A Study of Gaugeon Formalism for QED in Lorentz Violating Background
NASA Astrophysics Data System (ADS)
Shah, Mushtaq B.; Ganai, Prince A.
2018-02-01
At the energy regimes close to Planck scales, the usual structure of Lorentz symmetry fails to address certain fundamental issues and eventually breaks down, thus paving the way for an alternative road map. It is thus argued that some subgroup of proper Lorentz group could stand consistent and might possibly help us to circumvent this problem. It is this subgroup that goes by the name of Very Special Relativity (VSR). Apart from violating rotational symmetry, VSR is believed to preserve the very tenets of special relativity. The gaugeon formalism due to type-I Yokoyama and type-II Izawa are found to be invariant under BRST symmetry. In this paper, we analyze the scope of this invariance in the scheme of VSR. Furthermore, we will obtain VSR modified Lagrangian density using path integral derivation. We will explore the consistency of VSR with regard to these theories.
NASA Astrophysics Data System (ADS)
Akashi, Ryosuke; Nagornov, Yuri S.
2018-06-01
We develop a non-empirical scheme to search for the minimum-energy escape paths from the minima of the potential surface to unknown saddle points nearby. A stochastic algorithm is constructed to move the walkers up the surface through the potential valleys. This method employs only the local gradient and diagonal part of the Hessian matrix of the potential. An application to a two-dimensional model potential is presented to demonstrate the successful finding of the paths to the saddle points. The present scheme could serve as a starting point toward first-principles simulation of rare events across the potential basins free from empirical collective variables.
Cendagorta, Joseph R; Bačić, Zlatko; Tuckerman, Mark E
2018-03-14
We introduce a scheme for approximating quantum time correlation functions numerically within the Feynman path integral formulation. Starting with the symmetrized version of the correlation function expressed as a discretized path integral, we introduce a change of integration variables often used in the derivation of trajectory-based semiclassical methods. In particular, we transform to sum and difference variables between forward and backward complex-time propagation paths. Once the transformation is performed, the potential energy is expanded in powers of the difference variables, which allows us to perform the integrals over these variables analytically. The manner in which this procedure is carried out results in an open-chain path integral (in the remaining sum variables) with a modified potential that is evaluated using imaginary-time path-integral sampling rather than requiring the generation of a large ensemble of trajectories. Consequently, any number of path integral sampling schemes can be employed to compute the remaining path integral, including Monte Carlo, path-integral molecular dynamics, or enhanced path-integral molecular dynamics. We believe that this approach constitutes a different perspective in semiclassical-type approximations to quantum time correlation functions. Importantly, we argue that our approximation can be systematically improved within a cumulant expansion formalism. We test this approximation on a set of one-dimensional problems that are commonly used to benchmark approximate quantum dynamical schemes. We show that the method is at least as accurate as the popular ring-polymer molecular dynamics technique and linearized semiclassical initial value representation for correlation functions of linear operators in most of these examples and improves the accuracy of correlation functions of nonlinear operators.
NASA Astrophysics Data System (ADS)
Cendagorta, Joseph R.; Bačić, Zlatko; Tuckerman, Mark E.
2018-03-01
We introduce a scheme for approximating quantum time correlation functions numerically within the Feynman path integral formulation. Starting with the symmetrized version of the correlation function expressed as a discretized path integral, we introduce a change of integration variables often used in the derivation of trajectory-based semiclassical methods. In particular, we transform to sum and difference variables between forward and backward complex-time propagation paths. Once the transformation is performed, the potential energy is expanded in powers of the difference variables, which allows us to perform the integrals over these variables analytically. The manner in which this procedure is carried out results in an open-chain path integral (in the remaining sum variables) with a modified potential that is evaluated using imaginary-time path-integral sampling rather than requiring the generation of a large ensemble of trajectories. Consequently, any number of path integral sampling schemes can be employed to compute the remaining path integral, including Monte Carlo, path-integral molecular dynamics, or enhanced path-integral molecular dynamics. We believe that this approach constitutes a different perspective in semiclassical-type approximations to quantum time correlation functions. Importantly, we argue that our approximation can be systematically improved within a cumulant expansion formalism. We test this approximation on a set of one-dimensional problems that are commonly used to benchmark approximate quantum dynamical schemes. We show that the method is at least as accurate as the popular ring-polymer molecular dynamics technique and linearized semiclassical initial value representation for correlation functions of linear operators in most of these examples and improves the accuracy of correlation functions of nonlinear operators.
Prokudin, Alexei; Sun, Peng; Yuan, Feng
2015-10-01
Following an earlier derivation by Catani-de Florian-Grazzini (2000) on the scheme dependence in the Collins-Soper- Sterman (CSS) resummation formalism in hard scattering processes, we investigate the scheme dependence of the Transverse Momentum Distributions (TMDs) and their applications. By adopting a universal C-coefficient function associated with the integrated parton distributions, the difference between various TMD schemes can be attributed to a perturbative calculable function depending on the hard momentum scale. Thus, we further apply several TMD schemes to the Drell-Yan process of lepton pair production in hadronic collisions, and find that the constrained non-perturbative form factors in different schemes are remarkablymore » consistent with each other and with that of the standard CSS formalism.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Prokudin, Alexei; Sun, Peng; Yuan, Feng
Following an earlier derivation by Catani-de Florian-Grazzini (2000) on the scheme dependence in the Collins-Soper- Sterman (CSS) resummation formalism in hard scattering processes, we investigate the scheme dependence of the Transverse Momentum Distributions (TMDs) and their applications. By adopting a universal C-coefficient function associated with the integrated parton distributions, the difference between various TMD schemes can be attributed to a perturbative calculable function depending on the hard momentum scale. Thus, we further apply several TMD schemes to the Drell-Yan process of lepton pair production in hadronic collisions, and find that the constrained non-perturbative form factors in different schemes are remarkablymore » consistent with each other and with that of the standard CSS formalism.« less
NASA Astrophysics Data System (ADS)
Prokudin, Alexei; Sun, Peng; Yuan, Feng
2015-11-01
Following an earlier derivation by Catani, de Florian and Grazzini (2000) on the scheme dependence in the Collins-Soper-Sterman (CSS) resummation formalism in hard scattering processes, we investigate the scheme dependence of the Transverse Momentum Distributions (TMDs) and their applications. By adopting a universal C-coefficient function associated with the integrated parton distributions, the difference between various TMD schemes can be attributed to a perturbative calculable function depending on the hard momentum scale. We further apply several TMD schemes to the Drell-Yan process of lepton pair production in hadronic collisions, and find that the constrained non-perturbative form factors in different schemes are consistent with each other and with that of the standard CSS formalism.
On the Path Integral in Non-Commutative (nc) Qft
NASA Astrophysics Data System (ADS)
Dehne, Christoph
2008-09-01
As is generally known, different quantization schemes applied to field theory on NC spacetime lead to Feynman rules with different physical properties, if time does not commute with space. In particular, the Feynman rules that are derived from the path integral corresponding to the T*-product (the so-called naïve Feynman rules) violate the causal time ordering property. Within the Hamiltonian approach to quantum field theory, we show that we can (formally) modify the time ordering encoded in the above path integral. The resulting Feynman rules are identical to those obtained in the canonical approach via the Gell-Mann-Low formula (with T-ordering). They preserve thus unitarity and causal time ordering.
NASA Astrophysics Data System (ADS)
Pötz, Walter
2017-11-01
A single-cone finite-difference lattice scheme is developed for the (2+1)-dimensional Dirac equation in presence of general electromagnetic textures. The latter is represented on a (2+1)-dimensional staggered grid using a second-order-accurate finite difference scheme. A Peierls-Schwinger substitution to the wave function is used to introduce the electromagnetic (vector) potential into the Dirac equation. Thereby, the single-cone energy dispersion and gauge invariance are carried over from the continuum to the lattice formulation. Conservation laws and stability properties of the formal scheme are identified by comparison with the scheme for zero vector potential. The placement of magnetization terms is inferred from consistency with the one for the vector potential. Based on this formal scheme, several numerical schemes are proposed and tested. Elementary examples for single-fermion transport in the presence of in-plane magnetization are given, using material parameters typical for topological insulator surfaces.
Characterizing the propagation path in moderate to strong optical turbulence.
Vetelino, Frida Strömqvist; Clare, Bradley; Corbett, Kerry; Young, Cynthia; Grant, Kenneth; Andrews, Larry
2006-05-20
In February 2005 a joint atmospheric propagation experiment was conducted between the Australian Defence Science and Technology Organisation and the University of Central Florida. A Gaussian beam was propagated along a horizontal 1500 m path near the ground. Scintillation was measured simultaneously at three receivers of diameters 1, 5, and 13 mm. Scintillation theory combined with a numerical scheme was used to infer the structure constant C2n, the inner scale l0, and the outer scale L0 from the optical measurements. At the same time, C2n measurements were taken by a commercial scintillometer, set up parallel to the optical path. The C2n values from the inferred scheme and the commercial scintillometer predict the same behavior, but the inferred scheme consistently gives slightly smaller C2n values.
NASA Astrophysics Data System (ADS)
Heo, Jino; Hong, Chang-Ho; Lim, Jong-In; Yang, Hyung-Jin
2015-05-01
We propose an arbitrary controlled-unitary (CU) gate and a bidirectional quantum teleportation (BQTP) scheme. The proposed CU gate utilizes photonic qubits (photons) with cross-Kerr nonlinearities (XKNLs), X-homodyne detectors, and linear optical elements, and consists of the consecutive operation of a controlled-path (C-path) gate and a gathering-path (G-path) gate. It is almost deterministic and feasible with current technology when a strong coherent state and weak XKNLs are employed. Based on the CU gate, we present a BQTP scheme that simultaneously teleports two unknown photons between distant users by transmitting only one photon in a path-polarization intra-particle hybrid entangled state. Consequently, it is possible to experimentally implement BQTP with a certain success probability using the proposed CU gate. Project supported by the Ministry of Science, ICT&Future Planning, Korea, under the C-ITRC (Convergence Information Technology Research Center) Support program (NIPA-2013-H0301-13-3007) supervised by the National IT Industry Promotion Agency.
Report of the eRHIC Ring-Ring Working Group
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aschenauer, E. C.; Berg, S.; Blaskiewicz, M.
2015-10-13
This report evaluates the ring-ring option for eRHIC as a lower risk alternative to the linac-ring option. The reduced risk goes along with a reduced initial luminosity performance. However, a luminosity upgrade path is kept open. This upgrade path consists of two branches, with the ultimate upgrade being either a ring-ring or a linac-ring scheme. The linac-ring upgrade could be almost identical to the proposed linac-ring scheme, which is based on an ERL in the RHIC tunnel. This linac-ring version has been studied in great detail over the past ten years, and its significant risks are known. On the othermore » hand, no detailed work on an ultimate performance ring-ring scenario has been performed yet, other than the development of a consistent parameter set. Pursuing the ring-ring upgrade path introduces high risks and requires significant design work that is beyond the scope of this report.« less
A new formal graphic language for the representation of complex energy distribution systems
NASA Astrophysics Data System (ADS)
Benes, E.; Viehboeck, F. P.
A schematic notation system for the representation in design and analysis of multi-component heating systems is presented. This graphic language is clear and rigorous and allows quick changes between two basic levels of abstraction, as shown by two examples: a swimming pool with combined solar/electric heating system and the low temperature heating system of the Institute of Molecular Biology in Salzburg, Austria. The notation's 'energy path graphs' are more adequate for judging the relative merits of alternative system configurations than commonly used simplified installation schemes.
Dissipative quantum computing with open quantum walks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sinayskiy, Ilya; Petruccione, Francesco
An open quantum walk approach to the implementation of a dissipative quantum computing scheme is presented. The formalism is demonstrated for the example of an open quantum walk implementation of a 3 qubit quantum circuit consisting of 10 gates.
Computation of rare transitions in the barotropic quasi-geostrophic equations
NASA Astrophysics Data System (ADS)
Laurie, Jason; Bouchet, Freddy
2015-01-01
We investigate the theoretical and numerical computation of rare transitions in simple geophysical turbulent models. We consider the barotropic quasi-geostrophic and two-dimensional Navier-Stokes equations in regimes where bistability between two coexisting large-scale attractors exist. By means of large deviations and instanton theory with the use of an Onsager-Machlup path integral formalism for the transition probability, we show how one can directly compute the most probable transition path between two coexisting attractors analytically in an equilibrium (Langevin) framework and numerically otherwise. We adapt a class of numerical optimization algorithms known as minimum action methods to simple geophysical turbulent models. We show that by numerically minimizing an appropriate action functional in a large deviation limit, one can predict the most likely transition path for a rare transition between two states. By considering examples where theoretical predictions can be made, we show that the minimum action method successfully predicts the most likely transition path. Finally, we discuss the application and extension of such numerical optimization schemes to the computation of rare transitions observed in direct numerical simulations and experiments and to other, more complex, turbulent systems.
