. I.

    2016-07-01

    A new version of the ocean data assimilation system (ODAS) developed at the Hydrometcentre of Russia is presented. The assimilation is performed following the sequential scheme analysis-forecast-analysis. The main components of the ODAS are procedures for operational observation data processing, a variational analysis scheme, and an ocean general circulation model used to estimate the first guess fields involved in the analysis. In situ observations of temperature and salinity in the upper 1400-m ocean layer obtained from various observational platforms are used as input data. In the new ODAS version, the horizontal resolution of the assimilating model and of the output products is increased, the previous 2D-Var analysis scheme is replaced by a more general 3D-Var scheme, and a more flexible incremental analysis updating procedure is introduced to correct the model calculations. A reanalysis of the main World Ocean hydrophysical fields over the 2005-2015 period has been performed using the updated ODAS. The reanalysis results are compared with data from independent sources.

  19. Performance Evaluation of Counter-Based Dynamic Load Balancing Schemes for Massive Contingency Analysis with Different Computing Environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Yousu; Huang, Zhenyu; Chavarría-Miranda, Daniel

    Contingency analysis is a key function in the Energy Management System (EMS) to assess the impact of various combinations of power system component failures based on state estimation. Contingency analysis is also extensively used in power market operation for feasibility test of market solutions. High performance computing holds the promise of faster analysis of more contingency cases for the purpose of safe and reliable operation of today’s power grids with less operating margin and more intermittent renewable energy sources. This paper evaluates the performance of counter-based dynamic load balancing schemes for massive contingency analysis under different computing environments. Insights frommore » the performance evaluation can be used as guidance for users to select suitable schemes in the application of massive contingency analysis. Case studies, as well as MATLAB simulations, of massive contingency cases using the Western Electricity Coordinating Council power grid model are presented to illustrate the application of high performance computing with counter-based dynamic load balancing schemes.« less

  20. Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks

    PubMed Central

    Shim, Kyusung; Do, Nhu Tri; An, Beongku

    2017-01-01

    In this paper, we study the physical layer security (PLS) of opportunistic scheduling for uplink scenarios of multiuser multirelay cooperative networks. To this end, we propose a low-complexity, yet comparable secrecy performance source relay selection scheme, called the proposed source relay selection (PSRS) scheme. Specifically, the PSRS scheme first selects the least vulnerable source and then selects the relay that maximizes the system secrecy capacity for the given selected source. Additionally, the maximal ratio combining (MRC) technique and the selection combining (SC) technique are considered at the eavesdropper, respectively. Investigating the system performance in terms of secrecy outage probability (SOP), closed-form expressions of the SOP are derived. The developed analysis is corroborated through Monte Carlo simulation. Numerical results show that the PSRS scheme significantly improves the secure ability of the system compared to that of the random source relay selection scheme, but does not outperform the optimal joint source relay selection (OJSRS) scheme. However, the PSRS scheme drastically reduces the required amount of channel state information (CSI) estimations compared to that required by the OJSRS scheme, specially in dense cooperative networks. PMID:28212286

  1. Organizational Schemes of Information Resources in Top 50 Academic Business Library Websites

    ERIC Educational Resources Information Center

    Kim, Soojung; DeCoster, Elizabeth

    2011-01-01

    This paper analyzes the organizational schemes of information resources found in top 50 academic business library websites through content analysis and discusses the development and evaluation of the identified schemes.

  2. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    PubMed

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  3. On the security of a novel probabilistic signature based on bilinear square Diffie-Hellman problem and its extension.

    PubMed

    Zhao, Zhenguo; Shi, Wenbo

    2014-01-01

    Probabilistic signature scheme has been widely used in modern electronic commerce since it could provide integrity, authenticity, and nonrepudiation. Recently, Wu and Lin proposed a novel probabilistic signature (PS) scheme using the bilinear square Diffie-Hellman (BSDH) problem. They also extended it to a universal designated verifier signature (UDVS) scheme. In this paper, we analyze the security of Wu et al.'s PS scheme and UDVS scheme. Through concrete attacks, we demonstrate both of their schemes are not unforgeable. The security analysis shows that their schemes are not suitable for practical applications.

  4. Optimisation of colour schemes to accurately display mass spectrometry imaging data based on human colour perception.

    PubMed

    Race, Alan M; Bunch, Josephine

    2015-03-01

    The choice of colour scheme used to present data can have a dramatic effect on the perceived structure present within the data. This is of particular significance in mass spectrometry imaging (MSI), where ion images that provide 2D distributions of a wide range of analytes are used to draw conclusions about the observed system. Commonly employed colour schemes are generally suboptimal for providing an accurate representation of the maximum amount of data. Rainbow-based colour schemes are extremely popular within the community, but they introduce well-documented artefacts which can be actively misleading in the interpretation of the data. In this article, we consider the suitability of colour schemes and composite image formation found in MSI literature in the context of human colour perception. We also discuss recommendations of rules for colour scheme selection for ion composites and multivariate analysis techniques such as principal component analysis (PCA).

  5. Numerical analysis of electromagnetic cascades in emulsion chambers

    NASA Technical Reports Server (NTRS)

    Plyasheshnikov, A. V.; Vorobyev, K. V.

    1985-01-01

    A new calculational scheme of the Monte Carlo method assigned for the investigation of the development of high and extremely high energy electromagnetic cascades (EMC) in the matter was elaborated. The scheme was applied to the analysis of angular and radial distributions of EMC electrons in the atmosphere. By means of this scheme the EMC development in dense medium is investigated and some preliminary data are presented on the behavior of EMC in emulsion chambers. The results of more detailed theoretical analysis of the EMC development in emulsion chambers are discussed.

  6. Revised Chapman-Enskog analysis for a class of forcing schemes in the lattice Boltzmann method

    NASA Astrophysics Data System (ADS)

    Li, Q.; Zhou, P.; Yan, H. J.

    2016-10-01

    In the lattice Boltzmann (LB) method, the forcing scheme, which is used to incorporate an external or internal force into the LB equation, plays an important role. It determines whether the force of the system is correctly implemented in an LB model and affects the numerical accuracy. In this paper we aim to clarify a critical issue about the Chapman-Enskog analysis for a class of forcing schemes in the LB method in which the velocity in the equilibrium density distribution function is given by u =∑αeαfα / ρ , while the actual fluid velocity is defined as u ̂=u +δtF / (2 ρ ) . It is shown that the usual Chapman-Enskog analysis for this class of forcing schemes should be revised so as to derive the actual macroscopic equations recovered from these forcing schemes. Three forcing schemes belonging to the above class are analyzed, among which Wagner's forcing scheme [A. J. Wagner, Phys. Rev. E 74, 056703 (2006), 10.1103/PhysRevE.74.056703] is shown to be capable of reproducing the correct macroscopic equations. The theoretical analyses are examined and demonstrated with two numerical tests, including the simulation of Womersley flow and the modeling of flat and circular interfaces by the pseudopotential multiphase LB model.

  7. Comparison of finite-difference schemes for analysis of shells of revolution. [stress and free vibration analysis

    NASA Technical Reports Server (NTRS)

    Noor, A. K.; Stephens, W. B.

    1973-01-01

    Several finite difference schemes are applied to the stress and free vibration analysis of homogeneous isotropic and layered orthotropic shells of revolution. The study is based on a form of the Sanders-Budiansky first-approximation linear shell theory modified such that the effects of shear deformation and rotary inertia are included. A Fourier approach is used in which all the shell stress resultants and displacements are expanded in a Fourier series in the circumferential direction, and the governing equations reduce to ordinary differential equations in the meridional direction. While primary attention is given to finite difference schemes used in conjunction with first order differential equation formulation, comparison is made with finite difference schemes used with other formulations. These finite difference discretization models are compared with respect to simplicity of application, convergence characteristics, and computational efficiency. Numerical studies are presented for the effects of variations in shell geometry and lamination parameters on the accuracy and convergence of the solutions obtained by the different finite difference schemes. On the basis of the present study it is shown that the mixed finite difference scheme based on the first order differential equation formulation and two interlacing grids for the different fundamental unknowns combines a number of advantages over other finite difference schemes previously reported in the literature.

  8. A new multi-symplectic scheme for the generalized Kadomtsev-Petviashvili equation

    NASA Astrophysics Data System (ADS)

    Li, Haochen; Sun, Jianqiang

    2012-09-01

    We propose a new scheme for the generalized Kadomtsev-Petviashvili (KP) equation. The multi-symplectic conservation property of the new scheme is proved. Back error analysis shows that the new multi-symplectic scheme has second order accuracy in space and time. Numerical application on studying the KPI equation and the KPII equation are presented in detail.

  9. Correspondence between quantization schemes for two-player nonzero-sum games and CNOT complexity

    NASA Astrophysics Data System (ADS)

    Vijayakrishnan, V.; Balakrishnan, S.

    2018-05-01

    The well-known quantization schemes for two-player nonzero-sum games are Eisert-Wilkens-Lewenstein scheme and Marinatto-Weber scheme. In this work, we establish the connection between the two schemes from the perspective of quantum circuits. Further, we provide the correspondence between any game quantization schemes and the CNOT complexity, where CNOT complexity is up to the local unitary operations. While CNOT complexity is known to be useful in the analysis of universal quantum circuit, in this work, we find its applicability in quantum game theory.

  10. A secure biometrics-based authentication scheme for telecare medicine information systems.

    PubMed

    Yan, Xiaopeng; Li, Weiheng; Li, Ping; Wang, Jiantao; Hao, Xinhong; Gong, Peng

    2013-10-01

    The telecare medicine information system (TMIS) allows patients and doctors to access medical services or medical information at remote sites. Therefore, it could bring us very big convenient. To safeguard patients' privacy, authentication schemes for the TMIS attracted wide attention. Recently, Tan proposed an efficient biometrics-based authentication scheme for the TMIS and claimed their scheme could withstand various attacks. However, in this paper, we point out that Tan's scheme is vulnerable to the Denial-of-Service attack. To enhance security, we also propose an improved scheme based on Tan's work. Security and performance analysis shows our scheme not only could overcome weakness in Tan's scheme but also has better performance.

  11. Selecting registration schemes in case of interstitial lung disease follow-up in CT

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vlachopoulos, Georgios; Korfiatis, Panayiotis; Skiadopoulos, Spyros

    Purpose: Primary goal of this study is to select optimal registration schemes in the framework of interstitial lung disease (ILD) follow-up analysis in CT. Methods: A set of 128 multiresolution schemes composed of multiresolution nonrigid and combinations of rigid and nonrigid registration schemes are evaluated, utilizing ten artificially warped ILD follow-up volumes, originating from ten clinical volumetric CT scans of ILD affected patients, to select candidate optimal schemes. Specifically, all combinations of four transformation models (three rigid: rigid, similarity, affine and one nonrigid: third order B-spline), four cost functions (sum-of-square distances, normalized correlation coefficient, mutual information, and normalized mutual information),more » four gradient descent optimizers (standard, regular step, adaptive stochastic, and finite difference), and two types of pyramids (recursive and Gaussian-smoothing) were considered. The selection process involves two stages. The first stage involves identification of schemes with deformation field singularities, according to the determinant of the Jacobian matrix. In the second stage, evaluation methodology is based on distance between corresponding landmark points in both normal lung parenchyma (NLP) and ILD affected regions. Statistical analysis was performed in order to select near optimal registration schemes per evaluation metric. Performance of the candidate registration schemes was verified on a case sample of ten clinical follow-up CT scans to obtain the selected registration schemes. Results: By considering near optimal schemes common to all ranking lists, 16 out of 128 registration schemes were initially selected. These schemes obtained submillimeter registration accuracies in terms of average distance errors 0.18 ± 0.01 mm for NLP and 0.20 ± 0.01 mm for ILD, in case of artificially generated follow-up data. Registration accuracy in terms of average distance error in clinical follow-up data was in the range of 1.985–2.156 mm and 1.966–2.234 mm, for NLP and ILD affected regions, respectively, excluding schemes with statistically significant lower performance (Wilcoxon signed-ranks test, p < 0.05), resulting in 13 finally selected registration schemes. Conclusions: Selected registration schemes in case of ILD CT follow-up analysis indicate the significance of adaptive stochastic gradient descent optimizer, as well as the importance of combined rigid and nonrigid schemes providing high accuracy and time efficiency. The selected optimal deformable registration schemes are equivalent in terms of their accuracy and thus compatible in terms of their clinical outcome.« less

  12. Assessing the Predictability of Convection using Ensemble Data Assimilation of Simulated Radar Observations in an LETKF system

    NASA Astrophysics Data System (ADS)

    Lange, Heiner; Craig, George

    2014-05-01

    This study uses the Local Ensemble Transform Kalman Filter (LETKF) to perform storm-scale Data Assimilation of simulated Doppler radar observations into the non-hydrostatic, convection-permitting COSMO model. In perfect model experiments (OSSEs), it is investigated how the limited predictability of convective storms affects precipitation forecasts. The study compares a fine analysis scheme with small RMS errors to a coarse scheme that allows for errors in position, shape and occurrence of storms in the ensemble. The coarse scheme uses superobservations, a coarser grid for analysis weights, a larger localization radius and larger observation error that allow a broadening of the Gaussian error statistics. Three hour forecasts of convective systems (with typical lifetimes exceeding 6 hours) from the detailed analyses of the fine scheme are found to be advantageous to those of the coarse scheme during the first 1-2 hours, with respect to the predicted storm positions. After 3 hours in the convective regime used here, the forecast quality of the two schemes appears indiscernible, judging by RMSE and verification methods for rain-fields and objects. It is concluded that, for operational assimilation systems, the analysis scheme might not necessarily need to be detailed to the grid scale of the model. Depending on the forecast lead time, and on the presence of orographic or synoptic forcing that enhance the predictability of storm occurrences, analyses from a coarser scheme might suffice.

  13. The impact of catchment source group classification on the accuracy of sediment fingerprinting outputs.

    PubMed

    Pulley, Simon; Foster, Ian; Collins, Adrian L

    2017-06-01

    The objective classification of sediment source groups is at present an under-investigated aspect of source tracing studies, which has the potential to statistically improve discrimination between sediment sources and reduce uncertainty. This paper investigates this potential using three different source group classification schemes. The first classification scheme was simple surface and subsurface groupings (Scheme 1). The tracer signatures were then used in a two-step cluster analysis to identify the sediment source groupings naturally defined by the tracer signatures (Scheme 2). The cluster source groups were then modified by splitting each one into a surface and subsurface component to suit catchment management goals (Scheme 3). The schemes were tested using artificial mixtures of sediment source samples. Controlled corruptions were made to some of the mixtures to mimic the potential causes of tracer non-conservatism present when using tracers in natural fluvial environments. It was determined how accurately the known proportions of sediment sources in the mixtures were identified after unmixing modelling using the three classification schemes. The cluster analysis derived source groups (2) significantly increased tracer variability ratios (inter-/intra-source group variability) (up to 2122%, median 194%) compared to the surface and subsurface groupings (1). As a result, the composition of the artificial mixtures was identified an average of 9.8% more accurately on the 0-100% contribution scale. It was found that the cluster groups could be reclassified into a surface and subsurface component (3) with no significant increase in composite uncertainty (a 0.1% increase over Scheme 2). The far smaller effects of simulated tracer non-conservatism for the cluster analysis based schemes (2 and 3) was primarily attributed to the increased inter-group variability producing a far larger sediment source signal that the non-conservatism noise (1). Modified cluster analysis based classification methods have the potential to reduce composite uncertainty significantly in future source tracing studies. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Performance analyses and improvements for the IEEE 802.15.4 CSMA/CA scheme with heterogeneous buffered conditions.

    PubMed

    Zhu, Jianping; Tao, Zhengsu; Lv, Chunfeng

    2012-01-01

    Studies of the IEEE 802.15.4 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme have been received considerable attention recently, with most of these studies focusing on homogeneous or saturated traffic. Two novel transmission schemes-OSTS/BSTS (One Service a Time Scheme/Bulk Service a Time Scheme)-are proposed in this paper to improve the behaviors of time-critical buffered networks with heterogeneous unsaturated traffic. First, we propose a model which contains two modified semi-Markov chains and a macro-Markov chain combined with the theory of M/G/1/K queues to evaluate the characteristics of these two improved CSMA/CA schemes, in which traffic arrivals and accessing packets are bestowed with non-preemptive priority over each other, instead of prioritization. Then, throughput, packet delay and energy consumption of unsaturated, unacknowledged IEEE 802.15.4 beacon-enabled networks are predicted based on the overall point of view which takes the dependent interactions of different types of nodes into account. Moreover, performance comparisons of these two schemes with other non-priority schemes are also proposed. Analysis and simulation results show that delay and fairness of our schemes are superior to those of other schemes, while throughput and energy efficiency are superior to others in more heterogeneous situations. Comprehensive simulations demonstrate that the analysis results of these models match well with the simulation results.

  15. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  16. A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.

    PubMed

    Chaudhry, Shehzad Ashraf; Khan, Muhammad Tawab; Khan, Muhammad Khurram; Shon, Taeshik

    2016-11-01

    Recently several authentication schemes are proposed for telecare medicine information system (TMIS). Many of such schemes are proved to have weaknesses against known attacks. Furthermore, numerous such schemes cannot be used in real time scenarios. Because they assume a single server for authentication across the globe. Very recently, Amin et al. (J. Med. Syst. 39(11):180, 2015) designed an authentication scheme for secure communication between a patient and a medical practitioner using a trusted central medical server. They claimed their scheme to extend all security requirements and emphasized the efficiency of their scheme. However, the analysis in this article proves that the scheme designed by Amin et al. is vulnerable to stolen smart card and stolen verifier attacks. Furthermore, their scheme is having scalability issues along with inefficient password change and password recovery phases. Then we propose an improved scheme. The proposed scheme is more practical, secure and lightweight than Amin et al.'s scheme. The security of proposed scheme is proved using the popular automated tool ProVerif.

  17. Quantum Attack-Resistent Certificateless Multi-Receiver Signcryption Scheme

    PubMed Central

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards. PMID:23967037

  18. On the Security of a Novel Probabilistic Signature Based on Bilinear Square Diffie-Hellman Problem and Its Extension

    PubMed Central

    Zhao, Zhenguo; Shi, Wenbo

    2014-01-01

    Probabilistic signature scheme has been widely used in modern electronic commerce since it could provide integrity, authenticity, and nonrepudiation. Recently, Wu and Lin proposed a novel probabilistic signature (PS) scheme using the bilinear square Diffie-Hellman (BSDH) problem. They also extended it to a universal designated verifier signature (UDVS) scheme. In this paper, we analyze the security of Wu et al.'s PS scheme and UDVS scheme. Through concrete attacks, we demonstrate both of their schemes are not unforgeable. The security analysis shows that their schemes are not suitable for practical applications. PMID:25025083

  19. Design of an extensive information representation scheme for clinical narratives.

    PubMed

    Deléger, Louise; Campillos, Leonardo; Ligozat, Anne-Laure; Névéol, Aurélie

    2017-09-11

    Knowledge representation frameworks are essential to the understanding of complex biomedical processes, and to the analysis of biomedical texts that describe them. Combined with natural language processing (NLP), they have the potential to contribute to retrospective studies by unlocking important phenotyping information contained in the narrative content of electronic health records (EHRs). This work aims to develop an extensive information representation scheme for clinical information contained in EHR narratives, and to support secondary use of EHR narrative data to answer clinical questions. We review recent work that proposed information representation schemes and applied them to the analysis of clinical narratives. We then propose a unifying scheme that supports the extraction of information to address a large variety of clinical questions. We devised a new information representation scheme for clinical narratives that comprises 13 entities, 11 attributes and 37 relations. The associated annotation guidelines can be used to consistently apply the scheme to clinical narratives and are https://cabernet.limsi.fr/annotation_guide_for_the_merlot_french_clinical_corpus-Sept2016.pdf . The information scheme includes many elements of the major schemes described in the clinical natural language processing literature, as well as a uniquely detailed set of relations.

  20. Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards.

    PubMed

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.

  1. Robust Biometrics Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.’s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes. PMID:25978373

  2. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme.

    PubMed

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks.

  3. Analysis of a Teacher's Pedagogical Arguments Using Toulmin's Model and Argumentation Schemes

    ERIC Educational Resources Information Center

    Metaxas, N.; Potari, D.; Zachariades, T.

    2016-01-01

    In this article, we elaborate methodologies to study the argumentation speech of a teacher involved in argumentative activities. The standard tool of analysis of teachers' argumentation concerning pedagogical matters is Toulmin's model. The theory of argumentation schemes offers an alternative perspective on the analysis of arguments. We propose…

  4. Content Analysis Coding Schemes for Online Asynchronous Discussion

    ERIC Educational Resources Information Center

    Weltzer-Ward, Lisa

    2011-01-01

    Purpose: Researchers commonly utilize coding-based analysis of classroom asynchronous discussion contributions as part of studies of online learning and instruction. However, this analysis is inconsistent from study to study with over 50 coding schemes and procedures applied in the last eight years. The aim of this article is to provide a basis…

  5. Outage Performance Analysis of Relay Selection Schemes in Wireless Energy Harvesting Cooperative Networks over Non-Identical Rayleigh Fading Channels †

    PubMed Central

    Do, Nhu Tri; Bao, Vo Nguyen Quoc; An, Beongku

    2016-01-01

    In this paper, we study relay selection in decode-and-forward wireless energy harvesting cooperative networks. In contrast to conventional cooperative networks, the relays harvest energy from the source’s radio-frequency radiation and then use that energy to forward the source information. Considering power splitting receiver architecture used at relays to harvest energy, we are concerned with the performance of two popular relay selection schemes, namely, partial relay selection (PRS) scheme and optimal relay selection (ORS) scheme. In particular, we analyze the system performance in terms of outage probability (OP) over independent and non-identical (i.n.i.d.) Rayleigh fading channels. We derive the closed-form approximations for the system outage probabilities of both schemes and validate the analysis by the Monte-Carlo simulation. The numerical results provide comprehensive performance comparison between the PRS and ORS schemes and reveal the effect of wireless energy harvesting on the outage performances of both schemes. Additionally, we also show the advantages and drawbacks of the wireless energy harvesting cooperative networks and compare to the conventional cooperative networks. PMID:26927119

  6. Outage Performance Analysis of Relay Selection Schemes in Wireless Energy Harvesting Cooperative Networks over Non-Identical Rayleigh Fading Channels.

    PubMed

    Do, Nhu Tri; Bao, Vo Nguyen Quoc; An, Beongku

    2016-02-26

    In this paper, we study relay selection in decode-and-forward wireless energy harvesting cooperative networks. In contrast to conventional cooperative networks, the relays harvest energy from the source's radio-frequency radiation and then use that energy to forward the source information. Considering power splitting receiver architecture used at relays to harvest energy, we are concerned with the performance of two popular relay selection schemes, namely, partial relay selection (PRS) scheme and optimal relay selection (ORS) scheme. In particular, we analyze the system performance in terms of outage probability (OP) over independent and non-identical (i.n.i.d.) Rayleigh fading channels. We derive the closed-form approximations for the system outage probabilities of both schemes and validate the analysis by the Monte-Carlo simulation. The numerical results provide comprehensive performance comparison between the PRS and ORS schemes and reveal the effect of wireless energy harvesting on the outage performances of both schemes. Additionally, we also show the advantages and drawbacks of the wireless energy harvesting cooperative networks and compare to the conventional cooperative networks.

  7. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-06-08

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  8. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  9. Von Neumann stability analysis of globally divergence-free RKDG schemes for the induction equation using multidimensional Riemann solvers

    NASA Astrophysics Data System (ADS)

    Balsara, Dinshaw S.; Käppeli, Roger

    2017-05-01

    In this paper we focus on the numerical solution of the induction equation using Runge-Kutta Discontinuous Galerkin (RKDG)-like schemes that are globally divergence-free. The induction equation plays a role in numerical MHD and other systems like it. It ensures that the magnetic field evolves in a divergence-free fashion; and that same property is shared by the numerical schemes presented here. The algorithms presented here are based on a novel DG-like method as it applies to the magnetic field components in the faces of a mesh. (I.e., this is not a conventional DG algorithm for conservation laws.) The other two novel building blocks of the method include divergence-free reconstruction of the magnetic field and multidimensional Riemann solvers; both of which have been developed in recent years by the first author. Since the method is linear, a von Neumann stability analysis is carried out in two-dimensions to understand its stability properties. The von Neumann stability analysis that we develop in this paper relies on transcribing from a modal to a nodal DG formulation in order to develop discrete evolutionary equations for the nodal values. These are then coupled to a suitable Runge-Kutta timestepping strategy so that one can analyze the stability of the entire scheme which is suitably high order in space and time. We show that our scheme permits CFL numbers that are comparable to those of traditional RKDG schemes. We also analyze the wave propagation characteristics of the method and show that with increasing order of accuracy the wave propagation becomes more isotropic and free of dissipation for a larger range of long wavelength modes. This makes a strong case for investing in higher order methods. We also use the von Neumann stability analysis to show that the divergence-free reconstruction and multidimensional Riemann solvers are essential algorithmic ingredients of a globally divergence-free RKDG-like scheme. Numerical accuracy analyses of the RKDG-like schemes are presented and compared with the accuracy of PNPM schemes. It is found that PNPM retrieve much of the accuracy of the RKDG-like schemes while permitting a larger CFL number.

  10. Finite Volume Methods: Foundation and Analysis

    NASA Technical Reports Server (NTRS)

    Barth, Timothy; Ohlberger, Mario

    2003-01-01

    Finite volume methods are a class of discretization schemes that have proven highly successful in approximating the solution of a wide variety of conservation law systems. They are extensively used in fluid mechanics, porous media flow, meteorology, electromagnetics, models of biological processes, semi-conductor device simulation and many other engineering areas governed by conservative systems that can be written in integral control volume form. This article reviews elements of the foundation and analysis of modern finite volume methods. The primary advantages of these methods are numerical robustness through the obtention of discrete maximum (minimum) principles, applicability on very general unstructured meshes, and the intrinsic local conservation properties of the resulting schemes. Throughout this article, specific attention is given to scalar nonlinear hyperbolic conservation laws and the development of high order accurate schemes for discretizing them. A key tool in the design and analysis of finite volume schemes suitable for non-oscillatory discontinuity capturing is discrete maximum principle analysis. A number of building blocks used in the development of numerical schemes possessing local discrete maximum principles are reviewed in one and several space dimensions, e.g. monotone fluxes, E-fluxes, TVD discretization, non-oscillatory reconstruction, slope limiters, positive coefficient schemes, etc. When available, theoretical results concerning a priori and a posteriori error estimates are given. Further advanced topics are then considered such as high order time integration, discretization of diffusion terms and the extension to systems of nonlinear conservation laws.

  11. A Quantum Multi-proxy Blind Signature Scheme Based on Genuine Four-Qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Tian, Juan-Hong; Zhang, Jian-Zhong; Li, Yan-Ping

    2016-02-01

    In this paper, we propose a multi-proxy blind signature scheme based on controlled teleportation. Genuine four-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. The security analysis shows the scheme satisfies the security features of multi-proxy signature, unforgeability, undeniability, blindness and unconditional security.

  12. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme

    PubMed Central

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.’s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks. PMID:26866606

  13. Numerical study of read scheme in one-selector one-resistor crossbar array

    NASA Astrophysics Data System (ADS)

    Kim, Sungho; Kim, Hee-Dong; Choi, Sung-Jin

    2015-12-01

    A comprehensive numerical circuit analysis of read schemes of a one selector-one resistance change memory (1S1R) crossbar array is carried out. Three schemes-the ground, V/2, and V/3 schemes-are compared with each other in terms of sensing margin and power consumption. Without the aid of a complex analytical approach or SPICE-based simulation, a simple numerical iteration method is developed to simulate entire current flows and node voltages within a crossbar array. Understanding such phenomena is essential in successfully evaluating the electrical specifications of selectors for suppressing intrinsic drawbacks of crossbar arrays, such as sneaky current paths and series line resistance problems. This method provides a quantitative tool for the accurate analysis of crossbar arrays and provides guidelines for developing an optimal read scheme, array configuration, and selector device specifications.

  14. Qualitative Analysis: The Current Status.

    ERIC Educational Resources Information Center

    Cole, G. Mattney, Jr.; Waggoner, William H.

    1983-01-01

    To assist in designing/implementing qualitative analysis courses, examines reliability/accuracy of several published separation schemes, notes methods where particular difficulties arise (focusing on Groups II/III), and presents alternative schemes for the separation of these groups. Only cation analyses are reviewed. Figures are presented in…

  15. Qualitative Analysis, with Periodicity, for "Real" Solutions.

    ERIC Educational Resources Information Center

    Rich, Ronald L.

    1984-01-01

    Presents an outline of group separations for a nonhydrogen sulfide analytical scheme applicable to all metallic elements (Bromide scheme). Also presents another outline of an abbreviated and modified version (Iodide scheme) designed for emphasis on nutritionally important metals, with special attention to 10 cations. (JM)

  16. Assessment of numerical methods for the solution of fluid dynamics equations for nonlinear resonance systems

    NASA Technical Reports Server (NTRS)

    Przekwas, A. J.; Yang, H. Q.

    1989-01-01

    The capability of accurate nonlinear flow analysis of resonance systems is essential in many problems, including combustion instability. Classical numerical schemes are either too diffusive or too dispersive especially for transient problems. In the last few years, significant progress has been made in the numerical methods for flows with shocks. The objective was to assess advanced shock capturing schemes on transient flows. Several numerical schemes were tested including TVD, MUSCL, ENO, FCT, and Riemann Solver Godunov type schemes. A systematic assessment was performed on scalar transport, Burgers' and gas dynamic problems. Several shock capturing schemes are compared on fast transient resonant pipe flow problems. A system of 1-D nonlinear hyperbolic gas dynamics equations is solved to predict propagation of finite amplitude waves, the wave steepening, formation, propagation, and reflection of shocks for several hundred wave cycles. It is shown that high accuracy schemes can be used for direct, exact nonlinear analysis of combustion instability problems, preserving high harmonic energy content for long periods of time.

  17. Modeling and performance analysis of an improved movement-based location management scheme for packet-switched mobile communication systems.

    PubMed

    Chung, Yun Won; Kwon, Jae Kyun; Park, Suwon

    2014-01-01

    One of the key technologies to support mobility of mobile station (MS) in mobile communication systems is location management which consists of location update and paging. In this paper, an improved movement-based location management scheme with two movement thresholds is proposed, considering bursty data traffic characteristics of packet-switched (PS) services. The analytical modeling for location update and paging signaling loads of the proposed scheme is developed thoroughly and the performance of the proposed scheme is compared with that of the conventional scheme. We show that the proposed scheme outperforms the conventional scheme in terms of total signaling load with an appropriate selection of movement thresholds.

  18. Weighted analysis methods for mapped plot forest inventory data: Tables, regressions, maps and graphs

    Treesearch

    Paul C. Van Deusen; Linda S. Heath

    2010-01-01

    Weighted estimation methods for analysis of mapped plot forest inventory data are discussed. The appropriate weighting scheme can vary depending on the type of analysis and graphical display. Both statistical issues and user expectations need to be considered in these methods. A weighting scheme is proposed that balances statistical considerations and the logical...

  19. An Improved Flame Test for Qualitative Analysis Using a Multichannel UV-Visible Spectrophotometer

    ERIC Educational Resources Information Center

    Blitz, Jonathan P.; Sheeran, Daniel J.; Becker, Thomas L.

    2006-01-01

    Qualitative analysis schemes are used in undergraduate laboratory settings as a way to introduce equilibrium concepts and logical thinking. The main component of all qualitative analysis schemes is a flame test, as the color of light emitted from certain elements is distinctive and a flame photometer or spectrophotometer in each laboratory is…

  20. Determination of power distribution in the VVER-440 core on the basis of data from in-core monitors by means of a metric analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kryanev, A. V.; Udumyan, D. K.; Kurchenkov, A. Yu., E-mail: s327@vver.kiae.ru

    2014-12-15

    Problems associated with determining the power distribution in the VVER-440 core on the basis of a neutron-physics calculation and data from in-core monitors are considered. A new mathematical scheme is proposed for this on the basis of a metric analysis. In relation to the existing mathematical schemes, the scheme in question improves the accuracy and reliability of the resulting power distribution.

  1. High-order upwind schemes for the wave equation on overlapping grids: Maxwell's equations in second-order form

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Angel, Jordan B.; Banks, Jeffrey W.; Henshaw, William D.

    High-order accurate upwind approximations for the wave equation in second-order form on overlapping grids are developed. Although upwind schemes are well established for first-order hyperbolic systems, it was only recently shown by Banks and Henshaw how upwinding could be incorporated into the second-order form of the wave equation. This new upwind approach is extended here to solve the time-domain Maxwell's equations in second-order form; schemes of arbitrary order of accuracy are formulated for general curvilinear grids. Taylor time-stepping is used to develop single-step space-time schemes, and the upwind dissipation is incorporated by embedding the exact solution of a local Riemannmore » problem into the discretization. Second-order and fourth-order accurate schemes are implemented for problems in two and three space dimensions, and overlapping grids are used to treat complex geometry and problems with multiple materials. Stability analysis of the upwind-scheme on overlapping grids is performed using normal mode theory. The stability analysis and computations confirm that the upwind scheme remains stable on overlapping grids, including the difficult case of thin boundary grids when the traditional non-dissipative scheme becomes unstable. The accuracy properties of the scheme are carefully evaluated on a series of classical scattering problems for both perfect conductors and dielectric materials in two and three space dimensions. Finally, the upwind scheme is shown to be robust and provide high-order accuracy.« less

  2. High-order upwind schemes for the wave equation on overlapping grids: Maxwell's equations in second-order form

    DOE PAGES

    Angel, Jordan B.; Banks, Jeffrey W.; Henshaw, William D.

    2017-09-28

    High-order accurate upwind approximations for the wave equation in second-order form on overlapping grids are developed. Although upwind schemes are well established for first-order hyperbolic systems, it was only recently shown by Banks and Henshaw how upwinding could be incorporated into the second-order form of the wave equation. This new upwind approach is extended here to solve the time-domain Maxwell's equations in second-order form; schemes of arbitrary order of accuracy are formulated for general curvilinear grids. Taylor time-stepping is used to develop single-step space-time schemes, and the upwind dissipation is incorporated by embedding the exact solution of a local Riemannmore » problem into the discretization. Second-order and fourth-order accurate schemes are implemented for problems in two and three space dimensions, and overlapping grids are used to treat complex geometry and problems with multiple materials. Stability analysis of the upwind-scheme on overlapping grids is performed using normal mode theory. The stability analysis and computations confirm that the upwind scheme remains stable on overlapping grids, including the difficult case of thin boundary grids when the traditional non-dissipative scheme becomes unstable. The accuracy properties of the scheme are carefully evaluated on a series of classical scattering problems for both perfect conductors and dielectric materials in two and three space dimensions. Finally, the upwind scheme is shown to be robust and provide high-order accuracy.« less

  3. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-01-01

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890

  4. High-order upwind schemes for the wave equation on overlapping grids: Maxwell's equations in second-order form

    NASA Astrophysics Data System (ADS)

    Angel, Jordan B.; Banks, Jeffrey W.; Henshaw, William D.

    2018-01-01

    High-order accurate upwind approximations for the wave equation in second-order form on overlapping grids are developed. Although upwind schemes are well established for first-order hyperbolic systems, it was only recently shown by Banks and Henshaw [1] how upwinding could be incorporated into the second-order form of the wave equation. This new upwind approach is extended here to solve the time-domain Maxwell's equations in second-order form; schemes of arbitrary order of accuracy are formulated for general curvilinear grids. Taylor time-stepping is used to develop single-step space-time schemes, and the upwind dissipation is incorporated by embedding the exact solution of a local Riemann problem into the discretization. Second-order and fourth-order accurate schemes are implemented for problems in two and three space dimensions, and overlapping grids are used to treat complex geometry and problems with multiple materials. Stability analysis of the upwind-scheme on overlapping grids is performed using normal mode theory. The stability analysis and computations confirm that the upwind scheme remains stable on overlapping grids, including the difficult case of thin boundary grids when the traditional non-dissipative scheme becomes unstable. The accuracy properties of the scheme are carefully evaluated on a series of classical scattering problems for both perfect conductors and dielectric materials in two and three space dimensions. The upwind scheme is shown to be robust and provide high-order accuracy.

  5. Performance Analyses and Improvements for the IEEE 802.15.4 CSMA/CA Scheme with Heterogeneous Buffered Conditions

    PubMed Central

    Zhu, Jianping; Tao, Zhengsu; Lv, Chunfeng

    2012-01-01

    Studies of the IEEE 802.15.4 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme have been received considerable attention recently, with most of these studies focusing on homogeneous or saturated traffic. Two novel transmission schemes—OSTS/BSTS (One Service a Time Scheme/Bulk Service a Time Scheme)—are proposed in this paper to improve the behaviors of time-critical buffered networks with heterogeneous unsaturated traffic. First, we propose a model which contains two modified semi-Markov chains and a macro-Markov chain combined with the theory of M/G/1/K queues to evaluate the characteristics of these two improved CSMA/CA schemes, in which traffic arrivals and accessing packets are bestowed with non-preemptive priority over each other, instead of prioritization. Then, throughput, packet delay and energy consumption of unsaturated, unacknowledged IEEE 802.15.4 beacon-enabled networks are predicted based on the overall point of view which takes the dependent interactions of different types of nodes into account. Moreover, performance comparisons of these two schemes with other non-priority schemes are also proposed. Analysis and simulation results show that delay and fairness of our schemes are superior to those of other schemes, while throughput and energy efficiency are superior to others in more heterogeneous situations. Comprehensive simulations demonstrate that the analysis results of these models match well with the simulation results. PMID:22666076

  6. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    PubMed

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.

  7. MASTER ANALYTICAL SCHEME FOR ORGANIC COMPOUNDS IN WATER: PART 1. PROTOCOLS

    EPA Science Inventory

    A Master Analytical Scheme (MAS) has been developed for the analysis of volatile (gas chromatographable) organic compounds in water. In developing the MAS, it was necessary to evaluate and modify existing analysis procedures and develop new techniques to produce protocols that pr...

  8. APPLICATION OF THE MASTER ANALYTICAL SCHEME TO POLAR ORGANICS IN DRINKING WATER

    EPA Science Inventory

    EPA's Master Analytical Scheme (MAS) for Organic Compounds in Water provides for comprehensive qualitative-quantitative analysis of gas chromatographable organics in many types of water. The paper emphasizes the analysis of polar and ionic organics, the more water soluble compoun...

  9. Computational aspects of helicopter trim analysis and damping levels from Floquet theory

    NASA Technical Reports Server (NTRS)

    Gaonkar, Gopal H.; Achar, N. S.

    1992-01-01

    Helicopter trim settings of periodic initial state and control inputs are investigated for convergence of Newton iteration in computing the settings sequentially and in parallel. The trim analysis uses a shooting method and a weak version of two temporal finite element methods with displacement formulation and with mixed formulation of displacements and momenta. These three methods broadly represent two main approaches of trim analysis: adaptation of initial-value and finite element boundary-value codes to periodic boundary conditions, particularly for unstable and marginally stable systems. In each method, both the sequential and in-parallel schemes are used and the resulting nonlinear algebraic equations are solved by damped Newton iteration with an optimally selected damping parameter. The impact of damped Newton iteration, including earlier-observed divergence problems in trim analysis, is demonstrated by the maximum condition number of the Jacobian matrices of the iterative scheme and by virtual elimination of divergence. The advantages of the in-parallel scheme over the conventional sequential scheme are also demonstrated.

  10. Analysis/forecast experiments with a flow-dependent correlation function using FGGE data

    NASA Technical Reports Server (NTRS)

    Baker, W. E.; Bloom, S. C.; Carus, H.; Nestler, M. S.

    1986-01-01

    The use of a flow-dependent correlation function to improve the accuracy of an optimum interpolation (OI) scheme is examined. The development of the correlation function for the OI analysis scheme used for numerical weather prediction is described. The scheme uses a multivariate surface analysis over the oceans to model the pressure-wind error cross-correlation and it has the ability to use an error correlation function that is flow- and geographically-dependent. A series of four-day data assimilation experiments, conducted from January 5-9, 1979, were used to investigate the effect of the different features of the OI scheme (error correlation) on forecast skill for the barotropic lows and highs. The skill of the OI was compared with that of a successive correlation method (SCM) of analysis. It is observed that the largest difference in the correlation statistics occurred in barotropic and baroclinic lows and highs. The comparison reveals that the OI forecasts were more accurate than the SCM forecasts.

  11. Unstructured grids for sonic-boom analysis

    NASA Technical Reports Server (NTRS)

    Fouladi, Kamran

    1993-01-01

    A fast and efficient unstructured grid scheme is evaluated for sonic-boom applications. The scheme is used to predict the near-field pressure signatures of a body of revolution at several body lengths below the configuration, and those results are compared with experimental data. The introduction of the 'sonic-boom grid topology' to this scheme make it well suited for sonic-boom applications, thus providing an alternative to conventional multiblock structured grid schemes.

  12. Stability analysis of implicit time discretizations for the Compton-scattering Fokker-Planck equation

    NASA Astrophysics Data System (ADS)

    Densmore, Jeffery D.; Warsa, James S.; Lowrie, Robert B.; Morel, Jim E.

    2009-09-01

    The Fokker-Planck equation is a widely used approximation for modeling the Compton scattering of photons in high energy density applications. In this paper, we perform a stability analysis of three implicit time discretizations for the Compton-Scattering Fokker-Planck equation. Specifically, we examine (i) a Semi-Implicit (SI) scheme that employs backward-Euler differencing but evaluates temperature-dependent coefficients at their beginning-of-time-step values, (ii) a Fully Implicit (FI) discretization that instead evaluates temperature-dependent coefficients at their end-of-time-step values, and (iii) a Linearized Implicit (LI) scheme, which is developed by linearizing the temperature dependence of the FI discretization within each time step. Our stability analysis shows that the FI and LI schemes are unconditionally stable and cannot generate oscillatory solutions regardless of time-step size, whereas the SI discretization can suffer from instabilities and nonphysical oscillations for sufficiently large time steps. With the results of this analysis, we present time-step limits for the SI scheme that prevent undesirable behavior. We test the validity of our stability analysis and time-step limits with a set of numerical examples.

  13. Cryo-EM structures of the human endolysosomal TRPML3 channel in three distinct states.

    PubMed

    Zhou, Xiaoyuan; Li, Minghui; Su, Deyuan; Jia, Qi; Li, Huan; Li, Xueming; Yang, Jian

    2017-12-01

    TRPML3 channels are mainly localized to endolysosomes and play a critical role in the endocytic pathway. Their dysfunction causes deafness and pigmentation defects in mice. TRPML3 activity is inhibited by low endolysosomal pH. Here we present cryo-electron microscopy (cryo-EM) structures of human TRPML3 in the closed, agonist-activated, and low-pH-inhibited states, with resolutions of 4.06, 3.62, and 4.65 Å, respectively. The agonist ML-SA1 lodges between S5 and S6 and opens an S6 gate. A polycystin-mucolipin domain (PMD) forms a luminal cap. S1 extends into this cap, forming a 'gating rod' that connects directly to a luminal pore loop, which undergoes dramatic conformational changes in response to low pH. S2 extends intracellularly and interacts with several intracellular regions to form a 'gating knob'. These unique structural features, combined with the results of electrophysiological studies, indicate a new mechanism by which luminal pH and other physiological modulators such as PIP 2 regulate TRPML3 by changing S1 and S2 conformations.

  14. Genome-wide association analysis of secondary imaging phenotypes from the Alzheimer's disease neuroimaging initiative study.

    PubMed

    Zhu, Wensheng; Yuan, Ying; Zhang, Jingwen; Zhou, Fan; Knickmeyer, Rebecca C; Zhu, Hongtu

    2017-02-01

    The aim of this paper is to systematically evaluate a biased sampling issue associated with genome-wide association analysis (GWAS) of imaging phenotypes for most imaging genetic studies, including the Alzheimer's Disease Neuroimaging Initiative (ADNI). Specifically, the original sampling scheme of these imaging genetic studies is primarily the retrospective case-control design, whereas most existing statistical analyses of these studies ignore such sampling scheme by directly correlating imaging phenotypes (called the secondary traits) with genotype. Although it has been well documented in genetic epidemiology that ignoring the case-control sampling scheme can produce highly biased estimates, and subsequently lead to misleading results and suspicious associations, such findings are not well documented in imaging genetics. We use extensive simulations and a large-scale imaging genetic data analysis of the Alzheimer's Disease Neuroimaging Initiative (ADNI) data to evaluate the effects of the case-control sampling scheme on GWAS results based on some standard statistical methods, such as linear regression methods, while comparing it with several advanced statistical methods that appropriately adjust for the case-control sampling scheme. Copyright © 2016 Elsevier Inc. All rights reserved.

  15. An extended GS method for dense linear systems

    NASA Astrophysics Data System (ADS)

    Niki, Hiroshi; Kohno, Toshiyuki; Abe, Kuniyoshi

    2009-09-01

    Davey and Rosindale [K. Davey, I. Rosindale, An iterative solution scheme for systems of boundary element equations, Internat. J. Numer. Methods Engrg. 37 (1994) 1399-1411] derived the GSOR method, which uses an upper triangular matrix [Omega] in order to solve dense linear systems. By applying functional analysis, the authors presented an expression for the optimum [Omega]. Moreover, Davey and Bounds [K. Davey, S. Bounds, A generalized SOR method for dense linear systems of boundary element equations, SIAM J. Comput. 19 (1998) 953-967] also introduced further interesting results. In this note, we employ a matrix analysis approach to investigate these schemes, and derive theorems that compare these schemes with existing preconditioners for dense linear systems. We show that the convergence rate of the Gauss-Seidel method with preconditioner PG is superior to that of the GSOR method. Moreover, we define some splittings associated with the iterative schemes. Some numerical examples are reported to confirm the theoretical analysis. We show that the EGS method with preconditioner produces an extremely small spectral radius in comparison with the other schemes considered.

  16. Comparison of different incremental analysis update schemes in a realistic assimilation system with Ensemble Kalman Filter

    NASA Astrophysics Data System (ADS)

    Yan, Y.; Barth, A.; Beckers, J. M.; Brankart, J. M.; Brasseur, P.; Candille, G.

    2017-07-01

    In this paper, three incremental analysis update schemes (IAU 0, IAU 50 and IAU 100) are compared in the same assimilation experiments with a realistic eddy permitting primitive equation model of the North Atlantic Ocean using the Ensemble Kalman Filter. The difference between the three IAU schemes lies on the position of the increment update window. The relevance of each IAU scheme is evaluated through analyses on both thermohaline and dynamical variables. The validation of the assimilation results is performed according to both deterministic and probabilistic metrics against different sources of observations. For deterministic validation, the ensemble mean and the ensemble spread are compared to the observations. For probabilistic validation, the continuous ranked probability score (CRPS) is used to evaluate the ensemble forecast system according to reliability and resolution. The reliability is further decomposed into bias and dispersion by the reduced centred random variable (RCRV) score. The obtained results show that 1) the IAU 50 scheme has the same performance as the IAU 100 scheme 2) the IAU 50/100 schemes outperform the IAU 0 scheme in error covariance propagation for thermohaline variables in relatively stable region, while the IAU 0 scheme outperforms the IAU 50/100 schemes in dynamical variables estimation in dynamically active region 3) in case with sufficient number of observations and good error specification, the impact of IAU schemes is negligible. The differences between the IAU 0 scheme and the IAU 50/100 schemes are mainly due to different model integration time and different instability (density inversion, large vertical velocity, etc.) induced by the increment update. The longer model integration time with the IAU 50/100 schemes, especially the free model integration, on one hand, allows for better re-establishment of the equilibrium model state, on the other hand, smooths the strong gradients in dynamically active region.

  17. Study on test of coal co-firing for 600MW ultra supercritical boiler with four walls tangential burning

    NASA Astrophysics Data System (ADS)

    Ying, Wu; Yong-lu, Zhong; Guo-mingi, Yin

    2018-06-01

    On account of nine commonly used coals in a Jiangxi Power Plant,two kinds of coal were selected to be applied in coal co-firing test through industrial analysis,elementary analysis and thermogravimetric analysis of coal.During the coal co-firing test,two load points were selected,three coal mixtures were prepared.Moreover,under each coal blending scheme, the optimal oxygen content was obtained by oxygen varying test. At last,by measuring the boiler efficiency and coal consumption of power supply in different coal co-firing schemes, the recommended coal co-firing scheme was obtained.

  18. Laplace-Fourier-domain dispersion analysis of an average derivative optimal scheme for scalar-wave equation

    NASA Astrophysics Data System (ADS)

    Chen, Jing-Bo

    2014-06-01

    By using low-frequency components of the damped wavefield, Laplace-Fourier-domain full waveform inversion (FWI) can recover a long-wavelength velocity model from the original undamped seismic data lacking low-frequency information. Laplace-Fourier-domain modelling is an important foundation of Laplace-Fourier-domain FWI. Based on the numerical phase velocity and the numerical attenuation propagation velocity, a method for performing Laplace-Fourier-domain numerical dispersion analysis is developed in this paper. This method is applied to an average-derivative optimal scheme. The results show that within the relative error of 1 per cent, the Laplace-Fourier-domain average-derivative optimal scheme requires seven gridpoints per smallest wavelength and smallest pseudo-wavelength for both equal and unequal directional sampling intervals. In contrast, the classical five-point scheme requires 23 gridpoints per smallest wavelength and smallest pseudo-wavelength to achieve the same accuracy. Numerical experiments demonstrate the theoretical analysis.

  19. A novel equivalent definition of Caputo fractional derivative without singular kernel and superconvergent analysis

    NASA Astrophysics Data System (ADS)

    Liu, Zhengguang; Li, Xiaoli

    2018-05-01

    In this article, we present a new second-order finite difference discrete scheme for a fractal mobile/immobile transport model based on equivalent transformative Caputo formulation. The new transformative formulation takes the singular kernel away to make the integral calculation more efficient. Furthermore, this definition is also effective where α is a positive integer. Besides, the T-Caputo derivative also helps us to increase the convergence rate of the discretization of the α-order(0 < α < 1) Caputo derivative from O(τ2-α) to O(τ3-α), where τ is the time step. For numerical analysis, a Crank-Nicolson finite difference scheme to solve the fractal mobile/immobile transport model is introduced and analyzed. The unconditional stability and a priori estimates of the scheme are given rigorously. Moreover, the applicability and accuracy of the scheme are demonstrated by numerical experiments to support our theoretical analysis.

  20. MASTER ANALYTICAL SCHEME FOR ORGANIC COMPOUNDS IN WATER. PART 2. APPENDICES TO PROTOCOLS

    EPA Science Inventory

    A Master Analytical Scheme (MAS) has been developed for the analysis of volatile (gas chromatographable) organic compounds in water. In developing the MAS, it was necessary to evaluate and modify existing analysis procedures and develop new techniques to produce protocols that pr...

  1. Leisingera sp. JC1, a Bacterial Isolate from Hawaiian Bobtail Squid Eggs, Produces Indigoidine and Differentially Inhibits Vibrios

    PubMed Central

    Gromek, Samantha M.; Suria, Andrea M.; Fullmer, Matthew S.; Garcia, Jillian L.; Gogarten, Johann Peter; Nyholm, Spencer V.; Balunas, Marcy J.

    2016-01-01

    Female members of many cephalopod species house a bacterial consortium in the accessory nidamental gland (ANG), part of the reproductive system. These bacteria are deposited into eggs that are then laid in the environment where they must develop unprotected from predation, pathogens, and fouling. In this study, we characterized the genome and secondary metabolite production of Leisingera sp. JC1, a member of the roseobacter clade (Rhodobacteraceae) of Alphaproteobacteria isolated from the jelly coat of eggs from the Hawaiian bobtail squid, Euprymna scolopes. Whole genome sequencing and MLSA analysis revealed that Leisingera sp. JC1 falls within a group of roseobacters associated with squid ANGs. Genome and biochemical analyses revealed the potential for and production of a number of secondary metabolites, including siderophores and acyl-homoserine lactones involved with quorum sensing. The complete biosynthetic gene cluster for the pigment indigoidine was detected in the genome and mass spectrometry confirmed the production of this compound. Furthermore, we investigated the production of indigoidine under co-culture conditions with Vibrio fischeri, the light organ symbiont of E. scolopes, and with other vibrios. Finally, both Leisingera sp. JC1 and secondary metabolite extracts of this strain had differential antimicrobial activity against a number of marine vibrios, suggesting that Leisingera sp. JC1 may play a role in host defense against other marine bacteria either in the eggs and/or ANG. These data also suggest that indigoidine may be partially, but not wholly, responsible for the antimicrobial activity of this squid-associated bacterium. PMID:27660622

  2. New Coffee Plant-Infecting Xylella fastidiosa Variants Derived via Homologous Recombination

    PubMed Central

    Denancé, Nicolas; Legendre, Bruno; Morel, Emmanuelle; Briand, Martial; Mississipi, Stelly; Durand, Karine; Olivier, Valérie; Portier, Perrine; Poliakoff, Françoise; Crouzillat, Dominique

    2015-01-01

    Xylella fastidiosa is a xylem-limited phytopathogenic bacterium endemic to the Americas that has recently emerged in Asia and Europe. Although this bacterium is classified as a quarantine organism in the European Union, importation of plant material from contaminated areas and latent infection in asymptomatic plants have engendered its inevitable introduction. In 2012, four coffee plants (Coffea arabica and Coffea canephora) with leaf scorch symptoms growing in a confined greenhouse were detected and intercepted in France. After identification of the causal agent, this outbreak was eradicated. Three X. fastidiosa strains were isolated from these plants, confirming a preliminary identification based on immunology. The strains were characterized by multiplex PCR and by multilocus sequence analysis/typing (MLSA-MLST) based on seven housekeeping genes. One strain, CFBP 8073, isolated from C. canephora imported from Mexico, was assigned to X. fastidiosa subsp. fastidiosa/X. fastidiosa subsp. sandyi. This strain harbors a novel sequence type (ST) with novel alleles at two loci. The two other strains, CFBP 8072 and CFBP 8074, isolated from Coffea arabica imported from Ecuador, were allocated to X. fastidiosa subsp. pauca. These two strains shared a novel ST with novel alleles at two loci. These MLST profiles showed evidence of recombination events. We provide genome sequences for CFBP 8072 and CFBP 8073 strains. Comparative genomic analyses of these two genome sequences with publicly available X. fastidiosa genomes, including the Italian strain CoDiRO, confirmed these phylogenetic positions and provided candidate alleles for coffee plant adaptation. This study demonstrates the global diversity of X. fastidiosa and highlights the diversity of strains isolated from coffee plants. PMID:26712553

  3. Parallelization of implicit finite difference schemes in computational fluid dynamics

    NASA Technical Reports Server (NTRS)

    Decker, Naomi H.; Naik, Vijay K.; Nicoules, Michel

    1990-01-01

    Implicit finite difference schemes are often the preferred numerical schemes in computational fluid dynamics, requiring less stringent stability bounds than the explicit schemes. Each iteration in an implicit scheme involves global data dependencies in the form of second and higher order recurrences. Efficient parallel implementations of such iterative methods are considerably more difficult and non-intuitive. The parallelization of the implicit schemes that are used for solving the Euler and the thin layer Navier-Stokes equations and that require inversions of large linear systems in the form of block tri-diagonal and/or block penta-diagonal matrices is discussed. Three-dimensional cases are emphasized and schemes that minimize the total execution time are presented. Partitioning and scheduling schemes for alleviating the effects of the global data dependencies are described. An analysis of the communication and the computation aspects of these methods is presented. The effect of the boundary conditions on the parallel schemes is also discussed.

  4. Security analysis and improvement of a privacy authentication scheme for telecare medical information systems.

    PubMed

    Wu, Fan; Xu, Lili

    2013-08-01

    Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.

  5. Analysis of sensitivity to different parameterization schemes for a subtropical cyclone

    NASA Astrophysics Data System (ADS)

    Quitián-Hernández, L.; Fernández-González, S.; González-Alemán, J. J.; Valero, F.; Martín, M. L.

    2018-05-01

    A sensitivity analysis to diverse WRF model physical parameterization schemes is carried out during the lifecycle of a Subtropical cyclone (STC). STCs are low-pressure systems that share tropical and extratropical characteristics, with hybrid thermal structures. In October 2014, a STC made landfall in the Canary Islands, causing widespread damage from strong winds and precipitation there. The system began to develop on October 18 and its effects lasted until October 21. Accurate simulation of this type of cyclone continues to be a major challenge because of its rapid intensification and unique characteristics. In the present study, several numerical simulations were performed using the WRF model to do a sensitivity analysis of its various parameterization schemes for the development and intensification of the STC. The combination of parameterization schemes that best simulated this type of phenomenon was thereby determined. In particular, the parameterization combinations that included the Tiedtke cumulus schemes had the most positive effects on model results. Moreover, concerning STC track validation, optimal results were attained when the STC was fully formed and all convective processes stabilized. Furthermore, to obtain the parameterization schemes that optimally categorize STC structure, a verification using Cyclone Phase Space is assessed. Consequently, the combination of parameterizations including the Tiedtke cumulus schemes were again the best in categorizing the cyclone's subtropical structure. For strength validation, related atmospheric variables such as wind speed and precipitable water were analyzed. Finally, the effects of using a deterministic or probabilistic approach in simulating intense convective phenomena were evaluated.

  6. A robust control scheme for flexible arms with friction in the joints

    NASA Technical Reports Server (NTRS)

    Rattan, Kuldip S.; Feliu, Vicente; Brown, H. Benjamin, Jr.

    1988-01-01

    A general control scheme to control flexible arms with friction in the joints is proposed in this paper. This scheme presents the advantage of being robust in the sense that it minimizes the effects of the Coulomb friction existing in the motor and the effects of changes in the dynamic friction coefficient. A justification of the robustness properties of the scheme is given in terms of the sensitivity analysis.

  7. A user anonymity preserving three-factor authentication scheme for telecare medicine information systems.

    PubMed

    Tan, Zuowen

    2014-03-01

    The telecare medicine information system enables the patients gain health monitoring at home and access medical services over internet or mobile networks. In recent years, the schemes based on cryptography have been proposed to address the security and privacy issues in the telecare medicine information systems. However, many schemes are insecure or they have low efficiency. Recently, Awasthi and Srivastava proposed a three-factor authentication scheme for telecare medicine information systems. In this paper, we show that their scheme is vulnerable to the reflection attacks. Furthermore, it fails to provide three-factor security and the user anonymity. We propose a new three-factor authentication scheme for the telecare medicine information systems. Detailed analysis demonstrates that the proposed scheme provides mutual authentication, server not knowing password and freedom of password, biometric update and three-factor security. Moreover, the new scheme provides the user anonymity. As compared with the previous three-factor authentication schemes, the proposed scheme is more secure and practical.

  8. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    PubMed

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.

  9. A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics

    PubMed Central

    Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  10. RAS screening in colorectal cancer: a comprehensive analysis of the results from the UK NEQAS colorectal cancer external quality assurance schemes (2009-2016).

    PubMed

    Richman, Susan D; Fairley, Jennifer; Butler, Rachel; Deans, Zandra C

    2017-12-01

    Evidence strongly indicates that extended RAS testing should be undertaken in mCRC patients, prior to prescribing anti-EGFR therapies. With more laboratories implementing testing, the requirement for External Quality Assurance schemes increases, thus ensuring high standards of molecular analysis. Data was analysed from 15 United Kingdom National External Quality Assessment Service (UK NEQAS) for Molecular Genetics Colorectal cancer external quality assurance (EQA) schemes, delivered between 2009 and 2016. Laboratories were provided annually with nine colorectal tumour samples for genotyping. Information on methodology and extent of testing coverage was requested, and scores given for genotyping, interpretation and clerical accuracy. There has been a sixfold increase in laboratory participation (18 in 2009 to 108 in 2016). For RAS genotyping, fewer laboratories now use Roche cobas®, pyrosequencing and Sanger sequencing, with more moving to next generation sequencing (NGS). NGS is the most commonly employed technology for BRAF and PIK3CA mutation screening. KRAS genotyping errors were seen in ≤10% laboratories, until the 2014-2015 scheme, when there was an increase to 16.7%, corresponding to a large increase in scheme participants. NRAS genotyping errors peaked at 25.6% in the first 2015-2016 scheme but subsequently dropped to below 5%. Interpretation and clerical accuracy scores have been consistently good throughout. Within this EQA scheme, we have observed that the quality of molecular analysis for colorectal cancer has continued to improve, despite changes in the required targets, the volume of testing and the technologies employed. It is reassuring to know that laboratories clearly recognise the importance of participating in EQA schemes.

  11. An ex-ante economic evaluation of the Maternal and Child Health Voucher Scheme as a decision-making tool in Myanmar

    PubMed Central

    Kingkaew, Pritaporn; Werayingyong, Pitsaphun; Aye, San San; Tin, Nilar; Singh, Alaka; Myint, Phone; Teerawattananon, Yot

    2016-01-01

    Reducing child and maternal mortality in order to meet the health-related Millennium Development Goals (MDGs) 4 and 5 remains a major challenge in Myanmar. Inadequate care during pregnancy and labour plays an important role in the maternal mortality rate in Myanmar. A Maternal and Child Health (MCH) Voucher Scheme comprising a subsidization for pregnant women to receive four antenatal care (ANC), delivery and postnatal care (PNC) free-of-charge was planned to help women overcome financial barriers in addition to raising awareness of ANC and delivery with skilled birth attendants (SBA), which can reduce the rate of maternal and neonatal death. This study is part of an ex-ante evaluation of a feasibility study of the MCH Voucher Scheme. A cost-utility analysis was conducted using a decision tree model to assess the cost per disability-adjusted life years (DALYs) averted from the MCH Voucher Scheme compared with the current situation. Most input parameters were obtained from Myanmar context. From the base-case analysis, where the financial burden on households was fully subsidized, the MCH Voucher Scheme increased utilization for ANC from 73% up to 93% and for delivery from SBAs from 51% up to and 71%, respectively; hence, it is considered to be very cost-effective with an incremental cost-effectiveness ratio of 381 027 kyats per DALY averted (2010, price year). From the probabilistic sensitivity analysis, the MCH Voucher Scheme had a 52% chance of being a cost-effective option at 1 GDP per capita threshold compared to the current situation. Given that the Voucher Scheme is currently being implemented in one township in Myanmar as a result of this study, ongoing evaluation of the effectiveness and cost-effectiveness of this scheme is warranted. PMID:26412858

  12. Fourier analysis of finite element preconditioned collocation schemes

    NASA Technical Reports Server (NTRS)

    Deville, Michel O.; Mund, Ernest H.

    1990-01-01

    The spectrum of the iteration operator of some finite element preconditioned Fourier collocation schemes is investigated. The first part of the paper analyses one-dimensional elliptic and hyperbolic model problems and the advection-diffusion equation. Analytical expressions of the eigenvalues are obtained with use of symbolic computation. The second part of the paper considers the set of one-dimensional differential equations resulting from Fourier analysis (in the tranverse direction) of the 2-D Stokes problem. All results agree with previous conclusions on the numerical efficiency of finite element preconditioning schemes.

  13. Modification and evaluation of a Barnes-type objective analysis scheme for surface meteorological data

    NASA Technical Reports Server (NTRS)

    Smith, D. R.

    1982-01-01

    The Purdue Regional Objective Analysis of the Mesoscale (PROAM) is a Barness-type scheme for the analysis of surface meteorological data. Modifications are introduced to the original version in order to increase its flexibility and to permit greater ease of usage. The code was rewritten for an interactive computer environment. Furthermore, a multiple iteration technique suggested by Barnes was implemented for greater accuracy. PROAM was subjected to a series of experiments in order to evaluate its performance under a variety of analysis conditions. The tests include use of a known analytic temperature distribution in order to quantify error bounds for the scheme. Similar experiments were conducted using actual atmospheric data. Results indicate that the multiple iteration technique increases the accuracy of the analysis. Furthermore, the tests verify appropriate values for the analysis parameters in resolving meso-beta scale phenomena.

  14. Communication Optimizations for a Wireless Distributed Prognostic Framework

    NASA Technical Reports Server (NTRS)

    Saha, Sankalita; Saha, Bhaskar; Goebel, Kai

    2009-01-01

    Distributed architecture for prognostics is an essential step in prognostic research in order to enable feasible real-time system health management. Communication overhead is an important design problem for such systems. In this paper we focus on communication issues faced in the distributed implementation of an important class of algorithms for prognostics - particle filters. In spite of being computation and memory intensive, particle filters lend well to distributed implementation except for one significant step - resampling. We propose new resampling scheme called parameterized resampling that attempts to reduce communication between collaborating nodes in a distributed wireless sensor network. Analysis and comparison with relevant resampling schemes is also presented. A battery health management system is used as a target application. A new resampling scheme for distributed implementation of particle filters has been discussed in this paper. Analysis and comparison of this new scheme with existing resampling schemes in the context for minimizing communication overhead have also been discussed. Our proposed new resampling scheme performs significantly better compared to other schemes by attempting to reduce both the communication message length as well as number total communication messages exchanged while not compromising prediction accuracy and precision. Future work will explore the effects of the new resampling scheme in the overall computational performance of the whole system as well as full implementation of the new schemes on the Sun SPOT devices. Exploring different network architectures for efficient communication is an importance future research direction as well.

  15. Extricating Justification Scheme Theory in Middle School Mathematical Problem Solving

    ERIC Educational Resources Information Center

    Matteson, Shirley; Capraro, Mary Margaret; Capraro, Robert M.; Lincoln, Yvonna S.

    2012-01-01

    Twenty middle grades students were interviewed to gain insights into their reasoning about problem-solving strategies using a Problem Solving Justification Scheme as our theoretical lens and the basis for our analysis. The scheme was modified from the work of Harel and Sowder (1998) making it more broadly applicable and accounting for research…

  16. Using Student Performance to Judge the Difficulty of Examinations

    ERIC Educational Resources Information Center

    Roegner, Katherine

    2015-01-01

    This contribution focuses on a scheme developed to characterize the level of difficulty of an examination in the course "Linear Algebra for Engineers" and on the transfer of the underlying idea to a similar scheme for examinations in the course "Analysis I for Engineers". Using these schemes, it is possible to define standards…

  17. Ancient numerical daemons of conceptual hydrological modeling: 2. Impact of time stepping schemes on model analysis and prediction

    NASA Astrophysics Data System (ADS)

    Kavetski, Dmitri; Clark, Martyn P.

    2010-10-01

    Despite the widespread use of conceptual hydrological models in environmental research and operations, they remain frequently implemented using numerically unreliable methods. This paper considers the impact of the time stepping scheme on model analysis (sensitivity analysis, parameter optimization, and Markov chain Monte Carlo-based uncertainty estimation) and prediction. It builds on the companion paper (Clark and Kavetski, 2010), which focused on numerical accuracy, fidelity, and computational efficiency. Empirical and theoretical analysis of eight distinct time stepping schemes for six different hydrological models in 13 diverse basins demonstrates several critical conclusions. (1) Unreliable time stepping schemes, in particular, fixed-step explicit methods, suffer from troublesome numerical artifacts that severely deform the objective function of the model. These deformations are not rare isolated instances but can arise in any model structure, in any catchment, and under common hydroclimatic conditions. (2) Sensitivity analysis can be severely contaminated by numerical errors, often to the extent that it becomes dominated by the sensitivity of truncation errors rather than the model equations. (3) Robust time stepping schemes generally produce "better behaved" objective functions, free of spurious local optima, and with sufficient numerical continuity to permit parameter optimization using efficient quasi Newton methods. When implemented within a multistart framework, modern Newton-type optimizers are robust even when started far from the optima and provide valuable diagnostic insights not directly available from evolutionary global optimizers. (4) Unreliable time stepping schemes lead to inconsistent and biased inferences of the model parameters and internal states. (5) Even when interactions between hydrological parameters and numerical errors provide "the right result for the wrong reason" and the calibrated model performance appears adequate, unreliable time stepping schemes make the model unnecessarily fragile in predictive mode, undermining validation assessments and operational use. Erroneous or misleading conclusions of model analysis and prediction arising from numerical artifacts in hydrological models are intolerable, especially given that robust numerics are accepted as mainstream in other areas of science and engineering. We hope that the vivid empirical findings will encourage the conceptual hydrological community to close its Pandora's box of numerical problems, paving the way for more meaningful model application and interpretation.

  18. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    PubMed

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.

  19. Continuous-variable quantum network coding for coherent states

    NASA Astrophysics Data System (ADS)

    Shang, Tao; Li, Ke; Liu, Jian-wei

    2017-04-01

    As far as the spectral characteristic of quantum information is concerned, the existing quantum network coding schemes can be looked on as the discrete-variable quantum network coding schemes. Considering the practical advantage of continuous variables, in this paper, we explore two feasible continuous-variable quantum network coding (CVQNC) schemes. Basic operations and CVQNC schemes are both provided. The first scheme is based on Gaussian cloning and ADD/SUB operators and can transmit two coherent states across with a fidelity of 1/2, while the second scheme utilizes continuous-variable quantum teleportation and can transmit two coherent states perfectly. By encoding classical information on quantum states, quantum network coding schemes can be utilized to transmit classical information. Scheme analysis shows that compared with the discrete-variable paradigms, the proposed CVQNC schemes provide better network throughput from the viewpoint of classical information transmission. By modulating the amplitude and phase quadratures of coherent states with classical characters, the first scheme and the second scheme can transmit 4{log _2}N and 2{log _2}N bits of information by a single network use, respectively.

  20. A Quantum Proxy Blind Signature Scheme Based on Genuine Five-Qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Zeng, Chuan; Zhang, Jian-Zhong; Xie, Shu-Cui

    2017-06-01

    In this paper, a quantum proxy blind signature scheme based on controlled quantum teleportation is proposed. This scheme uses a genuine five-qubit entangled state as quantum channel and adopts the classical Vernam algorithm to blind message. We use the physical characteristics of quantum mechanics to implement delegation, signature and verification. Security analysis shows that our scheme is valid and satisfy the properties of a proxy blind signature, such as blindness, verifiability, unforgeability, undeniability.

  1. Performance evaluation of dispersion parameterization schemes in the plume simulation of FFT-07 diffusion experiment

    NASA Astrophysics Data System (ADS)

    Pandey, Gavendra; Sharan, Maithili

    2018-01-01

    Application of atmospheric dispersion models in air quality analysis requires a proper representation of the vertical and horizontal growth of the plume. For this purpose, various schemes for the parameterization of dispersion parameters σ‧s are described in both stable and unstable conditions. These schemes differ on the use of (i) extent of availability of on-site measurements (ii) formulations developed for other sites and (iii) empirical relations. The performance of these schemes is evaluated in an earlier developed IIT (Indian Institute of Technology) dispersion model with the data set in single and multiple releases conducted at Fusion Field Trials, Dugway Proving Ground, Utah 2007. Qualitative and quantitative evaluation of the relative performance of all the schemes is carried out in both stable and unstable conditions in the light of (i) peak/maximum concentrations, and (ii) overall concentration distribution. The blocked bootstrap resampling technique is adopted to investigate the statistical significance of the differences in performances of each of the schemes by computing 95% confidence limits on the parameters FB and NMSE. The various analysis based on some selected statistical measures indicated consistency in the qualitative and quantitative performances of σ schemes. The scheme which is based on standard deviation of wind velocity fluctuations and Lagrangian time scales exhibits a relatively better performance in predicting the peak as well as the lateral spread.

  2. No-Fault Compensation for Adverse Events Following Immunization: A Review of Chinese Law And Practice.

    PubMed

    Fei, Lanfang; Peng, Zhou

    2017-02-01

    In 2005, China introduced an administrative no-fault one-time compensation scheme for adverse events following immunization (AEFI). The scheme aims to ensure fair compensation for those injured by adverse reactions following immunization. These individuals bear a significant burden for the benefits of widespread immunization. However, there is little empirical evidence of how the scheme has been implemented and how it functions in practice. The article aims to fill this gap. Based on an analysis of the legal basis of the scheme and of practical compensation cases, this article examines the structuring, function, and effects of the scheme; evaluates loopholes in the scheme; evaluates the extent to which the scheme has achieved its intended objectives; and discusses further development of the scheme. © The Author 2017. Published by Oxford University Press; all rights reserved. For Permissions, please email: journals.permissions@oup.com.

  3. A Continuing Search for a Near-Perfect Numerical Flux Scheme. Part 1; [AUSM+

    NASA Technical Reports Server (NTRS)

    Liou, Meng-Sing

    1994-01-01

    While enjoying demonstrated improvement in accuracy, efficiency, and robustness over existing schemes, the Advection Upstream Splitting Scheme (AUSM) was found to have some deficiencies in extreme cases. This recent progress towards improving the AUSM while retaining its advantageous features is described. The new scheme, termed AUSM+, features: unification of velocity and Mach number splitting; exact capture of a single stationary shock; and improvement in accuracy. A general construction of the AUSM+ scheme is layed out and then focus is on the analysis of the a scheme and its mathematical properties, heretofore unreported. Monotonicity and positivity are proved, and a CFL-like condition is given for first and second order schemes and for generalized curvilinear co-ordinates. Finally, results of numerical tests on many problems are given to confirm the capability and improvements on a variety of problems including those failed by prominent schemes.

  4. Re-evaluation of an Optimized Second Order Backward Difference (BDF2OPT) Scheme for Unsteady Flow Applications

    NASA Technical Reports Server (NTRS)

    Vatsa, Veer N.; Carpenter, Mark H.; Lockard, David P.

    2009-01-01

    Recent experience in the application of an optimized, second-order, backward-difference (BDF2OPT) temporal scheme is reported. The primary focus of the work is on obtaining accurate solutions of the unsteady Reynolds-averaged Navier-Stokes equations over long periods of time for aerodynamic problems of interest. The baseline flow solver under consideration uses a particular BDF2OPT temporal scheme with a dual-time-stepping algorithm for advancing the flow solutions in time. Numerical difficulties are encountered with this scheme when the flow code is run for a large number of time steps, a behavior not seen with the standard second-order, backward-difference, temporal scheme. Based on a stability analysis, slight modifications to the BDF2OPT scheme are suggested. The performance and accuracy of this modified scheme is assessed by comparing the computational results with other numerical schemes and experimental data.

  5. A new scheme for velocity analysis and imaging of diffractions

    NASA Astrophysics Data System (ADS)

    Lin, Peng; Peng, Suping; Zhao, Jingtao; Cui, Xiaoqin; Du, Wenfeng

    2018-06-01

    Seismic diffractions are the responses of small-scale inhomogeneities or discontinuous geological features, which play a vital role in the exploitation and development of oil and gas reservoirs. However, diffractions are generally ignored and considered as interference noise in conventional data processing. In this paper, a new scheme for velocity analysis and imaging of seismic diffractions is proposed. Two steps compose of this scheme in our application. First, the plane-wave destruction method is used to separate diffractions from specular reflections in the prestack domain. Second, in order to accurately estimate migration velocity of the diffractions, the time-domain dip-angle gathers are derived from a Kirchhoff-based angle prestack time migration using separated diffractions. Diffraction events appear flat in the dip-angle gathers when imaged above the diffraction point with selected accurate migration velocity for diffractions. The selected migration velocity helps to produce the desired prestack imaging of diffractions. Synthetic and field examples are applied to test the validity of the new scheme. The diffraction imaging results indicate that the proposed scheme for velocity analysis and imaging of diffractions can provide more detailed information about small-scale geologic features for seismic interpretation.

  6. Analysis and design of digital output interface devices for gas turbine electronic controls

    NASA Technical Reports Server (NTRS)

    Newirth, D. M.; Koenig, E. W.

    1976-01-01

    A trade study was performed on twenty-one digital output interface schemes for gas turbine electronic controls to select the most promising scheme based on criteria of reliability, performance, cost, and sampling requirements. The most promising scheme, a digital effector with optical feedback of the fuel metering valve position, was designed.

  7. A modified symplectic PRK scheme for seismic wave modeling

    NASA Astrophysics Data System (ADS)

    Liu, Shaolin; Yang, Dinghui; Ma, Jian

    2017-02-01

    A new scheme for the temporal discretization of the seismic wave equation is constructed based on symplectic geometric theory and a modified strategy. The ordinary differential equation in terms of time, which is obtained after spatial discretization via the spectral-element method, is transformed into a Hamiltonian system. A symplectic partitioned Runge-Kutta (PRK) scheme is used to solve the Hamiltonian system. A term related to the multiplication of the spatial discretization operator with the seismic wave velocity vector is added into the symplectic PRK scheme to create a modified symplectic PRK scheme. The symplectic coefficients of the new scheme are determined via Taylor series expansion. The positive coefficients of the scheme indicate that its long-term computational capability is more powerful than that of conventional symplectic schemes. An exhaustive theoretical analysis reveals that the new scheme is highly stable and has low numerical dispersion. The results of three numerical experiments demonstrate the high efficiency of this method for seismic wave modeling.

  8. New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing.

    PubMed

    Wang, Chunzhi; Zhang, Yanmei

    2015-11-01

    Due to the development of information technologies and network technologies, healthcare systems have been employed in many countries. As an important part of healthcare systems, the wireless body area network (WBAN) could bring convenience to both patients and physicians because it could help physicians to monitor patients' physiological values remotely. It is essential to ensure secure communication in WBANs because patients' physiological values are very sensitive. Recently, Liu et al. proposed an efficient authentication scheme for WBANs. Unfortunately, Zhao pointed out that their scheme suffered from the stolen verifier-table attack. To improve security and efficiency, Zhao proposed an anonymous authentication scheme for WBANs. However, Zhao's scheme cannot provide real anonymity because the users' pseudo identities are constant value and the attack could tract the users. In this paper, we propose a new anonymous authentication scheme for WBANs. Security analysis shows that the proposed scheme could overcome weaknesses in previous scheme. We also use the BAN logic to demonstrate the security of the proposed scheme.

  9. An investigation of error characteristics and coding performance

    NASA Technical Reports Server (NTRS)

    Ebel, William J.; Ingels, Frank M.

    1993-01-01

    The first year's effort on NASA Grant NAG5-2006 was an investigation to characterize typical errors resulting from the EOS dorn link. The analysis methods developed for this effort were used on test data from a March 1992 White Sands Terminal Test. The effectiveness of a concatenated coding scheme of a Reed Solomon outer code and a convolutional inner code versus a Reed Solomon only code scheme has been investigated as well as the effectiveness of a Periodic Convolutional Interleaver in dispersing errors of certain types. The work effort consisted of development of software that allows simulation studies with the appropriate coding schemes plus either simulated data with errors or actual data with errors. The software program is entitled Communication Link Error Analysis (CLEAN) and models downlink errors, forward error correcting schemes, and interleavers.