High-Order Energy Stable WENO Schemes
NASA Technical Reports Server (NTRS)
Yamaleev, Nail K.; Carpenter, Mark H.
2009-01-01
A third-order Energy Stable Weighted Essentially Non-Oscillatory (ESWENO) finite difference scheme developed by Yamaleev and Carpenter was proven to be stable in the energy norm for both continuous and discontinuous solutions of systems of linear hyperbolic equations. Herein, a systematic approach is presented that enables 'energy stable' modifications for existing WENO schemes of any order. The technique is demonstrated by developing a one-parameter family of fifth-order upwind-biased ESWENO schemes; ESWENO schemes up to eighth order are presented in the appendix. New weight functions are also developed that provide (1) formal consistency, (2) much faster convergence for smooth solutions with an arbitrary number of vanishing derivatives, and (3) improved resolution near strong discontinuities.
Quantization of Simple Parametrized Systems
NASA Astrophysics Data System (ADS)
Ruffini, Giulio
1995-01-01
I study the canonical formulation and quantization of some simple parametrized systems using Dirac's formalism and the Becchi-Rouet-Stora-Tyutin (BRST) extended phase space method. These systems include the parametrized particle and minisuperspace. Using Dirac's formalism I first analyze for each case the construction of the classical reduced phase space. There are two separate features of these systems that may make this construction difficult: (a) Because of the boundary conditions used, the actions are not gauge invariant at the boundaries. (b) The constraints may have a disconnected solution space. The relativistic particle and minisuperspace have such complicated constraints, while the non-relativistic particle displays only the first feature. I first show that a change of gauge fixing is equivalent to a canonical transformation in the reduced phase space, thus resolving the problems associated with the first feature above. Then I consider the quantization of these systems using several approaches: Dirac's method, Dirac-Fock quantization, and the BRST formalism. In the cases of the relativistic particle and minisuperspace I consider first the quantization of one branch of the constraint at the time and then discuss the backgrounds in which it is possible to quantize simultaneously both branches. I motivate and define the inner product, and obtain, for example, the Klein-Gordon inner product for the relativistic case. Then I show how to construct phase space path integral representations for amplitudes in these approaches--the Batalin-Fradkin-Vilkovisky (BFV) and the Faddeev path integrals --from which one can then derive the path integrals in coordinate space--the Faddeev-Popov path integral and the geometric path integral. In particular I establish the connection between the Hilbert space representation and the range of the lapse in the path integrals. I also examine the class of paths that contribute in the path integrals and how they affect space-time covariance, concluding that it is consistent to take paths that move forward in time only when there is no electric field. The key elements in this analysis are the space-like paths and the behavior of the action under the non-trivial ( Z_2) element of the reparametrization group.
Critique of Coleman's Theory of the Vanishing Cosmological Constant
NASA Astrophysics Data System (ADS)
Susskind, Leonard
In these lectures I would like to review some of the criticisms to the Coleman worm-hole theory of the vanishing cosmological constant. In particular, I would like to focus on the most fundamental assumption that the path integral over topologies defines a probability for the cosmological constant which has the form EXP(A) with A being the Baum-Hawking-Coleman saddle point. Coleman argues that the euclideam path integral over all geometries may be dominated by special configurations which consist of large smooth "spheres" connected by any number of narrow wormholes. Formally summing up such configurations gives a very divergent expression for the path integral…
A Systematic Methodology for Constructing High-Order Energy-Stable WENO Schemes
NASA Technical Reports Server (NTRS)
Yamaleev, Nail K.; Carpenter, Mark H.
2008-01-01
A third-order Energy Stable Weighted Essentially Non-Oscillatory (ESWENO) finite difference scheme developed by Yamaleev and Carpenter (AIAA 2008-2876, 2008) was proven to be stable in the energy norm for both continuous and discontinuous solutions of systems of linear hyperbolic equations. Herein, a systematic approach is presented that enables \\energy stable" modifications for existing WENO schemes of any order. The technique is demonstrated by developing a one-parameter family of fifth-order upwind-biased ESWENO schemes; ESWENO schemes up to eighth order are presented in the appendix. New weight functions are also developed that provide (1) formal consistency, (2) much faster convergence for smooth solutions with an arbitrary number of vanishing derivatives, and (3) improved resolution near strong discontinuities.
A Systematic Methodology for Constructing High-Order Energy Stable WENO Schemes
NASA Technical Reports Server (NTRS)
Yamaleev, Nail K.; Carpenter, Mark H.
2009-01-01
A third-order Energy Stable Weighted Essentially Non{Oscillatory (ESWENO) finite difference scheme developed by Yamaleev and Carpenter [1] was proven to be stable in the energy norm for both continuous and discontinuous solutions of systems of linear hyperbolic equations. Herein, a systematic approach is presented that enables "energy stable" modifications for existing WENO schemes of any order. The technique is demonstrated by developing a one-parameter family of fifth-order upwind-biased ESWENO schemes; ESWENO schemes up to eighth order are presented in the appendix. New weight functions are also developed that provide (1) formal consistency, (2) much faster convergence for smooth solutions with an arbitrary number of vanishing derivatives, and (3) improved resolution near strong discontinuities.
Cho, Sunghyun; Choi, Ji-Woong; You, Cheolwoo
2013-10-02
Mobile wireless multimedia sensor networks (WMSNs), which consist of mobile sink or sensor nodes and use rich sensing information, require much faster and more reliable wireless links than static wireless sensor networks (WSNs). This paper proposes an adaptive multi-node (MN) multiple input and multiple output (MIMO) transmission to improve the transmission reliability and capacity of mobile sink nodes when they experience spatial correlation. Unlike conventional single-node (SN) MIMO transmission, the proposed scheme considers the use of transmission antennas from more than two sensor nodes. To find an optimal antenna set and a MIMO transmission scheme, a MN MIMO channel model is introduced first, followed by derivation of closed-form ergodic capacity expressions with different MIMO transmission schemes, such as space-time transmit diversity coding and spatial multiplexing. The capacity varies according to the antenna correlation and the path gain from multiple sensor nodes. Based on these statistical results, we propose an adaptive MIMO mode and antenna set switching algorithm that maximizes the ergodic capacity of mobile sink nodes. The ergodic capacity of the proposed scheme is compared with conventional SN MIMO schemes, where the gain increases as the antenna correlation and path gain ratio increase.
Cho, Sunghyun; Choi, Ji-Woong; You, Cheolwoo
2013-01-01
Mobile wireless multimedia sensor networks (WMSNs), which consist of mobile sink or sensor nodes and use rich sensing information, require much faster and more reliable wireless links than static wireless sensor networks (WSNs). This paper proposes an adaptive multi-node (MN) multiple input and multiple output (MIMO) transmission to improve the transmission reliability and capacity of mobile sink nodes when they experience spatial correlation. Unlike conventional single-node (SN) MIMO transmission, the proposed scheme considers the use of transmission antennas from more than two sensor nodes. To find an optimal antenna set and a MIMO transmission scheme, a MN MIMO channel model is introduced first, followed by derivation of closed-form ergodic capacity expressions with different MIMO transmission schemes, such as space-time transmit diversity coding and spatial multiplexing. The capacity varies according to the antenna correlation and the path gain from multiple sensor nodes. Based on these statistical results, we propose an adaptive MIMO mode and antenna set switching algorithm that maximizes the ergodic capacity of mobile sink nodes. The ergodic capacity of the proposed scheme is compared with conventional SN MIMO schemes, where the gain increases as the antenna correlation and path gain ratio increase. PMID:24152920
Quantum annealing of the traveling-salesman problem.
Martonák, Roman; Santoro, Giuseppe E; Tosatti, Erio
2004-11-01
We propose a path-integral Monte Carlo quantum annealing scheme for the symmetric traveling-salesman problem, based on a highly constrained Ising-like representation, and we compare its performance against standard thermal simulated annealing. The Monte Carlo moves implemented are standard, and consist in restructuring a tour by exchanging two links (two-opt moves). The quantum annealing scheme, even with a drastically simple form of kinetic energy, appears definitely superior to the classical one, when tested on a 1002-city instance of the standard TSPLIB.
Microscopic theory of cavity-enhanced single-photon emission from optical two-photon Raman processes
NASA Astrophysics Data System (ADS)
Breddermann, Dominik; Praschan, Tom; Heinze, Dirk; Binder, Rolf; Schumacher, Stefan
2018-03-01
We consider cavity-enhanced single-photon generation from stimulated two-photon Raman processes in three-level systems. We compare four fundamental system configurations, one Λ -, one V-, and two ladder (Ξ -) configurations. These can be realized as subsystems of a single quantum dot or of quantum-dot molecules. For a new microscopic understanding of the Raman process, we analyze the Heisenberg equation of motion applying the cluster-expansion scheme. Within this formalism an exact and rigorous definition of a cavity-enhanced Raman photon via its corresponding Raman correlation is possible. This definition for example enables us to systematically investigate the on-demand potential of Raman-transition-based single-photon sources. The four system arrangements can be divided into two subclasses, Λ -type and V-type, which exhibit strongly different Raman-emission characteristics and Raman-emission probabilities. Moreover, our approach reveals whether the Raman path generates a single photon or just induces destructive quantum interference with other excitation paths. Based on our findings and as a first application, we gain a more detailed understanding of experimental data from the literature. Our analysis and results are also transferable to the case of atomic three-level-resonator systems and can be extended to more complicated multilevel schemes.
Hierarchical Motion Planning for Autonomous Aerial and Terrestrial Vehicles
NASA Astrophysics Data System (ADS)
Cowlagi, Raghvendra V.
Autonomous mobile robots---both aerial and terrestrial vehicles---have gained immense importance due to the broad spectrum of their potential military and civilian applications. One of the indispensable requirements for the autonomy of a mobile vehicle is the vehicle's capability of planning and executing its motion, that is, finding appropriate control inputs for the vehicle such that the resulting vehicle motion satisfies the requirements of the vehicular task. The motion planning and control problem is inherently complex because it involves two disparate sub-problems: (1) satisfaction of the vehicular task requirements, which requires tools from combinatorics and/or formal methods, and (2) design of the vehicle control laws, which requires tools from dynamical systems and control theory. Accordingly, this problem is usually decomposed and solved over two levels of hierarchy. The higher level, called the geometric path planning level, finds a geometric path that satisfies the vehicular task requirements, e.g., obstacle avoidance. The lower level, called the trajectory planning level, involves sufficient smoothening of this geometric path followed by a suitable time parametrization to obtain a reference trajectory for the vehicle. Although simple and efficient, such hierarchical decomposition suffers a serious drawback: the geometric path planner has no information of the kinematical and dynamical constraints of the vehicle. Consequently, the geometric planner may produce paths that the trajectory planner cannot transform into a feasible reference trajectory. Two main ideas appear in the literature to remedy this problem: (a) randomized sampling-based planning, which eliminates the geometric planner altogether by planning in the vehicle state space, and (b) geometric planning supported by feedback control laws. The former class of methods suffer from a lack of optimality of the resultant trajectory, while the latter class of methods makes a restrictive assumption concerning the vehicle kinematical model. We propose a hierarchical motion planning framework based on a novel mode of interaction between these two levels of planning. This interaction rests on the solution of a special shortest-path problem on graphs, namely, one using costs defined on multiple edge transitions in the path instead of the usual single edge transition costs. These costs are provided by a local trajectory generation algorithm, which we implement using model predictive control and the concept of effective target sets for simplifying the non-convex constraints involved in the problem. The proposed motion planner ensures "consistency" between the two levels of planning, i.e., a guarantee that the higher level geometric path is always associated with a kinematically and dynamically feasible trajectory. The main contributions of this thesis are: 1. A motion planning framework based on history-dependent costs (H-costs) in cell decomposition graphs for incorporating vehicle dynamical constraints: this framework offers distinct advantages in comparison with the competing approaches of discretization of the state space, of randomized sampling-based motion planning, and of local feedback-based, decoupled hierarchical motion planning, 2. An efficient and flexible algorithm for finding optimal H-cost paths, 3. A precise and general formulation of a local trajectory problem (the tile motion planning problem) that allows independent development of the discrete planner and the trajectory planner, while maintaining "compatibility" between the two planners, 4. A local trajectory generation algorithm using mpc, and the application of the concept of effective target sets for a significant simplification of the local trajectory generation problem, 5. The geometric analysis of curvature-bounded traversal of rectangular channels, leading to less conservative results in comparison with a result reported in the literature, and also to the efficient construction of effective target sets for the solution of the tile motion planning problem, 6. A wavelet-based multi-resolution path planning scheme, and a proof of completeness of the proposed scheme: such proofs are altogether absent from other works on multi-resolution path planning, 7. A technique for extracting all information about cells---namely, the locations, the sizes, and the associated image intensities---directly from the set of significant detail coefficients considered for path planning at a given iteration, and 8. The extension of the multi-resolution path planning scheme to include vehicle dynamical constraints using the aforementioned history-dependent costs approach. The future work includes an implementation of the proposed framework involving a discrete planner that solves classical planning problems more general than the single-query path planning problem considered thus far, and involving trajectory generation schemes for realistic vehicle dynamical models such as the bicycle model.