  10. A fully-implicit high-order system thermal-hydraulics model for advanced non-LWR safety analyses

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hu, Rui

    An advanced system analysis tool is being developed for advanced reactor safety analysis. This paper describes the underlying physics and numerical models used in the code, including the governing equations, the stabilization schemes, the high-order spatial and temporal discretization schemes, and the Jacobian Free Newton Krylov solution method. The effects of the spatial and temporal discretization schemes are investigated. Additionally, a series of verification test problems are presented to confirm the high-order schemes. Furthermore, it is demonstrated that the developed system thermal-hydraulics model can be strictly verified with the theoretical convergence rates, and that it performs very well for amore » wide range of flow problems with high accuracy, efficiency, and minimal numerical diffusions.« less

  11. A fully-implicit high-order system thermal-hydraulics model for advanced non-LWR safety analyses

    DOE PAGES

    Hu, Rui

    2016-11-19

    An advanced system analysis tool is being developed for advanced reactor safety analysis. This paper describes the underlying physics and numerical models used in the code, including the governing equations, the stabilization schemes, the high-order spatial and temporal discretization schemes, and the Jacobian Free Newton Krylov solution method. The effects of the spatial and temporal discretization schemes are investigated. Additionally, a series of verification test problems are presented to confirm the high-order schemes. Furthermore, it is demonstrated that the developed system thermal-hydraulics model can be strictly verified with the theoretical convergence rates, and that it performs very well for amore » wide range of flow problems with high accuracy, efficiency, and minimal numerical diffusions.« less

  12. Multivariate optimum interpolation of surface pressure and winds over oceans

    NASA Technical Reports Server (NTRS)

    Bloom, S. C.

    1984-01-01

    The observations of surface pressure are quite sparse over oceanic areas. An effort to improve the analysis of surface pressure over oceans through the development of a multivariate surface analysis scheme which makes use of surface pressure and wind data is discussed. Although the present research used ship winds, future versions of this analysis scheme could utilize winds from additional sources, such as satellite scatterometer data.

  13. A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards

    NASA Astrophysics Data System (ADS)

    Son, Kyungho; Han, Dong-Guk; Won, Dongho

    In this work we propose a novel smart card based privacy-protecting authentication scheme for roaming services. Our proposal achieves so-called Class 2 privacy protection, i.e., no information identifying a roaming user and also linking the user's behaviors is not revealed in a visited network. It can be used to overcome the inherent structural flaws of smart card based anonymous authentication schemes issued recently. As shown in our analysis, our scheme is computationally efficient for a mobile user.

  14. An authentication scheme for secure access to healthcare services.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  15. Design of a tight frame of 2D shearlets based on a fast non-iterative analysis and synthesis algorithm

    NASA Astrophysics Data System (ADS)

    Goossens, Bart; Aelterman, Jan; Luong, Hi"p.; Pižurica, Aleksandra; Philips, Wilfried

    2011-09-01

    The shearlet transform is a recent sibling in the family of geometric image representations that provides a traditional multiresolution analysis combined with a multidirectional analysis. In this paper, we present a fast DFT-based analysis and synthesis scheme for the 2D discrete shearlet transform. Our scheme conforms to the continuous shearlet theory to high extent, provides perfect numerical reconstruction (up to floating point rounding errors) in a non-iterative scheme and is highly suitable for parallel implementation (e.g. FPGA, GPU). We show that our discrete shearlet representation is also a tight frame and the redundancy factor of the transform is around 2.6, independent of the number of analysis directions. Experimental denoising results indicate that the transform performs the same or even better than several related multiresolution transforms, while having a significantly lower redundancy factor.

  16. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks †

    PubMed Central

    Sampangi, Raghav V.; Sampalli, Srinivas

    2015-01-01

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis. PMID:26389899

  17. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.

    PubMed

    Sampangi, Raghav V; Sampalli, Srinivas

    2015-09-15

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  18. Assessment strategies for municipal selective waste collection schemes.

    PubMed

    Ferreira, Fátima; Avelino, Catarina; Bentes, Isabel; Matos, Cristina; Teixeira, Carlos Afonso

    2017-01-01

    An important strategy to promote a strong sustainable growth relies on an efficient municipal waste management, and phasing out waste landfilling through waste prevention and recycling emerges as a major target. For this purpose, effective collection schemes are required, in particular those regarding selective waste collection, pursuing a more efficient and high quality recycling of reusable materials. This paper addresses the assessment and benchmarking of selective collection schemes, relevant to guide future operational improvements. In particular, the assessment is based on the monitoring and statistical analysis of a core-set of performance indicators that highlights collection trends, complemented with a performance index that gathers a weighted linear combination of these indicators. This combined analysis underlines a potential tool to support decision makers involved in the process of selecting the collection scheme with best overall performance. The presented approach was applied to a case study conducted in Oporto Municipality, with data gathered from two distinct selective collection schemes. Copyright © 2016 Elsevier Ltd. All rights reserved.

  19. Standardization, evaluation and early-phase method validation of an analytical scheme for batch-consistency N-glycosylation analysis of recombinant produced glycoproteins.

    PubMed

    Zietze, Stefan; Müller, Rainer H; Brecht, René

    2008-03-01

    In order to set up a batch-to-batch-consistency analytical scheme for N-glycosylation analysis, several sample preparation steps including enzyme digestions and fluorophore labelling and two HPLC-methods were established. The whole method scheme was standardized, evaluated and validated according to the requirements on analytical testing in early clinical drug development by usage of a recombinant produced reference glycoprotein (RGP). The standardization of the methods was performed by clearly defined standard operation procedures. During evaluation of the methods, the major interest was in the loss determination of oligosaccharides within the analytical scheme. Validation of the methods was performed with respect to specificity, linearity, repeatability, LOD and LOQ. Due to the fact that reference N-glycan standards were not available, a statistical approach was chosen to derive accuracy from the linearity data. After finishing the validation procedure, defined limits for method variability could be calculated and differences observed in consistency analysis could be separated into significant and incidental ones.

  20. Accuracy Analysis for Finite-Volume Discretization Schemes on Irregular Grids

    NASA Technical Reports Server (NTRS)

    Diskin, Boris; Thomas, James L.

    2010-01-01

    A new computational analysis tool, downscaling test, is introduced and applied for studying the convergence rates of truncation and discretization errors of nite-volume discretization schemes on general irregular (e.g., unstructured) grids. The study shows that the design-order convergence of discretization errors can be achieved even when truncation errors exhibit a lower-order convergence or, in some cases, do not converge at all. The downscaling test is a general, efficient, accurate, and practical tool, enabling straightforward extension of verification and validation to general unstructured grid formulations. It also allows separate analysis of the interior, boundaries, and singularities that could be useful even in structured-grid settings. There are several new findings arising from the use of the downscaling test analysis. It is shown that the discretization accuracy of a common node-centered nite-volume scheme, known to be second-order accurate for inviscid equations on triangular grids, degenerates to first order for mixed grids. Alternative node-centered schemes are presented and demonstrated to provide second and third order accuracies on general mixed grids. The local accuracy deterioration at intersections of tangency and in flow/outflow boundaries is demonstrated using the DS tests tailored to examining the local behavior of the boundary conditions. The discretization-error order reduction within inviscid stagnation regions is demonstrated. The accuracy deterioration is local, affecting mainly the velocity components, but applies to any order scheme.

  1. Comparison of wavelet based denoising schemes for gear condition monitoring: An Artificial Neural Network based Approach

    NASA Astrophysics Data System (ADS)

    Ahmed, Rounaq; Srinivasa Pai, P.; Sriram, N. S.; Bhat, Vasudeva

    2018-02-01

    Vibration Analysis has been extensively used in recent past for gear fault diagnosis. The vibration signals extracted is usually contaminated with noise and may lead to wrong interpretation of results. The denoising of extracted vibration signals helps the fault diagnosis by giving meaningful results. Wavelet Transform (WT) increases signal to noise ratio (SNR), reduces root mean square error (RMSE) and is effective to denoise the gear vibration signals. The extracted signals have to be denoised by selecting a proper denoising scheme in order to prevent the loss of signal information along with noise. An approach has been made in this work to show the effectiveness of Principal Component Analysis (PCA) to denoise gear vibration signal. In this regard three selected wavelet based denoising schemes namely PCA, Empirical Mode Decomposition (EMD), Neighcoeff Coefficient (NC), has been compared with Adaptive Threshold (AT) an extensively used wavelet based denoising scheme for gear vibration signal. The vibration signals acquired from a customized gear test rig were denoised by above mentioned four denoising schemes. The fault identification capability as well as SNR, Kurtosis and RMSE for the four denoising schemes have been compared. Features extracted from the denoised signals have been used to train and test artificial neural network (ANN) models. The performances of the four denoising schemes have been evaluated based on the performance of the ANN models. The best denoising scheme has been identified, based on the classification accuracy results. PCA is effective in all the regards as a best denoising scheme.

  2. Error analysis of finite difference schemes applied to hyperbolic initial boundary value problems

    NASA Technical Reports Server (NTRS)

    Skollermo, G.

    1979-01-01

    Finite difference methods for the numerical solution of mixed initial boundary value problems for hyperbolic equations are studied. The reported investigation has the objective to develop a technique for the total error analysis of a finite difference scheme, taking into account initial approximations, boundary conditions, and interior approximation. Attention is given to the Cauchy problem and the initial approximation, the homogeneous problem in an infinite strip with inhomogeneous boundary data, the reflection of errors in the boundaries, and two different boundary approximations for the leapfrog scheme with a fourth order accurate difference operator in space.

  3. Considerations and techniques for incorporating remotely sensed imagery into the land resource management process.

    NASA Technical Reports Server (NTRS)

    Brooner, W. G.; Nichols, D. A.

    1972-01-01

    Development of a scheme for utilizing remote sensing technology in an operational program for regional land use planning and land resource management program applications. The scheme utilizes remote sensing imagery as one of several potential inputs to derive desired and necessary data, and considers several alternative approaches to the expansion and/or reduction and analysis of data, using automated data handling techniques. Within this scheme is a five-stage program development which includes: (1) preliminary coordination, (2) interpretation and encoding, (3) creation of data base files, (4) data analysis and generation of desired products, and (5) applications.

  4. Forward Period Analysis Method of the Periodic Hamiltonian System.

    PubMed

    Wang, Pengfei

    2016-01-01

    Using the forward period analysis (FPA), we obtain the period of a Morse oscillator and mathematical pendulum system, with the accuracy of 100 significant digits. From these results, the long-term [0, 1060] (time unit) solutions, ranging from the Planck time to the age of the universe, are computed reliably and quickly with a parallel multiple-precision Taylor series (PMT) scheme. The application of FPA to periodic systems can greatly reduce the computation time of long-term reliable simulations. This scheme provides an efficient way to generate reference solutions, against which long-term simulations using other schemes can be tested.

  5. Process optimization of solid rad waste management at the Shelter object transformation to the ecologically safety system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Batiy, V.G.; Stojanov, A.I.; Schmieman, E.

    2007-07-01

    Methodological approach of optimization of schemes of solid radwaste management of the Object Shelter (Shelter) and ChNPP industrial site during transformation to the ecologically safe system was developed. On the basis of the conducted models researches the ALARA-analysis was carried out for the choice of optimum variant of schemes and technologies of solid radwaste management. The criteria of choice of optimum schemes, which are directed on optimization of doses and financial expenses, minimization of amount of the formed radwaste etc, were developed for realization of this ALARA-analysis. (authors)

  6. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  7. Transient three-dimensional thermal-hydraulic analysis of nuclear reactor fuel rod arrays: general equations and numerical scheme

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wnek, W.J.; Ramshaw, J.D.; Trapp, J.A.

    1975-11-01

    A mathematical model and a numerical solution scheme for thermal- hydraulic analysis of fuel rod arrays are given. The model alleviates the two major deficiencies associated with existing rod array analysis models, that of a correct transverse momentum equation and the capability of handling reversing and circulatory flows. Possible applications of the model include steady state and transient subchannel calculations as well as analysis of flows in heat exchangers, other engineering equipment, and porous media. (auth)

  8. Comparison of Optimum Interpolation and Cressman Analyses

    NASA Technical Reports Server (NTRS)

    Baker, W. E.; Bloom, S. C.; Nestler, M. S.

    1984-01-01

    The objective of this investigation is to develop a state-of-the-art optimum interpolation (O/I) objective analysis procedure for use in numerical weather prediction studies. A three-dimensional multivariate O/I analysis scheme has been developed. Some characteristics of the GLAS O/I compared with those of the NMC and ECMWF systems are summarized. Some recent enhancements of the GLAS scheme include a univariate analysis of water vapor mixing ratio, a geographically dependent model prediction error correlation function and a multivariate oceanic surface analysis.

  9. Comparison of Optimum Interpolation and Cressman Analyses

    NASA Technical Reports Server (NTRS)

    Baker, W. E.; Bloom, S. C.; Nestler, M. S.

    1985-01-01

    The development of a state of the art optimum interpolation (O/I) objective analysis procedure for use in numerical weather prediction studies was investigated. A three dimensional multivariate O/I analysis scheme was developed. Some characteristics of the GLAS O/I compared with those of the NMC and ECMWF systems are summarized. Some recent enhancements of the GLAS scheme include a univariate analysis of water vapor mixing ratio, a geographically dependent model prediction error correlation function and a multivariate oceanic surface analysis.

  10. Analysis and discussion on anti-thunder scheme of wind power generation system

    NASA Astrophysics Data System (ADS)

    Sun, Shuguang

    2017-01-01

    Anti-thunder scheme of wind power generation system is discussed in this paper. Through the research and analysis on the harm of the thunder, division of lightning protection zone and lightning protection measures are put forward, which has a certain practical significance on the design and application of wind power generation system.

  11. Nonlinear truncation error analysis of finite difference schemes for the Euler equations

    NASA Technical Reports Server (NTRS)

    Klopfer, G. H.; Mcrae, D. S.

    1983-01-01

    It is pointed out that, in general, dissipative finite difference integration schemes have been found to be quite robust when applied to the Euler equations of gas dynamics. The present investigation considers a modified equation analysis of both implicit and explicit finite difference techniques as applied to the Euler equations. The analysis is used to identify those error terms which contribute most to the observed solution errors. A technique for analytically removing the dominant error terms is demonstrated, resulting in a greatly improved solution for the explicit Lax-Wendroff schemes. It is shown that the nonlinear truncation errors are quite large and distributed quite differently for each of the three conservation equations as applied to a one-dimensional shock tube problem.

  12. A practically unconditionally gradient stable scheme for the N-component Cahn-Hilliard system

    NASA Astrophysics Data System (ADS)

    Lee, Hyun Geun; Choi, Jeong-Whan; Kim, Junseok

    2012-02-01

    We present a practically unconditionally gradient stable conservative nonlinear numerical scheme for the N-component Cahn-Hilliard system modeling the phase separation of an N-component mixture. The scheme is based on a nonlinear splitting method and is solved by an efficient and accurate nonlinear multigrid method. The scheme allows us to convert the N-component Cahn-Hilliard system into a system of N-1 binary Cahn-Hilliard equations and significantly reduces the required computer memory and CPU time. We observe that our numerical solutions are consistent with the linear stability analysis results. We also demonstrate the efficiency of the proposed scheme with various numerical experiments.

  13. Novel Image Encryption Scheme Based on Chebyshev Polynomial and Duffing Map

    PubMed Central

    2014-01-01

    We present a novel image encryption algorithm using Chebyshev polynomial based on permutation and substitution and Duffing map based on substitution. Comprehensive security analysis has been performed on the designed scheme using key space analysis, visual testing, histogram analysis, information entropy calculation, correlation coefficient analysis, differential analysis, key sensitivity test, and speed test. The study demonstrates that the proposed image encryption algorithm shows advantages of more than 10113 key space and desirable level of security based on the good statistical results and theoretical arguments. PMID:25143970

  14. A provably-secure ECC-based authentication scheme for wireless sensor networks.

    PubMed

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-11-06

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.

  15. A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

    PubMed Central

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009

  16. Nonequilibrium scheme for computing the flux of the convection-diffusion equation in the framework of the lattice Boltzmann method.

    PubMed

    Chai, Zhenhua; Zhao, T S

    2014-07-01

    In this paper, we propose a local nonequilibrium scheme for computing the flux of the convection-diffusion equation with a source term in the framework of the multiple-relaxation-time (MRT) lattice Boltzmann method (LBM). Both the Chapman-Enskog analysis and the numerical results show that, at the diffusive scaling, the present nonequilibrium scheme has a second-order convergence rate in space. A comparison between the nonequilibrium scheme and the conventional second-order central-difference scheme indicates that, although both schemes have a second-order convergence rate in space, the present nonequilibrium scheme is more accurate than the central-difference scheme. In addition, the flux computation rendered by the present scheme also preserves the parallel computation feature of the LBM, making the scheme more efficient than conventional finite-difference schemes in the study of large-scale problems. Finally, a comparison between the single-relaxation-time model and the MRT model is also conducted, and the results show that the MRT model is more accurate than the single-relaxation-time model, both in solving the convection-diffusion equation and in computing the flux.

  17. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    PubMed

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  18. Multiple Locus Variable-Number Tandem-Repeat and Single-Nucleotide Polymorphism-Based Brucella Typing Reveals Multiple Lineages in Brucella melitensis Currently Endemic in China.

    PubMed

    Sun, Mingjun; Jing, Zhigang; Di, Dongdong; Yan, Hao; Zhang, Zhicheng; Xu, Quangang; Zhang, Xiyue; Wang, Xun; Ni, Bo; Sun, Xiangxiang; Yan, Chengxu; Yang, Zhen; Tian, Lili; Li, Jinping; Fan, Weixing

    2017-01-01

    Brucellosis is a worldwide zoonotic disease caused by Brucella spp. In China, brucellosis is recognized as a reemerging disease mainly caused by Brucella melitensis specie. To better understand the currently endemic B. melitensis strains in China, three Brucella genotyping methods were applied to 110 B. melitensis strains obtained in past several years. By MLVA genotyping, five MLVA-8 genotypes were identified, among which genotypes 42 (1-5-3-13-2-2-3-2) was recognized as the predominant genotype, while genotype 63 (1-5-3-13-2-3-3-2) and a novel genotype of 1-5-3-13-2-4-3-2 were second frequently observed. MLVA-16 discerned a total of 57 MLVA-16 genotypes among these Brucella strains, with 41 genotypes being firstly detected and the other 16 genotypes being previously reported. By BruMLSA21 typing, six sequence types (STs) were identified, among them ST8 is the most frequently seen in China while the other five STs were firstly detected and designated as ST137, ST138, ST139, ST140, and ST141 by international multilocus sequence typing database. Whole-genome sequence (WGS)-single-nucleotide polymorphism (SNP)-based typing and phylogenetic analysis resolved Chinese B. melitensis strains into five clusters, reflecting the existence of multiple lineages among these Chinese B. melitensis strains. In phylogeny, Chinese lineages are more closely related to strains collected from East Mediterranean and Middle East countries, such as Turkey, Kuwait, and Iraq. In the next few years, MLVA typing will certainly remain an important epidemiological tool for Brucella infection analysis, as it displays a high discriminatory ability and achieves result largely in agreement with WGS-SNP-based typing. However, WGS-SNP-based typing is found to be the most powerful and reliable method in discerning Brucella strains and will be popular used in the future.

  19. Bradyrhizobium centrolobii and Bradyrhizobium macuxiense sp. nov. isolated from Centrolobium paraense grown in soil of Amazonia, Brazil.

    PubMed

    Michel, Daniele C; Passos, Samuel R; Simões-Araujo, Jean L; Baraúna, Alexandre C; da Silva, Krisle; Parma, Marcia M; Melo, Itamar S; De Meyer, Sofie E; O'Hara, Graham; Zilli, Jerri E

    2017-07-01

    Thirteen Gram-negative, aerobic, motile with polar flagella, rod-shaped bacteria were isolated from root nodules of Centrolobium paraense Tul. grown in soils from the Amazon region of Brazil. Growth of strains was observed at temperature range 20-36 °C (optimal 28 °C), pH ranges 5-11 (optimal 6.0-7.0), and 0.1-0.5%NaCl (optimal 0.1-0.3%). Analysis of 16S rRNA gene placed the strains into two groups within Bradyrhizobium. Closest neighbouring species (98.8%) for group I was B. neotropicale while for group II were 12 species with more than 99% of similarity. Multi-locus sequence analysis (MLSA) with dnaK, glnII, recA, and rpoB confirmed B. neotropicale BR 10247 T as the closest type strain for the group I and B. elkanii USDA 76 T and B. pachyrhizi PAC 48 T for group II. Average Nucleotide Identity (ANI) differentiated group I from the B. neotropicale BR 10247 T (79.6%) and group II from B. elkanii USDA 76 T and B. pachyrhizi PAC 48 T (88.1% and 87.9%, respectively). Fatty acid profiles [majority C 16:0 and Summed feature 8 (18:1ω6c/18:1ω7c) for both groups], DNA G + C content, and carbon compound utilization supported the placement of the novel strains in the genus Bradyrhizobium. Gene nodC and nifH of the new strains have in general low similarity with other Bradyrhizobium species. Both groups nodulated plants from the tribes Crotalarieae, Dalbergiae, Genisteae, and Phaseoleae. Based on the presented data, two novel species which the names Bradyrhizobium centrolobii and Bradyrhizobium macuxiense are proposed, with BR 10245 T (=HAMBI 3597 T ) and BR 10303 T (=HAMBI 3602 T ) as the respective-type strains.

  20. Multilocus sequence analysis of Echinococcus granulosus strains isolated from humans and animals in Iran.

    PubMed

    Nikmanesh, Bahram; Mirhendi, Hossein; Mahmoudi, Shahram; Rokni, Mohammad Bagher

    2017-12-01

    Echinococcus granulosus is now considered a complex consisting of at least four species and ten genotypes. Different molecular targets have been described for molecular characterization of E. granulosus; however, in almost all studies only one or two of the targets have been used, and only limited data is available on the utilization of multiple loci. Therefore, we investigated the genetic diversity among 64 strains isolated from 138 cyst specimens of human and animal isolates, using a set of nuclear and mitochondrial genes; i.e., cytochrome c oxidase subunit 1 (cox1), NADH dehydrogenase subunit 1 (nad1), ATPase subunit 6 (atp6), 12S rRNA (12S), and Actin II (act II). In comparison to the use of molecular reference targets (nad1 + cox1), using singular target (act II or 12S or atp6) yielded lower discriminatory power. Act II and 12S genes could accurately discriminate the G6 genotype, but they were not able to differentiate between G1 and G3 genotypes. As the G1 and G3 genotypes belong to the E. granulosus sensu stricto, low intra-species variation was observed for act II and 12S. The atp6 gene could identify the G3 genotype but could not differentiate G6 and G1 genotypes. Using concatenated sequence of five genes (cox1 + nad1 + atp6 + 12S + act II), genotypes were identified accurately, and markedly higher resolution was obtained in comparison with the use of reference markers (nad1 + cox1) only. Application of multilocus sequence analysis (MLSA) to large-scale studies could provide valuable epidemiological data to make efficient control and management measures for cystic echinococcosis. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. Payment schemes and cost efficiency: evidence from Swiss public hospitals.

    PubMed

    Meyer, Stefan

    2015-03-01

    This paper aims at analysing the impact of prospective payment schemes on cost efficiency of acute care hospitals in Switzerland. We study a panel of 121 public hospitals subject to one of four payment schemes. While several hospitals are still reimbursed on a per diem basis for the treatment of patients, most face flat per-case rates-or mixed schemes, which combine both elements of reimbursement. Thus, unlike previous studies, we are able to simultaneously analyse and isolate the cost-efficiency effects of different payment schemes. By means of stochastic frontier analysis, we first estimate a hospital cost frontier. Using the two-stage approach proposed by Battese and Coelli (Empir Econ 20:325-332, 1995), we then analyse the impact of these payment schemes on the cost efficiency of hospitals. Controlling for hospital characteristics, local market conditions in the 26 Swiss states (cantons), and a time trend, we show that, compared to per diem, hospitals which are reimbursed by flat payment schemes perform better in terms of cost efficiency. Our results suggest that mixed schemes create incentives for cost containment as well, although to a lesser extent. In addition, our findings indicate that cost-efficient hospitals are primarily located in cantons with competitive markets, as measured by the Herfindahl-Hirschman index in inpatient care. Furthermore, our econometric model shows that we obtain biased estimates from frontier analysis if we do not account for heteroscedasticity in the inefficiency term.

  2. The Nature of All "Inappropriate Referrals" Made to a Countywide Physical Activity Referral Scheme: Implications for Practice

    ERIC Educational Resources Information Center

    Johnston, Lynne Halley; Warwick, Jane; De Ste Croix, Mark; Crone, Diane; Sldford, Adrienne

    2005-01-01

    Objective: The aim of this study was to evaluate the impact of a centralised referral mechanism (CRM) upon the number and type of "inappropriate referrals" made to a countywide physical activity referral scheme. Design: Case study. Method: Phase 1: Hierarchical Content Analysis of 458 "inappropriate referrals" made to a countywide scheme over a…

  3. Entropy Analysis of Kinetic Flux Vector Splitting Schemes for the Compressible Euler Equations

    NASA Technical Reports Server (NTRS)

    Shiuhong, Lui; Xu, Jun

    1999-01-01

    Flux Vector Splitting (FVS) scheme is one group of approximate Riemann solvers for the compressible Euler equations. In this paper, the discretized entropy condition of the Kinetic Flux Vector Splitting (KFVS) scheme based on the gas-kinetic theory is proved. The proof of the entropy condition involves the entropy definition difference between the distinguishable and indistinguishable particles.

  4. An unconditionally stable Runge-Kutta method for unsteady flows

    NASA Technical Reports Server (NTRS)

    Jorgenson, Philip C. E.; Chima, Rodrick V.

    1988-01-01

    A quasi-three dimensional analysis was developed for unsteady rotor-stator interaction in turbomachinery. The analysis solves the unsteady Euler or thin-layer Navier-Stokes equations in a body fitted coordinate system. It accounts for the effects of rotation, radius change, and stream surface thickness. The Baldwin-Lomax eddy viscosity model is used for turbulent flows. The equations are integrated in time using a four stage Runge-Kutta scheme with a constant time step. Implicit residual smoothing was employed to accelerate the solution of the time accurate computations. The scheme is described and accuracy analyses are given. Results are shown for a supersonic through-flow fan designed for NASA Lewis. The rotor:stator blade ratio was taken as 1:1. Results are also shown for the first stage of the Space Shuttle Main Engine high pressure fuel turbopump. Here the blade ratio is 2:3. Implicit residual smoothing was used to increase the time step limit of the unsmoothed scheme by a factor of six with negligible differences in the unsteady results. It is felt that the implicitly smoothed Runge-Kutta scheme is easily competitive with implicit schemes for unsteady flows while retaining the simplicity of an explicit scheme.

  5. Design of an image encryption scheme based on a multiple chaotic map

    NASA Astrophysics Data System (ADS)

    Tong, Xiao-Jun

    2013-07-01

    In order to solve the problem that chaos is degenerated in limited computer precision and Cat map is the small key space, this paper presents a chaotic map based on topological conjugacy and the chaotic characteristics are proved by Devaney definition. In order to produce a large key space, a Cat map named block Cat map is also designed for permutation process based on multiple-dimensional chaotic maps. The image encryption algorithm is based on permutation-substitution, and each key is controlled by different chaotic maps. The entropy analysis, differential analysis, weak-keys analysis, statistical analysis, cipher random analysis, and cipher sensibility analysis depending on key and plaintext are introduced to test the security of the new image encryption scheme. Through the comparison to the proposed scheme with AES, DES and Logistic encryption methods, we come to the conclusion that the image encryption method solves the problem of low precision of one dimensional chaotic function and has higher speed and higher security.

  6. On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu

    NASA Astrophysics Data System (ADS)

    Krishnappa, Dilip Kumar; Khemmarat, Samamon; Gao, Lixin; Zink, Michael

    Lately researchers are looking at ways to reduce the delay on video playback through mechanisms like prefetching and caching for Video-on-Demand (VoD) services. The usage of prefetching and caching also has the potential to reduce the amount of network bandwidth usage, as most popular requests are served from a local cache rather than the server containing the original content. In this paper, we investigate the advantages of having such a prefetching and caching scheme for a free hosting service of professionally created video (movies and TV shows) named "hulu". We look into the advantages of using a prefetching scheme where the most popular videos of the week, as provided by the hulu website, are prefetched and compare this approach with a conventional LRU caching scheme with limited storage space and a combined scheme of prefetching and caching. Results from our measurement and analysis shows that employing a basic caching scheme at the proxy yields a hit ratio of up to 77.69%, but requires storage of about 236GB. Further analysis shows that a prefetching scheme where the top-100 popular videos of the week are downloaded to the proxy yields a hit ratio of 44% with a storage requirement of 10GB. A LRU caching scheme with a storage limitation of 20GB can achieve a hit ratio of 55% but downloads 4713 videos to achieve such high hit ratio compared to 100 videos in prefetching scheme, whereas a scheme with both prefetching and caching with the same storage yields a hit ratio of 59% with download requirement of 4439 videos. We find that employing a scheme of prefetching along with caching with trade-off on the storage will yield a better hit ratio and bandwidth saving than individual caching or prefetching schemes.

  7. Residual Distribution Schemes for Conservation Laws Via Adaptive Quadrature

    NASA Technical Reports Server (NTRS)

    Barth, Timothy; Abgrall, Remi; Biegel, Bryan (Technical Monitor)

    2000-01-01

    This paper considers a family of nonconservative numerical discretizations for conservation laws which retains the correct weak solution behavior in the limit of mesh refinement whenever sufficient order numerical quadrature is used. Our analysis of 2-D discretizations in nonconservative form follows the 1-D analysis of Hou and Le Floch. For a specific family of nonconservative discretizations, it is shown under mild assumptions that the error arising from non-conservation is strictly smaller than the discretization error in the scheme. In the limit of mesh refinement under the same assumptions, solutions are shown to satisfy an entropy inequality. Using results from this analysis, a variant of the "N" (Narrow) residual distribution scheme of van der Weide and Deconinck is developed for first-order systems of conservation laws. The modified form of the N-scheme supplants the usual exact single-state mean-value linearization of flux divergence, typically used for the Euler equations of gasdynamics, by an equivalent integral form on simplex interiors. This integral form is then numerically approximated using an adaptive quadrature procedure. This renders the scheme nonconservative in the sense described earlier so that correct weak solutions are still obtained in the limit of mesh refinement. Consequently, we then show that the modified form of the N-scheme can be easily applied to general (non-simplicial) element shapes and general systems of first-order conservation laws equipped with an entropy inequality where exact mean-value linearization of the flux divergence is not readily obtained, e.g. magnetohydrodynamics, the Euler equations with certain forms of chemistry, etc. Numerical examples of subsonic, transonic and supersonic flows containing discontinuities together with multi-level mesh refinement are provided to verify the analysis.

  8. Influence diagnostics in meta-regression model.

    PubMed

    Shi, Lei; Zuo, ShanShan; Yu, Dalei; Zhou, Xiaohua

    2017-09-01

    This paper studies the influence diagnostics in meta-regression model including case deletion diagnostic and local influence analysis. We derive the subset deletion formulae for the estimation of regression coefficient and heterogeneity variance and obtain the corresponding influence measures. The DerSimonian and Laird estimation and maximum likelihood estimation methods in meta-regression are considered, respectively, to derive the results. Internal and external residual and leverage measure are defined. The local influence analysis based on case-weights perturbation scheme, responses perturbation scheme, covariate perturbation scheme, and within-variance perturbation scheme are explored. We introduce a method by simultaneous perturbing responses, covariate, and within-variance to obtain the local influence measure, which has an advantage of capable to compare the influence magnitude of influential studies from different perturbations. An example is used to illustrate the proposed methodology. Copyright © 2017 John Wiley & Sons, Ltd.

  9. A framework to support decision making in the selection of sustainable drainage system design alternatives.

    PubMed

    Wang, Mingming; Sweetapple, Chris; Fu, Guangtao; Farmani, Raziyeh; Butler, David

    2017-10-01

    This paper presents a new framework for decision making in sustainable drainage system (SuDS) scheme design. It integrates resilience, hydraulic performance, pollution control, rainwater usage, energy analysis, greenhouse gas (GHG) emissions and costs, and has 12 indicators. The multi-criteria analysis methods of entropy weight and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) were selected to support SuDS scheme selection. The effectiveness of the framework is demonstrated with a SuDS case in China. Indicators used include flood volume, flood duration, a hydraulic performance indicator, cost and resilience. Resilience is an important design consideration, and it supports scheme selection in the case study. The proposed framework will help a decision maker to choose an appropriate design scheme for implementation without subjectivity. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  11. A Regev-type fully homomorphic encryption scheme using modulus switching.

    PubMed

    Chen, Zhigang; Wang, Jian; Chen, Liqun; Song, Xinxia

    2014-01-01

    A critical challenge in a fully homomorphic encryption (FHE) scheme is to manage noise. Modulus switching technique is currently the most efficient noise management technique. When using the modulus switching technique to design and implement a FHE scheme, how to choose concrete parameters is an important step, but to our best knowledge, this step has drawn very little attention to the existing FHE researches in the literature. The contributions of this paper are twofold. On one hand, we propose a function of the lower bound of dimension value in the switching techniques depending on the LWE specific security levels. On the other hand, as a case study, we modify the Brakerski FHE scheme (in Crypto 2012) by using the modulus switching technique. We recommend concrete parameter values of our proposed scheme and provide security analysis. Our result shows that the modified FHE scheme is more efficient than the original Brakerski scheme in the same security level.

  12. An ex-ante economic evaluation of the Maternal and Child Health Voucher Scheme as a decision-making tool in Myanmar.

    PubMed

    Kingkaew, Pritaporn; Werayingyong, Pitsaphun; Aye, San San; Tin, Nilar; Singh, Alaka; Myint, Phone; Teerawattananon, Yot

    2016-05-01

    Reducing child and maternal mortality in order to meet the health-related Millennium Development Goals (MDGs) 4 and 5 remains a major challenge in Myanmar. Inadequate care during pregnancy and labour plays an important role in the maternal mortality rate in Myanmar. A Maternal and Child Health (MCH) Voucher Scheme comprising a subsidization for pregnant women to receive four antenatal care (ANC), delivery and postnatal care (PNC) free-of-charge was planned to help women overcome financial barriers in addition to raising awareness of ANC and delivery with skilled birth attendants (SBA), which can reduce the rate of maternal and neonatal death. This study is part of an ex-ante evaluation of a feasibility study of the MCH Voucher Scheme. A cost-utility analysis was conducted using a decision tree model to assess the cost per disability-adjusted life years (DALYs) averted from the MCH Voucher Scheme compared with the current situation. Most input parameters were obtained from Myanmar context. From the base-case analysis, where the financial burden on households was fully subsidized, the MCH Voucher Scheme increased utilization for ANC from 73% up to 93% and for delivery from SBAs from 51% up to and 71%, respectively; hence, it is considered to be very cost-effective with an incremental cost-effectiveness ratio of 381 027 kyats per DALY averted (2010, price year). From the probabilistic sensitivity analysis, the MCH Voucher Scheme had a 52% chance of being a cost-effective option at 1 GDP per capita threshold compared to the current situation. Given that the Voucher Scheme is currently being implemented in one township in Myanmar as a result of this study, ongoing evaluation of the effectiveness and cost-effectiveness of this scheme is warranted. © The Author 2015. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine.

  13. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    PubMed

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  14. A stitch in time saves nine: external quality assessment rounds demonstrate improved quality of biomarker analysis in lung cancer

    PubMed Central

    Keppens, Cleo; Tack, Véronique; Hart, Nils ‘t; Tembuyser, Lien; Ryska, Ales; Pauwels, Patrick; Zwaenepoel, Karen; Schuuring, Ed; Cabillic, Florian; Tornillo, Luigi; Warth, Arne; Weichert, Wilko; Dequeker, Elisabeth

    2018-01-01

    Biomarker analysis has become routine practice in the treatment of non-small cell lung cancer (NSCLC). To ensure high quality testing, participation to external quality assessment (EQA) schemes is essential. This article provides a longitudinal overview of the EQA performance for EGFR, ALK, and ROS1 analyses in NSCLC between 2012 and 2015. The four scheme years were organized by the European Society of Pathology according to the ISO 17043 standard. Participants were asked to analyze the provided tissue using their routine procedures. Analysis scores improved for individual laboratories upon participation to more EQA schemes, except for ROS1 immunohistochemistry (IHC). For EGFR analysis, scheme error rates were 18.8%, 14.1% and 7.5% in 2013, 2014 and 2015 respectively. For ALK testing, error rates decreased between 2012 and 2015 by 5.2%, 3.2% and 11.8% for the fluorescence in situ hybridization (FISH), FISH digital, and IHC subschemes, respectively. In contrast, for ROS1 error rates increased between 2014 and 2015 for FISH and IHC by 3.2% and 9.3%. Technical failures decreased over the years for all three markers. Results show that EQA contributes to an ameliorated performance for most predictive biomarkers in NSCLC. Room for improvement is still present, especially for ROS1 analysis. PMID:29755669

  15. [GIS and scenario analysis aid to water pollution control planning of river basin].

    PubMed

    Wang, Shao-ping; Cheng, Sheng-tong; Jia, Hai-feng; Ou, Zhi-dan; Tan, Bin

    2004-07-01

    The forward and backward algorithms for watershed water pollution control planning were summarized in this paper as well as their advantages and shortages. The spatial databases of water environmental function region, pollution sources, monitoring sections and sewer outlets were built with ARCGIS8.1 as the platform in the case study of Ganjiang valley, Jiangxi province. Based on the principles of the forward algorithm, four scenarios were designed for the watershed pollution control. Under these scenarios, ten sets of planning schemes were generated to implement cascade pollution source control. The investment costs of sewage treatment for these schemes were estimated by means of a series of cost-effective functions; with pollution source prediction, the water quality was modeled with CSTR model for each planning scheme. The modeled results of different planning schemes were visualized through GIS to aid decision-making. With the results of investment cost and water quality attainment as decision-making accords and based on the analysis of the economic endurable capacity for water pollution control in Ganjiang river basin, two optimized schemes were proposed. The research shows that GIS technology and scenario analysis can provide a good guidance to the synthesis, integrity and sustainability aspects for river basin water quality planning.

  16. Analysis of 3D poroelastodynamics using BEM based on modified time-step scheme

    NASA Astrophysics Data System (ADS)

    Igumnov, L. A.; Petrov, A. N.; Vorobtsov, I. V.

    2017-10-01

    The development of 3d boundary elements modeling of dynamic partially saturated poroelastic media using a stepping scheme is presented in this paper. Boundary Element Method (BEM) in Laplace domain and the time-stepping scheme for numerical inversion of the Laplace transform are used to solve the boundary value problem. The modified stepping scheme with a varied integration step for quadrature coefficients calculation using the symmetry of the integrand function and integral formulas of Strongly Oscillating Functions was applied. The problem with force acting on a poroelastic prismatic console end was solved using the developed method. A comparison of the results obtained by the traditional stepping scheme with the solutions obtained by this modified scheme shows that the computational efficiency is better with usage of combined formulas.

  17. Density enhancement mechanism of upwind schemes for low Mach number flows

    NASA Astrophysics Data System (ADS)

    Lin, Bo-Xi; Yan, Chao; Chen, Shu-Sheng

    2018-06-01

    Many all-speed Roe schemes have been proposed to improve performance in terms of low speeds. Among them, the F-Roe and T-D-Roe schemes have been found to get incorrect density fluctuation in low Mach flows, which is expected to be with the square of Mach number. Asymptotic analysis presents the mechanism of how the density fluctuation problem relates to the incorrect order of terms in the energy equation \\tilde{ρ {\\tilde{a}} {\\tilde{U}}Δ U}. It is known that changing the upwind scheme coefficients of the pressure-difference dissipation term D^P and the velocity-difference dissipation term in the momentum equation D^{ρ U} to the order of O(c^{-1}) and O(c0) can improve the level of pressure and velocity accuracy at low speeds. This paper shows that corresponding changes in energy equation can also improve the density accuracy in low speeds. We apply this modification to a recently proposed scheme, TV-MAS, to get a new scheme, TV-MAS2. Unsteady Gresho vortex flow, double shear-layer flow, low Mach number flows over the inviscid cylinder, and NACA0012 airfoil show that energy equation modification in these schemes can obtain the expected square Ma scaling of density fluctuations, which is in good agreement with corresponding asymptotic analysis. Therefore, this density correction is expected to be widely implemented into all-speed compressible flow solvers.

  18. An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian

    2016-01-01

    User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.’s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.’s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance. PMID:27101305

  19. A Theoretical Analysis of a New Polarimetric Optical Scheme for Glucose Sensing in the Human Eye

    NASA Technical Reports Server (NTRS)

    Rovati, Luigi L.; Boeckle, Stefan; Ansari, Rafat R.; Salzman, Jack A. (Technical Monitor)

    2002-01-01

    The challenging task of in vivo polarimetric glucose sensing is the identification and selection of a scheme to optically access the aqueous humor of the human eye. In this short communication an earlier approach of Cote et al. is theoretically compared with our new optical scheme. Simulations of the new scheme using the eye model of Navarro, suggest that the new optical geometry can overcome the limitations of the previous approach for in vivo measurements of glucose in a human eye.

  20. Core Genome Multilocus Sequence Typing Scheme for High-Resolution Typing of Enterococcus faecium

    PubMed Central

    de Been, Mark; Pinholt, Mette; Top, Janetta; Bletz, Stefan; van Schaik, Willem; Brouwer, Ellen; Rogers, Malbert; Kraat, Yvette; Bonten, Marc; Corander, Jukka; Westh, Henrik; Harmsen, Dag

    2015-01-01

    Enterococcus faecium, a common inhabitant of the human gut, has emerged in the last 2 decades as an important multidrug-resistant nosocomial pathogen. Since the start of the 21st century, multilocus sequence typing (MLST) has been used to study the molecular epidemiology of E. faecium. However, due to the use of a small number of genes, the resolution of MLST is limited. Whole-genome sequencing (WGS) now allows for high-resolution tracing of outbreaks, but current WGS-based approaches lack standardization, rendering them less suitable for interlaboratory prospective surveillance. To overcome this limitation, we developed a core genome MLST (cgMLST) scheme for E. faecium. cgMLST transfers genome-wide single nucleotide polymorphism (SNP) diversity into a standardized and portable allele numbering system that is far less computationally intensive than SNP-based analysis of WGS data. The E. faecium cgMLST scheme was built using 40 genome sequences that represented the diversity of the species. The scheme consists of 1,423 cgMLST target genes. To test the performance of the scheme, we performed WGS analysis of 103 outbreak isolates from five different hospitals in the Netherlands, Denmark, and Germany. The cgMLST scheme performed well in distinguishing between epidemiologically related and unrelated isolates, even between those that had the same sequence type (ST), which denotes the higher discriminatory power of this cgMLST scheme over that of conventional MLST. We also show that in terms of resolution, the performance of the E. faecium cgMLST scheme is equivalent to that of an SNP-based approach. In conclusion, the cgMLST scheme developed in this study facilitates rapid, standardized, and high-resolution tracing of E. faecium outbreaks. PMID:26400782

  1. Valuing breastfeeding: a qualitative study of women's experiences of a financial incentive scheme for breastfeeding.

    PubMed

    Johnson, Maxine; Whelan, Barbara; Relton, Clare; Thomas, Kate; Strong, Mark; Scott, Elaine; Renfrew, Mary J

    2018-01-08

    A cluster randomised controlled trial of a financial incentive for breastfeeding conducted in areas with low breastfeeding rates in the UK reported a statistically significant increase in breastfeeding at 6-8 weeks. In this paper we report an analysis of interviews with women eligible for the scheme, exploring their experiences and perceptions of the scheme and its impact on breastfeeding to support the interpretation of the results of the trial. Semi-structured interviews were carried out with 35 women eligible for the scheme during the feasibility and trial stages. All interviews were recorded and verbatim transcripts analysed using a Framework Analysis approach. Women reported that their decisions about infant feeding were influenced by the behaviours and beliefs of their family and friends, socio-cultural norms and by health and practical considerations. They were generally positive about the scheme, and felt valued for the effort involved in breastfeeding. The vouchers were frequently described as a reward, a bonus and something to look forward to, and helping women keep going with their breastfeeding. They were often perceived as compensation for the difficulties women encountered during breastfeeding. The scheme was not thought to make a difference to mothers who were strongly against breastfeeding. However, women did believe the scheme would help normalise breastfeeding, influence those who were undecided and help women to keep going with breastfeeding and reach key milestones e.g. 6 weeks or 3 months. The scheme was acceptable to women, who perceived it as rewarding and valuing them for breastfeeding. Women reported that the scheme could raise awareness of breastfeeding and encourage its normalisation. This provides a possible mechanism of action to explain the results of the trial. The trial is registered with the ISRCTN registry, number 44898617 , https://www.isrctn.com.

  2. Core Genome Multilocus Sequence Typing Scheme for High- Resolution Typing of Enterococcus faecium.

    PubMed

    de Been, Mark; Pinholt, Mette; Top, Janetta; Bletz, Stefan; Mellmann, Alexander; van Schaik, Willem; Brouwer, Ellen; Rogers, Malbert; Kraat, Yvette; Bonten, Marc; Corander, Jukka; Westh, Henrik; Harmsen, Dag; Willems, Rob J L

    2015-12-01

    Enterococcus faecium, a common inhabitant of the human gut, has emerged in the last 2 decades as an important multidrug-resistant nosocomial pathogen. Since the start of the 21st century, multilocus sequence typing (MLST) has been used to study the molecular epidemiology of E. faecium. However, due to the use of a small number of genes, the resolution of MLST is limited. Whole-genome sequencing (WGS) now allows for high-resolution tracing of outbreaks, but current WGS-based approaches lack standardization, rendering them less suitable for interlaboratory prospective surveillance. To overcome this limitation, we developed a core genome MLST (cgMLST) scheme for E. faecium. cgMLST transfers genome-wide single nucleotide polymorphism(SNP) diversity into a standardized and portable allele numbering system that is far less computationally intensive than SNP-based analysis of WGS data. The E. faecium cgMLST scheme was built using 40 genome sequences that represented the diversity of the species. The scheme consists of 1,423 cgMLST target genes. To test the performance of the scheme, we performed WGS analysis of 103 outbreak isolates from five different hospitals in the Netherlands, Denmark, and Germany. The cgMLST scheme performed well in distinguishing between epidemiologically related and unrelated isolates, even between those that had the same sequence type (ST), which denotes the higher discriminatory power of this cgMLST scheme over that of conventional MLST. We also show that in terms of resolution, the performance of the E. faecium cgMLST scheme is equivalent to that of an SNP-based approach. In conclusion, the cgMLST scheme developed in this study facilitates rapid, standardized, and high-resolution tracing of E. faecium outbreaks.

  3. The Social Meanings of the C-Card Scheme: The Importance of Friends and Peers

    ERIC Educational Resources Information Center

    Cheetham, Mandy

    2014-01-01

    This paper draws on findings from an analysis of interviews with young people aged 14-18 years, to explore the peer influences in young people's informal social networks which can affect their access to sexual health services. The research focuses on the social meanings of a C-Card condom distribution scheme in North East England. Such schemes are…

  4. Sensitivity analysis as an aid in modelling and control of (poorly-defined) ecological systems. [closed ecological systems

    NASA Technical Reports Server (NTRS)

    Hornberger, G. M.; Rastetter, E. B.

    1982-01-01

    A literature review of the use of sensitivity analyses in modelling nonlinear, ill-defined systems, such as ecological interactions is presented. Discussions of previous work, and a proposed scheme for generalized sensitivity analysis applicable to ill-defined systems are included. This scheme considers classes of mathematical models, problem-defining behavior, analysis procedures (especially the use of Monte-Carlo methods), sensitivity ranking of parameters, and extension to control system design.

  5. CFD and Aeroelastic Analysis of the MEXICO Wind Turbine

    NASA Astrophysics Data System (ADS)

    Carrión, M.; Woodgate, M.; Steijl, R.; Barakos, G.; Gómez-Iradi, S.; Munduate, X.

    2014-12-01

    This paper presents an aerodynamic and aeroelastic analysis of the MEXICO wind turbine, using the compressible HMB solver of Liverpool. The aeroelasticity of the blade, as well as the effect of a low-Mach scheme were studied for the zero-yaw 15m/s wind case and steady- state computations. The wake developed behind the rotor was also extracted and compared with the experimental data, using the compressible solver and a low-Mach scheme. It was found that the loads were not sensitive to the Mach number effects, although the low-Mach scheme improved the wake predictions. The sensitivity of the results to the blade structural properties was also highlighted.

  6. Analysis/forecast experiments with a multivariate statistical analysis scheme using FGGE data

    NASA Technical Reports Server (NTRS)

    Baker, W. E.; Bloom, S. C.; Nestler, M. S.

    1985-01-01

    A three-dimensional, multivariate, statistical analysis method, optimal interpolation (OI) is described for modeling meteorological data from widely dispersed sites. The model was developed to analyze FGGE data at the NASA-Goddard Laboratory of Atmospherics. The model features a multivariate surface analysis over the oceans, including maintenance of the Ekman balance and a geographically dependent correlation function. Preliminary comparisons are made between the OI model and similar schemes employed at the European Center for Medium Range Weather Forecasts and the National Meteorological Center. The OI scheme is used to provide input to a GCM, and model error correlations are calculated for forecasts of 500 mb vertical water mixing ratios and the wind profiles. Comparisons are made between the predictions and measured data. The model is shown to be as accurate as a successive corrections model out to 4.5 days.

  7. A simple, objective analysis scheme for scatterometer data. [Seasat A satellite observation of wind over ocean

    NASA Technical Reports Server (NTRS)

    Levy, G.; Brown, R. A.

    1986-01-01

    A simple economical objective analysis scheme is devised and tested on real scatterometer data. It is designed to treat dense data such as those of the Seasat A Satellite Scatterometer (SASS) for individual or multiple passes, and preserves subsynoptic scale features. Errors are evaluated with the aid of sampling ('bootstrap') statistical methods. In addition, sensitivity tests have been performed which establish qualitative confidence in calculated fields of divergence and vorticity. The SASS wind algorithm could be improved; however, the data at this point are limited by instrument errors rather than analysis errors. The analysis error is typically negligible in comparison with the instrument error, but amounts to 30 percent of the instrument error in areas of strong wind shear. The scheme is very economical, and thus suitable for large volumes of dense data such as SASS data.

  8. Experimental validation of convection-diffusion discretisation scheme employed for computational modelling of biological mass transport

    PubMed Central

    2010-01-01

    Background The finite volume solver Fluent (Lebanon, NH, USA) is a computational fluid dynamics software employed to analyse biological mass-transport in the vasculature. A principal consideration for computational modelling of blood-side mass-transport is convection-diffusion discretisation scheme selection. Due to numerous discretisation schemes available when developing a mass-transport numerical model, the results obtained should either be validated against benchmark theoretical solutions or experimentally obtained results. Methods An idealised aneurysm model was selected for the experimental and computational mass-transport analysis of species concentration due to its well-defined recirculation region within the aneurysmal sac, allowing species concentration to vary slowly with time. The experimental results were obtained from fluid samples extracted from a glass aneurysm model, using the direct spectrophometric concentration measurement technique. The computational analysis was conducted using the four convection-diffusion discretisation schemes available to the Fluent user, including the First-Order Upwind, the Power Law, the Second-Order Upwind and the Quadratic Upstream Interpolation for Convective Kinetics (QUICK) schemes. The fluid has a diffusivity of 3.125 × 10-10 m2/s in water, resulting in a Peclet number of 2,560,000, indicating strongly convection-dominated flow. Results The discretisation scheme applied to the solution of the convection-diffusion equation, for blood-side mass-transport within the vasculature, has a significant influence on the resultant species concentration field. The First-Order Upwind and the Power Law schemes produce similar results. The Second-Order Upwind and QUICK schemes also correlate well but differ considerably from the concentration contour plots of the First-Order Upwind and Power Law schemes. The computational results were then compared to the experimental findings. An average error of 140% and 116% was demonstrated between the experimental results and those obtained from the First-Order Upwind and Power Law schemes, respectively. However, both the Second-Order upwind and QUICK schemes accurately predict species concentration under high Peclet number, convection-dominated flow conditions. Conclusion Convection-diffusion discretisation scheme selection has a strong influence on resultant species concentration fields, as determined by CFD. Furthermore, either the Second-Order or QUICK discretisation schemes should be implemented when numerically modelling convection-dominated mass-transport conditions. Finally, care should be taken not to utilize computationally inexpensive discretisation schemes at the cost of accuracy in resultant species concentration. PMID:20642816

  9. Evaluation of Microphysics and Cumulus Schemes of WRF for Forecasting of Heavy Monsoon Rainfall over the Southeastern Hilly Region of Bangladesh

    NASA Astrophysics Data System (ADS)

    Hasan, Md Alfi; Islam, A. K. M. Saiful

    2018-05-01

    Accurate forecasting of heavy rainfall is crucial for the improvement of flood warning to prevent loss of life and property damage due to flash-flood-related landslides in the hilly region of Bangladesh. Forecasting heavy rainfall events is challenging where microphysics and cumulus parameterization schemes of Weather Research and Forecast (WRF) model play an important role. In this study, a comparison was made between observed and simulated rainfall using 19 different combinations of microphysics and cumulus schemes available in WRF over Bangladesh. Two severe rainfall events during 11th June 2007 and 24-27th June 2012, over the eastern hilly region of Bangladesh, were selected for performance evaluation using a number of indicators. A combination of the Stony Brook University microphysics scheme with Tiedtke cumulus scheme is found as the most suitable scheme for reproducing those events. Another combination of the single-moment 6-class microphysics scheme with New Grell 3D cumulus schemes also showed reasonable performance in forecasting heavy rainfall over this region. The sensitivity analysis confirms that cumulus schemes play a greater role than microphysics schemes for reproducing the heavy rainfall events using WRF.

  10. Improved finite difference schemes for transonic potential calculations

    NASA Technical Reports Server (NTRS)

    Hafez, M.; Osher, S.; Whitlow, W., Jr.

    1984-01-01

    Engquist and Osher (1980) have introduced a finite difference scheme for solving the transonic small disturbance equation, taking into account cases in which only compression shocks are admitted. Osher et al. (1983) studied a class of schemes for the full potential equation. It is proved that these schemes satisfy a new discrete 'entropy inequality' which rules out expansion shocks. However, the conducted analysis is restricted to steady two-dimensional flows. The present investigation is concerned with the adoption of a heuristic approach. The full potential equation in conservation form is solved with the aid of a modified artificial density method, based on flux biasing. It is shown that, with the current scheme, expansion shocks are not possible.

  11. Multigrid schemes for viscous hypersonic flows

    NASA Technical Reports Server (NTRS)

    Swanson, R. C.; Radespiel, R.

    1993-01-01

    Several multigrid schemes are considered for the numerical computation of viscous hypersonic flows. For each scheme, the basic solution algorithm employs upwind spatial discretization with explicit multistage time stepping. Two-level versions of the various multigrid algorithms are applied to the two-dimensional advection equation, and Fourier analysis is used to determine their damping properties. The capabilities of the multigrid methods are assessed by solving two different hypersonic flow problems. Some new multigrid schemes, based on semicoarsening strategies, are shown to be quite effective in relieving the stiffness caused by the high-aspect-ratio cells required to resolve high Reynolds number flows. These schemes exhibit good convergence rates for Reynolds numbers up to 200 x 10(exp 6).

  12. Composite scheme using localized relaxation with non-standard finite difference method for hyperbolic conservation laws

    NASA Astrophysics Data System (ADS)

    Kumar, Vivek; Raghurama Rao, S. V.

    2008-04-01

    Non-standard finite difference methods (NSFDM) introduced by Mickens [ Non-standard Finite Difference Models of Differential Equations, World Scientific, Singapore, 1994] are interesting alternatives to the traditional finite difference and finite volume methods. When applied to linear hyperbolic conservation laws, these methods reproduce exact solutions. In this paper, the NSFDM is first extended to hyperbolic systems of conservation laws, by a novel utilization of the decoupled equations using characteristic variables. In the second part of this paper, the NSFDM is studied for its efficacy in application to nonlinear scalar hyperbolic conservation laws. The original NSFDMs introduced by Mickens (1994) were not in conservation form, which is an important feature in capturing discontinuities at the right locations. Mickens [Construction and analysis of a non-standard finite difference scheme for the Burgers-Fisher equations, Journal of Sound and Vibration 257 (4) (2002) 791-797] recently introduced a NSFDM in conservative form. This method captures the shock waves exactly, without any numerical dissipation. In this paper, this algorithm is tested for the case of expansion waves with sonic points and is found to generate unphysical expansion shocks. As a remedy to this defect, we use the strategy of composite schemes [R. Liska, B. Wendroff, Composite schemes for conservation laws, SIAM Journal of Numerical Analysis 35 (6) (1998) 2250-2271] in which the accurate NSFDM is used as the basic scheme and localized relaxation NSFDM is used as the supporting scheme which acts like a filter. Relaxation schemes introduced by Jin and Xin [The relaxation schemes for systems of conservation laws in arbitrary space dimensions, Communications in Pure and Applied Mathematics 48 (1995) 235-276] are based on relaxation systems which replace the nonlinear hyperbolic conservation laws by a semi-linear system with a stiff relaxation term. The relaxation parameter ( λ) is chosen locally on the three point stencil of grid which makes the proposed method more efficient. This composite scheme overcomes the problem of unphysical expansion shocks and captures the shock waves with an accuracy better than the upwind relaxation scheme, as demonstrated by the test cases, together with comparisons with popular numerical methods like Roe scheme and ENO schemes.

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thorell, Kaisa; Hosseini, Shaghayegh; Palacios Gonzales, Reyna Victoria Palacios

    In this study, Helicobacter pylori (H. pylori) is one of the most common bacterial infections in humans and this infection can lead to gastric ulcers and gastric cancer. H. pylori is one of the most genetically variable human pathogens and the ability of the bacterium to bind to the host epithelium as well as the presence of different virulence factors and genetic variants within these genes have been associated with disease severity. Nicaragua has particularly high gastric cancer incidence and we therefore studied Nicaraguan clinical H. pylori isolates for factors that could contribute to cancer risk. The complete genomes ofmore » fifty-two Nicaraguan H. pylorii isolates were sequenced and assembled de novo, and phylogenetic and virulence factor analyses were performed. The Nicaraguan isolates showed phylogenetic relationship with West African isolates in whole-genome sequence comparisons and with Western and urban South-and Central American isolates using MLSA (Multi-locus sequence analysis). A majority, 77 % of the isolates carried the cancer-associated virulence gene cagA and also the s1/i1/m1 vacuolating cytotoxin, vacA allele combination, which is linked to increased severity of disease. Specifically, we also found that Nicaraguan isolates have a blood group-binding adhesin (BabA) variant highly similar to previously reported BabA sequences from Latin America, including from isolates belonging to other phylogenetic groups. These BabA sequences were found to be under positive selection at several amino acid positions that differed from the global collection of isolates. In conclusion, the discovery of a Latin American BabA variant, independent of overall phylogenetic background, suggests hitherto unknown host or environmental factors within the Latin American population giving H. pylori isolates carrying this adhesin variant a selective advantage, which could affect pathogenesis and risk for sequelae through specific adherence properties.« less

  14. Vibrio coralliirubri sp. nov., a new species isolated from mucus of red coral (Corallium rubrum) collected at Procida island, Italy.

    PubMed

    Poli, Annarita; Romano, Ida; Mastascusa, Vincenza; Buono, Lorena; Orlando, Pierangelo; Nicolaus, Barbara; Leone, Luigi; Hong, Kar Wai; Chan, Kok-Gan; Goh, Kian Mau; Pascual, Javier

    2018-07-01

    Strain Corallo1 T was isolated from mucus of red coral (Corallium rubrum) at Punta Pizzaco (Procida island, Naples, Italy). It was characterised as a Gram-stain negative, motile, rod-shaped bacterium. Strain Corallo1 T was found to show positive responses for cytochrome-c oxidase, catalase, reduction of nitrate and nitrite, β-galactosidase activity and hydrolysis of starch, xylan, peptone, Tween 40, Tween 80 and casein. Strain Corallo1 T was found to be mesophilic, neutrophilic to alkalophilic and slightly halophilic. According to analysis of the almost-complete 16S rRNA gene, strain Corallo1 T is closely related to Vibrio celticus (100% sequence similarity), Vibrio gigantis (100%), Vibrio crassostreae (99.7%), Vibrio artabrorum (99.7%) and Vibrio pomeroyi (99.6%). MLSA of five housekeeping genes (atpA, pyrH, recA, rpoA and rpoD) was performed to refine the phylogenetic relationships of strain Corallo1 T . A draft genome sequence of strain Corallo1 T was obtained. The DNA G+C content of this strain was determined to be 44.5 mol %. The major cellular fatty acids of strain Corallo1 T are C 16:1 , n-C 16:0 and C 18:1 , and the major isoprenoid ubiquinone is Q8. ANI indexes, in silico estimations of DDH values and wet lab DDH values demonstrated that strain Corallo1 T represents an independent genomospecies. Based on a polyphasic taxonomic characterisation, strain Corallo1 T is concluded to represent a novel species of the genus Vibrio, for which the name Vibrio coralliirubri sp. nov. is proposed. The type strain is Corallo1 T (= DSM 27495 T  = CIP 110630 T ).

  15. Comparative Genomics Reveals High Genomic Diversity in the Genus Photobacterium

    PubMed Central

    Machado, Henrique; Gram, Lone

    2017-01-01

    Vibrionaceae is a large marine bacterial family, which can constitute up to 50% of the prokaryotic population in marine waters. Photobacterium is the second largest genus in the family and we used comparative genomics on 35 strains representing 16 of the 28 species described so far, to understand the genomic diversity present in the Photobacterium genus. Such understanding is important for ecophysiology studies of the genus. We used whole genome sequences to evaluate phylogenetic relationships using several analyses (16S rRNA, MLSA, fur, amino-acid usage, ANI), which allowed us to identify two misidentified strains. Genome analyses also revealed occurrence of higher and lower GC content clades, correlating with phylogenetic clusters. Pan- and core-genome analysis revealed the conservation of 25% of the genome throughout the genus, with a large and open pan-genome. The major source of genomic diversity could be traced to the smaller chromosome and plasmids. Several of the physiological traits studied in the genus did not correlate with phylogenetic data. Since horizontal gene transfer (HGT) is often suggested as a source of genetic diversity and a potential driver of genomic evolution in bacterial species, we looked into evidence of such in Photobacterium genomes. Genomic islands were the source of genomic differences between strains of the same species. Also, we found transposase genes and CRISPR arrays that suggest multiple encounters with foreign DNA. Presence of genomic exchange traits was widespread and abundant in the genus, suggesting a role in genomic evolution. The high genetic variability and indications of genetic exchange make it difficult to elucidate genome evolutionary paths and raise the awareness of the roles of foreign DNA in the genomic evolution of environmental organisms. PMID:28706512

  16. New Coffee Plant-Infecting Xylella fastidiosa Variants Derived via Homologous Recombination.

    PubMed

    Jacques, Marie-Agnès; Denancé, Nicolas; Legendre, Bruno; Morel, Emmanuelle; Briand, Martial; Mississipi, Stelly; Durand, Karine; Olivier, Valérie; Portier, Perrine; Poliakoff, Françoise; Crouzillat, Dominique

    2015-12-28

    Xylella fastidiosa is a xylem-limited phytopathogenic bacterium endemic to the Americas that has recently emerged in Asia and Europe. Although this bacterium is classified as a quarantine organism in the European Union, importation of plant material from contaminated areas and latent infection in asymptomatic plants have engendered its inevitable introduction. In 2012, four coffee plants (Coffea arabica and Coffea canephora) with leaf scorch symptoms growing in a confined greenhouse were detected and intercepted in France. After identification of the causal agent, this outbreak was eradicated. Three X. fastidiosa strains were isolated from these plants, confirming a preliminary identification based on immunology. The strains were characterized by multiplex PCR and by multilocus sequence analysis/typing (MLSA-MLST) based on seven housekeeping genes. One strain, CFBP 8073, isolated from C. canephora imported from Mexico, was assigned to X. fastidiosa subsp. fastidiosa/X. fastidiosa subsp. sandyi. This strain harbors a novel sequence type (ST) with novel alleles at two loci. The two other strains, CFBP 8072 and CFBP 8074, isolated from Coffea arabica imported from Ecuador, were allocated to X. fastidiosa subsp. pauca. These two strains shared a novel ST with novel alleles at two loci. These MLST profiles showed evidence of recombination events. We provide genome sequences for CFBP 8072 and CFBP 8073 strains. Comparative genomic analyses of these two genome sequences with publicly available X. fastidiosa genomes, including the Italian strain CoDiRO, confirmed these phylogenetic positions and provided candidate alleles for coffee plant adaptation. This study demonstrates the global diversity of X. fastidiosa and highlights the diversity of strains isolated from coffee plants. Copyright © 2016, American Society for Microbiology. All Rights Reserved.

  17. Comparative Genomics Reveals High Genomic Diversity in the Genus Photobacterium.

    PubMed

    Machado, Henrique; Gram, Lone

    2017-01-01

    Vibrionaceae is a large marine bacterial family, which can constitute up to 50% of the prokaryotic population in marine waters. Photobacterium is the second largest genus in the family and we used comparative genomics on 35 strains representing 16 of the 28 species described so far, to understand the genomic diversity present in the Photobacterium genus. Such understanding is important for ecophysiology studies of the genus. We used whole genome sequences to evaluate phylogenetic relationships using several analyses (16S rRNA, MLSA, fur , amino-acid usage, ANI), which allowed us to identify two misidentified strains. Genome analyses also revealed occurrence of higher and lower GC content clades, correlating with phylogenetic clusters. Pan- and core-genome analysis revealed the conservation of 25% of the genome throughout the genus, with a large and open pan-genome. The major source of genomic diversity could be traced to the smaller chromosome and plasmids. Several of the physiological traits studied in the genus did not correlate with phylogenetic data. Since horizontal gene transfer (HGT) is often suggested as a source of genetic diversity and a potential driver of genomic evolution in bacterial species, we looked into evidence of such in Photobacterium genomes. Genomic islands were the source of genomic differences between strains of the same species. Also, we found transposase genes and CRISPR arrays that suggest multiple encounters with foreign DNA. Presence of genomic exchange traits was widespread and abundant in the genus, suggesting a role in genomic evolution. The high genetic variability and indications of genetic exchange make it difficult to elucidate genome evolutionary paths and raise the awareness of the roles of foreign DNA in the genomic evolution of environmental organisms.

  18. High-Order Hyperbolic Residual-Distribution Schemes on Arbitrary Triangular Grids

    NASA Technical Reports Server (NTRS)

    Mazaheri, Alireza; Nishikawa, Hiroaki

    2015-01-01

    In this paper, we construct high-order hyperbolic residual-distribution schemes for general advection-diffusion problems on arbitrary triangular grids. We demonstrate that the second-order accuracy of the hyperbolic schemes can be greatly improved by requiring the scheme to preserve exact quadratic solutions. We also show that the improved second-order scheme can be easily extended to third-order by further requiring the exactness for cubic solutions. We construct these schemes based on the LDA and the SUPG methodology formulated in the framework of the residual-distribution method. For both second- and third-order-schemes, we construct a fully implicit solver by the exact residual Jacobian of the second-order scheme, and demonstrate rapid convergence of 10-15 iterations to reduce the residuals by 10 orders of magnitude. We demonstrate also that these schemes can be constructed based on a separate treatment of the advective and diffusive terms, which paves the way for the construction of hyperbolic residual-distribution schemes for the compressible Navier-Stokes equations. Numerical results show that these schemes produce exceptionally accurate and smooth solution gradients on highly skewed and anisotropic triangular grids, including curved boundary problems, using linear elements. We also present Fourier analysis performed on the constructed linear system and show that an under-relaxation parameter is needed for stabilization of Gauss-Seidel relaxation.

  19. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  20. Control Scheme for Quickly Starting X-ray Tube

    NASA Astrophysics Data System (ADS)

    Nakahama, Masayuki; Nakanishi, Toshiki; Ishitobi, Manabu; Ito, Tuyoshi; Hosoda, Kenichi

    A control scheme for quickly starting a portable X-ray generator used in the livestock industry is proposed in this paper. A portable X-ray generator used to take X-ray images of animals such as horses, sheep and dogs should be capable of starting quickly because it is difficult for veterinarians to take X-ray images of animals at their timing. In order to develop a scheme for starting the X-ray tube quickly, it is necessary to analysis the X-ray tube. However, such an analysis has not been discussed until now. First, the states of an X-ray tube are classified into the temperature-limited state and the space-charge-limited state. Furthermore, existence of “mixed state” that comprises both is newly proposed in this paper. From these analyses, a novel scheme for quickly starting an X-ray generator is proposed; this scheme is considered with the characteristics of the X-ray tube. The proposed X-ray system that is capable of starting quickly is evaluated on the basis of experimental results.

  1. Burkholderia paludis sp. nov., an Antibiotic-Siderophore Producing Novel Burkholderia cepacia Complex Species, Isolated from Malaysian Tropical Peat Swamp Soil.

    PubMed

    Ong, Kuan Shion; Aw, Yoong Kit; Lee, Learn Han; Yule, Catherine M; Cheow, Yuen Lin; Lee, Sui Mae

    2016-01-01

    A novel Gram negative rod-shaped bacterium, designated strain MSh1 T , was isolated from Southeast Pahang tropical peat swamp forest soil in Malaysia and characterized using a polyphasic taxonomy approach. The predominant cellular fatty acids (>10.0%) were C 16:0 (31.7%), C 17:0 cyclo (26.6%), and C 19:0 cyclo ω8c (16.1%). The polar lipids detected were phosphatidylglycerol, phosphatidylethanolamine, and diphosphatidylglycerol. The predominant ubiquinone was Q-8. This revealed that strain MSh1 T belongs to the genus Burkholderia . The type strain MSh1 T can be differentiated from other Burkholderia cepacia complex (Bcc) species by phylogenetic analysis of 16S rRNA gene sequence, multilocus sequence analysis (MLSA), average nucleotide identity (ANI) and biochemical tests. DNA-DNA relatedness values between strain MSh1 T and closely related type strains were below the 70% threshold value. Based on this polyphasic study of MSh1 T , it can be concluded that this strain represents a novel species within the Bcc, for which the name Burkholderia paludis sp. nov. is proposed. The type strain is MSh1 T (= DSM 100703 T = MCCC 1K01245 T ). The dichloromethane extract of MSh1 T exhibited antimicrobial activity against four Gram positive bacteria ( Enterococcus faecalis ATCC 29212, E. faecalis ATCC 700802, Staphylococcus aureus ATCC 29213, S. aureus ATCC 700699) and a Gram negative bacteria ( Escherichia coli ATCC 25922). Further purification work has led to the isolation of Compound 1, pyochelin. Pyochelin demonstrated antimicrobial activity against four S. aureus strains and three E . faecalis strains with MIC-values of 3.13 μg/ml and 6.26 μg/ml, respectively. SEM analysis showed that the cellular morphology of E. faecalis ATCC 700802 was not affected by pyochelin; suggesting that it might target the intracellular components. Pyochelin, a siderophore with antimicrobial activity might be useful in treating bacterial infections caused by S. aureus and E. faecalis , however further work has to be done.

  2. The Design and Analysis of the Hydraulic-pressure Seal of the Engine Box

    NASA Astrophysics Data System (ADS)

    Chen, Zhenya; Shen, Xingquan; Xin, Zhijie; Guo, Tingting; Liao, Kewei

    2017-12-01

    According to the sealing requirements of engine casing, using NX software to establish three-dimensional solid model of the engine box. Designing two seals suppress schemes basing on analyzing the characteristics of the case structure, one of seal is using two pins on one side to localize, the other is using cylinder to top tight and fasten, Clarifying the reasons for the using the former scheme have a lower cost. At the same time analysesing of the forces and deformation of the former scheme using finite element analysis software and the NX software, results proved that the pressure scheme can meet the actual needs of the program. It illustrated the composition of the basic principles of manual pressure and hydraulic system, verifed the feasibility of the seal program using experiment, providing reference for the experimental program of hydrostatic pressure in the future.

  3. Boundary condition at a two-phase interface in the lattice Boltzmann method for the convection-diffusion equation.

    PubMed

    Yoshida, Hiroaki; Kobayashi, Takayuki; Hayashi, Hidemitsu; Kinjo, Tomoyuki; Washizu, Hitoshi; Fukuzawa, Kenji

    2014-07-01

    A boundary scheme in the lattice Boltzmann method (LBM) for the convection-diffusion equation, which correctly realizes the internal boundary condition at the interface between two phases with different transport properties, is presented. The difficulty in satisfying the continuity of flux at the interface in a transient analysis, which is inherent in the conventional LBM, is overcome by modifying the collision operator and the streaming process of the LBM. An asymptotic analysis of the scheme is carried out in order to clarify the role played by the adjustable parameters involved in the scheme. As a result, the internal boundary condition is shown to be satisfied with second-order accuracy with respect to the lattice interval, if we assign appropriate values to the adjustable parameters. In addition, two specific problems are numerically analyzed, and comparison with the analytical solutions of the problems numerically validates the proposed scheme.

  4. Analysis and performance assessment of a fragment retransmission scheme for energy efficient IEEE 802.11 WLANs.

    PubMed

    Mafole, Prosper; Aritsugi, Masayoshi

    2016-01-01

    Backoff-free fragment retransmission (BFFR) scheme enhances the performance of legacy MAC layer fragmentation by eliminating contention overhead. The eliminated overhead is the result of backoff executed before a retransmission attempt is made when fragment transmission failure occurs within a fragment burst. This paper provides a mathematical analysis of BFFR energy efficiency and further assesses, by means of simulations, the energy efficiency, throughput and delay obtained when BFFR is used. The validity of the new scheme is evaluated in different scenarios namely, constant bit rate traffic, realistic bursty internet traffic, node mobility, rigid and elastic flows and their combinations at different traffic loads. We also evaluate and discuss the impact of BFFR on MAC fairness when the number of nodes is varied from 4 to 10. It is shown that BFFR has advantages over legacy MAC fragmentation scheme in all the scenarios.

  5. Rajiv Aarogyasri Community Health Insurance Scheme in Andhra Pradesh, India: a comprehensive analytic view of private public partnership model.

    PubMed

    Reddy, Sunita; Mary, Immaculate

    2013-01-01

    The Rajiv Aarogyasri Community Health Insurance (RACHI) in Andhra Pradesh (AP) has been very popular social insurance scheme with a private public partnership model to deal with the problems of catastrophic medical expenditures at tertiary level care for the poor households. A brief analysis of the RACHI scheme based on officially available data and media reports has been undertaken from a public health perspective to understand the nature and financing of partnership and the lessons it provides. The analysis of the annual budget spent on the surgeries in private hospitals compared to tertiary public hospitals shows that the current scheme is not sustainable and pose huge burden on the state exchequers. The private hospital association's in AP, further acts as pressure groups to increase the budget or threaten to withdraw services. Thus, profits are privatized and losses are socialized.

  6. Performance Analysis of a Wind Turbine Driven Swash Plate Pump for Large Scale Offshore Applications

    NASA Astrophysics Data System (ADS)

    Buhagiar, D.; Sant, T.

    2014-12-01

    This paper deals with the performance modelling and analysis of offshore wind turbine-driven hydraulic pumps. The concept consists of an open loop hydraulic system with the rotor main shaft directly coupled to a swash plate pump to supply pressurised sea water. A mathematical model is derived to cater for the steady state behaviour of entire system. A simplified model for the pump is implemented together with different control scheme options for regulating the rotor shaft power. A new control scheme is investigated, based on the combined use of hydraulic pressure and pitch control. Using a steady-state analysis, the study shows how the adoption of alternative control schemes in a the wind turbine-hydraulic pump system may result in higher energy yields than those from a conventional system with an electrical generator and standard pitch control for power regulation. This is in particular the case with the new control scheme investigated in this study that is based on the combined use of pressure and rotor blade pitch control.

  7. Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme.

    PubMed

    Zhang, Liping; Zhu, Shaohui; Tang, Shanyu

    2017-03-01

    Telecare medicine information systems (TMIS) provide flexible and convenient e-health care. However, the medical records transmitted in TMIS are exposed to unsecured public networks, so TMIS are more vulnerable to various types of security threats and attacks. To provide privacy protection for TMIS, a secure and efficient authenticated key agreement scheme is urgently needed to protect the sensitive medical data. Recently, Mishra et al. proposed a biometrics-based authenticated key agreement scheme for TMIS by using hash function and nonce, they claimed that their scheme could eliminate the security weaknesses of Yan et al.'s scheme and provide dynamic identity protection and user anonymity. In this paper, however, we demonstrate that Mishra et al.'s scheme suffers from replay attacks, man-in-the-middle attacks and fails to provide perfect forward secrecy. To overcome the weaknesses of Mishra et al.'s scheme, we then propose a three-factor authenticated key agreement scheme to enable the patient to enjoy the remote healthcare services via TMIS with privacy protection. The chaotic map-based cryptography is employed in the proposed scheme to achieve a delicate balance of security and performance. Security analysis demonstrates that the proposed scheme resists various attacks and provides several attractive security properties. Performance evaluation shows that the proposed scheme increases efficiency in comparison with other related schemes.

  8. Exploring the role of voluntary disease schemes on UK farmer bio-security behaviours: Findings from the Norfolk-Suffolk Bovine Viral Diarrhoea control scheme.

    PubMed

    Azbel-Jackson, Lena; Heffernan, Claire; Gunn, George; Brownlie, Joe

    2018-01-01

    The article describes the influence of a disease control scheme (the Norfolk-Suffolk Bovine Viral Diarrhoea Disease (BVD) Eradication scheme) on farmers' bio-security attitudes and behaviours. In 2010, a survey of 100 cattle farmers (53 scheme members vs. 47 out of scheme farmers) was undertaken among cattle farmers residing in Norfolk and Suffolk counties in the UK. A cross-sectional independent measures design was employed. The main analytical tool was content analysis. The following variables at the farmer-level were explored: the specific BVD control measures adopted, livestock disease priorities, motivation for scheme membership, wider knowledge acquisition, biosecurity behaviours employed and training course attendance. The findings suggest that participation in the BVD scheme improved farmers' perception of the scheme benefits and participation in training courses. However, no association was found between the taking part in the BVD scheme and livestock disease priorities or motivation for scheme participation, or knowledge about BVD bio-security measures employed. Equally importantly, scheme membership did appear to influence the importance accorded specific bio-security measures. Yet such ranking did not appear to reflect the actual behaviours undertaken. As such, disease control efforts alone while necessary, are insufficient. Rather, to enhance farmer bio-security behaviours significant effort must be made to address underlying attitudes to the specific disease threat involved.

  9. Exploring the role of voluntary disease schemes on UK farmer bio-security behaviours: Findings from the Norfolk-Suffolk Bovine Viral Diarrhoea control scheme

    PubMed Central

    Azbel-Jackson, Lena; Heffernan, Claire; Gunn, George; Brownlie, Joe

    2018-01-01

    The article describes the influence of a disease control scheme (the Norfolk-Suffolk Bovine Viral Diarrhoea Disease (BVD) Eradication scheme) on farmers' bio-security attitudes and behaviours. In 2010, a survey of 100 cattle farmers (53 scheme members vs. 47 out of scheme farmers) was undertaken among cattle farmers residing in Norfolk and Suffolk counties in the UK. A cross-sectional independent measures design was employed. The main analytical tool was content analysis. The following variables at the farmer-level were explored: the specific BVD control measures adopted, livestock disease priorities, motivation for scheme membership, wider knowledge acquisition, biosecurity behaviours employed and training course attendance. The findings suggest that participation in the BVD scheme improved farmers' perception of the scheme benefits and participation in training courses. However, no association was found between the taking part in the BVD scheme and livestock disease priorities or motivation for scheme participation, or knowledge about BVD bio-security measures employed. Equally importantly, scheme membership did appear to influence the importance accorded specific bio-security measures. Yet such ranking did not appear to reflect the actual behaviours undertaken. As such, disease control efforts alone while necessary, are insufficient. Rather, to enhance farmer bio-security behaviours significant effort must be made to address underlying attitudes to the specific disease threat involved. PMID:29432435

  10. Statistical Field Estimation for Complex Coastal Regions and Archipelagos (PREPRINT)

    DTIC Science & Technology

    2011-04-09

    and study the computational properties of these schemes. Specifically, we extend a multiscale Objective Analysis (OA) approach to complex coastal...computational properties of these schemes. Specifically, we extend a multiscale Objective Analysis (OA) approach to complex coastal regions and... multiscale free-surface code builds on the primitive-equation model of the Harvard Ocean Predic- tion System (HOPS, Haley et al. (2009)). Additionally

  11. Energy efficiency analysis of reactor for torrefaction of biomass with direct heating

    NASA Astrophysics Data System (ADS)

    Kuzmina, J. S.; Director, L. B.; Shevchenko, A. L.; Zaichenko, V. M.