NASA Astrophysics Data System (ADS)
Louko, Jorma
2007-04-01
Bastianelli and van Nieuwenhuizen's monograph `Path Integrals and Anomalies in Curved Space' collects in one volume the results of the authors' 15-year research programme on anomalies that arise in Feynman diagrams of quantum field theories on curved manifolds. The programme was spurred by the path-integral techniques introduced in Alvarez-Gaumé and Witten's renowned 1983 paper on gravitational anomalies which, together with the anomaly cancellation paper by Green and Schwarz, led to the string theory explosion of the 1980s. The authors have produced a tour de force, giving a comprehensive and pedagogical exposition of material that is central to current research. The first part of the book develops from scratch a formalism for defining and evaluating quantum mechanical path integrals in nonlinear sigma models, using time slicing regularization, mode regularization and dimensional regularization. The second part applies this formalism to quantum fields of spin 0, 1/2, 1 and 3/2 and to self-dual antisymmetric tensor fields. The book concludes with a discussion of gravitational anomalies in 10-dimensional supergravities, for both classical and exceptional gauge groups. The target audience is researchers and graduate students in curved spacetime quantum field theory and string theory, and the aims, style and pedagogical level have been chosen with this audience in mind. Path integrals are treated as calculational tools, and the notation and terminology are throughout tailored to calculational convenience, rather than to mathematical rigour. The style is closer to that of an exceedingly thorough and self-contained review article than to that of a textbook. As the authors mention, the first part of the book can be used as an introduction to path integrals in quantum mechanics, although in a classroom setting perhaps more likely as supplementary reading than a primary class text. Readers outside the core audience, including this reviewer, will gain from the book a heightened appreciation of the central role of regularization as a defining ingredient of a quantum field theory and will be impressed by the agreement of results arising from different regularization schemes. The readers may in particular enjoy the authors' `brief history of anomalies' in quantum field theory, as well as a similar historical discussion of path integrals in quantum mechanics.
Su, Hongling; Li, Shengtai
2016-02-03
In this study, we propose two new energy/dissipation-preserving Birkhoffian multi-symplectic methods (Birkhoffian and Birkhoffian box) for Maxwell's equations with dissipation terms. After investigating the non-autonomous and autonomous Birkhoffian formalism for Maxwell's equations with dissipation terms, we first apply a novel generating functional theory to the non-autonomous Birkhoffian formalism to propose our Birkhoffian scheme, and then implement a central box method to the autonomous Birkhoffian formalism to derive the Birkhoffian box scheme. We have obtained four formal local conservation laws and three formal energy global conservation laws. We have also proved that both of our derived schemes preserve the discrete versionmore » of the global/local conservation laws. Furthermore, the stability, dissipation and dispersion relations are also investigated for the schemes. Theoretical analysis shows that the schemes are unconditionally stable, dissipation-preserving for Maxwell's equations in a perfectly matched layer (PML) medium and have second order accuracy in both time and space. Numerical experiments for problems with exact theoretical results are given to demonstrate that the Birkhoffian multi-symplectic schemes are much more accurate in preserving energy than both the exponential finite-difference time-domain (FDTD) method and traditional Hamiltonian scheme. Finally, we also solve the electromagnetic pulse (EMP) propagation problem and the numerical results show that the Birkhoffian scheme recovers the magnitude of the current source and reaction history very well even after long time propagation.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Su, Hongling; Li, Shengtai
In this study, we propose two new energy/dissipation-preserving Birkhoffian multi-symplectic methods (Birkhoffian and Birkhoffian box) for Maxwell's equations with dissipation terms. After investigating the non-autonomous and autonomous Birkhoffian formalism for Maxwell's equations with dissipation terms, we first apply a novel generating functional theory to the non-autonomous Birkhoffian formalism to propose our Birkhoffian scheme, and then implement a central box method to the autonomous Birkhoffian formalism to derive the Birkhoffian box scheme. We have obtained four formal local conservation laws and three formal energy global conservation laws. We have also proved that both of our derived schemes preserve the discrete versionmore » of the global/local conservation laws. Furthermore, the stability, dissipation and dispersion relations are also investigated for the schemes. Theoretical analysis shows that the schemes are unconditionally stable, dissipation-preserving for Maxwell's equations in a perfectly matched layer (PML) medium and have second order accuracy in both time and space. Numerical experiments for problems with exact theoretical results are given to demonstrate that the Birkhoffian multi-symplectic schemes are much more accurate in preserving energy than both the exponential finite-difference time-domain (FDTD) method and traditional Hamiltonian scheme. Finally, we also solve the electromagnetic pulse (EMP) propagation problem and the numerical results show that the Birkhoffian scheme recovers the magnitude of the current source and reaction history very well even after long time propagation.« less
Higher-Order Compact Schemes for Numerical Simulation of Incompressible Flows
NASA Technical Reports Server (NTRS)
Wilson, Robert V.; Demuren, Ayodeji O.; Carpenter, Mark
1998-01-01
A higher order accurate numerical procedure has been developed for solving incompressible Navier-Stokes equations for 2D or 3D fluid flow problems. It is based on low-storage Runge-Kutta schemes for temporal discretization and fourth and sixth order compact finite-difference schemes for spatial discretization. The particular difficulty of satisfying the divergence-free velocity field required in incompressible fluid flow is resolved by solving a Poisson equation for pressure. It is demonstrated that for consistent global accuracy, it is necessary to employ the same order of accuracy in the discretization of the Poisson equation. Special care is also required to achieve the formal temporal accuracy of the Runge-Kutta schemes. The accuracy of the present procedure is demonstrated by application to several pertinent benchmark problems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Xu, Y; Southern Medical University, Guangzhou; Tian, Z
Purpose: Monte Carlo (MC) simulation is an important tool to solve radiotherapy and medical imaging problems. Low computational efficiency hinders its wide applications. Conventionally, MC is performed in a particle-by -particle fashion. The lack of control on particle trajectory is a main cause of low efficiency in some applications. Take cone beam CT (CBCT) projection simulation as an example, significant amount of computations were wasted on transporting photons that do not reach the detector. To solve this problem, we propose an innovative MC simulation scheme with a path-by-path sampling method. Methods: Consider a photon path starting at the x-ray source.more » After going through a set of interactions, it ends at the detector. In the proposed scheme, we sampled an entire photon path each time. Metropolis-Hasting algorithm was employed to accept/reject a sampled path based on a calculated acceptance probability, in order to maintain correct relative probabilities among different paths, which are governed by photon transport physics. We developed a package gMMC on GPU with this new scheme implemented. The performance of gMMC was tested in a sample problem of CBCT projection simulation for a homogeneous object. The results were compared to those obtained using gMCDRR, a GPU-based MC tool with the conventional particle-by-particle simulation scheme. Results: Calculated scattered photon signals in gMMC agreed with those from gMCDRR with a relative difference of 3%. It took 3.1 hr. for gMCDRR to simulate 7.8e11 photons and 246.5 sec for gMMC to simulate 1.4e10 paths. Under this setting, both results attained the same ∼2% statistical uncertainty. Hence, a speed-up factor of ∼45.3 was achieved by this new path-by-path simulation scheme, where all the computations were spent on those photons contributing to the detector signal. Conclusion: We innovatively proposed a novel path-by-path simulation scheme that enabled a significant efficiency enhancement for MC particle transport simulations.« less
NASA Astrophysics Data System (ADS)
Vitale, Valerio; Dziedzic, Jacek; Albaugh, Alex; Niklasson, Anders M. N.; Head-Gordon, Teresa; Skylaris, Chris-Kriton
2017-03-01
Iterative energy minimization with the aim of achieving self-consistency is a common feature of Born-Oppenheimer molecular dynamics (BOMD) and classical molecular dynamics with polarizable force fields. In the former, the electronic degrees of freedom are optimized, while the latter often involves an iterative determination of induced point dipoles. The computational effort of the self-consistency procedure can be reduced by re-using converged solutions from previous time steps. However, this must be done carefully, as not to break time-reversal symmetry, which negatively impacts energy conservation. Self-consistent schemes based on the extended Lagrangian formalism, where the initial guesses for the optimized quantities are treated as auxiliary degrees of freedom, constitute one elegant solution. We report on the performance of two integration schemes with the same underlying extended Lagrangian structure, which we both employ in two radically distinct regimes—in classical molecular dynamics simulations with the AMOEBA polarizable force field and in BOMD simulations with the Onetep linear-scaling density functional theory (LS-DFT) approach. Both integration schemes are found to offer significant improvements over the standard (unpropagated) molecular dynamics formulation in both the classical and LS-DFT regimes.
Vitale, Valerio; Dziedzic, Jacek; Albaugh, Alex; Niklasson, Anders M N; Head-Gordon, Teresa; Skylaris, Chris-Kriton
2017-03-28
Iterative energy minimization with the aim of achieving self-consistency is a common feature of Born-Oppenheimer molecular dynamics (BOMD) and classical molecular dynamics with polarizable force fields. In the former, the electronic degrees of freedom are optimized, while the latter often involves an iterative determination of induced point dipoles. The computational effort of the self-consistency procedure can be reduced by re-using converged solutions from previous time steps. However, this must be done carefully, as not to break time-reversal symmetry, which negatively impacts energy conservation. Self-consistent schemes based on the extended Lagrangian formalism, where the initial guesses for the optimized quantities are treated as auxiliary degrees of freedom, constitute one elegant solution. We report on the performance of two integration schemes with the same underlying extended Lagrangian structure, which we both employ in two radically distinct regimes-in classical molecular dynamics simulations with the AMOEBA polarizable force field and in BOMD simulations with the Onetep linear-scaling density functional theory (LS-DFT) approach. Both integration schemes are found to offer significant improvements over the standard (unpropagated) molecular dynamics formulation in both the classical and LS-DFT regimes.
Vitale, Valerio; Dziedzic, Jacek; Albaugh, Alex; ...
2017-03-28
Iterative energy minimization with the aim of achieving self-consistency is a common feature of Born-Oppenheimer molecular dynamics (BOMD) and classical molecular dynamics with polarizable force fields. In the former, the electronic degrees of freedom are optimized, while the latter often involves an iterative determination of induced point dipoles. The computational effort of the self-consistency procedure can be reduced by re-using converged solutions from previous time steps. However, this must be done carefully, as not to break time-reversal symmetry, which negatively impacts energy conservation. Self-consistent schemes based on the extended Lagrangian formalism, where the initial guesses for the optimized quantities aremore » treated as auxiliary degrees of freedom, constitute one elegant solution. We report on the performance of two integration schemes with the same underlying extended Lagrangian structure, which we both employ in two radically distinct regimes—in classical molecular dynamics simulations with the AMOEBA polarizable force field and in BOMD simulations with the Onetep linear-scaling density functional theory (LS-DFT) approach. Furthermore, both integration schemes are found to offer significant improvements over the standard (unpropagated) molecular dynamics formulation in both the classical and LS-DFT regimes.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vitale, Valerio; Dziedzic, Jacek; Albaugh, Alex
Iterative energy minimization with the aim of achieving self-consistency is a common feature of Born-Oppenheimer molecular dynamics (BOMD) and classical molecular dynamics with polarizable force fields. In the former, the electronic degrees of freedom are optimized, while the latter often involves an iterative determination of induced point dipoles. The computational effort of the self-consistency procedure can be reduced by re-using converged solutions from previous time steps. However, this must be done carefully, as not to break time-reversal symmetry, which negatively impacts energy conservation. Self-consistent schemes based on the extended Lagrangian formalism, where the initial guesses for the optimized quantities aremore » treated as auxiliary degrees of freedom, constitute one elegant solution. We report on the performance of two integration schemes with the same underlying extended Lagrangian structure, which we both employ in two radically distinct regimes—in classical molecular dynamics simulations with the AMOEBA polarizable force field and in BOMD simulations with the Onetep linear-scaling density functional theory (LS-DFT) approach. Furthermore, both integration schemes are found to offer significant improvements over the standard (unpropagated) molecular dynamics formulation in both the classical and LS-DFT regimes.« less
Calculations of steady and transient channel flows with a time-accurate L-U factorization scheme
NASA Technical Reports Server (NTRS)
Kim, S.-W.