    2016-11-01

    Paper presents energy analysis of reactor for torrefaction with direct heating of granulated biomass by exhaust gases. Various schemes of gas flow through the reactor zones are presented. Performed is a comparative evaluation of the specific energy consumption for the considered schemes. It has been shown that one of the most expensive processes of torrefaction technology is recycling of pyrolysis gases.

  12. A cascaded coding scheme for error control and its performance analysis

    NASA Technical Reports Server (NTRS)

    Lin, S.

    1986-01-01

    A coding scheme for error control in data communication systems is investigated. The scheme is obtained by cascading two error correcting codes, called the inner and the outer codes. The error performance of the scheme is analyzed for a binary symmetric channel with bit error rate epsilon < 1/2. It is shown that, if the inner and outer codes are chosen properly, extremely high reliability can be attained even for a high channel bit error rate. Various specific example schemes with inner codes ranging from high rates to very low rates and Reed-Solomon codes are considered, and their probabilities are evaluated. They all provide extremely high reliability even for very high bit error rates, say 0.1 to 0.01. Several example schemes are being considered by NASA for satellite and spacecraft down link error control.

  13. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    PubMed Central

    Lee, Youngsook; Paik, Juryon

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme. PMID:25302330

  14. Security analysis and improvement of an anonymous authentication scheme for roaming services.

    PubMed

    Lee, Youngsook; Paik, Juryon

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme.

  15. A cascaded coding scheme for error control and its performance analysis

    NASA Technical Reports Server (NTRS)

    Lin, Shu; Kasami, Tadao; Fujiwara, Tohru; Takata, Toyoo

    1986-01-01

    A coding scheme is investigated for error control in data communication systems. The scheme is obtained by cascading two error correcting codes, called the inner and outer codes. The error performance of the scheme is analyzed for a binary symmetric channel with bit error rate epsilon <1/2. It is shown that if the inner and outer codes are chosen properly, extremely high reliability can be attained even for a high channel bit error rate. Various specific example schemes with inner codes ranging form high rates to very low rates and Reed-Solomon codes as inner codes are considered, and their error probabilities are evaluated. They all provide extremely high reliability even for very high bit error rates. Several example schemes are being considered by NASA for satellite and spacecraft down link error control.

  16. Comparative research of redundant strap down inertial navigation system based on different configuration schemes

    NASA Astrophysics Data System (ADS)

    Yu, Yuting; Cheng, Ming

    2018-05-01

    Aiming at various configuration scheme and inertial measurement units of Strapdown Inertial Navigation System, selected tetrahedron skew configuration and coaxial orthogonal configuration by nine low cost IMU to build system. Calculation and simulation the performance index, reliability and fault diagnosis ability of the navigation system. Analysis shows that the reliability and reconfiguration scheme of skew configuration is superior to the orthogonal configuration scheme, while the performance index and fault diagnosis ability of the system are similar. The work in this paper provides a strong reference for the selection of engineering applications.

  17. Multiparty Quantum Blind Signature Scheme Based on Graph States

    NASA Astrophysics Data System (ADS)

    Jian-Wu, Liang; Xiao-Shu, Liu; Jin-Jing, Shi; Ying, Guo

    2018-05-01

    A multiparty quantum blind signature scheme is proposed based on the principle of graph state, in which the unitary operations of graph state particles can be applied to generate the quantum blind signature and achieve verification. Different from the classical blind signature based on the mathematical difficulty, the scheme could guarantee not only the anonymity but also the unconditionally security. The analysis shows that the length of the signature generated in our scheme does not become longer as the number of signers increases, and it is easy to increase or decrease the number of signers.

  18. Financial incentives to encourage healthy behaviour: an analysis of U.K. media coverage.

    PubMed

    Parke, Hannah; Ashcroft, Richard; Brown, Rebecca; Marteau, Theresa M; Seale, Clive

    2013-09-01

    Policies to use financial incentives to encourage healthy behaviour are controversial. Much of this controversy is played out in the mass media, both reflecting and shaping public opinion. To describe U.K. mass media coverage of incentive schemes, comparing schemes targeted at different client groups and assessing the relative prominence of the views of different interest groups. Thematic content analysis. National and local news coverage in newspapers, news media targeted at health-care providers and popular websites between January 2005 and February 2010. U.K. mass media. The study included 210 articles. Fifteen separate arguments favourable towards schemes, and 19 unfavourable, were identified. Overall, coverage was more favourable than unfavourable, although most articles reported a mix of views. Arguments about the prevalence and seriousness of the health problems targeted by incentive schemes were uncontested. Moral and ethical objections to such schemes were common, focused in particular on recipients such as drug users or the overweight who were already stereotyped as morally deficient, and these arguments were largely uncontested. Arguments about the effectiveness of schemes and their potential for benefit or harm were areas of greater contestation. Government, public health and other health-care provider interests dominated favourable coverage; opposition came from rival politicians, taxpayers' representatives, certain charities and from some journalists themselves. Those promoting incentive schemes for people who might be regarded as 'undeserving' should plan a media strategy that anticipates their public reception. © 2011 John Wiley & Sons Ltd.

  19. Financial incentives to encourage healthy behaviour: an analysis of UK media coverage

    PubMed Central

    Parke, Hannah; Ashcroft, Richard; Brown, Rebecca; Marteau, Theresa M; Seale, Clive

    2011-01-01

    Abstract Background  Policies to use financial incentives to encourage healthy behaviour are controversial. Much of this controversy is played out in the mass media, both reflecting and shaping public opinion. Objective  To describe UK mass media coverage of incentive schemes, comparing schemes targeted at different client groups and assessing the relative prominence of the views of different interest groups. Design  Thematic content analysis. Subjects  National and local news coverage in newspapers, news media targeted at health‐care providers and popular websites between January 2005 and February 2010. Setting  UK mass media. Results  The study included 210 articles. Fifteen separate arguments favourable towards schemes, and 19 unfavourable, were identified. Overall, coverage was more favourable than unfavourable, although most articles reported a mix of views. Arguments about the prevalence and seriousness of the health problems targeted by incentive schemes were uncontested. Moral and ethical objections to such schemes were common, focused in particular on recipients such as drug users or the overweight who were already stereotyped as morally deficient, and these arguments were largely uncontested. Arguments about the effectiveness of schemes and their potential for benefit or harm were areas of greater contestation. Government, public health and other health‐care provider interests dominated favourable coverage; opposition came from rival politicians, taxpayers’ representatives, certain charities and from some journalists themselves. Conclusions  Those promoting incentive schemes for people who might be regarded as ‘undeserving’ should plan a media strategy that anticipates their public reception. PMID:21771227

  20. Progress with multigrid schemes for hypersonic flow problems

    NASA Technical Reports Server (NTRS)

    Radespiel, R.; Swanson, R. C.

    1991-01-01

    Several multigrid schemes are considered for the numerical computation of viscous hypersonic flows. For each scheme, the basic solution algorithm uses upwind spatial discretization with explicit multistage time stepping. Two level versions of the various multigrid algorithms are applied to the two dimensional advection equation, and Fourier analysis is used to determine their damping properties. The capabilities of the multigrid methods are assessed by solving three different hypersonic flow problems. Some new multigrid schemes based on semicoarsening strategies are shown to be quite effective in relieving the stiffness caused by the high aspect ratio cells required to resolve high Reynolds number flows. These schemes exhibit good convergence rates for Reynolds numbers up to 200 x 10(exp 6) and Mach numbers up to 25.

  1. A Quantum Multi-Proxy Weak Blind Signature Scheme Based on Entanglement Swapping

    NASA Astrophysics Data System (ADS)

    Yan, LiLi; Chang, Yan; Zhang, ShiBin; Han, GuiHua; Sheng, ZhiWei

    2017-02-01

    In this paper, we present a multi-proxy weak blind signature scheme based on quantum entanglement swapping of Bell states. In the scheme, proxy signers can finish the signature instead of original singer with his/her authority. It can be applied to the electronic voting system, electronic paying system, etc. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. It could guarantee not only the unconditionally security but also the anonymity of the message owner. The security analysis shows the scheme satisfies the security features of multi-proxy weak signature, singers cannot disavowal his/her signature while the signature cannot be forged by others, and the message owner can be traced.

  2. A scheme of hidden-structure attribute-based encryption with multiple authorities

    NASA Astrophysics Data System (ADS)

    Ling, J.; Weng, A. X.

    2018-05-01

    In the most of the CP-ABE schemes with hidden access structure, both all the user attributes and the key generation are managed by only one authority. The key generation efficiency will decrease as the number of user increases, and the data will encounter security issues as the only authority is attacked. We proposed a scheme of hidden-structure attribute-based encryption with multiple authorities, which introduces multiple semi-trusted attribute authorities, avoiding the threat even though one or more authorities are attacked. We also realized user revocation by managing a revocation list. Based on DBDH assumption, we proved that our scheme is of IND-CMA security. The analysis shows that our scheme improves the key generation efficiency.

  3. Novel conformal technique to reduce staircasing artifacts at material boundaries for FDTD modeling of the bioheat equation.

    PubMed

    Neufeld, E; Chavannes, N; Samaras, T; Kuster, N

    2007-08-07

    The modeling of thermal effects, often based on the Pennes Bioheat Equation, is becoming increasingly popular. The FDTD technique commonly used in this context suffers considerably from staircasing errors at boundaries. A new conformal technique is proposed that can easily be integrated into existing implementations without requiring a special update scheme. It scales fluxes at interfaces with factors derived from the local surface normal. The new scheme is validated using an analytical solution, and an error analysis is performed to understand its behavior. The new scheme behaves considerably better than the standard scheme. Furthermore, in contrast to the standard scheme, it is possible to obtain with it more accurate solutions by increasing the grid resolution.

  4. Understanding the types of fraud in claims to South African medical schemes.

    PubMed

    Legotlo, T G; Mutezo, A

    2018-03-28

    Medical schemes play a significant role in funding private healthcare in South Africa (SA). However, the sector is negatively affected by the high rate of fraudulent claims. To identify the types of fraudulent activities committed in SA medical scheme claims. A cross-sectional qualitative study was conducted, adopting a case study strategy. A sample of 15 employees was purposively selected from a single medical scheme administration company in SA. Semi-structured interviews were conducted to collect data from study participants. A thematic analysis of the data was done using ATLAS.ti software (ATLAS.ti Scientific Software Development, Germany). The study population comprised the 17 companies that administer medical schemes in SA. Data were collected from 15 study participants, who were selected from the medical scheme administrator chosen as a case study. The study found that medical schemes were defrauded in numerous ways. The perpetrators of this type of fraud include healthcare service providers, medical scheme members, employees, brokers and syndicates. Medical schemes are mostly defrauded by the submission of false claims by service providers and syndicates. Fraud committed by medical scheme members encompasses the sharing of medical scheme benefits with non-members (card farming) and non-disclosure of pre-existing conditions at the application stage. The study concluded that perpetrators of fraud have found several ways of defrauding SA medical schemes regarding claims. Understanding and identifying the types of fraud events facing medical schemes is the initial step towards establishing methods to mitigate this risk. Future studies should examine strategies to manage fraudulent medical scheme claims.

  5. Evaluation of multicast schemes in optical burst-switched networks: the case with dynamic sessions

    NASA Astrophysics Data System (ADS)

    Jeong, Myoungki; Qiao, Chunming; Xiong, Yijun; Vandenhoute, Marc

    2000-10-01

    In this paper, we evaluate the performance of several multicast schemes in optical burst-switched WDM networks taking into accounts the overheads due to control packets and guard bands (Gbs) of bursts on separate channels (wavelengths). A straightforward scheme is called Separate Multicasting (S-MCAST) where each source node constructs separate bursts for its multicast (per each multicast session) and unicast traffic. To reduce the overhead due to Gbs (and control packets), one may piggyback the multicast traffic in bursts containing unicast traffic using a scheme called Multiple Unicasting (M-UCAST). The third scheme is called Tree-Shared Multicasting (TS-MCAST) wehreby multicast traffic belonging to multiple multicast sesions can be mixed together in a burst, which is delivered via a shared multicast tree. In [1], we have evaluated several multicast schemes with static sessions at the flow level. In this paper, we perform a simple analysis for the multicast schemes and evaluate the performance of three multicast schemes, focusing on the case with dynamic sessions in terms of the link utilization, bandwidth consumption, blocking (loss) probability, goodput and the processing loads.

  6. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks

    PubMed Central

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-01

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719

  7. Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems.

    PubMed

    Yau, Wei-Chuen; Phan, Raphael C-W

    2013-12-01

    Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.

  8. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.

    PubMed

    Wang, Chenyu; Xu, Guoai; Sun, Jing

    2017-12-19

    As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows-Abadi-Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.

  9. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks

    PubMed Central

    Xu, Guoai; Sun, Jing

    2017-01-01

    As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme. PMID:29257066

  10. Predictive Control of Networked Multiagent Systems via Cloud Computing.

    PubMed

    Liu, Guo-Ping

    2017-01-18

    This paper studies the design and analysis of networked multiagent predictive control systems via cloud computing. A cloud predictive control scheme for networked multiagent systems (NMASs) is proposed to achieve consensus and stability simultaneously and to compensate for network delays actively. The design of the cloud predictive controller for NMASs is detailed. The analysis of the cloud predictive control scheme gives the necessary and sufficient conditions of stability and consensus of closed-loop networked multiagent control systems. The proposed scheme is verified to characterize the dynamical behavior and control performance of NMASs through simulations. The outcome provides a foundation for the development of cooperative and coordinative control of NMASs and its applications.

  11. Statistical Analysis for Collision-free Boson Sampling.

    PubMed

    Huang, He-Liang; Zhong, Han-Sen; Li, Tan; Li, Feng-Guang; Fu, Xiang-Qun; Zhang, Shuo; Wang, Xiang; Bao, Wan-Su

    2017-11-10

    Boson sampling is strongly believed to be intractable for classical computers but solvable with photons in linear optics, which raises widespread concern as a rapid way to demonstrate the quantum supremacy. However, due to its solution is mathematically unverifiable, how to certify the experimental results becomes a major difficulty in the boson sampling experiment. Here, we develop a statistical analysis scheme to experimentally certify the collision-free boson sampling. Numerical simulations are performed to show the feasibility and practicability of our scheme, and the effects of realistic experimental conditions are also considered, demonstrating that our proposed scheme is experimentally friendly. Moreover, our broad approach is expected to be generally applied to investigate multi-particle coherent dynamics beyond the boson sampling.

  12. On the convergence of nonconvex minimization methods for image recovery.

    PubMed

    Xiao, Jin; Ng, Michael Kwok-Po; Yang, Yu-Fei

    2015-05-01

    Nonconvex nonsmooth regularization method has been shown to be effective for restoring images with neat edges. Fast alternating minimization schemes have also been proposed and developed to solve the nonconvex nonsmooth minimization problem. The main contribution of this paper is to show the convergence of these alternating minimization schemes, based on the Kurdyka-Łojasiewicz property. In particular, we show that the iterates generated by the alternating minimization scheme, converges to a critical point of this nonconvex nonsmooth objective function. We also extend the analysis to nonconvex nonsmooth regularization model with box constraints, and obtain similar convergence results of the related minimization algorithm. Numerical examples are given to illustrate our convergence analysis.

  13. Evolutionary algorithm based heuristic scheme for nonlinear heat transfer equations.

    PubMed

    Ullah, Azmat; Malik, Suheel Abdullah; Alimgeer, Khurram Saleem

    2018-01-01

    In this paper, a hybrid heuristic scheme based on two different basis functions i.e. Log Sigmoid and Bernstein Polynomial with unknown parameters is used for solving the nonlinear heat transfer equations efficiently. The proposed technique transforms the given nonlinear ordinary differential equation into an equivalent global error minimization problem. Trial solution for the given nonlinear differential equation is formulated using a fitness function with unknown parameters. The proposed hybrid scheme of Genetic Algorithm (GA) with Interior Point Algorithm (IPA) is opted to solve the minimization problem and to achieve the optimal values of unknown parameters. The effectiveness of the proposed scheme is validated by solving nonlinear heat transfer equations. The results obtained by the proposed scheme are compared and found in sharp agreement with both the exact solution and solution obtained by Haar Wavelet-Quasilinearization technique which witnesses the effectiveness and viability of the suggested scheme. Moreover, the statistical analysis is also conducted for investigating the stability and reliability of the presented scheme.

  14. A Regev-Type Fully Homomorphic Encryption Scheme Using Modulus Switching

    PubMed Central

    Chen, Zhigang; Wang, Jian; Song, Xinxia

    2014-01-01

    A critical challenge in a fully homomorphic encryption (FHE) scheme is to manage noise. Modulus switching technique is currently the most efficient noise management technique. When using the modulus switching technique to design and implement a FHE scheme, how to choose concrete parameters is an important step, but to our best knowledge, this step has drawn very little attention to the existing FHE researches in the literature. The contributions of this paper are twofold. On one hand, we propose a function of the lower bound of dimension value in the switching techniques depending on the LWE specific security levels. On the other hand, as a case study, we modify the Brakerski FHE scheme (in Crypto 2012) by using the modulus switching technique. We recommend concrete parameter values of our proposed scheme and provide security analysis. Our result shows that the modified FHE scheme is more efficient than the original Brakerski scheme in the same security level. PMID:25093212

  15. Genetic algorithms with memory- and elitism-based immigrants in dynamic environments.

    PubMed

    Yang, Shengxiang

    2008-01-01

    In recent years the genetic algorithm community has shown a growing interest in studying dynamic optimization problems. Several approaches have been devised. The random immigrants and memory schemes are two major ones. The random immigrants scheme addresses dynamic environments by maintaining the population diversity while the memory scheme aims to adapt genetic algorithms quickly to new environments by reusing historical information. This paper investigates a hybrid memory and random immigrants scheme, called memory-based immigrants, and a hybrid elitism and random immigrants scheme, called elitism-based immigrants, for genetic algorithms in dynamic environments. In these schemes, the best individual from memory or the elite from the previous generation is retrieved as the base to create immigrants into the population by mutation. This way, not only can diversity be maintained but it is done more efficiently to adapt genetic algorithms to the current environment. Based on a series of systematically constructed dynamic problems, experiments are carried out to compare genetic algorithms with the memory-based and elitism-based immigrants schemes against genetic algorithms with traditional memory and random immigrants schemes and a hybrid memory and multi-population scheme. The sensitivity analysis regarding some key parameters is also carried out. Experimental results show that the memory-based and elitism-based immigrants schemes efficiently improve the performance of genetic algorithms in dynamic environments.

  16. Convergence Acceleration of Runge-Kutta Schemes for Solving the Navier-Stokes Equations

    NASA Technical Reports Server (NTRS)

    Swanson, Roy C., Jr.; Turkel, Eli; Rossow, C.-C.

    2007-01-01

    The convergence of a Runge-Kutta (RK) scheme with multigrid is accelerated by preconditioning with a fully implicit operator. With the extended stability of the Runge-Kutta scheme, CFL numbers as high as 1000 can be used. The implicit preconditioner addresses the stiffness in the discrete equations associated with stretched meshes. This RK/implicit scheme is used as a smoother for multigrid. Fourier analysis is applied to determine damping properties. Numerical dissipation operators based on the Roe scheme, a matrix dissipation, and the CUSP scheme are considered in evaluating the RK/implicit scheme. In addition, the effect of the number of RK stages is examined. Both the numerical and computational efficiency of the scheme with the different dissipation operators are discussed. The RK/implicit scheme is used to solve the two-dimensional (2-D) and three-dimensional (3-D) compressible, Reynolds-averaged Navier-Stokes equations. Turbulent flows over an airfoil and wing at subsonic and transonic conditions are computed. The effects of the cell aspect ratio on convergence are investigated for Reynolds numbers between 5:7 x 10(exp 6) and 100 x 10(exp 6). It is demonstrated that the implicit preconditioner can reduce the computational time of a well-tuned standard RK scheme by a factor between four and ten.

  17. A staggered-grid finite-difference scheme optimized in the time–space domain for modeling scalar-wave propagation in geophysical problems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tan, Sirui, E-mail: siruitan@hotmail.com; Huang, Lianjie, E-mail: ljh@lanl.gov

    For modeling scalar-wave propagation in geophysical problems using finite-difference schemes, optimizing the coefficients of the finite-difference operators can reduce numerical dispersion. Most optimized finite-difference schemes for modeling seismic-wave propagation suppress only spatial but not temporal dispersion errors. We develop a novel optimized finite-difference scheme for numerical scalar-wave modeling to control dispersion errors not only in space but also in time. Our optimized scheme is based on a new stencil that contains a few more grid points than the standard stencil. We design an objective function for minimizing relative errors of phase velocities of waves propagating in all directions within amore » given range of wavenumbers. Dispersion analysis and numerical examples demonstrate that our optimized finite-difference scheme is computationally up to 2.5 times faster than the optimized schemes using the standard stencil to achieve the similar modeling accuracy for a given 2D or 3D problem. Compared with the high-order finite-difference scheme using the same new stencil, our optimized scheme reduces 50 percent of the computational cost to achieve the similar modeling accuracy. This new optimized finite-difference scheme is particularly useful for large-scale 3D scalar-wave modeling and inversion.« less

  18. Classification schemes for knowledge translation interventions: a practical resource for researchers.

    PubMed

    Slaughter, Susan E; Zimmermann, Gabrielle L; Nuspl, Megan; Hanson, Heather M; Albrecht, Lauren; Esmail, Rosmin; Sauro, Khara; Newton, Amanda S; Donald, Maoliosa; Dyson, Michele P; Thomson, Denise; Hartling, Lisa

    2017-12-06

    As implementation science advances, the number of interventions to promote the translation of evidence into healthcare, health systems, or health policy is growing. Accordingly, classification schemes for these knowledge translation (KT) interventions have emerged. A recent scoping review identified 51 classification schemes of KT interventions to integrate evidence into healthcare practice; however, the review did not evaluate the quality of the classification schemes or provide detailed information to assist researchers in selecting a scheme for their context and purpose. This study aimed to further examine and assess the quality of these classification schemes of KT interventions, and provide information to aid researchers when selecting a classification scheme. We abstracted the following information from each of the original 51 classification scheme articles: authors' objectives; purpose of the scheme and field of application; socioecologic level (individual, organizational, community, system); adaptability (broad versus specific); target group (patients, providers, policy-makers), intent (policy, education, practice), and purpose (dissemination versus implementation). Two reviewers independently evaluated the methodological quality of the development of each classification scheme using an adapted version of the AGREE II tool. Based on these assessments, two independent reviewers reached consensus about whether to recommend each scheme for researcher use, or not. Of the 51 original classification schemes, we excluded seven that were not specific classification schemes, not accessible or duplicates. Of the remaining 44 classification schemes, nine were not recommended. Of the 35 recommended classification schemes, ten focused on behaviour change and six focused on population health. Many schemes (n = 29) addressed practice considerations. Fewer schemes addressed educational or policy objectives. Twenty-five classification schemes had broad applicability, six were specific, and four had elements of both. Twenty-three schemes targeted health providers, nine targeted both patients and providers and one targeted policy-makers. Most classification schemes were intended for implementation rather than dissemination. Thirty-five classification schemes of KT interventions were developed and reported with sufficient rigour to be recommended for use by researchers interested in KT in healthcare. Our additional categorization and quality analysis will aid in selecting suitable classification schemes for research initiatives in the field of implementation science.

  19. Exact finite difference schemes for the non-linear unidirectional wave equation

    NASA Technical Reports Server (NTRS)

    Mickens, R. E.

    1985-01-01

    Attention is given to the construction of exact finite difference schemes for the nonlinear unidirectional wave equation that describes the nonlinear propagation of a wave motion in the positive x-direction. The schemes constructed for these equations are compared with those obtained by using the usual procedures of numerical analysis. It is noted that the order of the exact finite difference models is equal to the order of the differential equation.

  20. An Improved Quantum Proxy Blind Signature Scheme Based on Genuine Seven-Qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Yang, Yuan-Yuan; Xie, Shu-Cui; Zhang, Jian-Zhong

    2017-07-01

    An improved quantum proxy blind signature scheme based on controlled teleportation is proposed in this paper. Genuine seven-qubit entangled state functions as quantum channel. We use the physical characteristics of quantum mechanics to implement delegation, signature and verification. Security analysis shows that our scheme is unforgeability, undeniability, blind and unconditionally secure. Meanwhile, we propose a trust party to provide higher security, the trust party is costless.

  1. An Analysis of an Implicit Factored Scheme for Simulating Shock Waves

    DTIC Science & Technology

    1988-05-01

    can cope with a wide range of boundary conditions and equations of state, For modelling -( shock waves in solids, elastic- plastic terms must also be...positive caracteristic speeds. One-sided schemes have superior dissipative and dispersive properties compared to those of centered schemes (Steger and...Elastic- plastic con. ditions must be- incorporated into the problem and usually the addition of suitable bource or sink terms to c-’ustion (1

  2. Permanence analysis of a concatenated coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Costello, D. J., Jr.; Lin, S.; Kasami, T.

    1983-01-01

    A concatenated coding scheme for error control in data communications is analyzed. In this scheme, the inner code is used for both error correction and detection, however, the outer code is used only for error detection. A retransmission is requested if the outer code detects the presence of errors after the inner code decoding. Probability of undetected error is derived and bounded. A particular example, proposed for the planetary program, is analyzed.

  3. An analysis of civil aviation propeller-to-person accidents : 1965-1979.

    DOT National Transportation Integrated Search

    1981-05-01

    The interest of manufacturing, governmental, and safety personnel using paint schemes on propeller and rotor blades is based on improving the visual conspicuity of those blades when they are rotating. While propeller and rotor paint schemes may serve...

  4. Distributed computing for membrane-based modeling of action potential propagation.

    PubMed

    Porras, D; Rogers, J M; Smith, W M; Pollard, A E

    2000-08-01

    Action potential propagation simulations with physiologic membrane currents and macroscopic tissue dimensions are computationally expensive. We, therefore, analyzed distributed computing schemes to reduce execution time in workstation clusters by parallelizing solutions with message passing. Four schemes were considered in two-dimensional monodomain simulations with the Beeler-Reuter membrane equations. Parallel speedups measured with each scheme were compared to theoretical speedups, recognizing the relationship between speedup and code portions that executed serially. A data decomposition scheme based on total ionic current provided the best performance. Analysis of communication latencies in that scheme led to a load-balancing algorithm in which measured speedups at 89 +/- 2% and 75 +/- 8% of theoretical speedups were achieved in homogeneous and heterogeneous clusters of workstations. Speedups in this scheme with the Luo-Rudy dynamic membrane equations exceeded 3.0 with eight distributed workstations. Cluster speedups were comparable to those measured during parallel execution on a shared memory machine.

  5. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.

    PubMed

    He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk

    2014-10-01

    The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.

  6. Design of a 3-dimensional visual illusion speed reduction marking scheme.

    PubMed

    Liang, Guohua; Qian, Guomin; Wang, Ye; Yi, Zige; Ru, Xiaolei; Ye, Wei

    2017-03-01

    To determine which graphic and color combination for a 3-dimensional visual illusion speed reduction marking scheme presents the best visual stimulus, five parameters were designed. According to the Balanced Incomplete Blocks-Law of Comparative Judgment, three schemes, which produce strong stereoscopic impressions, were screened from the 25 initial design schemes of different combinations of graphics and colors. Three-dimensional experimental simulation scenes of the three screened schemes were created to evaluate four different effects according to a semantic analysis. The following conclusions were drawn: schemes with a red color are more effective than those without; the combination of red, yellow and blue produces the best visual stimulus; a larger area from the top surface and the front surface should be colored red; and a triangular prism should be painted as the graphic of the marking according to the stereoscopic impression and the coordination of graphics with the road.

  7. Extended opening hours and patient experience of general practice in England: multilevel regression analysis of a national patient survey.

    PubMed

    Cowling, Thomas E; Harris, Matthew; Majeed, Azeem

    2017-05-01

    The UK government plans to extend the opening hours of general practices in England. The 'extended hours access scheme' pays practices for providing appointments outside core times (08:00 to 18.30, Monday to Friday) for at least 30 min per 1000 registered patients each week. To determine the association between extended hours access scheme participation and patient experience. Retrospective analysis of a national cross-sectional survey completed by questionnaire (General Practice Patient Survey 2013-2014); 903 357 survey respondents aged ≥18 years old and registered to 8005 general practices formed the study population. Outcome measures were satisfaction with opening hours, experience of making an appointment and overall experience (on five-level interval scales from 0 to 100). Mean differences between scheme participation groups were estimated using multilevel random-effects regression, propensity score matching and instrumental variable analysis. Most patients were very (37.2%) or fairly satisfied (42.7%) with the opening hours of their general practices; results were similar for experience of making an appointment and overall experience. Most general practices participated in the extended hours access scheme (73.9%). Mean differences in outcome measures between scheme participants and non-participants were positive but small across estimation methods (mean differences ≤1.79). For example, scheme participation was associated with a 1.25 (95% CI 0.96 to 1.55) increase in satisfaction with opening hours using multilevel regression; this association was slightly greater when patients could not take time off work to see a general practitioner (2.08, 95% CI 1.53 to 2.63). Participation in the extended hours access scheme has a limited association with three patient experience measures. This questions expected impacts of current plans to extend opening hours on patient experience. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  8. Impact of different parameterization schemes on simulation of mesoscale convective system over south-east India

    NASA Astrophysics Data System (ADS)

    Madhulatha, A.; Rajeevan, M.

    2018-02-01

    Main objective of the present paper is to examine the role of various parameterization schemes in simulating the evolution of mesoscale convective system (MCS) occurred over south-east India. Using the Weather Research and Forecasting (WRF) model, numerical experiments are conducted by considering various planetary boundary layer, microphysics, and cumulus parameterization schemes. Performances of different schemes are evaluated by examining boundary layer, reflectivity, and precipitation features of MCS using ground-based and satellite observations. Among various physical parameterization schemes, Mellor-Yamada-Janjic (MYJ) boundary layer scheme is able to produce deep boundary layer height by simulating warm temperatures necessary for storm initiation; Thompson (THM) microphysics scheme is capable to simulate the reflectivity by reasonable distribution of different hydrometeors during various stages of system; Betts-Miller-Janjic (BMJ) cumulus scheme is able to capture the precipitation by proper representation of convective instability associated with MCS. Present analysis suggests that MYJ, a local turbulent kinetic energy boundary layer scheme, which accounts strong vertical mixing; THM, a six-class hybrid moment microphysics scheme, which considers number concentration along with mixing ratio of rain hydrometeors; and BMJ, a closure cumulus scheme, which adjusts thermodynamic profiles based on climatological profiles might have contributed for better performance of respective model simulations. Numerical simulation carried out using the above combination of schemes is able to capture storm initiation, propagation, surface variations, thermodynamic structure, and precipitation features reasonably well. This study clearly demonstrates that the simulation of MCS characteristics is highly sensitive to the choice of parameterization schemes.

  9. Depth data research of GIS based on clustering analysis algorithm

    NASA Astrophysics Data System (ADS)

    Xiong, Yan; Xu, Wenli

    2018-03-01

    The data of GIS have spatial distribution. Geographic data has both spatial characteristics and attribute characteristics, and also changes with time. Therefore, the amount of data is very large. Nowadays, many industries and departments in the society are using GIS. However, without proper data analysis and mining scheme, GIS will not exert its maximum effectiveness and will waste a lot of data. In this paper, we use the geographic information demand of a national security department as the experimental object, combining the characteristics of GIS data, taking into account the characteristics of time, space, attributes and so on, and using cluster analysis algorithm. We further study the mining scheme for depth data, and get the algorithm model. This algorithm can automatically classify sample data, and then carry out exploratory analysis. The research shows that the algorithm model and the information mining scheme can quickly find hidden depth information from the surface data of GIS, thus improving the efficiency of the security department. This algorithm can also be extended to other fields.

  10. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  11. Resource Management Scheme Based on Ubiquitous Data Analysis

    PubMed Central

    Lee, Heung Ki; Jung, Jaehee

    2014-01-01

    Resource management of the main memory and process handler is critical to enhancing the system performance of a web server. Owing to the transaction delay time that affects incoming requests from web clients, web server systems utilize several web processes to anticipate future requests. This procedure is able to decrease the web generation time because there are enough processes to handle the incoming requests from web browsers. However, inefficient process management results in low service quality for the web server system. Proper pregenerated process mechanisms are required for dealing with the clients' requests. Unfortunately, it is difficult to predict how many requests a web server system is going to receive. If a web server system builds too many web processes, it wastes a considerable amount of memory space, and thus performance is reduced. We propose an adaptive web process manager scheme based on the analysis of web log mining. In the proposed scheme, the number of web processes is controlled through prediction of incoming requests, and accordingly, the web process management scheme consumes the least possible web transaction resources. In experiments, real web trace data were used to prove the improved performance of the proposed scheme. PMID:25197692

  12. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

    PubMed Central

    Ding, Chao; Yang, Lijun; Wu, Meng

    2017-01-01

    Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies. PMID:28098846

  13. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge.

    PubMed

    Ding, Chao; Yang, Lijun; Wu, Meng

    2017-01-15

    Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies.

  14. Sensitivity of Forecast Skill to Different Objective Analysis Schemes

    NASA Technical Reports Server (NTRS)

    Baker, W. E.

    1979-01-01

    Numerical weather forecasts are characterized by rapidly declining skill in the first 48 to 72 h. Recent estimates of the sources of forecast error indicate that the inaccurate specification of the initial conditions contributes substantially to this error. The sensitivity of the forecast skill to the initial conditions is examined by comparing a set of real-data experiments whose initial data were obtained with two different analysis schemes. Results are presented to emphasize the importance of the objective analysis techniques used in the assimilation of observational data.

  15. Study on the design schemes of the air-conditioning system in a gymnasium

    NASA Astrophysics Data System (ADS)

    Zhang, Yujin; Wu, Xinwei; Zhang, Jing; Pan, Zhixin

    2017-08-01

    In view of designing the air conditioning project for a gymnasium successfully, the cooling and heating source schemes are fully studied by analyzing the surrounding environment and energy conditions of the project, as well as the analysis of the initial investment and operating costs, which indicates the air source heat pump air conditioning system is the best choice for the project. The indoor air conditioning schemes are also studied systematically and the optimization of air conditioning schemes is carried out in each area. The principle of operating conditions for the whole year is followed and the quality of indoor air and energy-saving are ensured by the optimized design schemes, which provide references for the air conditioning system design in the same kinds of building.

  16. Efficient scheme for parametric fitting of data in arbitrary dimensions.

    PubMed

    Pang, Ning-Ning; Tzeng, Wen-Jer; Kao, Hisen-Ching

    2008-07-01

    We propose an efficient scheme for parametric fitting expressed in terms of the Legendre polynomials. For continuous systems, our scheme is exact and the derived explicit expression is very helpful for further analytical studies. For discrete systems, our scheme is almost as accurate as the method of singular value decomposition. Through a few numerical examples, we show that our algorithm costs much less CPU time and memory space than the method of singular value decomposition. Thus, our algorithm is very suitable for a large amount of data fitting. In addition, the proposed scheme can also be used to extract the global structure of fluctuating systems. We then derive the exact relation between the correlation function and the detrended variance function of fluctuating systems in arbitrary dimensions and give a general scaling analysis.

  17. Self-match based on polling scheme for passive optical network monitoring

    NASA Astrophysics Data System (ADS)

    Zhang, Xuan; Guo, Hao; Jia, Xinhong; Liao, Qinghua

    2018-06-01

    We propose a self-match based on polling scheme for passive optical network monitoring. Each end-user is equipped with an optical matcher that exploits only the specific length patchcord and two different fiber Bragg gratings with 100% reflectivity. The simple and low-cost scheme can greatly simplify the final recognition processing of the network link status and reduce the sensitivity of the photodetector. We analyze the time-domain relation between reflected pulses and establish the calculation model to evaluate the false alarm rate. The feasibility of the proposed scheme and the validity of the time-domain relation analysis are experimentally demonstrated.

  18. An improved scheme on decoy-state method for measurement-device-independent quantum key distribution.

    PubMed

    Wang, Dong; Li, Mo; Guo, Guang-Can; Wang, Qin

    2015-10-14

    Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and two other existing ones, i.e., two-intensity decoy-states with single-photon-added coherent sources, and three-intensity decoy-states with weak coherent sources. Through numerical analysis, we demonstrate the advantages of our scheme in secure transmission distance and the final key generation rate.

  19. On the equivalence of Gaussian elimination and Gauss-Jordan reduction in solving linear equations

    NASA Technical Reports Server (NTRS)

    Tsao, Nai-Kuan

    1989-01-01

    A novel general approach to round-off error analysis using the error complexity concepts is described. This is applied to the analysis of the Gaussian Elimination and Gauss-Jordan scheme for solving linear equations. The results show that the two algorithms are equivalent in terms of our error complexity measures. Thus the inherently parallel Gauss-Jordan scheme can be implemented with confidence if parallel computers are available.

  20. Sparse Image Reconstruction on the Sphere: Analysis and Synthesis.

    PubMed

    Wallis, Christopher G R; Wiaux, Yves; McEwen, Jason D

    2017-11-01

    We develop techniques to solve ill-posed inverse problems on the sphere by sparse regularization, exploiting sparsity in both axisymmetric and directional scale-discretized wavelet space. Denoising, inpainting, and deconvolution problems and combinations thereof, are considered as examples. Inverse problems are solved in both the analysis and synthesis settings, with a number of different sampling schemes. The most effective approach is that with the most restricted solution-space, which depends on the interplay between the adopted sampling scheme, the selection of the analysis/synthesis problem, and any weighting of the l 1 norm appearing in the regularization problem. More efficient sampling schemes on the sphere improve reconstruction fidelity by restricting the solution-space and also by improving sparsity in wavelet space. We apply the technique to denoise Planck 353-GHz observations, improving the ability to extract the structure of Galactic dust emission, which is important for studying Galactic magnetism.

  1. Temporal abstraction for the analysis of intensive care information

    NASA Astrophysics Data System (ADS)

    Hadad, Alejandro J.; Evin, Diego A.; Drozdowicz, Bartolomé; Chiotti, Omar

    2007-11-01

    This paper proposes a scheme for the analysis of time-stamped series data from multiple monitoring devices of intensive care units, using Temporal Abstraction concepts. This scheme is oriented to obtain a description of the patient state evolution in an unsupervised way. The case of study is based on a dataset clinically classified with Pulmonary Edema. For this dataset a trends based Temporal Abstraction mechanism is proposed, by means of a Behaviours Base of time-stamped series and then used in a classification step. Combining this approach with the introduction of expert knowledge, using Fuzzy Logic, and multivariate analysis by means of Self-Organizing Maps, a states characterization model is obtained. This model is feasible of being extended to different patients groups and states. The proposed scheme allows to obtain intermediate states descriptions through which it is passing the patient and that could be used to anticipate alert situations.