1991-01-01
Calculations of steady and unsteady, transonic, turbulent channel flows with a time accurate, lower-upper (L-U) factorization scheme are presented. The L-U factorization scheme is formally second-order accurate in time and space, and it is an extension of the steady state flow solver (RPLUS) used extensively to solve compressible flows. A time discretization method and the implementation of a consistent boundary condition specific to the L-U factorization scheme are also presented. The turbulence is described by the Baldwin-Lomax algebraic turbulence model. The present L-U scheme yields stable numerical results with the use of much smaller artificial dissipations than those used in the previous steady flow solver for steady and unsteady channel flows. The capability to solve time dependent flows is shown by solving very weakly excited and strongly excited, forced oscillatory, channel flows.
Studying the precision of ray tracing techniques with Szekeres models
NASA Astrophysics Data System (ADS)
Koksbang, S. M.; Hannestad, S.
2015-07-01
The simplest standard ray tracing scheme employing the Born and Limber approximations and neglecting lens-lens coupling is used for computing the convergence along individual rays in mock N-body data based on Szekeres swiss cheese and onion models. The results are compared with the exact convergence computed using the exact Szekeres metric combined with the Sachs formalism. A comparison is also made with an extension of the simple ray tracing scheme which includes the Doppler convergence. The exact convergence is reproduced very precisely as the sum of the gravitational and Doppler convergences along rays in Lemaitre-Tolman-Bondi swiss cheese and single void models. This is not the case when the swiss cheese models are based on nonsymmetric Szekeres models. For such models, there is a significant deviation between the exact and ray traced paths and hence also the corresponding convergences. There is also a clear deviation between the exact and ray tracing results obtained when studying both nonsymmetric and spherically symmetric Szekeres onion models.
Das, Ashok Kumar; Goswami, Adrijit
2014-06-01
Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.
Chain-Based Communication in Cylindrical Underwater Wireless Sensor Networks
Javaid, Nadeem; Jafri, Mohsin Raza; Khan, Zahoor Ali; Alrajeh, Nabil; Imran, Muhammad; Vasilakos, Athanasios
2015-01-01
Appropriate network design is very significant for Underwater Wireless Sensor Networks (UWSNs). Application-oriented UWSNs are planned to achieve certain objectives. Therefore, there is always a demand for efficient data routing schemes, which can fulfill certain requirements of application-oriented UWSNs. These networks can be of any shape, i.e., rectangular, cylindrical or square. In this paper, we propose chain-based routing schemes for application-oriented cylindrical networks and also formulate mathematical models to find a global optimum path for data transmission. In the first scheme, we devise four interconnected chains of sensor nodes to perform data communication. In the second scheme, we propose routing scheme in which two chains of sensor nodes are interconnected, whereas in third scheme single-chain based routing is done in cylindrical networks. After finding local optimum paths in separate chains, we find global optimum paths through their interconnection. Moreover, we develop a computational model for the analysis of end-to-end delay. We compare the performance of the above three proposed schemes with that of Power Efficient Gathering System in Sensor Information Systems (PEGASIS) and Congestion adjusted PEGASIS (C-PEGASIS). Simulation results show that our proposed 4-chain based scheme performs better than the other selected schemes in terms of network lifetime, end-to-end delay, path loss, transmission loss, and packet sending rate. PMID:25658394
NASA Astrophysics Data System (ADS)
Wei, Hai-Rui; Long, Gui Lu
2015-03-01
We propose two compact, economic, and scalable schemes for implementing optical controlled-phase-flip and controlled-controlled-phase-flip gates by using the input-output process of a single-sided cavity strongly coupled to a single nitrogen-vacancy-center defect in diamond. Additional photonic qubits, necessary for procedures based on the parity-check measurement or controlled-path and merging gates, are not employed in our schemes. In the controlled-path gate, the paths of the target photon are conditionally controlled by the control photon, and these two paths can be merged back into one by using a merging gate. Only one half-wave plate is employed in our scheme for the controlled-phase-flip gate. Compared with the conventional synthesis procedures for constructing a controlled-controlled-phase-flip gate, the cost of which is two controlled-path gates and two merging gates, or six controlled-not gates, our scheme is more compact and simpler. Our schemes could be performed with a high fidelity and high efficiency with current achievable experimental techniques.
Classical field configurations and infrared slavery
NASA Astrophysics Data System (ADS)
Swanson, Mark S.
1987-09-01
The problem of determining the energy of two spinor particles interacting through massless-particle exchange is analyzed using the path-integral method. A form for the long-range interaction energy is obtained by analyzing an abridged vertex derived from the parent theory. This abridged vertex describes the radiation of zero-momentum particles by pointlike sources. A path-integral formalism for calculating the energy of the radiation field associated with this abridged vertex is developed and applications are made to determine the energy necessary for adiabatic separation of two sources in quantum electrodynamics and for an SU(2) Yang-Mills theory. The latter theory is shown to be consistent with confinement via infrared slavery.
Teaching Basic Quantum Mechanics in Secondary School Using Concepts of Feynman Path Integrals Method
ERIC Educational Resources Information Center
Fanaro, Maria de los Angeles; Otero, Maria Rita; Arlego, Marcelo
2012-01-01
This paper discusses the teaching of basic quantum mechanics in high school. Rather than following the usual formalism, our approach is based on Feynman's path integral method. Our presentation makes use of simulation software and avoids sophisticated mathematical formalism. (Contains 3 figures.)
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks
Robinson, Y. Harold; Rajaram, M.
2015-01-01
Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique. PMID:26819966
Generalized Bondi-Sachs equations for characteristic formalism of numerical relativity
NASA Astrophysics Data System (ADS)
Cao, Zhoujian; He, Xiaokai
2013-11-01
The Cauchy formalism of numerical relativity has been successfully applied to simulate various dynamical spacetimes without any symmetry assumption. But discovering how to set a mathematically consistent and physically realistic boundary condition is still an open problem for Cauchy formalism. In addition, the numerical truncation error and finite region ambiguity affect the accuracy of gravitational wave form calculation. As to the finite region ambiguity issue, the characteristic extraction method helps much. But it does not solve all of the above issues. Besides the above problems for Cauchy formalism, the computational efficiency is another problem. Although characteristic formalism of numerical relativity suffers the difficulty from caustics in the inner near zone, it has advantages in relation to all of the issues listed above. Cauchy-characteristic matching (CCM) is a possible way to take advantage of characteristic formalism regarding these issues and treat the inner caustics at the same time. CCM has difficulty treating the gauge difference between the Cauchy part and the characteristic part. We propose generalized Bondi-Sachs equations for characteristic formalism for the Cauchy-characteristic matching end. Our proposal gives out a possible same numerical evolution scheme for both the Cauchy part and the characteristic part. And our generalized Bondi-Sachs equations have one adjustable gauge freedom which can be used to relate the gauge used in the Cauchy part. Then these equations can make the Cauchy part and the characteristic part share a consistent gauge condition. So our proposal gives a possible new starting point for Cauchy-characteristic matching.
Caching Joint Shortcut Routing to Improve Quality of Service for Information-Centric Networking.
Huang, Baixiang; Liu, Anfeng; Zhang, Chengyuan; Xiong, Naixue; Zeng, Zhiwen; Cai, Zhiping
2018-05-29
Hundreds of thousands of ubiquitous sensing (US) devices have provided an enormous number of data for Information-Centric Networking (ICN), which is an emerging network architecture that has the potential to solve a great variety of issues faced by the traditional network. A Caching Joint Shortcut Routing (CJSR) scheme is proposed in this paper to improve the Quality of service (QoS) for ICN. The CJSR scheme mainly has two innovations which are different from other in-network caching schemes: (1) Two routing shortcuts are set up to reduce the length of routing paths. Because of some inconvenient transmission processes, the routing paths of previous schemes are prolonged, and users can only request data from Data Centers (DCs) until the data have been uploaded from Data Producers (DPs) to DCs. Hence, the first kind of shortcut is built from DPs to users directly. This shortcut could release the burden of whole network and reduce delay. Moreover, in the second shortcut routing method, a Content Router (CR) which could yield shorter length of uploading routing path from DPs to DCs is chosen, and then data packets are uploaded through this chosen CR. In this method, the uploading path shares some segments with the pre-caching path, thus the overall length of routing paths is reduced. (2) The second innovation of the CJSR scheme is that a cooperative pre-caching mechanism is proposed so that QoS could have a further increase. Besides being used in downloading routing, the pre-caching mechanism can also be used when data packets are uploaded towards DCs. Combining uploading and downloading pre-caching, the cooperative pre-caching mechanism exhibits high performance in different situations. Furthermore, to address the scarcity of storage size, an algorithm that could make use of storage from idle CRs is proposed. After comparing the proposed scheme with five existing schemes via simulations, experiments results reveal that the CJSR scheme could reduce the total number of processed interest packets by 54.8%, enhance the cache hits of each CR and reduce the number of total hop counts by 51.6% and cut down the length of routing path for users to obtain their interested data by 28.6⁻85.7% compared with the traditional NDN scheme. Moreover, the length of uploading routing path could be decreased by 8.3⁻33.3%.
NASA Astrophysics Data System (ADS)
Mégnin, Charles; Romanowicz, Barbara
1999-08-01
Most global tomographic models to date are derived using a combination of surface wave (or normal-mode) data and body wave traveltime data. The traveltime approach limits the number of phases available for inversion by requiring them to be isolated on the seismogram. This may ultimately result in limiting the resolution of 3-D structure, at least in some depth ranges in the mantle. In a previous study, we successfully derived a degree 12 whole-mantle SH-velocity tomographic model (SAW12D) using exclusively waveform data. In that inversion, a normal-mode formalism suitable for body waveforms, the non-linear asymptotic coupling theory (NACT), was combined with a body wave windowing scheme, referred to as the `individual wavepacket' (IW) technique, which allows one to assign individual weights to different body wave energy packets. We here compare the relative merits of this choice of theoretical formalism and windowing scheme at different depth ranges in the mantle. Choosing as the reference a model obtained using 7500 transverse-component body wave and 8000 surface wave seismograms and the NACT and IW approaches, we discuss the relative performance of the path average approximation (PAVA), a zeroth-order theoretical approximation appropriate for single-mode surface waves, relative to NACT, and compare the IW windowing scheme with a more standard `full window' (FW) approach, in which a single time window is considered from the first body wave arrival to the fundamental-mode surface waves. The combination PAVA/FW is often used in global tomography to supplement the traveltime data. We show that although the quality of the image derived under the PAVA/FW formalism is very similar to that derived under NACT/IW in the first 300 km of the upper mantle, where the resolution is dominated by surface waves, it deteriorates at greater depths. Images of the lower mantle are shown to be strongly sensitive to the theoretical formalism. In contrast, the resolution of structure near the core-mantle boundary depends mostly on the windowing scheme. This is because this resolution is controlled by low-amplitude phases such as S_diff, which are downweighted in the FW scheme. Whilst the image obtained in D'' using the combination NACT/IW is in good agreement with images obtained by other authors using both waveforms and traveltimes, we show that, when using FW, uppermost mantle structure can be mapped into D''. This result is confirmed by synthetic tests performed on a composite of the upper-mantle geodynamic model 3SMAC. We also show, based on synthetic tests, that for structures in the upper mantle with sharp boundaries, differences are observed between NACT and PAVA. Whilst a combination of traveltimes and surface wave data is adequate for resolving relatively smooth features in the mantle, our results show that by potentially increasing the achievable sampling, the waveform approach shows great promise for future high-resolution tomographic modelling of mantle structure, if cast in an appropriate theoretical framework.
The SPH consistency problem and some astrophysical applications
NASA Astrophysics Data System (ADS)
Klapp, Jaime; Sigalotti, Leonardo; Rendon, Otto; Gabbasov, Ruslan; Torres, Ayax
2017-11-01
We discuss the SPH kernel and particle consistency problem and demonstrate that SPH has a limiting second-order convergence rate. We also present a solution to the SPH consistency problem. We present examples of how SPH implementations that are not mathematically consistent may lead to erroneous results. The new formalism has been implemented into the Gadget 2 code, including an improved scheme for the artificial viscosity. We present results for the ``Standard Isothermal Test Case'' of gravitational collapse and fragmentation of protostellar molecular cores that produce a very different evolution than with the standard SPH theory. A further application of accretion onto a black hole is presented.
Batalin-Vilkovisky quantization and generalizations
NASA Astrophysics Data System (ADS)
Bering, Klaus
Gauge theories play an important role in modern physics. Whenever a gauge symmetry is present, one should provide for a manifestly gauge independent formalism. It turns out that the BRST symmetry plays a prominent part in providing the gauge independence. The importance of gauge independence in the Hamiltonian Batalin-Fradkin-Fradkina- Vilkovisky formalism and in the Lagrangian Batalin- Vilkovisky formalism is stressed. Parallels are drawn between the various theories. A Hamiltonian path integral that takes into account quantum ordering effects arising in the operator formalism, should be written with the help of the star- multiplication or the Moyal bracket. It is generally believed, that this leads to higher order quantum corrections in the corresponding Lagrangian path integral. A higher order Lagrangian path integral based on a nilpotent higher order odd Laplacian is proposed. A new gauge independence mechanism that adapts to the higher order formalism, and that by-passes the problem of constructing a BRST transformation of the path integral in the higher order case, is developed. The new gauge mechanism is closely related to the cohomology of the odd Laplacian operator. Various cohomology aspects of the odd Laplacian are investigated. Whereas for instance the role of the ghost-cohomology properties of the BFV-BRST charge has been emphasized by several authors, the cohomology of the odd Laplacian are in general not well known.
NASA Technical Reports Server (NTRS)
Ansari, Nirwan; Liu, Dequan
1991-01-01
A neural-network-based traffic management scheme for a satellite communication network is described. The scheme consists of two levels of management. The front end of the scheme is a derivation of Kohonen's self-organization model to configure maps for the satellite communication network dynamically. The model consists of three stages. The first stage is the pattern recognition task, in which an exemplar map that best meets the current network requirements is selected. The second stage is the analysis of the discrepancy between the chosen exemplar map and the state of the network, and the adaptive modification of the chosen exemplar map to conform closely to the network requirement (input data pattern) by means of Kohonen's self-organization. On the basis of certain performance criteria, whether a new map is generated to replace the original chosen map is decided in the third stage. A state-dependent routing algorithm, which arranges the incoming call to some proper path, is used to make the network more efficient and to lower the call block rate. Simulation results demonstrate that the scheme, which combines self-organization and the state-dependent routing mechanism, provides better performance in terms of call block rate than schemes that only have either the self-organization mechanism or the routing mechanism.
Tackling higher derivative ghosts with the Euclidean path integral
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fontanini, Michele; Department of Physics, Syracuse University, Syracuse, New York 13244; Trodden, Mark
2011-05-15
An alternative to the effective field theory approach to treat ghosts in higher derivative theories is to attempt to integrate them out via the Euclidean path integral formalism. It has been suggested that this method could provide a consistent framework within which we might tolerate the ghost degrees of freedom that plague, among other theories, the higher derivative gravity models that have been proposed to explain cosmic acceleration. We consider the extension of this idea to treating a class of terms with order six derivatives, and find that for a general term the Euclidean path integral approach works in themore » most trivial background, Minkowski. Moreover we see that even in de Sitter background, despite some difficulties, it is possible to define a probability distribution for tensorial perturbations of the metric.« less
Umar, Nasir; Mohammed, Shafiu
2011-09-05
The need for health care reforms and alternative financing mechanism in many low and middle-income countries has been advocated. This led to the introduction of the national health insurance scheme (NHIS) in Nigeria, at first with the enrollment of formal sector employees. A qualitative study was conducted to assess enrollee's perception on the quality of health care before and after enrollment. Initial results revealed that respondents (heads of households) have generally viewed the NHIS favorably, but consistently expressed dissatisfaction over the terms of coverage. Specifically, because the NHIS enrollment covers only the primary insured person, their spouse and only up to four biological children (child defined as <18 years of age), in a setting where extended family is common. Dissatisfaction of enrollees could affect their willingness to participate in the insurance scheme, which may potentially affect the success and future extension of the scheme.
Impact of Beamforming on the Path Connectivity in Cognitive Radio Ad Hoc Networks
Dung, Le The; Hieu, Tran Dinh; Choi, Seong-Gon; Kim, Byung-Seo; An, Beongku
2017-01-01
This paper investigates the impact of using directional antennas and beamforming schemes on the connectivity of cognitive radio ad hoc networks (CRAHNs). Specifically, considering that secondary users use two kinds of directional antennas, i.e., uniform linear array (ULA) and uniform circular array (UCA) antennas, and two different beamforming schemes, i.e., randomized beamforming and center-directed to communicate with each other, we study the connectivity of all combination pairs of directional antennas and beamforming schemes and compare their performances to those of omnidirectional antennas. The results obtained in this paper show that, compared with omnidirectional transmission, beamforming transmission only benefits the connectivity when the density of secondary user is moderate. Moreover, the combination of UCA and randomized beamforming scheme gives the highest path connectivity in all evaluating scenarios. Finally, the number of antenna elements and degree of path loss greatly affect path connectivity in CRAHNs. PMID:28346377
Resonance fluorescence trajectories in superconducting qubit
NASA Astrophysics Data System (ADS)
Naghiloo, Mahdi; Tan, Dian; Harrington, Patrick; Lewalle, Philippe; Jordan, Andrew; Murch, Kater
We employ phase-sensitive amplification to perform homodyne detection of the resonance fluorescence from a driven superconducting artificial atom. Entanglement between the emitter and its fluorescence allows us to track the individual quantum state trajectories of the emitter. We analyze the ensemble properties of these trajectories by considering paths that connect specific initial and final states. By applying a stochastic path integral formalism, we calculate equations of motion for the most likely path between two quantum states and compare these predicted paths to experimental data. Drawing on the mathematical similarity between the action formalism of the most likely quantum paths and ray optics, we study the emergence of caustics in quantum trajectories-situations where multiple extrema in the stochastic action occur. We observe such multiple most likely paths in experimental data and find these paths to be in reasonable quantitative agreement with theoretical calculations. Supported by the John Templeton Foundation.
A modified F/A-18 in a distinctive red, white and blue paint scheme was showcased during formal roll
NASA Technical Reports Server (NTRS)
2002-01-01
A modified F/A-18 in a distinctive red, white and blue paint scheme was showcased during formal rollout ceremonies for the Active Aeroelastic Wing flight research program at NASA's Dryden Flight Research Center on March 27, 2002.
Free energy landscape from path-sampling: application to the structural transition in LJ38
NASA Astrophysics Data System (ADS)
Adjanor, G.; Athènes, M.; Calvo, F.
2006-09-01
We introduce a path-sampling scheme that allows equilibrium state-ensemble averages to be computed by means of a biased distribution of non-equilibrium paths. This non-equilibrium method is applied to the case of the 38-atom Lennard-Jones atomic cluster, which has a double-funnel energy landscape. We calculate the free energy profile along the Q4 bond orientational order parameter. At high or moderate temperature the results obtained using the non-equilibrium approach are consistent with those obtained using conventional equilibrium methods, including parallel tempering and Wang-Landau Monte Carlo simulations. At lower temperatures, the non-equilibrium approach becomes more efficient in exploring the relevant inherent structures. In particular, the free energy agrees with the predictions of the harmonic superposition approximation.
Fischer, Tatjana V; Folio, Les R; Backus, Christopher E; Bunger, Rolf
2012-01-01
Penetrating trauma is frequently encountered in forward deployed military combat hospitals. Abdominal blast injuries represent nearly 11% of combat injuries, and multiplanar computed tomography imaging is optimal for injury assessment and surgical planning. We describe a multiplanar approach to assessment of blast and ballistic injuries, which allows for more expeditious detection of missile tracts and damage caused along the path. Precise delineation of the trajectory path and localization of retained fragments enables time-saving and detailed evaluation of associated tissue and vascular injury. For consistent and reproducible documentation of fragment locations in the body, we propose a localization scheme based on Cartesian coordinates to report 3-dimensional locations of fragments and demonstrating the application in three cases of abdominal blast injury.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Giannessi, Luca; Quattromini, Marcello
1997-06-01
We describe the model for the simulation of charged beam dynamics in radiofrequency injectors used in the three dimensional code TREDI, where the inclusion of space charge fields is obtained by means of the Lienard-Wiechert retarded potentials. The problem of charge screening is analyzed in covariant form and some general recipes for charge assignment and noise reduction are given.
Measurements and mathematical formalism of quantum mechanics
NASA Astrophysics Data System (ADS)
Slavnov, D. A.
2007-03-01
A scheme for constructing quantum mechanics is given that does not have Hilbert space and linear operators as its basic elements. Instead, a version of algebraic approach is considered. Elements of a noncommutative algebra (observables) and functionals on this algebra (elementary states) associated with results of single measurements are used as primary components of the scheme. On the one hand, it is possible to use within the scheme the formalism of the standard (Kolmogorov) probability theory, and, on the other hand, it is possible to reproduce the mathematical formalism of standard quantum mechanics, and to study the limits of its applicability. A short outline is given of the necessary material from the theory of algebras and probability theory. It is described how the mathematical scheme of the paper agrees with the theory of quantum measurements, and avoids quantum paradoxes.
Distribution path robust optimization of electric vehicle with multiple distribution centers
Hao, Wei; He, Ruichun; Jia, Xiaoyan; Pan, Fuquan; Fan, Jing; Xiong, Ruiqi
2018-01-01
To identify electrical vehicle (EV) distribution paths with high robustness, insensitivity to uncertainty factors, and detailed road-by-road schemes, optimization of the distribution path problem of EV with multiple distribution centers and considering the charging facilities is necessary. With the minimum transport time as the goal, a robust optimization model of EV distribution path with adjustable robustness is established based on Bertsimas’ theory of robust discrete optimization. An enhanced three-segment genetic algorithm is also developed to solve the model, such that the optimal distribution scheme initially contains all road-by-road path data using the three-segment mixed coding and decoding method. During genetic manipulation, different interlacing and mutation operations are carried out on different chromosomes, while, during population evolution, the infeasible solution is naturally avoided. A part of the road network of Xifeng District in Qingyang City is taken as an example to test the model and the algorithm in this study, and the concrete transportation paths are utilized in the final distribution scheme. Therefore, more robust EV distribution paths with multiple distribution centers can be obtained using the robust optimization model. PMID:29518169
Long-distance thermal temporal ghost imaging over optical fibers
NASA Astrophysics Data System (ADS)
Yao, Xin; Zhang, Wei; Li, Hao; You, Lixing; Wang, Zhen; Huang, Yidong
2018-02-01
A thermal ghost imaging scheme between two distant parties is proposed and experimentally demonstrated over long-distance optical fibers. In the scheme, the weak thermal light is split into two paths. Photons in one path are spatially diffused according to their frequencies by a spatial dispersion component, then illuminate the object and record its spatial transmission information. Photons in the other path are temporally diffused by a temporal dispersion component. By the coincidence measurement between photons of two paths, the object can be imaged in a way of ghost imaging, based on the frequency correlation between photons in the two paths. In the experiment, the weak thermal light source is prepared by the spontaneous four-wave mixing in a silicon waveguide. The temporal dispersion is introduced by single mode fibers of 50 km, which also could be looked as a fiber link. Experimental results show that this scheme can be realized over long-distance optical fibers.
Path integrals and large deviations in stochastic hybrid systems.
Bressloff, Paul C; Newby, Jay M
2014-04-01
We construct a path-integral representation of solutions to a stochastic hybrid system, consisting of one or more continuous variables evolving according to a piecewise-deterministic dynamics. The differential equations for the continuous variables are coupled to a set of discrete variables that satisfy a continuous-time Markov process, which means that the differential equations are only valid between jumps in the discrete variables. Examples of stochastic hybrid systems arise in biophysical models of stochastic ion channels, motor-driven intracellular transport, gene networks, and stochastic neural networks. We use the path-integral representation to derive a large deviation action principle for a stochastic hybrid system. Minimizing the associated action functional with respect to the set of all trajectories emanating from a metastable state (assuming that such a minimization scheme exists) then determines the most probable paths of escape. Moreover, evaluating the action functional along a most probable path generates the so-called quasipotential used in the calculation of mean first passage times. We illustrate the theory by considering the optimal paths of escape from a metastable state in a bistable neural network.