  2. A Philosophical Approach to Describing Science Content: An Example From Geologic Classification.

    ERIC Educational Resources Information Center

    Finley, Fred N.

    1981-01-01

    Examines how research of philosophers of science may be useful to science education researchers and curriculum developers in the development of descriptions of science content related to classification schemes. Provides examples of concept analysis of two igneous rock classification schemes. (DS)

  3. A Simple Qualitative Analysis Scheme for Several Environmentally Important Elements

    ERIC Educational Resources Information Center

    Lambert, Jack L.; Meloan, Clifton E.

    1977-01-01

    Describes a scheme that uses precipitation, gas evolution, complex ion formation, and flame tests to analyze for the following ions: Hg(I), Hg(II), Sb(III), Cr(III), Pb(II), Sr(II), Cu(II), Cd(II), As(III), chloride, nitrate, and sulfate. (MLH)

  4. First Semester Qualitative Analysis

    ERIC Educational Resources Information Center

    DeLap, James H.

    1969-01-01

    Describes a two-hour laboratory course entitled "Chemical Periodicity offered first semester of the freshman year. Three cation groups, one anion group, and a final unkown salt are qualitatively analyzed. Course fosters scientific thinking in experimentation by encouraging student-initiated schemes of analyses rather than "cookbook schemes. (RR)

  5. Assessing a Reclaimed Concrete Up-Cycling Scheme through Life-Cycle Analysis

    NASA Astrophysics Data System (ADS)

    Guignot, Sylvain; Bru, Kathy; Touzé, Solène; Ménard, Yannick

    The present study evaluates the environmental impacts of a recycling scheme for gravels from building concretes wastes, in which the liberated aggregates are reused in structural concretes while the residual mortar fines are sent to the raw mill of a clinker kiln.

  6. Algorithmic trends in computational fluid dynamics; The Institute for Computer Applications in Science and Engineering (ICASE)/LaRC Workshop, NASA Langley Research Center, Hampton, VA, US, Sep. 15-17, 1991

    NASA Technical Reports Server (NTRS)

    Hussaini, M. Y. (Editor); Kumar, A. (Editor); Salas, M. D. (Editor)

    1993-01-01

    The purpose here is to assess the state of the art in the areas of numerical analysis that are particularly relevant to computational fluid dynamics (CFD), to identify promising new developments in various areas of numerical analysis that will impact CFD, and to establish a long-term perspective focusing on opportunities and needs. Overviews are given of discretization schemes, computational fluid dynamics, algorithmic trends in CFD for aerospace flow field calculations, simulation of compressible viscous flow, and massively parallel computation. Also discussed are accerelation methods, spectral and high-order methods, multi-resolution and subcell resolution schemes, and inherently multidimensional schemes.

  7. (LBA-and-WRM)-based DBA scheme for multi-wavelength upstream transmission supporting 10 Gbps and 1 Gbps in MAN

    NASA Astrophysics Data System (ADS)

    Zhang, Yuchao; Gan, Chaoqin; Gou, Kaiyu; Xu, Anni; Ma, Jiamin

    2018-01-01

    DBA scheme based on Load balance algorithm (LBA) and wavelength recycle mechanism (WRM) for multi-wavelength upstream transmission is proposed in this paper. According to 1 Gbps and 10 Gbps line rates, ONUs are grouped into different VPONs. To facilitate wavelength management, resource pool is proposed to record wavelength state. To realize quantitative analysis, a mathematical model describing metro-access network (MAN) environment is presented. To 10G-EPON upstream, load balance algorithm is designed to ensure load distribution fairness for 10G-OLTs. To 1G-EPON upstream, wavelength recycle mechanism is designed to share remained wavelengths. Finally, the effectiveness of the proposed scheme is demonstrated by simulation and analysis.

  8. Lognormal Assimilation of Water Vapor in a WRF-GSI Cycled System

    NASA Astrophysics Data System (ADS)

    Fletcher, S. J.; Kliewer, A.; Jones, A. S.; Forsythe, J. M.

    2015-12-01

    Recent publications have shown the viability of both detecting a lognormally-distributed signal for water vapor mixing ratio and the improved quality of satellite retrievals in a 1DVAR mixed lognormal-Gaussian assimilation scheme over a Gaussian-only system. This mixed scheme is incorporated into the Gridpoint Statistical Interpolation (GSI) assimilation scheme with the goal of improving forecasts from the Weather Research and Forecasting (WRF) Model in a cycled system. Results are presented of the impact of treating water vapor as a lognormal random variable. Included in the analysis are: 1) the evolution of Tropical Storm Chris from 2006, and 2) an analysis of a "Pineapple Express" water vapor event from 2005 where a lognormal signal has been previously detected.

  9. Assessment of numerical techniques for unsteady flow calculations

    NASA Technical Reports Server (NTRS)

    Hsieh, Kwang-Chung

    1989-01-01

    The characteristics of unsteady flow motions have long been a serious concern in the study of various fluid dynamic and combustion problems. With the advancement of computer resources, numerical approaches to these problems appear to be feasible. The objective of this paper is to assess the accuracy of several numerical schemes for unsteady flow calculations. In the present study, Fourier error analysis is performed for various numerical schemes based on a two-dimensional wave equation. Four methods sieved from the error analysis are then adopted for further assessment. Model problems include unsteady quasi-one-dimensional inviscid flows, two-dimensional wave propagations, and unsteady two-dimensional inviscid flows. According to the comparison between numerical and exact solutions, although second-order upwind scheme captures the unsteady flow and wave motions quite well, it is relatively more dissipative than sixth-order central difference scheme. Among various numerical approaches tested in this paper, the best performed one is Runge-Kutta method for time integration and six-order central difference for spatial discretization.

  10. A hybrid sales forecasting scheme by combining independent component analysis with K-means clustering and support vector regression.

    PubMed

    Lu, Chi-Jie; Chang, Chi-Chang

    2014-01-01

    Sales forecasting plays an important role in operating a business since it can be used to determine the required inventory level to meet consumer demand and avoid the problem of under/overstocking. Improving the accuracy of sales forecasting has become an important issue of operating a business. This study proposes a hybrid sales forecasting scheme by combining independent component analysis (ICA) with K-means clustering and support vector regression (SVR). The proposed scheme first uses the ICA to extract hidden information from the observed sales data. The extracted features are then applied to K-means algorithm for clustering the sales data into several disjoined clusters. Finally, the SVR forecasting models are applied to each group to generate final forecasting results. Experimental results from information technology (IT) product agent sales data reveal that the proposed sales forecasting scheme outperforms the three comparison models and hence provides an efficient alternative for sales forecasting.

  11. Predominant information quality scheme for the essential amino acids: an information-theoretical analysis.

    PubMed

    Esquivel, Rodolfo O; Molina-Espíritu, Moyocoyani; López-Rosa, Sheila; Soriano-Correa, Catalina; Barrientos-Salcedo, Carolina; Kohout, Miroslav; Dehesa, Jesús S

    2015-08-24

    In this work we undertake a pioneer information-theoretical analysis of 18 selected amino acids extracted from a natural protein, bacteriorhodopsin (1C3W). The conformational structures of each amino acid are analyzed by use of various quantum chemistry methodologies at high levels of theory: HF, M062X and CISD(Full). The Shannon entropy, Fisher information and disequilibrium are determined to grasp the spatial spreading features of delocalizability, order and uniformity of the optimized structures. These three entropic measures uniquely characterize all amino acids through a predominant information-theoretic quality scheme (PIQS), which gathers all chemical families by means of three major spreading features: delocalization, narrowness and uniformity. This scheme recognizes four major chemical families: aliphatic (delocalized), aromatic (delocalized), electro-attractive (narrowed) and tiny (uniform). All chemical families recognized by the existing energy-based classifications are embraced by this entropic scheme. Finally, novel chemical patterns are shown in the information planes associated with the PIQS entropic measures. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  12. A Hybrid Sales Forecasting Scheme by Combining Independent Component Analysis with K-Means Clustering and Support Vector Regression

    PubMed Central

    2014-01-01

    Sales forecasting plays an important role in operating a business since it can be used to determine the required inventory level to meet consumer demand and avoid the problem of under/overstocking. Improving the accuracy of sales forecasting has become an important issue of operating a business. This study proposes a hybrid sales forecasting scheme by combining independent component analysis (ICA) with K-means clustering and support vector regression (SVR). The proposed scheme first uses the ICA to extract hidden information from the observed sales data. The extracted features are then applied to K-means algorithm for clustering the sales data into several disjoined clusters. Finally, the SVR forecasting models are applied to each group to generate final forecasting results. Experimental results from information technology (IT) product agent sales data reveal that the proposed sales forecasting scheme outperforms the three comparison models and hence provides an efficient alternative for sales forecasting. PMID:25045738

  13. Robust ECC-based authenticated key agreement scheme with privacy protection for Telecare medicine information systems.

    PubMed

    Zhang, Liping; Zhu, Shaohui

    2015-05-01

    To protect the transmission of the sensitive medical data, a secure and efficient authenticated key agreement scheme should be deployed when the healthcare delivery session is established via Telecare Medicine Information Systems (TMIS) over the unsecure public network. Recently, Islam and Khan proposed an authenticated key agreement scheme using elliptic curve cryptography for TMIS. They claimed that their proposed scheme is provably secure against various attacks in random oracle model and enjoys some good properties such as user anonymity. In this paper, however, we point out that any legal but malicious patient can reveal other user's identity. Consequently, their scheme suffers from server spoofing attack and off-line password guessing attack. Moreover, if the malicious patient performs the same time of the registration as other users, she can further launch the impersonation attack, man-in-the-middle attack, modification attack, replay attack, and strong replay attack successfully. To eliminate these weaknesses, we propose an improved ECC-based authenticated key agreement scheme. Security analysis demonstrates that the proposed scheme can resist various attacks and enables the patient to enjoy the remote healthcare services with privacy protection. Through the performance evaluation, we show that the proposed scheme achieves a desired balance between security and performance in comparisons with other related schemes.

  14. Renormalization scheme dependence of high-order perturbative QCD predictions

    NASA Astrophysics Data System (ADS)

    Ma, Yang; Wu, Xing-Gang

    2018-02-01

    Conventionally, one adopts typical momentum flow of a physical observable as the renormalization scale for its perturbative QCD (pQCD) approximant. This simple treatment leads to renormalization scheme-and-scale ambiguities due to the renormalization scheme and scale dependence of the strong coupling and the perturbative coefficients do not exactly cancel at any fixed order. It is believed that those ambiguities will be softened by including more higher-order terms. In the paper, to show how the renormalization scheme dependence changes when more loop terms have been included, we discuss the sensitivity of pQCD prediction on the scheme parameters by using the scheme-dependent {βm ≥2}-terms. We adopt two four-loop examples, e+e-→hadrons and τ decays into hadrons, for detailed analysis. Our results show that under the conventional scale setting, by including more-and-more loop terms, the scheme dependence of the pQCD prediction cannot be reduced as efficiently as that of the scale dependence. Thus a proper scale-setting approach should be important to reduce the scheme dependence. We observe that the principle of minimum sensitivity could be such a scale-setting approach, which provides a practical way to achieve optimal scheme and scale by requiring the pQCD approximate be independent to the "unphysical" theoretical conventions.

  15. Chain-Based Communication in Cylindrical Underwater Wireless Sensor Networks

    PubMed Central

    Javaid, Nadeem; Jafri, Mohsin Raza; Khan, Zahoor Ali; Alrajeh, Nabil; Imran, Muhammad; Vasilakos, Athanasios

    2015-01-01

    Appropriate network design is very significant for Underwater Wireless Sensor Networks (UWSNs). Application-oriented UWSNs are planned to achieve certain objectives. Therefore, there is always a demand for efficient data routing schemes, which can fulfill certain requirements of application-oriented UWSNs. These networks can be of any shape, i.e., rectangular, cylindrical or square. In this paper, we propose chain-based routing schemes for application-oriented cylindrical networks and also formulate mathematical models to find a global optimum path for data transmission. In the first scheme, we devise four interconnected chains of sensor nodes to perform data communication. In the second scheme, we propose routing scheme in which two chains of sensor nodes are interconnected, whereas in third scheme single-chain based routing is done in cylindrical networks. After finding local optimum paths in separate chains, we find global optimum paths through their interconnection. Moreover, we develop a computational model for the analysis of end-to-end delay. We compare the performance of the above three proposed schemes with that of Power Efficient Gathering System in Sensor Information Systems (PEGASIS) and Congestion adjusted PEGASIS (C-PEGASIS). Simulation results show that our proposed 4-chain based scheme performs better than the other selected schemes in terms of network lifetime, end-to-end delay, path loss, transmission loss, and packet sending rate. PMID:25658394

  16. LDPC-PPM Coding Scheme for Optical Communication

    NASA Technical Reports Server (NTRS)

    Barsoum, Maged; Moision, Bruce; Divsalar, Dariush; Fitz, Michael

    2009-01-01

    In a proposed coding-and-modulation/demodulation-and-decoding scheme for a free-space optical communication system, an error-correcting code of the low-density parity-check (LDPC) type would be concatenated with a modulation code that consists of a mapping of bits to pulse-position-modulation (PPM) symbols. Hence, the scheme is denoted LDPC-PPM. This scheme could be considered a competitor of a related prior scheme in which an outer convolutional error-correcting code is concatenated with an interleaving operation, a bit-accumulation operation, and a PPM inner code. Both the prior and present schemes can be characterized as serially concatenated pulse-position modulation (SCPPM) coding schemes. Figure 1 represents a free-space optical communication system based on either the present LDPC-PPM scheme or the prior SCPPM scheme. At the transmitting terminal, the original data (u) are processed by an encoder into blocks of bits (a), and the encoded data are mapped to PPM of an optical signal (c). For the purpose of design and analysis, the optical channel in which the PPM signal propagates is modeled as a Poisson point process. At the receiving terminal, the arriving optical signal (y) is demodulated to obtain an estimate (a^) of the coded data, which is then processed by a decoder to obtain an estimate (u^) of the original data.

  17. Dropping out of Ethiopia's community-based health insurance scheme.

    PubMed

    Mebratie, Anagaw D; Sparrow, Robert; Yilma, Zelalem; Alemu, Getnet; Bedi, Arjun S

    2015-12-01

    Low contract renewal rates have been identified as one of the challenges facing the development of community-based health insurance (CBHI) schemes. This article uses longitudinal household survey data gathered in 2012 and 2013 to examine dropout in the case of Ethiopia's pilot CBHI scheme. We treat dropout as a function of scheme affordability, health status, scheme understanding and quality of care. The scheme saw enrolment increase from 41% 1 year after inception to 48% a year later. An impressive 82% of those who enrolled in the first year renewed their subscriptions, while 25% who had not enrolled joined the scheme. The analysis shows that socioeconomic status, a greater understanding of health insurance and experience with and knowledge of the CBHI scheme are associated with lower dropout rates. While there are concerns about the quality of care and the treatment meted out to the insured by providers, the overall picture is that returns from the scheme are overwhelmingly positive. For the bulk of households, premiums do not seem to be onerous, basic understanding of health insurance is high and almost all those who are currently enrolled signalled their desire to renew contracts. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine © The Author 2015; all rights reserved.

  18. Sensitivity experiments of a regional climate model to the different convective schemes over Central Africa

    NASA Astrophysics Data System (ADS)

    Armand J, K. M.

    2017-12-01

    In this study, version 4 of the regional climate model (RegCM4) is used to perform 6 years simulation including one year for spin-up (from January 2001 to December 2006) over Central Africa using four convective schemes: The Emmanuel scheme (MIT), the Grell scheme with Arakawa-Schulbert closure assumption (GAS), the Grell scheme with Fritsch-Chappell closure assumption (GFC) and the Anthes-Kuo scheme (Kuo). We have investigated the ability of the model to simulate precipitation, surface temperature, wind and aerosols optical depth. Emphasis in the model results were made in December-January-February (DJF) and July-August-September (JAS) periods. Two subregions have been identified for more specific analysis namely: zone 1 which corresponds to the sahel region mainly classified as desert and steppe and zone 2 which is a region spanning the tropical rain forest and is characterised by a bimodal rain regime. We found that regardless of periods or simulated parameters, MIT scheme generally has a tendency to overestimate. The GAS scheme is more suitable in simulating the aforementioned parameters, as well as the diurnal cycle of precipitations everywhere over the study domain irrespective of the season. In JAS, model results are similar in the representation of regional wind circulation. Apart from the MIT scheme, all the convective schemes give the same trends in aerosols optical depth simulations. Additional experiment reveals that the use of BATS instead of Zeng scheme to calculate ocean flux appears to improve the quality of the model simulations.

  19. A Novel Passive Tracking Scheme Exploiting Geometric and Intercept Theorems

    PubMed Central

    Zhou, Biao; Sun, Chao; Ahn, Deockhyeon; Kim, Youngok

    2018-01-01

    Passive tracking aims to track targets without assistant devices, that is, device-free targets. Passive tracking based on Radio Frequency (RF) Tomography in wireless sensor networks has recently been addressed as an emerging field. The passive tracking scheme using geometric theorems (GTs) is one of the most popular RF Tomography schemes, because the GT-based method can effectively mitigate the demand for a high density of wireless nodes. In the GT-based tracking scheme, the tracking scenario is considered as a two-dimensional geometric topology and then geometric theorems are applied to estimate crossing points (CPs) of the device-free target on line-of-sight links (LOSLs), which reveal the target’s trajectory information in a discrete form. In this paper, we review existing GT-based tracking schemes, and then propose a novel passive tracking scheme by exploiting the Intercept Theorem (IT). To create an IT-based CP estimation scheme available in the noisy non-parallel LOSL situation, we develop the equal-ratio traverse (ERT) method. Finally, we analyze properties of three GT-based tracking algorithms and the performance of these schemes is evaluated experimentally under various trajectories, node densities, and noisy topologies. Analysis of experimental results shows that tracking schemes exploiting geometric theorems can achieve remarkable positioning accuracy even under rather a low density of wireless nodes. Moreover, the proposed IT scheme can provide generally finer tracking accuracy under even lower node density and noisier topologies, in comparison to other schemes. PMID:29562621

  20. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  1. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    PubMed Central

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  2. Phylogenomic Study of Burkholderia glathei-like Organisms, Proposal of 13 Novel Burkholderia Species and Emended Descriptions of Burkholderia sordidicola, Burkholderia zhejiangensis, and Burkholderia grimmiae

    PubMed Central

    Peeters, Charlotte; Meier-Kolthoff, Jan P.; Verheyde, Bart; De Brandt, Evie; Cooper, Vaughn S.; Vandamme, Peter

    2016-01-01

    Partial gyrB gene sequence analysis of 17 isolates from human and environmental sources revealed 13 clusters of strains and identified them as Burkholderia glathei clade (BGC) bacteria. The taxonomic status of these clusters was examined by whole-genome sequence analysis, determination of the G+C content, whole-cell fatty acid analysis and biochemical characterization. The whole-genome sequence-based phylogeny was assessed using the Genome Blast Distance Phylogeny (GBDP) method and an extended multilocus sequence analysis (MLSA) approach. The results demonstrated that these 17 BGC isolates represented 13 novel Burkholderia species that could be distinguished by both genotypic and phenotypic characteristics. BGC strains exhibited a broad metabolic versatility and developed beneficial, symbiotic, and pathogenic interactions with different hosts. Our data also confirmed that there is no phylogenetic subdivision in the genus Burkholderia that distinguishes beneficial from pathogenic strains. We therefore propose to formally classify the 13 novel BGC Burkholderia species as Burkholderia arvi sp. nov. (type strain LMG 29317T = CCUG 68412T), Burkholderia hypogeia sp. nov. (type strain LMG 29322T = CCUG 68407T), Burkholderia ptereochthonis sp. nov. (type strain LMG 29326T = CCUG 68403T), Burkholderia glebae sp. nov. (type strain LMG 29325T = CCUG 68404T), Burkholderia pedi sp. nov. (type strain LMG 29323T = CCUG 68406T), Burkholderia arationis sp. nov. (type strain LMG 29324T = CCUG 68405T), Burkholderia fortuita sp. nov. (type strain LMG 29320T = CCUG 68409T), Burkholderia temeraria sp. nov. (type strain LMG 29319T = CCUG 68410T), Burkholderia calidae sp. nov. (type strain LMG 29321T = CCUG 68408T), Burkholderia concitans sp. nov. (type strain LMG 29315T = CCUG 68414T), Burkholderia turbans sp. nov. (type strain LMG 29316T = CCUG 68413T), Burkholderia catudaia sp. nov. (type strain LMG 29318T = CCUG 68411T) and Burkholderia peredens sp. nov. (type strain LMG 29314T = CCUG 68415T). Furthermore, we present emended descriptions of the species Burkholderia sordidicola, Burkholderia zhejiangensis and Burkholderia grimmiae. The GenBank/EMBL/DDBJ accession numbers for the 16S rRNA and gyrB gene sequences determined in this study are LT158612-LT158624 and LT158625-LT158641, respectively. PMID:27375597

  3. Effect of exercise referral schemes in primary care on physical activity and improving health outcomes: systematic review and meta-analysis

    PubMed Central

    Taylor, A H; Fox, K R; Hillsdon, M; Anokye, N; Campbell, J L; Foster, C; Green, C; Moxham, T; Mutrie, N; Searle, J; Trueman, P; Taylor, R S

    2011-01-01

    Objective To assess the impact of exercise referral schemes on physical activity and health outcomes. Design Systematic review and meta-analysis. Data sources Medline, Embase, PsycINFO, Cochrane Library, ISI Web of Science, SPORTDiscus, and ongoing trial registries up to October 2009. We also checked study references. Study selection Design: randomised controlled trials or non-randomised controlled (cluster or individual) studies published in peer review journals. Population: sedentary individuals with or without medical diagnosis. Exercise referral schemes defined as: clear referrals by primary care professionals to third party service providers to increase physical activity or exercise, physical activity or exercise programmes tailored to individuals, and initial assessment and monitoring throughout programmes. Comparators: usual care, no intervention, or alternative exercise referral schemes. Results Eight randomised controlled trials met the inclusion criteria, comparing exercise referral schemes with usual care (six trials), alternative physical activity intervention (two), and an exercise referral scheme plus a self determination theory intervention (one). Compared with usual care, follow-up data for exercise referral schemes showed an increased number of participants who achieved 90-150 minutes of physical activity of at least moderate intensity per week (pooled relative risk 1.16, 95% confidence intervals 1.03 to 1.30) and a reduced level of depression (pooled standardised mean difference −0.82, −1.28 to −0.35). Evidence of a between group difference in physical activity of moderate or vigorous intensity or in other health outcomes was inconsistent at follow-up. We did not find any difference in outcomes between exercise referral schemes and the other two comparator groups. None of the included trials separately reported outcomes in individuals with specific medical diagnoses.Substantial heterogeneity in the quality and nature of the exercise referral schemes across studies might have contributed to the inconsistency in outcome findings. Conclusions Considerable uncertainty remains as to the effectiveness of exercise referral schemes for increasing physical activity, fitness, or health indicators, or whether they are an efficient use of resources for sedentary people with or without a medical diagnosis. PMID:22058134

  4. Evaluation of the impact of observations on blended sea surface winds in a two-dimensional variational scheme using degrees of freedom

    NASA Astrophysics Data System (ADS)

    Wang, Ting; Xiang, Jie; Fei, Jianfang; Wang, Yi; Liu, Chunxia; Li, Yuanxiang

    2017-12-01

    This paper presents an evaluation of the observational impacts on blended sea surface winds from a two-dimensional variational data assimilation (2D-Var) scheme. We begin by briefly introducing the analysis sensitivity with respect to observations in variational data assimilation systems and its relationship with the degrees of freedom for signal (DFS), and then the DFS concept is applied to the 2D-Var sea surface wind blending scheme. Two methods, a priori and a posteriori, are used to estimate the DFS of the zonal ( u) and meridional ( v) components of winds in the 2D-Var blending scheme. The a posteriori method can obtain almost the same results as the a priori method. Because only by-products of the blending scheme are used for the a posteriori method, the computation time is reduced significantly. The magnitude of the DFS is critically related to the observational and background error statistics. Changing the observational and background error variances can affect the DFS value. Because the observation error variances are assumed to be uniform, the observational influence at each observational location is related to the background error variance, and the observations located at the place where there are larger background error variances have larger influences. The average observational influence of u and v with respect to the analysis is about 40%, implying that the background influence with respect to the analysis is about 60%.

  5. The social benefits of WEEE re-use schemes. A cost benefit analysis for PCs in Spain.

    PubMed

    González, Xose Manuel; Rodríguez, Miguel; Pena-Boquete, Yolanda

    2017-06-01

    One goal of the new European legislation set out in WEEE Directive 2012/19/UE is the promotion of WEEE re-use schemes. However, some authors are rather sceptical about the contribution of WEEE re-use schemes to improve resource efficiency. In order to evaluate and to design adequate policy instruments, some authors recommend the cost-benefit analysis (CBA) as a compulsory first step. In this context, the main contribution of this paper is to enlarge the empirical literature by providing a CBA of re-use schemes versus recycling processes of PCs. The analysis is made for Spain by quantifying in monetary terms the social damages of environmental impacts such as climate change, human toxicity, particulate matter formation, metal depletion, etc. Our results suggest that promoting re-use against recycling (and consequently the need for manufacturing a new PC from raw materials) may reduce environmental costs by 45.20€ per PC. Those social benefits are mainly generated in the re-use preparation process and distribution activities, whereas the re-use scenario displays a worse performance in energy consumption. The difference in the distribution stage during the second life cycle originates from the fact that the ready to re-use product is produced locally, while the brand new product is manufactured and distributed from abroad, mainly Asia. These results provide valuable information to policymakers and think tanks willing to design support schemes for re-use over recycling operations. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Dynamic downscaling over western Himalayas: Impact of cloud microphysics schemes

    NASA Astrophysics Data System (ADS)

    Tiwari, Sarita; Kar, Sarat C.; Bhatla, R.

    2018-03-01

    Due to lack of observation data in the region of inhomogeneous terrain of the Himalayas, detailed climate of Himalayas is still unknown. Global reanalysis data are too coarse to represent the hydroclimate over the region with sharp orography gradient in the western Himalayas. In the present study, dynamic downscaling of the European Centre for Medium-Range Weather Forecast (ECMWF) Reanalysis-Interim (ERA-I) dataset over the western Himalayas using high-resolution Weather Research and Forecast (WRF) model has been carried out. Sensitivity studies have also been carried out using convection and microphysics parameterization schemes. The WRF model simulations have been compared against ERA-I and available station observations. Analysis of the results suggests that the WRF model has simulated the hydroclimate of the region well. It is found that in the simulations that the impact of convection scheme is more during summer months than in winter. Examination of simulated results using various microphysics schemes reveal that the WRF single-moment class-6 (WSM6) scheme simulates more precipitation on the upwind region of the high mountain than that in the Morrison and Thompson schemes during the winter period. Vertical distribution of various hydrometeors shows that there are large differences in mixing ratios of ice, snow and graupel in the simulations with different microphysics schemes. The ice mixing ratio in Morrison scheme is more than WSM6 above 400 hPa. The Thompson scheme favors formation of more snow than WSM6 or Morrison schemes while the Morrison scheme has more graupel formation than other schemes.

  7. Some results on numerical methods for hyperbolic conservation laws

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang Huanan.

    1989-01-01

    This dissertation contains some results on the numerical solutions of hyperbolic conservation laws. (1) The author introduced an artificial compression method as a correction to the basic ENO schemes. The method successfully prevents contact discontinuities from being smeared. This is achieved by increasing the slopes of the ENO reconstructions in such a way that the essentially non-oscillatory property of the schemes is kept. He analyzes the non-oscillatory property of the new artificial compression method by applying it to the UNO scheme which is a second order accurate ENO scheme, and proves that the resulting scheme is indeed non-oscillatory. Extensive 1-Dmore » numerical results and some preliminary 2-D ones are provided to show the strong performance of the method. (2) He combines the ENO schemes and the centered difference schemes into self-adjusting hybrid schemes which will be called the localized ENO schemes. At or near the jumps, he uses the ENO schemes with the field by field decompositions, otherwise he simply uses the centered difference schemes without the field by field decompositions. The method involves a new interpolation analysis. In the numerical experiments on several standard test problems, the quality of the numerical results of this method is close to that of the pure ENO results. The localized ENO schemes can be equipped with the above artificial compression method. In this way, he dramatically improves the resolutions of the contact discontinuities at very little additional costs. (3) He introduces a space-time mesh refinement method for time dependent problems.« less

  8. Effects of color scheme and message lines of variable message signs on driver performance.

    PubMed

    Lai, Chien-Jung

    2010-07-01

    The advancement in variable message signs (VMS) technology has made it possible to display message with various formats. This study presented an ergonomic study on the message design of Chinese variable message signs on urban roads in Taiwan. Effects of color scheme (one, two and three) and number of message lines (single, double and triple) of VMS on participants' response performance were investigated through a laboratory experiment. Results of analysis showed that color scheme and number of message lines are significant factors for participants' response time to VMS. Participants responded faster for two-color than for one- and three-color scheme. Participants also took less response time for double line message than for single and triple line message. Both color scheme and number of message lines had no significant effect on participants' response accuracy. The preference survey after the experiment showed that most participants preferred two-color scheme and double line message to the other combinations. The results can assist in adopting appropriate color scheme and number of message lines of Chinese VMS. Copyright 2009 Elsevier Ltd. All rights reserved.

  9. Matching soil salinization and cropping systems in communally managed irrigation schemes

    NASA Astrophysics Data System (ADS)

    Malota, Mphatso; Mchenga, Joshua

    2018-03-01

    Occurrence of soil salinization in irrigation schemes can be a good indicator to introduce high salt tolerant crops in irrigation schemes. This study assessed the level of soil salinization in a communally managed 233 ha Nkhate irrigation scheme in the Lower Shire Valley region of Malawi. Soil samples were collected within the 0-0.4 m soil depth from eight randomly selected irrigation blocks. Irrigation water samples were also collected from five randomly selected locations along the Nkhate River which supplies irrigation water to the scheme. Salinity of both the soil and the irrigation water samples was determined using an electrical conductivity (EC) meter. Analysis of the results indicated that even for very low salinity tolerant crops (ECi < 2 dS/m), the irrigation water was suitable for irrigation purposes. However, root-zone soil salinity profiles depicted that leaching of salts was not adequate and that the leaching requirement for the scheme needs to be relooked and always be adhered to during irrigation operation. The study concluded that the crop system at the scheme needs to be adjusted to match with prevailing soil and irrigation water salinity levels.

  10. TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs

    PubMed Central

    Hu, Hao; Lu, Rongxing; Huang, Cheng; Zhang, Zonghua

    2016-01-01

    In this paper, we propose a trust-based vehicular platoon crowdsensing scheme, named TripSense, in VANET. The proposed TripSense scheme introduces a trust-based system to evaluate vehicles’ sensing abilities and then selects the more capable vehicles in order to improve sensing results accuracy. In addition, the sensing tasks are accomplished by platoon member vehicles and preprocessed by platoon head vehicles before the data are uploaded to server. Hence, it is less time-consuming and more efficient compared with the way where the data are submitted by individual platoon member vehicles. Hence it is more suitable in ephemeral networks like VANET. Moreover, our proposed TripSense scheme integrates unlinkable pseudo-ID techniques to achieve PM vehicle identity privacy, and employs a privacy-preserving sensing vehicle selection scheme without involving the PM vehicle’s trust score to keep its location privacy. Detailed security analysis shows that our proposed TripSense scheme not only achieves desirable privacy requirements but also resists against attacks launched by adversaries. In addition, extensive simulations are conducted to show the correctness and effectiveness of our proposed scheme. PMID:27258287

  11. A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6

    NASA Astrophysics Data System (ADS)

    You, Ilsun; Sakurai, Kouichi; Hori, Yoshiaki

    Recently, the security scheme, proposed by Kempf and Koodli, has been adopted as a security standard for Fast handover for Mobile IPv6. But, it does not prevent denial of service attacks while resulting in high computation cost. More importantly, we find that it is still vulnerable to redirection attacks because it fails to secure the Unsolicited Neighbor Advertisement messages. In this paper, Kempf-Koodli's scheme is formally analyzed through BAN-logic and its weaknesses are demonstrated.

  12. Semiclassical approximation of the Wheeler-DeWitt equation: arbitrary orders and the question of unitarity

    NASA Astrophysics Data System (ADS)

    Kiefer, Claus; Wichmann, David

    2018-06-01

    We extend the Born-Oppenheimer type of approximation scheme for the Wheeler-DeWitt equation of canonical quantum gravity to arbitrary orders in the inverse Planck mass squared. We discuss in detail the origin of unitarity violation in this scheme and show that unitarity can be restored by an appropriate modification which requires back reaction from matter onto the gravitational sector. In our analysis, we heavily rely on the gauge aspects of the standard Born-Oppenheimer scheme in molecular physics.

  13. A proposed harmonized LPS molecular-subtyping scheme for Cronobacter species.

    PubMed

    Yan, Qiongqiong; Jarvis, Karen G; Chase, Hannah R; Hébert, Karine; Trach, Larisa H; Lee, Chloe; Sadowski, Jennifer; Lee, Boram; Hwang, Seongeun; Sathyamoorthy, Venugopal; Mullane, Niall; Pava-Ripoll, Monica; Iversen, Carol; Pagotto, Franco; Fanning, Séamus; Tall, Ben D

    2015-09-01

    Cronobacter are opportunistic pathogens, which cause infections in all age groups. To aid the characterization of Cronobacter in foods and environments a harmonized LPS identification scheme for molecular serotyping is needed. To this end, we studied 409 Cronobacter isolates representing the seven Cronobacter species using two previously reported molecular serotyping schemes, described here as Mullane-Jarvis (M-J) and Sun schemes. PCR analysis revealed many overlapping results that were obtained when independently applying the two serotyping schemes. There were complete agreements between the two PCR schemes for Cronobacter sakazakii (Csak) O:1, Csak O:3, and Csak O:7 serotypes. However, only thirty-five of 41 Csak O:4 strains, identified using the M-J scheme, were PCR-positive with the Sun scheme primers. Also the Sun scheme Csak O:5 primers failed to identify this serotype in any of the C. sakazakii strains tested, but did recognize seven Cronobacter turicensis strains, which were identified as Ctur O:3 using the M-J scheme. Similarly, the Sun scheme Csak O:6 primers recognized 30 Cronobacter malonaticus O:2 strains identified with the M-J scheme, but failed to identify this serotype in any C. sakazakii strain investigated. In this report, these findings are summarized and a harmonized molecular-serotyping scheme is proposed which is predicated on the correct identification of Cronobacter species, prior to serotype determination. In summary, fourteen serotypes were identified using the combined protocol, which consists of Csak O:1-O:4, and Csak O:7; Cmal O:1-O:2; Cdub O:1-O:2, Cmuy O:1-O:2, Cuni O:1, as well as Ctur O:1 and Ctur O:3. Published by Elsevier Ltd.

  14. Higher Education Quality Assessment in China: An Impact Study

    ERIC Educational Resources Information Center

    Liu, Shuiyun

    2015-01-01

    This research analyses an external higher education quality assessment scheme in China, namely, the Quality Assessment of Undergraduate Education (QAUE) scheme. Case studies were conducted in three Chinese universities with different statuses. Analysis shows that the evaluated institutions responded to the external requirements of the QAUE…

  15. Comparative analysis of core genome MLST and SNP typing within a European Salmonella serovar Enteritidis outbreak.

    PubMed

    Pearce, Madison E; Alikhan, Nabil-Fareed; Dallman, Timothy J; Zhou, Zhemin; Grant, Kathie; Maiden, Martin C J

    2018-06-02

    Multi-country outbreaks of foodborne bacterial disease present challenges in their detection, tracking, and notification. As food is increasingly distributed across borders, such outbreaks are becoming more common. This increases the need for high-resolution, accessible, and replicable isolate typing schemes. Here we evaluate a core genome multilocus typing (cgMLST) scheme for the high-resolution reproducible typing of Salmonella enterica (S. enterica) isolates, by its application to a large European outbreak of S. enterica serovar Enteritidis. This outbreak had been extensively characterised using single nucleotide polymorphism (SNP)-based approaches. The cgMLST analysis was congruent with the original SNP-based analysis, the epidemiological data, and whole genome MLST (wgMLST) analysis. Combination of the cgMLST and epidemiological data confirmed that the genetic diversity among the isolates predated the outbreak, and was likely present at the infection source. There was consequently no link between country of isolation and genetic diversity, but the cgMLST clusters were congruent with date of isolation. Furthermore, comparison with publicly available Enteritidis isolate data demonstrated that the cgMLST scheme presented is highly scalable, enabling outbreaks to be contextualised within the Salmonella genus. The cgMLST scheme is therefore shown to be a standardised and scalable typing method, which allows Salmonella outbreaks to be analysed and compared across laboratories and jurisdictions. Copyright © 2018. Published by Elsevier B.V.

  16. A study of the response of nonlinear springs

    NASA Technical Reports Server (NTRS)

    Hyer, M. W.; Knott, T. W.; Johnson, E. R.

    1991-01-01

    The various phases to developing a methodology for studying the response of a spring-reinforced arch subjected to a point load are discussed. The arch is simply supported at its ends with both the spring and the point load assumed to be at midspan. The spring is present to off-set the typical snap through behavior normally associated with arches, and to provide a structure that responds with constant resistance over a finite displacement. The various phases discussed consist of the following: (1) development of the closed-form solution for the shallow arch case; (2) development of a finite difference analysis to study (shallow) arches; and (3) development of a finite element analysis for studying more general shallow and nonshallow arches. The two numerical analyses rely on a continuation scheme to move the solution past limit points, and to move onto bifurcated paths, both characteristics being common to the arch problem. An eigenvalue method is used for a continuation scheme. The finite difference analysis is based on a mixed formulation (force and displacement variables) of the governing equations. The governing equations for the mixed formulation are in first order form, making the finite difference implementation convenient. However, the mixed formulation is not well-suited for the eigenvalue continuation scheme. This provided the motivation for the displacement based finite element analysis. Both the finite difference and the finite element analyses are compared with the closed form shallow arch solution. Agreement is excellent, except for the potential problems with the finite difference analysis and the continuation scheme. Agreement between the finite element analysis and another investigator's numerical analysis for deep arches is also good.

  17. Multistage Schemes with Multigrid for Euler and Navier-Strokes Equations: Components and Analysis

    NASA Technical Reports Server (NTRS)

    Swanson, R. C.; Turkel, Eli

    1997-01-01

    A class of explicit multistage time-stepping schemes with centered spatial differencing and multigrids are considered for the compressible Euler and Navier-Stokes equations. These schemes are the basis for a family of computer programs (flow codes with multigrid (FLOMG) series) currently used to solve a wide range of fluid dynamics problems, including internal and external flows. In this paper, the components of these multistage time-stepping schemes are defined, discussed, and in many cases analyzed to provide additional insight into their behavior. Special emphasis is given to numerical dissipation, stability of Runge-Kutta schemes, and the convergence acceleration techniques of multigrid and implicit residual smoothing. Both the Baldwin and Lomax algebraic equilibrium model and the Johnson and King one-half equation nonequilibrium model are used to establish turbulence closure. Implementation of these models is described.

  18. Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency

    NASA Astrophysics Data System (ADS)

    Mohaisen, Abedelaziz; Jho, Nam-Su; Hong, Dowon; Nyang, Daehun

    Privacy preserving association rule mining algorithms have been designed for discovering the relations between variables in data while maintaining the data privacy. In this article we revise one of the recently introduced schemes for association rule mining using fake transactions (FS). In particular, our analysis shows that the FS scheme has exhaustive storage and high computation requirements for guaranteeing a reasonable level of privacy. We introduce a realistic definition of privacy that benefits from the average case privacy and motivates the study of a weakness in the structure of FS by fake transactions filtering. In order to overcome this problem, we improve the FS scheme by presenting a hybrid scheme that considers both privacy and resources as two concurrent guidelines. Analytical and empirical results show the efficiency and applicability of our proposed scheme.