Topology and static response of interaction networks in molecular biology
Radulescu, Ovidiu; Lagarrigue, Sandrine; Siegel, Anne; Veber, Philippe; Le Borgne, Michel
2005-01-01
We introduce a mathematical framework describing static response of networks occurring in molecular biology. This formalism has many similarities with the Laplace–Kirchhoff equations for electrical networks. We introduce the concept of graph boundary and we show how the response of the biological networks to external perturbations can be related to the Dirichlet or Neumann problems for the corresponding equations on the interaction graph. Solutions to these two problems are given in terms of path moduli (measuring path rigidity with respect to the propagation of interaction along the graph). Path moduli are related to loop products in the interaction graph via generalized Mason–Coates formulae. We apply our results to two specific biological examples: the lactose operon and the genetic regulation of lipogenesis. Our applications show consistency with experimental results and in the case of lipogenesis check some hypothesis on the behaviour of hepatic fatty acids on fasting. PMID:16849230
Leão, Erico; Montez, Carlos; Moraes, Ricardo; Portugal, Paulo; Vasques, Francisco
2017-01-01
The IEEE 802.15.4/ZigBee cluster-tree topology is a suitable technology to deploy wide-scale Wireless Sensor Networks (WSNs). These networks are usually designed to support convergecast traffic, where all communication paths go through the PAN (Personal Area Network) coordinator. Nevertheless, peer-to-peer communication relationships may be also required for different types of WSN applications. That is the typical case of sensor and actuator networks, where local control loops must be closed using a reduced number of communication hops. The use of communication schemes optimised just for the support of convergecast traffic may result in higher network congestion and in a potentially higher number of communication hops. Within this context, this paper proposes an Alternative-Route Definition (ARounD) communication scheme for WSNs. The underlying idea of ARounD is to setup alternative communication paths between specific source and destination nodes, avoiding congested cluster-tree paths. These alternative paths consider shorter inter-cluster paths, using a set of intermediate nodes to relay messages during their inactive periods in the cluster-tree network. Simulation results show that the ARounD communication scheme can significantly decrease the end-to-end communication delay, when compared to the use of standard cluster-tree communication schemes. Moreover, the ARounD communication scheme is able to reduce the network congestion around the PAN coordinator, enabling the reduction of the number of message drops due to queue overflows in the cluster-tree network. PMID:28481245
Leão, Erico; Montez, Carlos; Moraes, Ricardo; Portugal, Paulo; Vasques, Francisco
2017-05-06
The IEEE 802.15.4/ZigBee cluster-tree topology is a suitable technology to deploy wide-scale Wireless Sensor Networks (WSNs). These networks are usually designed to support convergecast traffic, where all communication paths go through the PAN (Personal Area Network) coordinator. Nevertheless, peer-to-peer communication relationships may be also required for different types of WSN applications. That is the typical case of sensor and actuator networks, where local control loops must be closed using a reduced number of communication hops. The use of communication schemes optimised just for the support of convergecast traffic may result in higher network congestion and in a potentially higher number of communication hops. Within this context, this paper proposes an Alternative-Route Definition (ARounD) communication scheme for WSNs. The underlying idea of ARounD is to setup alternative communication paths between specific source and destination nodes, avoiding congested cluster-tree paths. These alternative paths consider shorter inter-cluster paths, using a set of intermediate nodes to relay messages during their inactive periods in the cluster-tree network. Simulation results show that the ARounD communication scheme can significantly decrease the end-to-end communication delay, when compared to the use of standard cluster-tree communication schemes. Moreover, the ARounD communication scheme is able to reduce the network congestion around the PAN coordinator, enabling the reduction of the number of message drops due to queue overflows in the cluster-tree network.
Nitrogen dioxide sensing using a novel gas correlation detector
NASA Astrophysics Data System (ADS)
Kebabian, Paul L.; Annen, Kurt D.; Berkoff, Timothy A.; Freedman, Andrew
2000-05-01
A nitrogen dioxide point sensor, based on a novel nondispersive gas filter spectroscopic scheme, is described. The detection scheme relies on the fact that the absorption spectrum of nitrogen dioxide in the 400-550 nm region consists of a complicated line structure superimposed on an average broadband absorption. A compensating filter is used to remove the effect of the broadband absorption, making the sensor insensitive both to small particles in the optical path and to potentially interfering gases with broadband absorption features in the relevant wavelength region. Measurements are obtained using a remote optical absorption cell that is linked via multimode fibre optics to the source and detection optics. The incorporation of blue light emitting diodes which spectrally match the nitrogen dioxide absorption allows the employment of electronic (instead of mechanical) switching between optical paths. A sensitivity of better than 1.0 ppm m column density (1 s integration time) has been observed; improvements in electronics and thermal stabilization should increase this sensitivity.
Analytical and numerical analysis of frictional damage in quasi brittle materials
NASA Astrophysics Data System (ADS)
Zhu, Q. Z.; Zhao, L. Y.; Shao, J. F.
2016-07-01
Frictional sliding and crack growth are two main dissipation processes in quasi brittle materials. The frictional sliding along closed cracks is the origin of macroscopic plastic deformation while the crack growth induces a material damage. The main difficulty of modeling is to consider the inherent coupling between these two processes. Various models and associated numerical algorithms have been proposed. But there are so far no analytical solutions even for simple loading paths for the validation of such algorithms. In this paper, we first present a micro-mechanical model taking into account the damage-friction coupling for a large class of quasi brittle materials. The model is formulated by combining a linear homogenization procedure with the Mori-Tanaka scheme and the irreversible thermodynamics framework. As an original contribution, a series of analytical solutions of stress-strain relations are developed for various loading paths. Based on the micro-mechanical model, two numerical integration algorithms are exploited. The first one involves a coupled friction/damage correction scheme, which is consistent with the coupling nature of the constitutive model. The second one contains a friction/damage decoupling scheme with two consecutive steps: the friction correction followed by the damage correction. With the analytical solutions as reference results, the two algorithms are assessed through a series of numerical tests. It is found that the decoupling correction scheme is efficient to guarantee a systematic numerical convergence.
PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs.
Liu, Anfeng; Dong, Mianxiong; Ota, Kaoru; Long, Jun
2015-12-09
In this paper, a Per-Hop Acknowledgement (PHACK)-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes' ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes.
PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs
Liu, Anfeng; Dong, Mianxiong; Ota, Kaoru; Long, Jun
2015-01-01
In this paper, a Per-Hop Acknowledgement (PHACK)-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes’ ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes. PMID:26690178
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fraysse, F., E-mail: francois.fraysse@rs2n.eu; E. T. S. de Ingeniería Aeronáutica y del Espacio, Universidad Politécnica de Madrid, Madrid; Redondo, C.
This article is devoted to the numerical discretisation of the hyperbolic two-phase flow model of Baer and Nunziato. A special attention is paid on the discretisation of intercell flux functions in the framework of Finite Volume and Discontinuous Galerkin approaches, where care has to be taken to efficiently approximate the non-conservative products inherent to the model equations. Various upwind approximate Riemann solvers have been tested on a bench of discontinuous test cases. New discretisation schemes are proposed in a Discontinuous Galerkin framework following the criterion of Abgrall and the path-conservative formalism. A stabilisation technique based on artificial viscosity is appliedmore » to the high-order Discontinuous Galerkin method and compared against classical TVD-MUSCL Finite Volume flux reconstruction.« less
Quantum caustics in resonance-fluorescence trajectories
NASA Astrophysics Data System (ADS)
Naghiloo, M.; Tan, D.; Harrington, P. M.; Lewalle, P.; Jordan, A. N.; Murch, K. W.
2017-11-01
We employ phase-sensitive amplification to perform homodyne detection of the resonance fluorescence from a driven superconducting artificial atom. Entanglement between the emitter and its fluorescence allows us to track the individual quantum state trajectories of the emitter conditioned on the outcomes of the field measurements. We analyze the ensemble properties of these trajectories by considering trajectories that connect specific initial and final states. By applying the stochastic path-integral formalism, we calculate equations of motion for the most-likely path between two quantum states and compare these predicted paths to experimental data. Drawing on the mathematical similarity between the action formalism of the most-likely quantum paths and ray optics, we study the emergence of caustics in quantum trajectories: places where multiple extrema in the stochastic action occur. We observe such multiple most-likely paths in experimental data and find these paths to be in reasonable quantitative agreement with theoretical calculations.
Verification of Faulty Message Passing Systems with Continuous State Space in PVS
NASA Technical Reports Server (NTRS)
Pilotto, Concetta; White, Jerome
2010-01-01
We present a library of Prototype Verification System (PVS) meta-theories that verifies a class of distributed systems in which agent commu nication is through message-passing. The theoretic work, outlined in, consists of iterative schemes for solving systems of linear equations , such as message-passing extensions of the Gauss and Gauss-Seidel me thods. We briefly review that work and discuss the challenges in formally verifying it.
Consistency properties of chaotic systems driven by time-delayed feedback
NASA Astrophysics Data System (ADS)
Jüngling, T.; Soriano, M. C.; Oliver, N.; Porte, X.; Fischer, I.
2018-04-01
Consistency refers to the property of an externally driven dynamical system to respond in similar ways to similar inputs. In a delay system, the delayed feedback can be considered as an external drive to the undelayed subsystem. We analyze the degree of consistency in a generic chaotic system with delayed feedback by means of the auxiliary system approach. In this scheme an identical copy of the nonlinear node is driven by exactly the same signal as the original, allowing us to verify complete consistency via complete synchronization. In the past, the phenomenon of synchronization in delay-coupled chaotic systems has been widely studied using correlation functions. Here, we analytically derive relationships between characteristic signatures of the correlation functions in such systems and unequivocally relate them to the degree of consistency. The analytical framework is illustrated and supported by numerical calculations of the logistic map with delayed feedback for different replica configurations. We further apply the formalism to time series from an experiment based on a semiconductor laser with a double fiber-optical feedback loop. The experiment constitutes a high-quality replica scheme for studying consistency of the delay-driven laser and confirms the general theoretical results.
Analysis of switch and examine combining with post-examining selection in cognitive radio
NASA Astrophysics Data System (ADS)
Agarwal, Rupali; Srivastava, Neelam; Katiyar, Himanshu
2018-06-01
To perform spectrum sensing in fading environment is one of the most challenging tasks for a CR system. Diversity combining schemes are used to combat the effect of fading and hence detection probability of CR gets improved. Among many diversity combining techniques, switched diversity offers one of the lowest complexity solutions. The receiver embedded with switched diversity looks for an acceptable diversity path (having signal to noise ratio (SNR) above the required threshold) to receive the data. In conventional switch and examine combining (SEC) scheme, when no acceptable path is found after all the paths are examined, the receiver randomly chooses an unacceptable path. Switch and examine combining with post-examining selection (SECp) is a modified version of conventional SEC. In SECp, the conventional SEC scheme is altered in a way that it selects the best path when no acceptable path is found after all paths have been examined. In this paper, formula for probability of detection ( ?) is derived using SECp and SEC diversity combining technique over Rayleigh fading channel. Also the performance of SECp is compared with SEC and no diversity case. Performance comparison is done with the help of SNR vs. ? and complementary receiver operating characteristic curves.
Unified Approach To Control Of Motions Of Mobile Robots
NASA Technical Reports Server (NTRS)
Seraji, Homayoun
1995-01-01
Improved computationally efficient scheme developed for on-line coordinated control of both manipulation and mobility of robots that include manipulator arms mounted on mobile bases. Present scheme similar to one described in "Coordinated Control of Mobile Robotic Manipulators" (NPO-19109). Both schemes based on configuration-control formalism. Present one incorporates explicit distinction between holonomic and nonholonomic constraints. Several other prior articles in NASA Tech Briefs discussed aspects of configuration-control formalism. These include "Increasing the Dexterity of Redundant Robots" (NPO-17801), "Redundant Robot Can Avoid Obstacles" (NPO-17852), "Configuration-Control Scheme Copes with Singularities" (NPO-18556), "More Uses for Configuration Control of Robots" (NPO-18607/NPO-18608).
Finding paths in tree graphs with a quantum walk
NASA Astrophysics Data System (ADS)
Koch, Daniel; Hillery, Mark
2018-01-01
We analyze the potential for different types of searches using the formalism of scattering random walks on quantum computers. Given a particular type of graph consisting of nodes and connections, a "tree maze," we would like to find a selected final node as quickly as possible, faster than any classical search algorithm. We show that this can be done using a quantum random walk, both through numerical calculations as well as by using the eigenvectors and eigenvalues of the quantum system.
Kwon, Osung; Park, Kwang-Kyoon; Ra, Young-Sik; Kim, Yong-Su; Kim, Yoon-Ho
2013-10-21
Generation of time-bin entangled photon pairs requires the use of the Franson interferometer which consists of two spatially separated unbalanced Mach-Zehnder interferometers through which the signal and idler photons from spontaneous parametric down-conversion (SPDC) are made to transmit individually. There have been two SPDC pumping regimes where the scheme works: the narrowband regime and the double-pulse regime. In the narrowband regime, the SPDC process is pumped by a narrowband cw laser with the coherence length much longer than the path length difference of the Franson interferometer. In the double-pulse regime, the longitudinal separation between the pulse pair is made equal to the path length difference of the Franson interferometer. In this paper, we propose another regime by which the generation of time-bin entanglement is possible and demonstrate the scheme experimentally. In our scheme, differently from the previous approaches, the SPDC process is pumped by a cw multi-mode (i.e., short coherence length) laser and makes use of the coherence revival property of such a laser. The high-visibility two-photon Franson interference demonstrates clearly that high-quality time-bin entanglement source can be developed using inexpensive cw multi-mode diode lasers for various quantum communication applications.
NASA Astrophysics Data System (ADS)
Li, Guolong; Xiao, Xiao; Li, Yong; Wang, Xiaoguang
2018-02-01
We propose a multimode optomechanical system to realize tunable optical nonreciprocity that has the prospect of making an optical diode for information technology. The proposed model consists of two subsystems, each of which contains two optical cavities, injected with a classical field and a quantum signal via a 50:50 beam splitter, and a mechanical oscillator, coupled to both cavities via optomechanical coupling. Meanwhile two cavities and an oscillator in a subsystem are respectively coupled to their corresponding cavities and an oscillator in the other subsystem. Our scheme yields nonreciprocal effects at different frequencies with opposite directions, but each effective linear optomechanical coupling can be controlled by an independent classical one-frequency pump. With this setup one is able to apply quantum states with large fluctuations, which extends the scope of applicable quantum states, and exploit the independence of paths. Moreover, the optimal frequencies for nonreciprocal effects can be controlled by adjusting the relevant parameters. We also exhibit the path switching of two directions, from a mechanical input to two optical output channels, via tuning the signal frequency. In experiment, the considered scheme can be tuned to reach small damping rates of the oscillators relative to those of the cavities, which is more practical and requires less power than in previous schemes.
Action principle for overdetermined systems of nonlinear field equations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nissimov, E.; Pacheva, S.; Solomon, S.
1989-01-01
The authors propose a general scheme for constructing an action principle for arbitrary consistent overdetermined systems of nonlinear field equations. The principal tool is the BFV-BRST formalism. There is no need for star-product nor Chern-Simons forms. The main application of this general construction is the derivation of a superspace action in terms of unconstrained superfields for the D = 10N = 1 Super-Yang-Mills theory. The latter contains cubic as well as quartic interactions.
NASA Astrophysics Data System (ADS)
Bhardwaj, Manish; McCaughan, Leon; Olkhovets, Anatoli; Korotky, Steven K.
2006-12-01
We formulate an analytic framework for the restoration performance of path-based restoration schemes in planar mesh networks. We analyze various switch architectures and signaling schemes and model their total restoration interval. We also evaluate the network global expectation value of the time to restore a demand as a function of network parameters. We analyze a wide range of nominally capacity-optimal planar mesh networks and find our analytic model to be in good agreement with numerical simulation data.
Das, Ashok Kumar
2015-03-01
Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Podoshvedov, Sergey A.; Kim, Jaewan
2006-09-15
We suggest an all-optical scheme to generate entangled superposition of a single photon with macroscopic entangled states for testing macroscopic realism. The scheme consists of source of single photons, a Mach-Zehnder interferometer in routes of which a system of coupled-down converters with type-I phase matching is inserted, and a beam splitter for the other auxiliary modes of the scheme. We use quantization of the pumping modes, depletion of the coherent states passing through the system, and interference effect in the pumping modes in the process of erasing which-path information of the single-photon on exit from the Mach-Zehnder interferometer. We showmore » the macroscopic fields of the output superposition are distinguishable states. This scheme generates macroscopic entangled state that violates Bell's inequality. Moreover, the detailed analysis concerning change of amplitudes of entangled superposition by means of repeating this process many times is accomplished. We show our scheme works without photon number resolving detection and it is robust to detector inefficiency.« less
The QKD network: model and routing scheme
NASA Astrophysics Data System (ADS)
Yang, Chao; Zhang, Hongqi; Su, Jinhai
2017-11-01
Quantum key distribution (QKD) technology can establish unconditional secure keys between two communicating parties. Although this technology has some inherent constraints, such as the distance and point-to-point mode limits, building a QKD network with multiple point-to-point QKD devices can overcome these constraints. Considering the development level of current technology, the trust relaying QKD network is the first choice to build a practical QKD network. However, the previous research didn't address a routing method on the trust relaying QKD network in detail. This paper focuses on the routing issues, builds a model of the trust relaying QKD network for easily analysing and understanding this network, and proposes a dynamical routing scheme for this network. From the viewpoint of designing a dynamical routing scheme in classical network, the proposed scheme consists of three components: a Hello protocol helping share the network topology information, a routing algorithm to select a set of suitable paths and establish the routing table and a link state update mechanism helping keep the routing table newly. Experiments and evaluation demonstrates the validity and effectiveness of the proposed routing scheme.
On zero variance Monte Carlo path-stretching schemes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lux, I.
1983-08-01
A zero variance path-stretching biasing scheme proposed for a special case by Dwivedi is derived in full generality. The procedure turns out to be the generalization of the exponential transform. It is shown that the biased game can be interpreted as an analog simulation procedure, thus saving some computational effort in comparison with the corresponding nonanalog game.
Enhanced method of fast re-routing with load balancing in software-defined networks
NASA Astrophysics Data System (ADS)
Lemeshko, Oleksandr; Yeremenko, Oleksandra
2017-11-01
A two-level method of fast re-routing with load balancing in a software-defined network (SDN) is proposed. The novelty of the method consists, firstly, in the introduction of a two-level hierarchy of calculating the routing variables responsible for the formation of the primary and backup paths, and secondly, in ensuring a balanced load of the communication links of the network, which meets the requirements of the traffic engineering concept. The method provides implementation of link, node, path, and bandwidth protection schemes for fast re-routing in SDN. The separation in accordance with the interaction prediction principle along two hierarchical levels of the calculation functions of the primary (lower level) and backup (upper level) routes allowed to abandon the initial sufficiently large and nonlinear optimization problem by transiting to the iterative solution of linear optimization problems of half the dimension. The analysis of the proposed method confirmed its efficiency and effectiveness in terms of obtaining optimal solutions for ensuring balanced load of communication links and implementing the required network element protection schemes for fast re-routing in SDN.
Path Searching Based Fault Automated Recovery Scheme for Distribution Grid with DG
NASA Astrophysics Data System (ADS)
Xia, Lin; Qun, Wang; Hui, Xue; Simeng, Zhu
2016-12-01
Applying the method of path searching based on distribution network topology in setting software has a good effect, and the path searching method containing DG power source is also applicable to the automatic generation and division of planned islands after the fault. This paper applies path searching algorithm in the automatic division of planned islands after faults: starting from the switch of fault isolation, ending in each power source, and according to the line load that the searching path traverses and the load integrated by important optimized searching path, forming optimized division scheme of planned islands that uses each DG as power source and is balanced to local important load. Finally, COBASE software and distribution network automation software applied are used to illustrate the effectiveness of the realization of such automatic restoration program.
Methods for converging correlation energies within the dielectric matrix formalism
NASA Astrophysics Data System (ADS)
Dixit, Anant; Claudot, Julien; Gould, Tim; Lebègue, Sébastien; Rocca, Dario
2018-03-01
Within the dielectric matrix formalism, the random-phase approximation (RPA) and analogous methods that include exchange effects are promising approaches to overcome some of the limitations of traditional density functional theory approximations. The RPA-type methods however have a significantly higher computational cost, and, similarly to correlated quantum-chemical methods, are characterized by a slow basis set convergence. In this work we analyzed two different schemes to converge the correlation energy, one based on a more traditional complete basis set extrapolation and one that converges energy differences by accounting for the size-consistency property. These two approaches have been systematically tested on the A24 test set, for six points on the potential-energy surface of the methane-formaldehyde complex, and for reaction energies involving the breaking and formation of covalent bonds. While both methods converge to similar results at similar rates, the computation of size-consistent energy differences has the advantage of not relying on the choice of a specific extrapolation model.
NASA Technical Reports Server (NTRS)
Abramopoulos, Frank
1988-01-01
The conditions under which finite difference schemes for the shallow water equations can conserve both total energy and potential enstrophy are considered. A method of deriving such schemes using operator formalism is developed. Several such schemes are derived for the A-, B- and C-grids. The derived schemes include second-order schemes and pseudo-fourth-order schemes. The simplest B-grid pseudo-fourth-order schemes are presented.
A provably-secure ECC-based authentication scheme for wireless sensor networks.
Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho
2014-11-06
A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho
2014-01-01
A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009
NASA Astrophysics Data System (ADS)
Bernede, Adrien; Poëtte, Gaël
2018-02-01
In this paper, we are interested in the resolution of the time-dependent problem of particle transport in a medium whose composition evolves with time due to interactions. As a constraint, we want to use of Monte-Carlo (MC) scheme for the transport phase. A common resolution strategy consists in a splitting between the MC/transport phase and the time discretization scheme/medium evolution phase. After going over and illustrating the main drawbacks of split solvers in a simplified configuration (monokinetic, scalar Bateman problem), we build a new Unsplit MC (UMC) solver improving the accuracy of the solutions, avoiding numerical instabilities, and less sensitive to time discretization. The new solver is essentially based on a Monte Carlo scheme with time dependent cross sections implying the on-the-fly resolution of a reduced model for each MC particle describing the time evolution of the matter along their flight path.
The Hierarchical Structure of Formal Operational Tasks.
ERIC Educational Resources Information Center
Bart, William M.; Mertens, Donna M.
1979-01-01
The hierarchical structure of the formal operational period of Piaget's theory of cognitive development was explored through the application of ordering theoretical methods to a set of data that systematically utilized the various formal operational schemes. Results suggested a common structure underlying task performance. (Author/BH)
ON THE USE OF SHOT NOISE FOR PHOTON COUNTING
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zmuidzinas, Jonas, E-mail: jonas@caltech.edu
Lieu et al. have recently claimed that it is possible to substantially improve the sensitivity of radio-astronomical observations. In essence, their proposal is to make use of the intensity of the photon shot noise as a measure of the photon arrival rate. Lieu et al. provide a detailed quantum-mechanical calculation of a proposed measurement scheme that uses two detectors and conclude that this scheme avoids the sensitivity degradation that is associated with photon bunching. If correct, this result could have a profound impact on radio astronomy. Here I present a detailed analysis of the sensitivity attainable using shot-noise measurement schemesmore » that use either one or two detectors, and demonstrate that neither scheme can avoid the photon bunching penalty. I perform both semiclassical and fully quantum calculations of the sensitivity, obtaining consistent results, and provide a formal proof of the equivalence of these two approaches. These direct calculations are furthermore shown to be consistent with an indirect argument based on a correlation method that establishes an independent limit to the sensitivity of shot-noise measurement schemes. Furthermore, these calculations are directly applicable to the regime of interest identified by Lieu et al. Collectively, these results conclusively demonstrate that the photon-bunching sensitivity penalty applies to shot-noise measurement schemes just as it does to ordinary photon counting, in contradiction to the fundamental claim made by Lieu et al. The source of this contradiction is traced to a logical fallacy in their argument.« less
Quasiparticle self-consistent GW method for the spectral properties of complex materials.
Bruneval, Fabien; Gatti, Matteo
2014-01-01
The GW approximation to the formally exact many-body perturbation theory has been applied successfully to materials for several decades. Since the practical calculations are extremely cumbersome, the GW self-energy is most commonly evaluated using a first-order perturbative approach: This is the so-called G 0 W 0 scheme. However, the G 0 W 0 approximation depends heavily on the mean-field theory that is employed as a basis for the perturbation theory. Recently, a procedure to reach a kind of self-consistency within the GW framework has been proposed. The quasiparticle self-consistent GW (QSGW) approximation retains some positive aspects of a self-consistent approach, but circumvents the intricacies of the complete GW theory, which is inconveniently based on a non-Hermitian and dynamical self-energy. This new scheme allows one to surmount most of the flaws of the usual G 0 W 0 at a moderate calculation cost and at a reasonable implementation burden. In particular, the issues of small band gap semiconductors, of large band gap insulators, and of some transition metal oxides are then cured. The QSGW method broadens the range of materials for which the spectral properties can be predicted with confidence.