  19. Performance analysis of a cascaded coding scheme with interleaved outer code

    NASA Technical Reports Server (NTRS)

    Lin, S.

    1986-01-01

    A cascaded coding scheme for a random error channel with a bit-error rate is analyzed. In this scheme, the inner code C sub 1 is an (n sub 1, m sub 1l) binary linear block code which is designed for simultaneous error correction and detection. The outer code C sub 2 is a linear block code with symbols from the Galois field GF (2 sup l) which is designed for correcting both symbol errors and erasures, and is interleaved with a degree m sub 1. A procedure for computing the probability of a correct decoding is presented and an upper bound on the probability of a decoding error is derived. The bound provides much better results than the previous bound for a cascaded coding scheme with an interleaved outer code. Example schemes with inner codes ranging from high rates to very low rates are evaluated. Several schemes provide extremely high reliability even for very high bit-error rates say 10 to the -1 to 10 to the -2 power.

  20. Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks.

    PubMed

    Kim, Jiye; Lee, Donghoon; Jeon, Woongryul; Lee, Youngsook; Won, Dongho

    2014-04-09

    User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.

  1. Modeling and Analysis of Hybrid Cellular/WLAN Systems with Integrated Service-Based Vertical Handoff Schemes

    NASA Astrophysics Data System (ADS)

    Xia, Weiwei; Shen, Lianfeng

    We propose two vertical handoff schemes for cellular network and wireless local area network (WLAN) integration: integrated service-based handoff (ISH) and integrated service-based handoff with queue capabilities (ISHQ). Compared with existing handoff schemes in integrated cellular/WLAN networks, the proposed schemes consider a more comprehensive set of system characteristics such as different features of voice and data services, dynamic information about the admitted calls, user mobility and vertical handoffs in two directions. The code division multiple access (CDMA) cellular network and IEEE 802.11e WLAN are taken into account in the proposed schemes. We model the integrated networks by using multi-dimensional Markov chains and the major performance measures are derived for voice and data services. The important system parameters such as thresholds to prioritize handoff voice calls and queue sizes are optimized. Numerical results demonstrate that the proposed ISHQ scheme can maximize the utilization of overall bandwidth resources with the best quality of service (QoS) provisioning for voice and data services.

  2. Goose management schemes to resolve conflicts with agriculture: Theory, practice and effects.

    PubMed

    Eythórsson, Einar; Tombre, Ingunn M; Madsen, Jesper

    2017-03-01

    In 2012, the four countries hosting the Svalbard population of pink-footed goose Anser brachyrhynchus along its flyway launched an International Species Management Plan for the population. One of the aims was to reduce conflicts between geese and agriculture to an acceptable level. Since 2006, Norway has offered subsidies to farmers that provide refuge areas for geese on their land. We evaluate the mid-Norwegian goose management subsidy scheme, with a view to its adjustment to prevailing ecological and socio-economic parameters. The analysis indicates that the legitimacy of the scheme is highly dependent on transparency of knowledge management and accountability of management scheme to the farming community. Among farmers, as well as front-line officials, outcomes of prioritisation processes within the scheme are judged unfair when there is an evident mismatch between payments and genuine damage. We suggest how the scheme can be made more fair and responsive to ecological changes, within a framework of adaptive management.

  3. Multi-dimensional high order essentially non-oscillatory finite difference methods in generalized coordinates

    NASA Technical Reports Server (NTRS)

    Shu, Chi-Wang

    1992-01-01

    The nonlinear stability of compact schemes for shock calculations is investigated. In recent years compact schemes were used in various numerical simulations including direct numerical simulation of turbulence. However to apply them to problems containing shocks, one has to resolve the problem of spurious numerical oscillation and nonlinear instability. A framework to apply nonlinear limiting to a local mean is introduced. The resulting scheme can be proven total variation (1D) or maximum norm (multi D) stable and produces nice numerical results in the test cases. The result is summarized in the preprint entitled 'Nonlinearly Stable Compact Schemes for Shock Calculations', which was submitted to SIAM Journal on Numerical Analysis. Research was continued on issues related to two and three dimensional essentially non-oscillatory (ENO) schemes. The main research topics include: parallel implementation of ENO schemes on Connection Machines; boundary conditions; shock interaction with hydrogen bubbles, a preparation for the full combustion simulation; and direct numerical simulation of compressible sheared turbulence.

  4. A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing-Enhanced Location-Based Service

    PubMed Central

    Yin, Fan; Tang, Xiaohu

    2017-01-01

    Location-based services (LBS), as one of the most popular location-awareness applications, has been further developed to achieve low-latency with the assistance of fog computing. However, privacy issues remain a research challenge in the context of fog computing. Therefore, in this paper, we present a fine-grained and privacy-preserving query scheme for fog computing-enhanced location-based services, hereafter referred to as FGPQ. In particular, mobile users can obtain the fine-grained searching result satisfying not only the given spatial range but also the searching content. Detailed privacy analysis shows that our proposed scheme indeed achieves the privacy preservation for the LBS provider and mobile users. In addition, extensive performance analyses and experiments demonstrate that the FGPQ scheme can significantly reduce computational and communication overheads and ensure the low-latency, which outperforms existing state-of-the art schemes. Hence, our proposed scheme is more suitable for real-time LBS searching. PMID:28696395

  5. A New Quantum Gray-Scale Image Encoding Scheme

    NASA Astrophysics Data System (ADS)

    Naseri, Mosayeb; Abdolmaleky, Mona; Parandin, Fariborz; Fatahi, Negin; Farouk, Ahmed; Nazari, Reza

    2018-02-01

    In this paper, a new quantum images encoding scheme is proposed. The proposed scheme mainly consists of four different encoding algorithms. The idea behind of the scheme is a binary key generated randomly for each pixel of the original image. Afterwards, the employed encoding algorithm is selected corresponding to the qubit pair of the generated randomized binary key. The security analysis of the proposed scheme proved its enhancement through both randomization of the generated binary image key and altering the gray-scale value of the image pixels using the qubits of randomized binary key. The simulation of the proposed scheme assures that the final encoded image could not be recognized visually. Moreover, the histogram diagram of encoded image is flatter than the original one. The Shannon entropies of the final encoded images are significantly higher than the original one, which indicates that the attacker can not gain any information about the encoded images. Supported by Kermanshah Branch, Islamic Azad University, Kermanshah, IRAN

  6. Error Reduction Program. [combustor performance evaluation codes

    NASA Technical Reports Server (NTRS)

    Syed, S. A.; Chiappetta, L. M.; Gosman, A. D.

    1985-01-01

    The details of a study to select, incorporate and evaluate the best available finite difference scheme to reduce numerical error in combustor performance evaluation codes are described. The combustor performance computer programs chosen were the two dimensional and three dimensional versions of Pratt & Whitney's TEACH code. The criteria used to select schemes required that the difference equations mirror the properties of the governing differential equation, be more accurate than the current hybrid difference scheme, be stable and economical, be compatible with TEACH codes, use only modest amounts of additional storage, and be relatively simple. The methods of assessment used in the selection process consisted of examination of the difference equation, evaluation of the properties of the coefficient matrix, Taylor series analysis, and performance on model problems. Five schemes from the literature and three schemes developed during the course of the study were evaluated. This effort resulted in the incorporation of a scheme in 3D-TEACH which is usuallly more accurate than the hybrid differencing method and never less accurate.

  7. Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks

    PubMed Central

    Kim, Jiye; Lee, Donghoon; Jeon, Woongryul; Lee, Youngsook; Won, Dongho

    2014-01-01

    User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes. PMID:24721764

  8. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks

    PubMed Central

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant’s profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes. PMID:27337001

  9. A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing-Enhanced Location-Based Service.

    PubMed

    Yang, Xue; Yin, Fan; Tang, Xiaohu

    2017-07-11

    Location-based services (LBS), as one of the most popular location-awareness applications, has been further developed to achieve low-latency with the assistance of fog computing. However, privacy issues remain a research challenge in the context of fog computing. Therefore, in this paper, we present a fine-grained and privacy-preserving query scheme for fog computing-enhanced location-based services, hereafter referred to as FGPQ. In particular, mobile users can obtain the fine-grained searching result satisfying not only the given spatial range but also the searching content. Detailed privacy analysis shows that our proposed scheme indeed achieves the privacy preservation for the LBS provider and mobile users. In addition, extensive performance analyses and experiments demonstrate that the FGPQ scheme can significantly reduce computational and communication overheads and ensure the low-latency, which outperforms existing state-of-the art schemes. Hence, our proposed scheme is more suitable for real-time LBS searching.

  10. An implicit spatial and high-order temporal finite difference scheme for 2D acoustic modelling

    NASA Astrophysics Data System (ADS)

    Wang, Enjiang; Liu, Yang

    2018-01-01

    The finite difference (FD) method exhibits great superiority over other numerical methods due to its easy implementation and small computational requirement. We propose an effective FD method, characterised by implicit spatial and high-order temporal schemes, to reduce both the temporal and spatial dispersions simultaneously. For the temporal derivative, apart from the conventional second-order FD approximation, a special rhombus FD scheme is included to reach high-order accuracy in time. Compared with the Lax-Wendroff FD scheme, this scheme can achieve nearly the same temporal accuracy but requires less floating-point operation times and thus less computational cost when the same operator length is adopted. For the spatial derivatives, we adopt the implicit FD scheme to improve the spatial accuracy. Apart from the existing Taylor series expansion-based FD coefficients, we derive the least square optimisation based implicit spatial FD coefficients. Dispersion analysis and modelling examples demonstrate that, our proposed method can effectively decrease both the temporal and spatial dispersions, thus can provide more accurate wavefields.

  11. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

    PubMed

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes.

  12. Semi-quantum Secure Direct Communication Scheme Based on Bell States

    NASA Astrophysics Data System (ADS)

    Xie, Chen; Li, Lvzhou; Situ, Haozhen; He, Jianhao

    2018-06-01

    Recently, the idea of semi-quantumness has been often used in designing quantum cryptographic schemes, which allows some of the participants of a quantum cryptographic scheme to remain classical. One of the reasons why this idea is popular is that it allows a quantum information processing task to be accomplished by using quantum resources as few as possible. In this paper, we extend the idea to quantum secure direct communication(QSDC) by proposing a semi-quantum secure direct communication scheme. In the scheme, the message sender, Alice, encodes each bit into a Bell state |φ+> = 1/{√2}(|00> +|11> ) or |{Ψ }+> = 1/{√ 2}(|01> +|10> ), and the message receiver, Bob, who is classical in the sense that he can either let the qubit he received reflect undisturbed, or measure the qubit in the computational basis |0>, |1> and then resend it in the state he found. Moreover, the security analysis of our scheme is also given.

  13. Efficient bit sifting scheme of post-processing in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Li, Qiong; Le, Dan; Wu, Xianyan; Niu, Xiamu; Guo, Hong

    2015-10-01

    Bit sifting is an important step in the post-processing of quantum key distribution (QKD). Its function is to sift out the undetected original keys. The communication traffic of bit sifting has essential impact on the net secure key rate of a practical QKD system. In this paper, an efficient bit sifting scheme is presented, of which the core is a lossless source coding algorithm. Both theoretical analysis and experimental results demonstrate that the performance of the scheme is approaching the Shannon limit. The proposed scheme can greatly decrease the communication traffic of the post-processing of a QKD system, which means the proposed scheme can decrease the secure key consumption for classical channel authentication and increase the net secure key rate of the QKD system, as demonstrated by analyzing the improvement on the net secure key rate. Meanwhile, some recommendations on the application of the proposed scheme to some representative practical QKD systems are also provided.

  14. Uniformly high-order accurate non-oscillatory schemes, 1

    NASA Technical Reports Server (NTRS)

    Harten, A.; Osher, S.

    1985-01-01

    The construction and the analysis of nonoscillatory shock capturing methods for the approximation of hyperbolic conservation laws was begun. These schemes share many desirable properties with total variation diminishing schemes (TVD), but TVD schemes have at most first order accuracy, in the sense of truncation error, at extreme of the solution. A uniformly second order approximation was constucted, which is nonoscillatory in the sense that the number of extrema of the discrete solution is not increasing in time. This is achieved via a nonoscillatory piecewise linear reconstruction of the solution from its cell averages, time evolution through an approximate solution of the resulting initial value problem, and averaging of this approximate solution over each cell.

  15. Optimization research of railway passenger transfer scheme based on ant colony algorithm

    NASA Astrophysics Data System (ADS)

    Ni, Xiang

    2018-05-01

    The optimization research of railway passenger transfer scheme can provide strong support for railway passenger transport system, and its essence is path search. This paper realized the calculation of passenger transfer scheme for high speed railway when giving the time and stations of departure and arrival. The specific method that used were generating a passenger transfer service network of high-speed railway, establishing optimization model and searching by Ant Colony Algorithm. Finally, making analysis on the scheme from LanZhouxi to BeiJingXi which were based on high-speed railway network of China in 2017. The results showed that the transfer network and model had relatively high practical value and operation efficiency.

  16. A semi-implicit level set method for multiphase flows and fluid-structure interaction problems

    NASA Astrophysics Data System (ADS)

    Cottet, Georges-Henri; Maitre, Emmanuel

    2016-06-01

    In this paper we present a novel semi-implicit time-discretization of the level set method introduced in [8] for fluid-structure interaction problems. The idea stems from a linear stability analysis derived on a simplified one-dimensional problem. The semi-implicit scheme relies on a simple filter operating as a pre-processing on the level set function. It applies to multiphase flows driven by surface tension as well as to fluid-structure interaction problems. The semi-implicit scheme avoids the stability constraints that explicit scheme need to satisfy and reduces significantly the computational cost. It is validated through comparisons with the original explicit scheme and refinement studies on two-dimensional benchmarks.

  17. An improved scheme on decoy-state method for measurement-device-independent quantum key distribution

    PubMed Central

    Wang, Dong; Li, Mo; Guo, Guang-Can; Wang, Qin

    2015-01-01

    Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and two other existing ones, i.e., two-intensity decoy-states with single-photon-added coherent sources, and three-intensity decoy-states with weak coherent sources. Through numerical analysis, we demonstrate the advantages of our scheme in secure transmission distance and the final key generation rate. PMID:26463580

  18. Quantum blind dual-signature scheme without arbitrator

    NASA Astrophysics Data System (ADS)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-03-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology.

  19. Categorization and Analysis of Explanatory Writing in Mathematics

    ERIC Educational Resources Information Center

    Craig, Tracy S.

    2011-01-01

    The aim of this article is to present a scheme for coding and categorizing students' written explanations of mathematical problem-solving activities. The scheme was used successfully within a study project carried out to determine whether student problem-solving behaviour could be positively affected by writing explanatory strategies to…

  20. A Coupled Surface Nudging Scheme for use in Retrospective Weather and Climate Simulations for Environmental Applications

    EPA Science Inventory

    A surface analysis nudging scheme coupling atmospheric and land surface thermodynamic parameters has been implemented into WRF v3.8 (latest version) for use with retrospective weather and climate simulations, as well as for applications in air quality, hydrology, and ecosystem mo...

  1. A Quantitative Analysis of Children's Splitting Operations and Fraction Schemes

    ERIC Educational Resources Information Center

    Norton, Anderson; Wilkins, Jesse L. M.

    2009-01-01

    Teaching experiments with pairs of children have generated several hypotheses about students' construction of fractions. For example, Steffe (2004) hypothesized that robust conceptions of improper fractions depends on the development of a splitting operation. Results from teaching experiments that rely on scheme theory and Steffe's hierarchy of…

  2. Climate Change Effects on Stream and River Biological Indicators: A Preliminary Analysis (External Review Draft)

    EPA Science Inventory

    This draft report is a preliminary assessment that describes how biological indicators are likely to respond to climate change, how well current sampling schemes may detect climate-driven changes, and how likely it is that these sampling schemes will continue to detect impairment...

  3. A Coding Scheme to Analyse the Online Asynchronous Discussion Forums of University Students

    ERIC Educational Resources Information Center

    Biasutti, Michele

    2017-01-01

    The current study describes the development of a content analysis coding scheme to examine transcripts of online asynchronous discussion groups in higher education. The theoretical framework comprises the theories regarding knowledge construction in computer-supported collaborative learning (CSCL) based on a sociocultural perspective. The coding…

  4. A viscous flow analysis for the tip vortex generation process

    NASA Technical Reports Server (NTRS)

    Shamroth, S. J.; Briley, W. R.

    1979-01-01

    A three dimensional, forward-marching, viscous flow analysis is applied to the tip vortex generation problem. The equations include a streamwise momentum equation, a streamwise vorticity equation, a continuity equation, and a secondary flow stream function equation. The numerical method used combines a consistently split linearized scheme for parabolic equations with a scalar iterative ADI scheme for elliptic equations. The analysis is used to identify the source of the tip vortex generation process, as well as to obtain detailed flow results for a rectangular planform wing immersed in a high Reynolds number free stream at 6 degree incidence.

  5. Probabilistic evaluation of on-line checks in fault-tolerant multiprocessor systems

    NASA Technical Reports Server (NTRS)

    Nair, V. S. S.; Hoskote, Yatin V.; Abraham, Jacob A.

    1992-01-01

    The analysis of fault-tolerant multiprocessor systems that use concurrent error detection (CED) schemes is much more difficult than the analysis of conventional fault-tolerant architectures. Various analytical techniques have been proposed to evaluate CED schemes deterministically. However, these approaches are based on worst-case assumptions related to the failure of system components. Often, the evaluation results do not reflect the actual fault tolerance capabilities of the system. A probabilistic approach to evaluate the fault detecting and locating capabilities of on-line checks in a system is developed. The various probabilities associated with the checking schemes are identified and used in the framework of the matrix-based model. Based on these probabilistic matrices, estimates for the fault tolerance capabilities of various systems are derived analytically.

  6. On High-Order Upwind Methods for Advection

    NASA Technical Reports Server (NTRS)

    Huynh, H. T.

    2017-01-01

    In the fourth installment of the celebrated series of five papers entitled "Towards the ultimate conservative difference scheme", Van Leer (1977) introduced five schemes for advection, the first three are piecewise linear, and the last two, piecewise parabolic. Among the five, scheme I, which is the least accurate, extends with relative ease to systems of equations in multiple dimensions. As a result, it became the most popular and is widely known as the MUSCL scheme (monotone upstream-centered schemes for conservation laws). Schemes III and V have the same accuracy, are the most accurate, and are closely related to current high-order methods. Scheme III uses a piecewise linear approximation that is discontinuous across cells, and can be considered as a precursor of the discontinuous Galerkin methods. Scheme V employs a piecewise quadratic approximation that is, as opposed to the case of scheme III, continuous across cells. This method is the basis for the on-going "active flux scheme" developed by Roe and collaborators. Here, schemes III and V are shown to be equivalent in the sense that they yield identical (reconstructed) solutions, provided the initial condition for scheme III is defined from that of scheme V in a manner dependent on the CFL number. This equivalence is counter intuitive since it is generally believed that piecewise linear and piecewise parabolic methods cannot produce the same solutions due to their different degrees of approximation. The finding also shows a key connection between the approaches of discontinuous and continuous polynomial approximations. In addition to the discussed equivalence, a framework using both projection and interpolation that extends schemes III and V into a single family of high-order schemes is introduced. For these high-order extensions, it is demonstrated via Fourier analysis that schemes with the same number of degrees of freedom ?? per cell, in spite of the different piecewise polynomial degrees, share the same sets of eigenvalues and thus, have the same stability and accuracy. Moreover, these schemes are accurate to order 2??-1, which is higher than the expected order of ??.

  7. Numerical scoring for the Classic BILAG index.

    PubMed

    Cresswell, Lynne; Yee, Chee-Seng; Farewell, Vernon; Rahman, Anisur; Teh, Lee-Suan; Griffiths, Bridget; Bruce, Ian N; Ahmad, Yasmeen; Prabu, Athiveeraramapandian; Akil, Mohammed; McHugh, Neil; Toescu, Veronica; D'Cruz, David; Khamashta, Munther A; Maddison, Peter; Isenberg, David A; Gordon, Caroline

    2009-12-01

    To develop an additive numerical scoring scheme for the Classic BILAG index. SLE patients were recruited into this multi-centre cross-sectional study. At every assessment, data were collected on disease activity and therapy. Logistic regression was used to model an increase in therapy, as an indicator of active disease, by the Classic BILAG score in eight systems. As both indicate inactivity, scores of D and E were set to 0 and used as the baseline in the fitted model. The coefficients from the fitted model were used to determine the numerical values for Grades A, B and C. Different scoring schemes were then compared using receiver operating characteristic (ROC) curves. Validation analysis was performed using assessments from a single centre. There were 1510 assessments from 369 SLE patients. The currently used coding scheme (A = 9, B = 3, C = 1 and D/E = 0) did not fit the data well. The regression model suggested three possible numerical scoring schemes: (i) A = 11, B = 6, C = 1 and D/E = 0; (ii) A = 12, B = 6, C = 1 and D/E = 0; and (iii) A = 11, B = 7, C = 1 and D/E = 0. These schemes produced comparable ROC curves. Based on this, A = 12, B = 6, C = 1 and D/E = 0 seemed a reasonable and practical choice. The validation analysis suggested that although the A = 12, B = 6, C = 1 and D/E = 0 coding is still reasonable, a scheme with slightly less weighting for B, such as A = 12, B = 5, C = 1 and D/E = 0, may be more appropriate. A reasonable additive numerical scoring scheme based on treatment decision for the Classic BILAG index is A = 12, B = 5, C = 1, D = 0 and E = 0.

  8. Numerical scoring for the Classic BILAG index

    PubMed Central

    Cresswell, Lynne; Yee, Chee-Seng; Farewell, Vernon; Rahman, Anisur; Teh, Lee-Suan; Griffiths, Bridget; Bruce, Ian N.; Ahmad, Yasmeen; Prabu, Athiveeraramapandian; Akil, Mohammed; McHugh, Neil; Toescu, Veronica; D’Cruz, David; Khamashta, Munther A.; Maddison, Peter; Isenberg, David A.

    2009-01-01

    Objective. To develop an additive numerical scoring scheme for the Classic BILAG index. Methods. SLE patients were recruited into this multi-centre cross-sectional study. At every assessment, data were collected on disease activity and therapy. Logistic regression was used to model an increase in therapy, as an indicator of active disease, by the Classic BILAG score in eight systems. As both indicate inactivity, scores of D and E were set to 0 and used as the baseline in the fitted model. The coefficients from the fitted model were used to determine the numerical values for Grades A, B and C. Different scoring schemes were then compared using receiver operating characteristic (ROC) curves. Validation analysis was performed using assessments from a single centre. Results. There were 1510 assessments from 369 SLE patients. The currently used coding scheme (A = 9, B = 3, C = 1 and D/E = 0) did not fit the data well. The regression model suggested three possible numerical scoring schemes: (i) A = 11, B = 6, C = 1 and D/E = 0; (ii) A = 12, B = 6, C = 1 and D/E = 0; and (iii) A = 11, B = 7, C = 1 and D/E = 0. These schemes produced comparable ROC curves. Based on this, A = 12, B = 6, C = 1 and D/E = 0 seemed a reasonable and practical choice. The validation analysis suggested that although the A = 12, B = 6, C = 1 and D/E = 0 coding is still reasonable, a scheme with slightly less weighting for B, such as A = 12, B = 5, C = 1 and D/E = 0, may be more appropriate. Conclusions. A reasonable additive numerical scoring scheme based on treatment decision for the Classic BILAG index is A = 12, B = 5, C = 1, D = 0 and E = 0. PMID:19779027

  9. Financing Maternal Health and Family Planning: Are We on the Right Track? Evidence from the Reproductive Health Subaccounts in Mexico, 2003-2012.

    PubMed

    Avila-Burgos, Leticia; Cahuana-Hurtado, Lucero; Montañez-Hernandez, Julio; Servan-Mori, Edson; Aracena-Genao, Belkis; Del Río-Zolezzi, Aurora

    2016-01-01

    To analyze whether the changes observed in the level and distribution of resources for maternal health and family planning (MHFP) programs from 2003 to 2012 were consistent with the financial goals of the related policies. A longitudinal descriptive analysis of the Mexican Reproductive Health Subaccounts 2003-2012 was performed by financing scheme and health function. Financing schemes included social security, government schemes, household out-of-pocket (OOP) payments, and private insurance plans. Functions were preventive care, including family planning, antenatal and puerperium health services, normal and cesarean deliveries, and treatment of complications. Changes in the financial imbalance indicators covered by MHFP policy were tracked: (a) public and OOP expenditures as percentages of total MHFP spending; (b) public expenditure per woman of reproductive age (WoRA, 15-49 years) by financing scheme; (c) public expenditure on treating complications as a percentage of preventive care; and (d) public expenditure on WoRA at state level. Statistical analyses of trends and distributions were performed. Public expenditure on government schemes grew by approximately 300%, and the financial imbalance between populations covered by social security and government schemes decreased. The financial burden on households declined, particularly among households without social security. Expenditure on preventive care grew by 16%, narrowing the financing gap between treatment of complications and preventive care. Finally, public expenditure per WoRA for government schemes nearly doubled at the state level, although considerable disparities persist. Changes in the level and distribution of MHFP funding from 2003 to 2012 were consistent with the relevant policy goals. However, improving efficiency requires further analysis to ascertain the impact of investments on health outcomes. This, in turn, will require better financial data systems as a precondition for improving the monitoring and accountability functions in Mexico.

  10. Theoretical analysis and simulation study of the deep overcompression mode of velocity bunching for a comblike electron bunch train

    NASA Astrophysics Data System (ADS)

    Wang, Dan; Yan, Lixin; Du, YingChao; Huang, Wenhui; Gai, Wei; Tang, Chuanxiang

    2018-02-01

    Premodulated comblike electron bunch trains are used in a wide range of research fields, such as for wakefield-based particle acceleration and tunable radiation sources. We propose an optimized compression scheme for bunch trains in which a traveling wave accelerator tube and a downstream drift segment are together used as a compressor. When the phase injected into the accelerator tube for the bunch train is set to ≪-10 0 ° , velocity bunching occurs in a deep overcompression mode, which reverses the phase space and maintains a velocity difference within the injected beam, thereby giving rise to a compressed comblike electron bunch train after a few-meter-long drift segment; we call this the deep overcompression scheme. The main benefits of this scheme are the relatively large phase acceptance and the uniformity of compression for the bunch train. The comblike bunch train generated via this scheme is widely tunable: For the two-bunch case, the energy and time spacings can be continuously adjusted from +1 to -1 MeV and from 13 to 3 ps, respectively, by varying the injected phase of the bunch train from -22 0 ° to -14 0 ° . Both theoretical analysis and beam dynamics simulations are presented to study the properties of the deep overcompression scheme.

  11. Decentralising Zimbabwe’s water management: The case of Guyu-Chelesa irrigation scheme

    NASA Astrophysics Data System (ADS)

    Tambudzai, Rashirayi; Everisto, Mapedza; Gideon, Zhou

    Smallholder irrigation schemes are largely supply driven such that they exclude the beneficiaries on the management decisions and the choice of the irrigation schemes that would best suit their local needs. It is against this background that the decentralisation framework and the Dublin Principles on Integrated Water Resource Management (IWRM) emphasise the need for a participatory approach to water management. The Zimbabwean government has gone a step further in decentralising the management of irrigation schemes, that is promoting farmer managed irrigation schemes so as to ensure effective management of scarce community based land and water resources. The study set to investigate the way in which the Guyu-Chelesa irrigation scheme is managed with specific emphasis on the role of the Irrigation Management Committee (IMC), the level of accountability and the powers devolved to the IMC. Merrey’s 2008 critique of IWRM also informs this study which views irrigation as going beyond infrastructure by looking at how institutions and decision making processes play out at various levels including at the irrigation scheme level. The study was positioned on the hypothesis that ‘decentralised or autonomous irrigation management enhances the sustainability and effectiveness of irrigation schemes’. To validate or falsify the stated hypothesis, data was gathered using desk research in the form of reviewing articles, documents from within the scheme and field research in the form of questionnaire surveys, key informant interviews and field observation. The Statistical Package for Social Sciences was used to analyse data quantitatively, whilst content analysis was utilised to analyse qualitative data whereby data was analysed thematically. Comparative analysis was carried out as Guyu-Chelesa irrigation scheme was compared with other smallholder irrigation scheme’s experiences within Zimbabwe and the Sub Saharan African region at large. The findings were that whilst the scheme is a model of a decentralised entity whose importance lies at improving food security and employment creation within the community, it falls short in representing a downwardly accountable decentralised irrigation scheme. The scheme is faced with various challenges which include its operation which is below capacity utilisation, absence of specialised technical human personnel to address infrastructural breakdowns, uneven distribution of water pressure, incapacitated Irrigation Management Committee (IMC), absence of a locally legitimate constitution, compromised beneficiary participation and unclear lines of communication between various institutions involved in water management. Understanding decentralization is important since one of the key tenets of IWRM is stakeholder participation which the decentralization framework interrogates.

  12. Batch mode grid generation: An endangered species

    NASA Technical Reports Server (NTRS)

    Schuster, David M.

    1992-01-01

    Non-interactive grid generation schemes should thrive as emphasis shifts from development of numerical analysis and design methods to application of these tools to real engineering problems. A strong case is presented for the continued development and application of non-interactive geometry modeling methods. Guidelines, strategies, and techniques for developing and implementing these tools are presented using current non-interactive grid generation methods as examples. These schemes play an important role in the development of multidisciplinary analysis methods and some of these applications are also discussed.

  13. An analysis of the sliding pressure start-up of SCWR

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wang, F.; Yang, J.; Li, H.

    In this paper, the preliminary sliding pressure start-up system and scheme of supercritical water-cooled reactor in CGNPC (CGN-SCWR) were proposed. Thermal-hydraulic behavior in start-up procedures was analyzed in detail by employing advanced reactor subchannel analysis software ATHAS. The maximum cladding temperature (MCT for short) and core power of fuel assembly during the whole start-up process were investigated comparatively. The results show that the recommended start-up scheme meets the design requirements from the perspective of thermal-hydraulic. (authors)

  14. What Factors Affect Voluntary Uptake of Community-Based Health Insurance Schemes in Low- and Middle-Income Countries? A Systematic Review and Meta-Analysis.

    PubMed

    Dror, David Mark; Hossain, S A Shahed; Majumdar, Atanu; Pérez Koehlmoos, Tracey Lynn; John, Denny; Panda, Pradeep Kumar

    2016-01-01

    This research article reports on factors influencing initial voluntary uptake of community-based health insurance (CBHI) schemes in low- and middle-income countries (LMIC), and renewal decisions. Following PRISMA protocol, we conducted a comprehensive search of academic and gray literature, including academic databases in social science, economics and medical sciences (e.g., Econlit, Global health, Medline, Proquest) and other electronic resources (e.g., Eldis and Google scholar). Search strategies were developed using the thesaurus or index terms (e.g., MeSH) specific to the databases, combined with free text terms related to CBHI or health insurance. Searches were conducted from May 2013 to November 2013 in English, French, German, and Spanish. From the initial search yield of 15,770 hits, 54 relevant studies were retained for analysis of factors influencing enrolment and renewal decisions. The quantitative synthesis (informed by meta-analysis) and the qualitative analysis (informed by thematic synthesis) were compared to gain insight for an overall synthesis of findings/statements. Meta-analysis suggests that enrolments in CBHI were positively associated with household income, education and age of the household head (HHH), household size, female-headed household, married HHH and chronic illness episodes in the household. The thematic synthesis suggests the following factors as enablers for enrolment: (a) knowledge and understanding of insurance and CBHI, (b) quality of healthcare, (c) trust in scheme management. Factors found to be barriers to enrolment include: (a) inappropriate benefits package, (b) cultural beliefs, (c) affordability, (d) distance to healthcare facility, (e) lack of adequate legal and policy frameworks to support CBHI, and (f) stringent rules of some CBHI schemes. HHH education, household size and trust in the scheme management were positively associated with member renewal decisions. Other motivators were: (a) knowledge and understanding of insurance and CBHI, (b) healthcare quality, (c) trust in scheme management, and (d) receipt of an insurance payout the previous year. The barriers to renewal decisions were: (a) stringent rules of some CBHI schemes, (b) inadequate legal and policy frameworks to support CBHI and (c) inappropriate benefits package. The demand-side factors positively affecting enrolment in CBHI include education, age, female household heads, and the socioeconomic status of households. Moreover, when individuals understand how their CBHI functions they are more likely to enroll and when people have a positive claims experience, they are more likely to renew. A higher prevalence of chronic conditions or the perception that healthcare is of good quality and nearby act as factors enhancing enrolment. The perception that services are distant or deficient leads to lower enrolments. The second insight is that trust in the scheme enables enrolment. Thirdly, clarity about the legal or policy framework acts as a factor influencing enrolments. This is significant, as it points to hitherto unpublished evidence that governments can effectively broaden their outreach to grassroots groups that are excluded from social protection by formulating supportive regulatory and policy provisions even if they cannot fund such schemes in full, by leveraging people's willingness to exercise voluntary and contributory enrolment in a community-based health insurance.

  15. An optimal implicit staggered-grid finite-difference scheme based on the modified Taylor-series expansion with minimax approximation method for elastic modeling

    NASA Astrophysics Data System (ADS)

    Yang, Lei; Yan, Hongyong; Liu, Hong

    2017-03-01

    Implicit staggered-grid finite-difference (ISFD) scheme is competitive for its great accuracy and stability, whereas its coefficients are conventionally determined by the Taylor-series expansion (TE) method, leading to a loss in numerical precision. In this paper, we modify the TE method using the minimax approximation (MA), and propose a new optimal ISFD scheme based on the modified TE (MTE) with MA method. The new ISFD scheme takes the advantage of the TE method that guarantees great accuracy at small wavenumbers, and keeps the property of the MA method that keeps the numerical errors within a limited bound at the same time. Thus, it leads to great accuracy for numerical solution of the wave equations. We derive the optimal ISFD coefficients by applying the new method to the construction of the objective function, and using a Remez algorithm to minimize its maximum. Numerical analysis is made in comparison with the conventional TE-based ISFD scheme, indicating that the MTE-based ISFD scheme with appropriate parameters can widen the wavenumber range with high accuracy, and achieve greater precision than the conventional ISFD scheme. The numerical modeling results also demonstrate that the MTE-based ISFD scheme performs well in elastic wave simulation, and is more efficient than the conventional ISFD scheme for elastic modeling.

  16. Core genome conservation of Staphylococcus haemolyticus limits sequence based population structure analysis.

    PubMed

    Cavanagh, Jorunn Pauline; Klingenberg, Claus; Hanssen, Anne-Merethe; Fredheim, Elizabeth Aarag; Francois, Patrice; Schrenzel, Jacques; Flægstad, Trond; Sollid, Johanna Ericson

    2012-06-01

    The notoriously multi-resistant Staphylococcus haemolyticus is an emerging pathogen causing serious infections in immunocompromised patients. Defining the population structure is important to detect outbreaks and spread of antimicrobial resistant clones. Currently, the standard typing technique is pulsed-field gel electrophoresis (PFGE). In this study we describe novel molecular typing schemes for S. haemolyticus using multi locus sequence typing (MLST) and multi locus variable number of tandem repeats (VNTR) analysis. Seven housekeeping genes (MLST) and five VNTR loci (MLVF) were selected for the novel typing schemes. A panel of 45 human and veterinary S. haemolyticus isolates was investigated. The collection had diverse PFGE patterns (38 PFGE types) and was sampled over a 20 year-period from eight countries. MLST resolved 17 sequence types (Simpsons index of diversity [SID]=0.877) and MLVF resolved 14 repeat types (SID=0.831). We found a low sequence diversity. Phylogenetic analysis clustered the isolates in three (MLST) and one (MLVF) clonal complexes, respectively. Taken together, neither the MLST nor the MLVF scheme was suitable to resolve the population structure of this S. haemolyticus collection. Future MLVF and MLST schemes will benefit from addition of more variable core genome sequences identified by comparing different fully sequenced S. haemolyticus genomes. Copyright © 2012 Elsevier B.V. All rights reserved.

  17. Finite Volume Element (FVE) discretization and multilevel solution of the axisymmetric heat equation

    NASA Astrophysics Data System (ADS)

    Litaker, Eric T.

    1994-12-01

    The axisymmetric heat equation, resulting from a point-source of heat applied to a metal block, is solved numerically; both iterative and multilevel solutions are computed in order to compare the two processes. The continuum problem is discretized in two stages: finite differences are used to discretize the time derivatives, resulting is a fully implicit backward time-stepping scheme, and the Finite Volume Element (FVE) method is used to discretize the spatial derivatives. The application of the FVE method to a problem in cylindrical coordinates is new, and results in stencils which are analyzed extensively. Several iteration schemes are considered, including both Jacobi and Gauss-Seidel; a thorough analysis of these schemes is done, using both the spectral radii of the iteration matrices and local mode analysis. Using this discretization, a Gauss-Seidel relaxation scheme is used to solve the heat equation iteratively. A multilevel solution process is then constructed, including the development of intergrid transfer and coarse grid operators. Local mode analysis is performed on the components of the amplification matrix, resulting in the two-level convergence factors for various combinations of the operators. A multilevel solution process is implemented by using multigrid V-cycles; the iterative and multilevel results are compared and discussed in detail. The computational savings resulting from the multilevel process are then discussed.

  18. Performance Analysis of MIMO Relay Network via Propagation Measurement in L-Shaped Corridor Environment

    NASA Astrophysics Data System (ADS)

    Lertwiram, Namzilp; Tran, Gia Khanh; Mizutani, Keiichi; Sakaguchi, Kei; Araki, Kiyomichi

    Setting relays can address the shadowing problem between a transmitter (Tx) and a receiver (Rx). Moreover, the Multiple-Input Multiple-Output (MIMO) technique has been introduced to improve wireless link capacity. The MIMO technique can be applied in relay network to enhance system performance. However, the efficiency of relaying schemes and relay placement have not been well investigated with experiment-based study. This paper provides a propagation measurement campaign of a MIMO two-hop relay network in 5GHz band in an L-shaped corridor environment with various relay locations. Furthermore, this paper proposes a Relay Placement Estimation (RPE) scheme to identify the optimum relay location, i.e. the point at which the network performance is highest. Analysis results of channel capacity show that relaying technique is beneficial over direct transmission in strong shadowing environment while it is ineffective in non-shadowing environment. In addition, the optimum relay location estimated with the RPE scheme also agrees with the location where the network achieves the highest performance as identified by network capacity. Finally, the capacity analysis shows that two-way MIMO relay employing network coding has the best performance while cooperative relaying scheme is not effective due to shadowing effect weakening the signal strength of the direct link.

  19. A recoding scheme for X-linked and pseudoautosomal loci to be used with computer programs for autosomal LOD-score analysis.

    PubMed

    Strauch, Konstantin; Baur, Max P; Wienker, Thomas F

    2004-01-01

    We present a recoding scheme that allows for a parametric multipoint X-chromosomal linkage analysis of dichotomous traits in the context of a computer program for autosomes that can use trait models with imprinting. Furthermore, with this scheme, it is possible to perform a joint multipoint analysis of X-linked and pseudoautosomal loci. It is required that (1) the marker genotypes of all female nonfounders are available and that (2) there are no male nonfounders who have daughters in the pedigree. The second requirement does not apply if the trait locus is pseudoautosomal. The X-linked marker loci are recorded by adding a dummy allele to the males' hemizygous genotypes. For modelling an X-linked trait locus, five different liability classes are defined, in conjunction with a paternal imprinting model for male nonfounders. The formulation aims at the mapping of a diallelic trait locus relative to an arbitrary number of codominant markers with known genetic distances, in cases where a program for a genuine X-chromosomal analysis is not available. 2004 S. Karger AG, Basel.

  20. Alternative difference analysis scheme combining R -space EXAFS fit with global optimization XANES fit for X-ray transient absorption spectroscopy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhan, Fei; Tao, Ye; Zhao, Haifeng

    Time-resolved X-ray absorption spectroscopy (TR-XAS), based on the laser-pump/X-ray-probe method, is powerful in capturing the change of the geometrical and electronic structure of the absorbing atom upon excitation. TR-XAS data analysis is generally performed on the laser-on minus laser-off difference spectrum. Here, a new analysis scheme is presented for the TR-XAS difference fitting in both the extended X-ray absorption fine-structure (EXAFS) and the X-ray absorption near-edge structure (XANES) regions.R-space EXAFS difference fitting could quickly provide the main quantitative structure change of the first shell. The XANES fitting part introduces a global non-derivative optimization algorithm and optimizes the local structure changemore » in a flexible way where both the core XAS calculation package and the search method in the fitting shell are changeable. The scheme was applied to the TR-XAS difference analysis of Fe(phen) 3spin crossover complex and yielded reliable distance change and excitation population.« less

  1. Alternative difference analysis scheme combining R-space EXAFS fit with global optimization XANES fit for X-ray transient absorption spectroscopy.

    PubMed

    Zhan, Fei; Tao, Ye; Zhao, Haifeng

    2017-07-01

    Time-resolved X-ray absorption spectroscopy (TR-XAS), based on the laser-pump/X-ray-probe method, is powerful in capturing the change of the geometrical and electronic structure of the absorbing atom upon excitation. TR-XAS data analysis is generally performed on the laser-on minus laser-off difference spectrum. Here, a new analysis scheme is presented for the TR-XAS difference fitting in both the extended X-ray absorption fine-structure (EXAFS) and the X-ray absorption near-edge structure (XANES) regions. R-space EXAFS difference fitting could quickly provide the main quantitative structure change of the first shell. The XANES fitting part introduces a global non-derivative optimization algorithm and optimizes the local structure change in a flexible way where both the core XAS calculation package and the search method in the fitting shell are changeable. The scheme was applied to the TR-XAS difference analysis of Fe(phen) 3 spin crossover complex and yielded reliable distance change and excitation population.

  2. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication.

  3. The a(3) Scheme--A Fourth-Order Space-Time Flux-Conserving and Neutrally Stable CESE Solver

    NASA Technical Reports Server (NTRS)

    Chang, Sin-Chung

    2008-01-01

    The CESE development is driven by a belief that a solver should (i) enforce conservation laws in both space and time, and (ii) be built from a non-dissipative (i.e., neutrally stable) core scheme so that the numerical dissipation can be controlled effectively. To initiate a systematic CESE development of high order schemes, in this paper we provide a thorough discussion on the structure, consistency, stability, phase error, and accuracy of a new 4th-order space-time flux-conserving and neutrally stable CESE solver of an 1D scalar advection equation. The space-time stencil of this two-level explicit scheme is formed by one point at the upper time level and three points at the lower time level. Because it is associated with three independent mesh variables (the numerical analogues of the dependent variable and its 1st-order and 2ndorder spatial derivatives, respectively) and three equations per mesh point, the new scheme is referred to as the a(3) scheme. Through the von Neumann analysis, it is shown that the a(3) scheme is stable if and only if the Courant number is less than 0.5. Moreover, it is established numerically that the a(3) scheme is 4th-order accurate.

  4. Spectral cumulus parameterization based on cloud-resolving model

    NASA Astrophysics Data System (ADS)

    Baba, Yuya

    2018-02-01

    We have developed a spectral cumulus parameterization using a cloud-resolving model. This includes a new parameterization of the entrainment rate which was derived from analysis of the cloud properties obtained from the cloud-resolving model simulation and was valid for both shallow and deep convection. The new scheme was examined in a single-column model experiment and compared with the existing parameterization of Gregory (2001, Q J R Meteorol Soc 127:53-72) (GR scheme). The results showed that the GR scheme simulated more shallow and diluted convection than the new scheme. To further validate the physical performance of the parameterizations, Atmospheric Model Intercomparison Project (AMIP) experiments were performed, and the results were compared with reanalysis data. The new scheme performed better than the GR scheme in terms of mean state and variability of atmospheric circulation, i.e., the new scheme improved positive bias of precipitation in western Pacific region, and improved positive bias of outgoing shortwave radiation over the ocean. The new scheme also simulated better features of convectively coupled equatorial waves and Madden-Julian oscillation. These improvements were found to be derived from the modification of parameterization for the entrainment rate, i.e., the proposed parameterization suppressed excessive increase of entrainment, thus suppressing excessive increase of low-level clouds.

  5. A Blind Reversible Robust Watermarking Scheme for Relational Databases

    PubMed Central

    Chang, Chin-Chen; Nguyen, Thai-Son; Lin, Chia-Chen

    2013-01-01

    Protecting the ownership and controlling the copies of digital data have become very important issues in Internet-based applications. Reversible watermark technology allows the distortion-free recovery of relational databases after the embedded watermark data are detected or verified. In this paper, we propose a new, blind, reversible, robust watermarking scheme that can be used to provide proof of ownership for the owner of a relational database. In the proposed scheme, a reversible data-embedding algorithm, which is referred to as “histogram shifting of adjacent pixel difference” (APD), is used to obtain reversibility. The proposed scheme can detect successfully 100% of the embedded watermark data, even if as much as 80% of the watermarked relational database is altered. Our extensive analysis and experimental results show that the proposed scheme is robust against a variety of data attacks, for example, alteration attacks, deletion attacks, mix-match attacks, and sorting attacks. PMID:24223033

  6. A blind reversible robust watermarking scheme for relational databases.

    PubMed

    Chang, Chin-Chen; Nguyen, Thai-Son; Lin, Chia-Chen

    2013-01-01

    Protecting the ownership and controlling the copies of digital data have become very important issues in Internet-based applications. Reversible watermark technology allows the distortion-free recovery of relational databases after the embedded watermark data are detected or verified. In this paper, we propose a new, blind, reversible, robust watermarking scheme that can be used to provide proof of ownership for the owner of a relational database. In the proposed scheme, a reversible data-embedding algorithm, which is referred to as "histogram shifting of adjacent pixel difference" (APD), is used to obtain reversibility. The proposed scheme can detect successfully 100% of the embedded watermark data, even if as much as 80% of the watermarked relational database is altered. Our extensive analysis and experimental results show that the proposed scheme is robust against a variety of data attacks, for example, alteration attacks, deletion attacks, mix-match attacks, and sorting attacks.

  7. A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.

    PubMed

    Jiang, Qi; Lian, Xinxin; Yang, Chao; Ma, Jianfeng; Tian, Youliang; Yang, Yuanyuan

    2016-11-01

    Wireless body area networks (WBANs) have become one of the key components of mobile health (mHealth) which provides 24/7 health monitoring service and greatly improves the quality and efficiency of healthcare. However, users' concern about the security and privacy of their health information has become one of the major obstacles that impede the wide adoption of WBANs. Anonymous and unlinkable authentication is critical to protect the security and privacy of sensitive physiological information in transit from the client to the application provider. We first show that the anonymous authentication scheme of Wang and Zhang based on bilinear pairing is prone to client impersonation attack. Then, we propose an enhanced anonymous authentication scheme to remedy the flaw in Wang and Zhang's scheme. We give the security analysis to demonstrate that the enhanced scheme achieves the desired security features and withstands various known attacks.

  8. A digital memories based user authentication scheme with privacy preservation.

    PubMed

    Liu, JunLiang; Lyu, Qiuyun; Wang, Qiuhua; Yu, Xiangxiang

    2017-01-01

    The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users' privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results.

  9. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    PubMed

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  10. A digital memories based user authentication scheme with privacy preservation

    PubMed Central

    Liu, JunLiang; Lyu, Qiuyun; Wang, Qiuhua; Yu, Xiangxiang

    2017-01-01

    The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users’ privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results. PMID:29190659

  11. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    NASA Astrophysics Data System (ADS)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  12. Real-Time Support on IEEE 802.11 Wireless Ad-Hoc Networks: Reality vs. Theory

    NASA Astrophysics Data System (ADS)

    Kang, Mikyung; Kang, Dong-In; Suh, Jinwoo

    The usable throughput of an IEEE 802.11 system for an application is much less than the raw bandwidth. Although 802.11b has a theoretical maximum of 11Mbps, more than half of the bandwidth is consumed by overhead leaving at most 5Mbps of usable bandwidth. Considering this characteristic, this paper proposes and analyzes a real-time distributed scheduling scheme based on the existing IEEE 802.11 wireless ad-hoc networks, using USC/ISI's Power Aware Sensing Tracking and Analysis (PASTA) hardware platform. We compared the distributed real-time scheduling scheme with the real-time polling scheme to meet deadline, and compared a measured real bandwidth with a theoretical result. The theoretical and experimental results show that the distributed scheduling scheme can guarantee real-time traffic and enhances the performance up to 74% compared with polling scheme.

  13. A secure and efficient authentication and key agreement scheme based on ECC for telecare medicine information systems.

    PubMed

    Xu, Xin; Zhu, Ping; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua; He, Lian

    2014-01-01

    In the field of the Telecare Medicine Information System, recent researches have focused on consummating more convenient and secure healthcare delivery services for patients. In order to protect the sensitive information, various attempts such as access control have been proposed to safeguard patients' privacy in this system. However, these schemes suffered from some certain security defects and had costly consumption, which were not suitable for the telecare medicine information system. In this paper, based on the elliptic curve cryptography, we propose a secure and efficient two-factor mutual authentication and key agreement scheme to reduce the computational cost. Such a scheme enables to provide the patient anonymity by employing the dynamic identity. Compared with other related protocols, the security analysis and performance evaluation show that our scheme overcomes some well-known attacks and has a better performance in the telecare medicine information system.

  14. Essentially Non-Oscillatory and Weighted Essentially Non-Oscillatory Schemes for Hyperbolic Conservation Laws

    NASA Technical Reports Server (NTRS)

    Shu, Chi-Wang

    1997-01-01

    In these lecture notes we describe the construction, analysis, and application of ENO (Essentially Non-Oscillatory) and WENO (Weighted Essentially Non-Oscillatory) schemes for hyperbolic conservation laws and related Hamilton- Jacobi equations. ENO and WENO schemes are high order accurate finite difference schemes designed for problems with piecewise smooth solutions containing discontinuities. The key idea lies at the approximation level, where a nonlinear adaptive procedure is used to automatically choose the locally smoothest stencil, hence avoiding crossing discontinuities in the interpolation procedure as much as possible. ENO and WENO schemes have been quite successful in applications, especially for problems containing both shocks and complicated smooth solution structures, such as compressible turbulence simulations and aeroacoustics. These lecture notes are basically self-contained. It is our hope that with these notes and with the help of the quoted references, the reader can understand the algorithms and code them up for applications.

  15. An Overview of Recent Advances in Event-Triggered Consensus of Multiagent Systems.

    PubMed

    Ding, Lei; Han, Qing-Long; Ge, Xiaohua; Zhang, Xian-Ming

    2018-04-01

    Event-triggered consensus of multiagent systems (MASs) has attracted tremendous attention from both theoretical and practical perspectives due to the fact that it enables all agents eventually to reach an agreement upon a common quantity of interest while significantly alleviating utilization of communication and computation resources. This paper aims to provide an overview of recent advances in event-triggered consensus of MASs. First, a basic framework of multiagent event-triggered operational mechanisms is established. Second, representative results and methodologies reported in the literature are reviewed and some in-depth analysis is made on several event-triggered schemes, including event-based sampling schemes, model-based event-triggered schemes, sampled-data-based event-triggered schemes, and self-triggered sampling schemes. Third, two examples are outlined to show applicability of event-triggered consensus in power sharing of microgrids and formation control of multirobot systems, respectively. Finally, some challenging issues on event-triggered consensus are proposed for future research.

  16. An Empirical Cumulus Parameterization Scheme for a Global Spectral Model

    NASA Technical Reports Server (NTRS)

    Rajendran, K.; Krishnamurti, T. N.; Misra, V.; Tao, W.-K.

    2004-01-01

    Realistic vertical heating and drying profiles in a cumulus scheme is important for obtaining accurate weather forecasts. A new empirical cumulus parameterization scheme based on a procedure to improve the vertical distribution of heating and moistening over the tropics is developed. The empirical cumulus parameterization scheme (ECPS) utilizes profiles of Tropical Rainfall Measuring Mission (TRMM) based heating and moistening derived from the European Centre for Medium- Range Weather Forecasts (ECMWF) analysis. A dimension reduction technique through rotated principal component analysis (RPCA) is performed on the vertical profiles of heating (Q1) and drying (Q2) over the convective regions of the tropics, to obtain the dominant modes of variability. Analysis suggests that most of the variance associated with the observed profiles can be explained by retaining the first three modes. The ECPS then applies a statistical approach in which Q1 and Q2 are expressed as a linear combination of the first three dominant principal components which distinctly explain variance in the troposphere as a function of the prevalent large-scale dynamics. The principal component (PC) score which quantifies the contribution of each PC to the corresponding loading profile is estimated through a multiple screening regression method which yields the PC score as a function of the large-scale variables. The profiles of Q1 and Q2 thus obtained are found to match well with the observed profiles. The impact of the ECPS is investigated in a series of short range (1-3 day) prediction experiments using the Florida State University global spectral model (FSUGSM, T126L14). Comparisons between short range ECPS forecasts and those with the modified Kuo scheme show a very marked improvement in the skill in ECPS forecasts. This improvement in the forecast skill with ECPS emphasizes the importance of incorporating realistic vertical distributions of heating and drying in the model cumulus scheme. This also suggests that in the absence of explicit models for convection, the proposed statistical scheme improves the modeling of the vertical distribution of heating and moistening in areas of deep convection.

  17. Mundane? Demographic characteristics as predictors of enrolment onto the National Health Insurance Scheme in two districts of Ghana.

    PubMed

    Seddoh, Anthony; Sataru, Fuseini

    2018-05-04

    In 2003, Ghana passed a law to establish a National Health Insurance Scheme (NHIS) to serve as the main vehicle for achieving universal health coverage. Over 60% of the population had registered by 2009. Current active membership is however 40%. The stagnation in growth has been recorded across all the membership categories. Clearly, the Scheme is falling short of its core objective. This analysis is a critical thematic contextual examination of the effects of demographic factors on enrolment onto the Scheme. Demographic secondary data for 625 respondents collected (using a structured questionnaire) during a cross-sectional household survey in an urban, Ashaiman, and rural, Adaklu, districts was analyzed in univariate and multivariate logistic regression models using Statistical Package for Social Scientists (SPSS). Statistical significance was set at P-value < 0.05. Variables included in the analysis were age, gender, education, occupation and knowledge about the NHIS. Seventy-nine percent of the survey respondents have ever enrolled onto the NHIS with three-fifths being females. Of the ever enrolled, 63% had valid cards. Age, gender and educational level were significant predictors of enrolment in the multivariate analysis. Respondents between the ages 41-60 years were twice (p = 0.05) more likely to be enrolled onto a district Scheme compared with respondents between the ages 21-40 years. Females were thrice (p = 0.00) more likely to enroll compared with males. Respondents educated to the tertiary, five times (p = 0.02), and post-graduate, four times (p = 0.05), levels were more likely to enroll compared with non-educated respondents. No significant association was observed between occupation and enrolment. Uptake of the scheme is declining despite high awareness and knowledge. Leadership, innovation and collaboration are required at the district Scheme level to curtail issues of low self-enrolment and to grow membership. Otherwise, the goal of universal coverage under the NHIS will become merely a slogan and equity in financial access to health care for all Ghanaians will remain elusive.

  18. Determining a Method of Enabling and Disabling the Integral Torque in the SDO Science and Inertial Mode Controllers

    NASA Technical Reports Server (NTRS)

    Vess, Melissa F.; Starin, Scott R.

    2007-01-01

    During design of the SDO Science and Inertial mode PID controllers, the decision was made to disable the integral torque whenever system stability was in question. Three different schemes were developed to determine when to disable or enable the integral torque, and a trade study was performed to determine which scheme to implement. The trade study compared complexity of the control logic, risk of not reenabling the integral gain in time to reject steady-state error, and the amount of integral torque space used. The first scheme calculated a simplified Routh criterion to determine when to disable the integral torque. The second scheme calculates the PD part of the torque and looked to see if that torque would cause actuator saturation. If so, only the PD torque is used. If not, the integral torque is added. Finally, the third scheme compares the attitude and rate errors to limits and disables the integral torque if either of the errors is greater than the limit. Based on the trade study results, the third scheme was selected. Once it was decided when to disable the integral torque, analysis was performed to determine how to disable the integral torque and whether or not to reset the integrator once the integral torque was reenabled. Three ways to disable the integral torque were investigated: zero the input into the integrator, which causes the integral part of the PID control torque to be held constant; zero the integral torque directly but allow the integrator to continue integrating; or zero the integral torque directly and reset the integrator on integral torque reactivation. The analysis looked at complexity of the control logic, slew time plus settling time between each calibration maneuver step, and ability to reject steady-state error. Based on the results of the analysis, the decision was made to zero the input into the integrator without resetting it. Throughout the analysis, a high fidelity simulation was used to test the various implementation methods.

  19. A stable partitioned FSI algorithm for rigid bodies and incompressible flow. Part I: Model problem analysis

    NASA Astrophysics Data System (ADS)

    Banks, J. W.; Henshaw, W. D.; Schwendeman, D. W.; Tang, Qi

    2017-08-01

    A stable partitioned algorithm is developed for fluid-structure interaction (FSI) problems involving viscous incompressible flow and rigid bodies. This added-mass partitioned (AMP) algorithm remains stable, without sub-iterations, for light and even zero mass rigid bodies when added-mass and viscous added-damping effects are large. The scheme is based on a generalized Robin interface condition for the fluid pressure that includes terms involving the linear acceleration and angular acceleration of the rigid body. Added-mass effects are handled in the Robin condition by inclusion of a boundary integral term that depends on the pressure. Added-damping effects due to the viscous shear forces on the body are treated by inclusion of added-damping tensors that are derived through a linearization of the integrals defining the force and torque. Added-damping effects may be important at low Reynolds number, or, for example, in the case of a rotating cylinder or rotating sphere when the rotational moments of inertia are small. In this first part of a two-part series, the properties of the AMP scheme are motivated and evaluated through the development and analysis of some model problems. The analysis shows when and why the traditional partitioned scheme becomes unstable due to either added-mass or added-damping effects. The analysis also identifies the proper form of the added-damping which depends on the discrete time-step and the grid-spacing normal to the rigid body. The results of the analysis are confirmed with numerical simulations that also demonstrate a second-order accurate implementation of the AMP scheme.

  20. Recovery of symbiotic nitrogen fixing acacia rhizobia from Merzouga Desert sand dunes in South East Morocco--Identification of a probable new species of Ensifer adapted to stressed environments.

    PubMed

    Sakrouhi, Ilham; Belfquih, Meryem; Sbabou, Laïla; Moulin, Patricia; Bena, Gilles; Filali-Maltouf, Abdelkarim; Le Quéré, Antoine

    2016-03-01

    Bacteria capable of nodulating Acacia tortilis and A. gummifera could be recovered from sand dunes collected in the Moroccan Merzouga desert. The trapping approach enabled the recovery of 17 desert rhizobia that all clustered within the Ensifer (Sinorhizobium) genus. Four isolates of the dominant genotype comprising 15 strains as well as 2 divergent strains were further characterized by MLSA. Phylogenetic analyzes indicated that the dominant genetic type was belonging to a new and yet undefined species within the Ensifer genus. Interestingly, housekeeping gene phylogenies showed that this possibly new species is also present in another desert but in India. Phylogenetic analyses of nifH and nodC sequences showed high sequence conservation among the Moroccan strains belonging to the dominant genotype but high divergence with sequences from Indian isolates suggesting acquisition of symbiotic genes through Horizontal Gene Transfer. These desert rhizobia were capable of growing in media containing high salt concentrations, under high pH and most of the strains showed growth at 45°C. Only recovered from desert type of Biome, yet, this new taxon appears particularly adapted to such harsh environment. Copyright © 2016 Elsevier GmbH. All rights reserved.

  1. One-dimensional high-order compact method for solving Euler's equations

    NASA Astrophysics Data System (ADS)

    Mohamad, M. A. H.; Basri, S.; Basuno, B.

    2012-06-01

    In the field of computational fluid dynamics, many numerical algorithms have been developed to simulate inviscid, compressible flows problems. Among those most famous and relevant are based on flux vector splitting and Godunov-type schemes. Previously, this system was developed through computational studies by Mawlood [1]. However the new test cases for compressible flows, the shock tube problems namely the receding flow and shock waves were not investigated before by Mawlood [1]. Thus, the objective of this study is to develop a high-order compact (HOC) finite difference solver for onedimensional Euler equation. Before developing the solver, a detailed investigation was conducted to assess the performance of the basic third-order compact central discretization schemes. Spatial discretization of the Euler equation is based on flux-vector splitting. From this observation, discretization of the convective flux terms of the Euler equation is based on a hybrid flux-vector splitting, known as the advection upstream splitting method (AUSM) scheme which combines the accuracy of flux-difference splitting and the robustness of flux-vector splitting. The AUSM scheme is based on the third-order compact scheme to the approximate finite difference equation was completely analyzed consequently. In one-dimensional problem for the first order schemes, an explicit method is adopted by using time integration method. In addition to that, development and modification of source code for the one-dimensional flow is validated with four test cases namely, unsteady shock tube, quasi-one-dimensional supersonic-subsonic nozzle flow, receding flow and shock waves in shock tubes. From these results, it was also carried out to ensure that the definition of Riemann problem can be identified. Further analysis had also been done in comparing the characteristic of AUSM scheme against experimental results, obtained from previous works and also comparative analysis with computational results generated by van Leer, KFVS and AUSMPW schemes. Furthermore, there is a remarkable improvement with the extension of the AUSM scheme from first-order to third-order accuracy in terms of shocks, contact discontinuities and rarefaction waves.

  2. Several comparison result of two types of equilibrium (Pareto Schemes and Stackelberg Scheme) of game theory approach in probabilistic vendor – buyer supply chain system with imperfect quality

    NASA Astrophysics Data System (ADS)

    Setiawan, R.

    2018-05-01

    In this paper, Economic Order Quantity (EOQ) of the vendor-buyer supply-chain model under a probabilistic condition with imperfect quality items has been analysed. The analysis is delivered using two concepts in game theory approach, which is Stackelberg equilibrium and Pareto Optimal, under non-cooperative and cooperative games, respectively. Another result is getting acomparison of theoptimal result between integrated scheme and game theory approach based on analytical and numerical result using appropriate simulation data.

  3. An asymptotic preserving multidimensional ALE method for a system of two compressible flows coupled with friction

    NASA Astrophysics Data System (ADS)

    Del Pino, S.; Labourasse, E.; Morel, G.

    2018-06-01

    We present a multidimensional asymptotic preserving scheme for the approximation of a mixture of compressible flows. Fluids are modelled by two Euler systems of equations coupled with a friction term. The asymptotic preserving property is mandatory for this kind of model, to derive a scheme that behaves well in all regimes (i.e. whatever the friction parameter value is). The method we propose is defined in ALE coordinates, using a Lagrange plus remap approach. This imposes a multidimensional definition and analysis of the scheme.

  4. Blind Quantum Signature with Controlled Four-Particle Cluster States

    NASA Astrophysics Data System (ADS)

    Li, Wei; Shi, Jinjing; Shi, Ronghua; Guo, Ying

    2017-08-01

    A novel blind quantum signature scheme based on cluster states is introduced. Cluster states are a type of multi-qubit entangled states and it is more immune to decoherence than other entangled states. The controlled four-particle cluster states are created by acting controlled-Z gate on particles of four-particle cluster states. The presented scheme utilizes the above entangled states and simplifies the measurement basis to generate and verify the signature. Security analysis demonstrates that the scheme is unconditional secure. It can be employed to E-commerce systems in quantum scenario.

  5. Molecular Characterization and Phylogenetic Analysis of Pseudomonas aeruginosa Isolates Recovered from Greek Aquatic Habitats Implementing the Double-Locus Sequence Typing Scheme.

    PubMed

    Pappa, Olga; Beloukas, Apostolos; Vantarakis, Apostolos; Mavridou, Athena; Kefala, Anastasia-Maria; Galanis, Alex

    2017-07-01

    The recently described double-locus sequence typing (DLST) scheme implemented to deeply characterize the genetic profiles of 52 resistant environmental Pseudomonas aeruginosa isolates deriving from aquatic habitats of Greece. DLST scheme was able not only to assign an already known allelic profile to the majority of the isolates but also to recognize two new ones (ms217-190, ms217-191) with high discriminatory power. A third locus (oprD) was also used for the molecular typing, which has been found to be fundamental for the phylogenetic analysis of environmental isolates given the resulted increased discrimination between the isolates. Additionally, the circulation of acquired resistant mechanisms in the aquatic habitats according to their genetic profiles was proved to be more extent. Hereby, we suggest that the combination of the DLST to oprD typing can discriminate phenotypically and genetically related environmental P. aeruginosa isolates providing reliable phylogenetic analysis at a local level.

  6. On the validity of the modified equation approach to the stability analysis of finite-difference methods

    NASA Technical Reports Server (NTRS)

    Chang, Sin-Chung

    1987-01-01

    The validity of the modified equation stability analysis introduced by Warming and Hyett was investigated. It is shown that the procedure used in the derivation of the modified equation is flawed and generally leads to invalid results. Moreover, the interpretation of the modified equation as the exact partial differential equation solved by a finite-difference method generally cannot be justified even if spatial periodicity is assumed. For a two-level scheme, due to a series of mathematical quirks, the connection between the modified equation approach and the von Neuman method established by Warming and Hyett turns out to be correct despite its questionable original derivation. However, this connection is only partially valid for a scheme involving more than two time levels. In the von Neumann analysis, the complex error multiplication factor associated with a wave number generally has (L-1) roots for an L-level scheme. It is shown that the modified equation provides information about only one of these roots.

  7. Streaming support for data intensive cloud-based sequence analysis.

    PubMed

    Issa, Shadi A; Kienzler, Romeo; El-Kalioby, Mohamed; Tonellato, Peter J; Wall, Dennis; Bruggmann, Rémy; Abouelhoda, Mohamed

    2013-01-01

    Cloud computing provides a promising solution to the genomics data deluge problem resulting from the advent of next-generation sequencing (NGS) technology. Based on the concepts of "resources-on-demand" and "pay-as-you-go", scientists with no or limited infrastructure can have access to scalable and cost-effective computational resources. However, the large size of NGS data causes a significant data transfer latency from the client's site to the cloud, which presents a bottleneck for using cloud computing services. In this paper, we provide a streaming-based scheme to overcome this problem, where the NGS data is processed while being transferred to the cloud. Our scheme targets the wide class of NGS data analysis tasks, where the NGS sequences can be processed independently from one another. We also provide the elastream package that supports the use of this scheme with individual analysis programs or with workflow systems. Experiments presented in this paper show that our solution mitigates the effect of data transfer latency and saves both time and cost of computation.

  8. An Investigation of Wave Propagations in Discontinuous Galerkin Method

    NASA Technical Reports Server (NTRS)

    Hu, Fang Q.

    2004-01-01

    Analysis of the discontinuous Galerkin method has been carried out for one- and two-dimensional system of hyperbolic equations. Analytical, as well as numerical, properties of wave propagation in a DGM scheme are derived and verified with direct numerical simulations. In addition to a systematic examination of the dissipation and dispersion errors, behaviours of a DG scheme at an interface of two different grid topologies are also studied. Under the same framework, a quantitative discrete analysis of various artificial boundary conditions is also conducted. Progress has been made in numerical boundary condition treatment that is closely related to the application of DGM in aeroacoustics problems. Finally, Fourier analysis of DGM for the Convective diffusion equation has also be studied in connection with the application of DG schemes for the Navier-Stokes equations. This research has resulted in five(5) publications, plus one additional manuscript in preparation, four(4) conference presentations, and three(3) departmental seminars, as summarized in part II. Abstracts of papers are given in part 111 of this report.

  9. Single and two-shot quantitative phase imaging using Hilbert-Huang Transform based fringe pattern analysis

    NASA Astrophysics Data System (ADS)

    Trusiak, Maciej; Micó, Vicente; Patorski, Krzysztof; García-Monreal, Javier; Sluzewski, Lukasz; Ferreira, Carlos

    2016-08-01

    In this contribution we propose two Hilbert-Huang Transform based algorithms for fast and accurate single-shot and two-shot quantitative phase imaging applicable in both on-axis and off-axis configurations. In the first scheme a single fringe pattern containing information about biological phase-sample under study is adaptively pre-filtered using empirical mode decomposition based approach. Further it is phase demodulated by the Hilbert Spiral Transform aided by the Principal Component Analysis for the local fringe orientation estimation. Orientation calculation enables closed fringes efficient analysis and can be avoided using arbitrary phase-shifted two-shot Gram-Schmidt Orthonormalization scheme aided by Hilbert-Huang Transform pre-filtering. This two-shot approach is a trade-off between single-frame and temporal phase shifting demodulation. Robustness of the proposed techniques is corroborated using experimental digital holographic microscopy studies of polystyrene micro-beads and red blood cells. Both algorithms compare favorably with the temporal phase shifting scheme which is used as a reference method.

  10. Joint Blind Source Separation by Multi-set Canonical Correlation Analysis

    PubMed Central

    Li, Yi-Ou; Adalı, Tülay; Wang, Wei; Calhoun, Vince D

    2009-01-01

    In this work, we introduce a simple and effective scheme to achieve joint blind source separation (BSS) of multiple datasets using multi-set canonical correlation analysis (M-CCA) [1]. We first propose a generative model of joint BSS based on the correlation of latent sources within and between datasets. We specify source separability conditions, and show that, when the conditions are satisfied, the group of corresponding sources from each dataset can be jointly extracted by M-CCA through maximization of correlation among the extracted sources. We compare source separation performance of the M-CCA scheme with other joint BSS methods and demonstrate the superior performance of the M-CCA scheme in achieving joint BSS for a large number of datasets, group of corresponding sources with heterogeneous correlation values, and complex-valued sources with circular and non-circular distributions. We apply M-CCA to analysis of functional magnetic resonance imaging (fMRI) data from multiple subjects and show its utility in estimating meaningful brain activations from a visuomotor task. PMID:20221319

  11. College Communicative Teaching and E-Learning: A Training Scheme

    ERIC Educational Resources Information Center

    Ong, Charito G.

    2017-01-01

    This study sought to design and try out a training scheme for college teachers on e-learning use as a classroom strategy in a communicative teaching mode. Based on needs analysis the teachers of English were reoriented so that they became equipped with the rationale, strategies and assessment techniques of e-learning alongside communicative…

  12. Time as a Tool for Policy Analysis in Aging.

    ERIC Educational Resources Information Center

    Pastorello, Thomas

    National policy makers have put forth different life cycle planning proposals for the more satisfying integration of education, work and leisure over the life course. This speech describes a decision making scheme, the Time Paradigm, for researched-based choice among various proposals. The scheme is defined in terms of a typology of time-related…

  13. A Coding Scheme for Analysing Problem-Solving Processes of First-Year Engineering Students

    ERIC Educational Resources Information Center

    Grigg, Sarah J.; Benson, Lisa C.

    2014-01-01

    This study describes the development and structure of a coding scheme for analysing solutions to well-structured problems in terms of cognitive processes and problem-solving deficiencies for first-year engineering students. A task analysis approach was used to assess students' problem solutions using the hierarchical structure from a…

  14. Constructing Impairment and Disability in School Reading Schemes

    ERIC Educational Resources Information Center

    Hodkinson, Alan

    2017-01-01

    This paper examines the cultural construction of disability detailed within school reading schemes. The study by the employment of proto-text analysis followed the "reading journeys" that a four- and five-year-old child experienced during the course of one academic year. The study examined 61 reading books that contained 2199…

  15. Defining a Core Genome Multilocus Sequence Typing Scheme for the Global Epidemiology of Vibrio parahaemolyticus

    PubMed Central

    Jolley, Keith A.; Reed, Elizabeth; Martinez-Urtaza, Jaime

    2017-01-01

    ABSTRACT Vibrio parahaemolyticus is an important human foodborne pathogen whose transmission is associated with the consumption of contaminated seafood, with a growing number of infections reported over recent years worldwide. A multilocus sequence typing (MLST) database for V. parahaemolyticus was created in 2008, and a large number of clones have been identified, causing severe outbreaks worldwide (sequence type 3 [ST3]), recurrent outbreaks in certain regions (e.g., ST36), or spreading to other regions where they are nonendemic (e.g., ST88 or ST189). The current MLST scheme uses sequences of 7 genes to generate an ST, which results in a powerful tool for inferring the population structure of this pathogen, although with limited resolution, especially compared to pulsed-field gel electrophoresis (PFGE). The application of whole-genome sequencing (WGS) has become routine for trace back investigations, with core genome MLST (cgMLST) analysis as one of the most straightforward ways to explore complex genomic data in an epidemiological context. Therefore, there is a need to generate a new, portable, standardized, and more advanced system that provides higher resolution and discriminatory power among V. parahaemolyticus strains using WGS data. We sequenced 92 V. parahaemolyticus genomes and used the genome of strain RIMD 2210633 as a reference (with a total of 4,832 genes) to determine which genes were suitable for establishing a V. parahaemolyticus cgMLST scheme. This analysis resulted in the identification of 2,254 suitable core genes for use in the cgMLST scheme. To evaluate the performance of this scheme, we performed a cgMLST analysis of 92 newly sequenced genomes, plus an additional 142 strains with genomes available at NCBI. cgMLST analysis was able to distinguish related and unrelated strains, including those with the same ST, clearly showing its enhanced resolution over conventional MLST analysis. It also distinguished outbreak-related from non-outbreak-related strains within the same ST. The sequences obtained from this work were deposited and are available in the public database (http://pubmlst.org/vparahaemolyticus). The application of this cgMLST scheme to the characterization of V. parahaemolyticus strains provided by different laboratories from around the world will reveal the global picture of the epidemiology, spread, and evolution of this pathogen and will become a powerful tool for outbreak investigations, allowing for the unambiguous comparison of strains with global coverage. PMID:28330888

  16. Leap Frog and Time Step Sub-Cycle Scheme for Coupled Neutronics and Thermal-Hydraulic Codes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lu, S.

    2002-07-01

    As the result of the advancing TCP/IP based inter-process communication technology, more and more legacy thermal-hydraulic codes have been coupled with neutronics codes to provide best-estimate capabilities for reactivity related reactor transient analysis. Most of the coupling schemes are based on closely coupled serial or parallel approaches. Therefore, the execution of the coupled codes usually requires significant CPU time, when a complicated system is analyzed. Leap Frog scheme has been used to reduce the run time. The extent of the decoupling is usually determined based on a trial and error process for a specific analysis. It is the intent ofmore » this paper to develop a set of general criteria, which can be used to invoke the automatic Leap Frog algorithm. The algorithm will not only provide the run time reduction but also preserve the accuracy. The criteria will also serve as the base of an automatic time step sub-cycle scheme when a sudden reactivity change is introduced and the thermal-hydraulic code is marching with a relatively large time step. (authors)« less

  17. A frequency-based window width optimized two-dimensional S-Transform profilometry

    NASA Astrophysics Data System (ADS)

    Zhong, Min; Chen, Feng; Xiao, Chao

    2017-11-01

    A new scheme is proposed to as a frequency-based window width optimized two-dimensional S-Transform profilometry, in which parameters pu and pv are introduced to control the width of a two-dimensional Gaussian window. Unlike the standard two-dimensional S-transform using the Gaussian window with window width proportional to the reciprocal local frequency of the tested signal, the size of window width for the optimized two-dimensional S-Transform varies with the pu th (pv th) power of the reciprocal local frequency fx (fy) in x (y) direction. The paper gives a detailed theoretical analysis of optimized two-dimensional S-Transform in fringe analysis as well as the characteristics of the modified Gauss window. Simulations are applied to evaluate the proposed scheme, the results show that the new scheme has better noise reduction ability and can extract phase distribution more precise in comparison with the standard two-dimensional S-transform even though the surface of the measured object varies sharply. Finally, the proposed scheme is demonstrated on three-dimensional surface reconstruction for a complex plastic cat mask to show its effectiveness.

  18. Error Consistency Analysis Scheme for Infrared Ultraspectral Sounding Retrieval Error Budget Estimation

    NASA Technical Reports Server (NTRS)

    Zhou, Daniel K.; Larar, Allen M.; Liu, Xu; Smith, William L.; Strow, Larry, L.

    2013-01-01

    Great effort has been devoted towards validating geophysical parameters retrieved from ultraspectral infrared radiances obtained from satellite remote sensors. An error consistency analysis scheme (ECAS), utilizing fast radiative transfer model (RTM) forward and inverse calculations, has been developed to estimate the error budget in terms of mean difference and standard deviation of error in both spectral radiance and retrieval domains. The retrieval error is assessed through ECAS without relying on other independent measurements such as radiosonde data. ECAS establishes a link between the accuracies of radiances and retrieved geophysical parameters. ECAS can be applied to measurements from any ultraspectral instrument and any retrieval scheme with its associated RTM. In this manuscript, ECAS is described and demonstrated with measurements from the MetOp-A satellite Infrared Atmospheric Sounding Interferometer (IASI). This scheme can be used together with other validation methodologies to give a more definitive characterization of the error and/or uncertainty of geophysical parameters retrieved from ultraspectral radiances observed from current and future satellite remote sensors such as IASI, the Atmospheric Infrared Sounder (AIRS), and the Cross-track Infrared Sounder (CrIS).

  19. A special protection scheme utilizing trajectory sensitivity analysis in power transmission

    NASA Astrophysics Data System (ADS)

    Suriyamongkol, Dan

    In recent years, new measurement techniques have provided opportunities to improve the North American Power System observability, control and protection. This dissertation discusses the formulation and design of a special protection scheme based on a novel utilization of trajectory sensitivity techniques with inputs consisting of system state variables and parameters. Trajectory sensitivity analysis (TSA) has been used in previous publications as a method for power system security and stability assessment, and the mathematical formulation of TSA lends itself well to some of the time domain power system simulation techniques. Existing special protection schemes often have limited sets of goals and control actions. The proposed scheme aims to maintain stability while using as many control actions as possible. The approach here will use the TSA in a novel way by using the sensitivities of system state variables with respect to state parameter variations to determine the state parameter controls required to achieve the desired state variable movements. The initial application will operate based on the assumption that the modeled power system has full system observability, and practical considerations will be discussed.

  20. Void effect analysis of Pb-208 of fast reactors with modified CANDLE burn-up scheme

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Widiawati, Nina, E-mail: nina-widiawati28@yahoo.com; Su’ud, Zaki, E-mail: szaki@fi.itb.ac.id

    Void effect analysis of Pb-208 as coolant of fast reactors with modified candle burn-up scheme has been conducted. Lead cooled fast reactor (LFR) is one of the fourth-generation reactor designs. The reactor is designed with a thermal power output of 500 MWt. Modified CANDLE burn-up scheme allows the reactor to have long life operation by supplying only natural uranium as fuel cycle input. This scheme introducing discrete region, the fuel is initially put in region 1, after one cycle of 10 years of burn up it is shifted to region 2 and region 1 is filled by fresh natural uraniummore » fuel. The reactor is designed for 100 years with 10 regions arranged axially. The results of neutronic calculation showed that the void coefficients ranged from −0.6695443 % at BOC to −0.5273626 % at EOC for 500 MWt reactor. The void coefficients of Pb-208 more negative than Pb-nat. The results showed that the reactors with Pb-208 coolant have better level of safety than Pb-nat.« less

Top