A hybrid quantum eraser scheme for characterization of free-space and fiber communication channels
NASA Astrophysics Data System (ADS)
Nape, Isaac; Kyeremah, Charlotte; Vallés, Adam; Rosales-Guzmán, Carmelo; Buah-Bassuah, Paul K.; Forbes, Andrew
2018-02-01
We demonstrate a simple projective measurement based on the quantum eraser concept that can be used to characterize the disturbances of any communication channel. Quantum erasers are commonly implemented as spatially separated path interferometric schemes. Here we exploit the advantages of redefining the which-path information in terms of spatial modes, replacing physical paths with abstract paths of orbital angular momentum (OAM). Remarkably, vector modes (natural modes of free-space and fiber) have a non-separable feature of spin-orbit coupled states, equivalent to the description of two independently marked paths. We explore the effects of fiber perturbations by probing a step-index optical fiber channel with a vector mode, relevant to high-order spatial mode encoding of information for ultra-fast fiber communications.
A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function
Odelu, Vanga; Goswami, Adrijit
2014-01-01
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme. PMID:24892078
A robust and effective smart-card-based remote user authentication mechanism using hash function.
Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit
2014-01-01
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sun, Wenjun, E-mail: sun_wenjun@iapcm.ac.cn; Jiang, Song, E-mail: jiang@iapcm.ac.cn; Xu, Kun, E-mail: makxu@ust.hk
This paper presents an extension of previous work (Sun et al., 2015 [22]) of the unified gas kinetic scheme (UGKS) for the gray radiative transfer equations to the frequency-dependent (multi-group) radiative transfer system. Different from the gray radiative transfer equations, where the optical opacity is only a function of local material temperature, the simulation of frequency-dependent radiative transfer is associated with additional difficulties from the frequency-dependent opacity. For the multiple frequency radiation, the opacity depends on both the spatial location and the frequency. For example, the opacity is typically a decreasing function of frequency. At the same spatial region themore » transport physics can be optically thick for the low frequency photons, and optically thin for high frequency ones. Therefore, the optical thickness is not a simple function of space location. In this paper, the UGKS for frequency-dependent radiative system is developed. The UGKS is a finite volume method and the transport physics is modeled according to the ratio of the cell size to the photon's frequency-dependent mean free path. When the cell size is much larger than the photon's mean free path, a diffusion solution for such a frequency radiation will be obtained. On the other hand, when the cell size is much smaller than the photon's mean free path, a free transport mechanism will be recovered. In the regime between the above two limits, with the variation of the ratio between the local cell size and photon's mean free path, the UGKS provides a smooth transition in the physical and frequency space to capture the corresponding transport physics accurately. The seemingly straightforward extension of the UGKS from the gray to multiple frequency radiation system is due to its intrinsic consistent multiple scale transport modeling, but it still involves lots of work to properly discretize the multiple groups in order to design an asymptotic preserving (AP) scheme in all regimes. The current scheme is tested in a few frequency-dependent radiation problems, and the results are compared with the solutions from the well-defined implicit Monte Carlo (IMC) method. The UGKS is much more efficient than IMC, and the computational times of both schemes for all test cases are listed. The UGKS seems to be the first discrete ordinate method (DOM) for the accurate capturing of multiple frequency radiative transport physics from ballistic particle motion to the diffusive wave propagation.« less
Path probability of stochastic motion: A functional approach
NASA Astrophysics Data System (ADS)
Hattori, Masayuki; Abe, Sumiyoshi
2016-06-01
The path probability of a particle undergoing stochastic motion is studied by the use of functional technique, and the general formula is derived for the path probability distribution functional. The probability of finding paths inside a tube/band, the center of which is stipulated by a given path, is analytically evaluated in a way analogous to continuous measurements in quantum mechanics. Then, the formalism developed here is applied to the stochastic dynamics of stock price in finance.
Design and Evolution of the Asporto Heart Preservation Device.
Rivard, Andrew L
2015-06-01
The Asporto Heart Preservation Device is a system providing perfusion of cardioplegia to the donor heart using a computer-controlled peristaltic pump in a thermoelectrically cooled and insulated container. In 1998, a user interface was developed at the University of Minnesota consisting of a touch screen and battery-backed microcontroller. Power was supplied by a 120 VAC to 12 VDC converter. An upgrade to the insulated cooler and microcontroller occurred in 2002, which was followed by proof of concept experimental pre-clinical transplants and tests demonstrating the efficacy of the device with isolated donor hearts. During the period between 2002 and 2006, a variety of donor organ containers were developed, modified, and tested to provide an optimal sterile environment and fluid path. Parallel development paths encompass formalized design specifications for final prototypes of the touch screen/microcontroller, organ container, and thermoelectric cooler.
NASA Astrophysics Data System (ADS)
Rivera-Ortega, Uriel; Dirckx, Joris
2015-09-01
In this manuscript a computer based simulation is proposed for teaching concepts of interference of light (under the scheme of a Michelson interferometer), phase-shifting and polarization states. The user can change some parameters of the interfering waves, such as their amplitude and phase difference in order to graphically represent the polarization state of a simulated travelling wave. Regarding to the interference simulation, the user is able to change the wavelength and type of the interfering waves by selecting combinations between planar and Gaussian profiles, as well as the optical path difference by translating or tilting one of the two mirrors in the interferometer setup, all of this via a graphical user interface (GUI) designed in MATLAB. A theoretical introduction and simulation results for each phenomenon will be shown. Due to the simulation characteristics, this GUI can be a very good non-formal learning resource.
Conceptual Questions and Lack of Formal Reasoning: Are They Mutually Exclusive?
ERIC Educational Resources Information Center
Igaz, Csaba; Proksa, Miroslav
2012-01-01
Using specially designed conceptual question pairs, 9th grade students were tested on tasks (presented as experimental situations in pictorial form) that involved controlling the variables' scheme of formal reasoning. The question topics focused on these three chemical contexts: chemistry in everyday life, chemistry without formal concepts, and…
Comparison of Several Numerical Methods for Simulation of Compressible Shear Layers
NASA Technical Reports Server (NTRS)
Kennedy, Christopher A.; Carpenter, Mark H.
1997-01-01
An investigation is conducted on several numerical schemes for use in the computation of two-dimensional, spatially evolving, laminar variable-density compressible shear layers. Schemes with various temporal accuracies and arbitrary spatial accuracy for both inviscid and viscous terms are presented and analyzed. All integration schemes use explicit or compact finite-difference derivative operators. Three classes of schemes are considered: an extension of MacCormack's original second-order temporally accurate method, a new third-order variant of the schemes proposed by Rusanov and by Kutier, Lomax, and Warming (RKLW), and third- and fourth-order Runge-Kutta schemes. In each scheme, stability and formal accuracy are considered for the interior operators on the convection-diffusion equation U(sub t) + aU(sub x) = alpha U(sub xx). Accuracy is also verified on the nonlinear problem, U(sub t) + F(sub x) = 0. Numerical treatments of various orders of accuracy are chosen and evaluated for asymptotic stability. Formally accurate boundary conditions are derived for several sixth- and eighth-order central-difference schemes. Damping of high wave-number data is accomplished with explicit filters of arbitrary order. Several schemes are used to compute variable-density compressible shear layers, where regions of large gradients exist.
Reformulating the Schrödinger equation as a Shabat-Zakharov system
NASA Astrophysics Data System (ADS)
Boonserm, Petarpa; Visser, Matt
2010-02-01
We reformulate the second-order Schrödinger equation as a set of two coupled first-order differential equations, a so-called "Shabat-Zakharov system" (sometimes called a "Zakharov-Shabat" system). There is considerable flexibility in this approach, and we emphasize the utility of introducing an "auxiliary condition" or "gauge condition" that is used to cut down the degrees of freedom. Using this formalism, we derive the explicit (but formal) general solution to the Schrödinger equation. The general solution depends on three arbitrarily chosen functions, and a path-ordered exponential matrix. If one considers path ordering to be an "elementary" process, then this represents complete quadrature, albeit formal, of the second-order linear ordinary differential equation.
Koopman-von Neumann formulation of classical Yang-Mills theories: I
NASA Astrophysics Data System (ADS)
Carta, P.; Gozzi, E.; Mauro, D.
2006-03-01
In this paper we present the Koopman-von Neumann (KvN) formulation of classical non-Abelian gauge field theories. In particular we shall explore the functional (or classical path integral) counterpart of the KvN method. In the quantum path integral quantization of Yang-Mills theories concepts like gauge-fixing and Faddeev-Popov determinant appear in a quite natural way. We will prove that these same objects are needed also in this classical path integral formulation for Yang-Mills theories. We shall also explore the classical path integral counterpart of the BFV formalism and build all the associated universal and gauge charges. These last are quite different from the analog quantum ones and we shall show the relation between the two. This paper lays the foundation of this formalism which, due to the many auxiliary fields present, is rather heavy. Applications to specific topics outlined in the paper will appear in later publications.
Continuity equation for probability as a requirement of inference over paths
NASA Astrophysics Data System (ADS)
González, Diego; Díaz, Daniela; Davis, Sergio
2016-09-01
Local conservation of probability, expressed as the continuity equation, is a central feature of non-equilibrium Statistical Mechanics. In the existing literature, the continuity equation is always motivated by heuristic arguments with no derivation from first principles. In this work we show that the continuity equation is a logical consequence of the laws of probability and the application of the formalism of inference over paths for dynamical systems. That is, the simple postulate that a system moves continuously through time following paths implies the continuity equation. The translation between the language of dynamical paths to the usual representation in terms of probability densities of states is performed by means of an identity derived from Bayes' theorem. The formalism presented here is valid independently of the nature of the system studied: it is applicable to physical systems and also to more abstract dynamics such as financial indicators, population dynamics in ecology among others.
Impurity self-energy in the strongly-correlated Bose systems
NASA Astrophysics Data System (ADS)
Panochko, Galyna; Pastukhov, Volodymyr; Vakarchuk, Ivan
2018-02-01
We proposed the nonperturbative scheme for the calculation of the impurity spectrum in the Bose system at zero temperature. The method is based on the path-integral formulation and describes an impurity as a zero-density ideal Fermi gas interacting with Bose system for which the action is written in terms of density fluctuations. On the example of the 3He atom immersed in the liquid helium-4 a good consistency with experimental data and results of Monte Carlo simulations is shown.
Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets
Anh, Khuong Quoc; Choo, Hyunseung
2017-01-01
Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN) registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6) is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP) problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN) to an MN. Since the problem affects the quality of service (QoS) of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently. PMID:28968450
Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.
Kang, Byungseok; Anh, Khuong Quoc; Choo, Hyunseung
2017-01-01
Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN) registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6) is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP) problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN) to an MN. Since the problem affects the quality of service (QoS) of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.
Modeling of tool path for the CNC sheet cutting machines
NASA Astrophysics Data System (ADS)
Petunin, Aleksandr A.
2015-11-01
In the paper the problem of tool path optimization for CNC (Computer Numerical Control) cutting machines is considered. The classification of the cutting techniques is offered. We also propose a new classification of toll path problems. The tasks of cost minimization and time minimization for standard cutting technique (Continuous Cutting Problem, CCP) and for one of non-standard cutting techniques (Segment Continuous Cutting Problem, SCCP) are formalized. We show that the optimization tasks can be interpreted as discrete optimization problem (generalized travel salesman problem with additional constraints, GTSP). Formalization of some constraints for these tasks is described. For the solution GTSP we offer to use mathematical model of Prof. Chentsov based on concept of a megalopolis and dynamic programming.
Formalizing Resources for Planning
NASA Technical Reports Server (NTRS)
Bedrax-Weiss, Tania; McGann, Conor; Ramakrishnan, Sailesh
2003-01-01
In this paper we present a classification scheme which circumscribes a large class of resources found in the real world. Building on the work of others we also define key properties of resources that allow formal expression of the proposed classification. Furthermore, operations that change the state of a resource are formalized. Together, properties and operations go a long way in formalizing the representation and reasoning aspects of resources for planning.
Outer boundary as arrested history in general relativity
NASA Astrophysics Data System (ADS)
Lau, Stephen R.
2002-06-01
We present explicit outer boundary conditions for the canonical variables of general relativity. The conditions are associated with the causal evolution of a finite Cauchy domain, a so-called quasilocal boost, and they suggest a consistent scheme for modelling such an evolution numerically. The scheme involves a continuous boost in the spacetime orthogonal complement ⊥Tp(B) of the tangent space Tp(B) belonging to each point p on the system boundary B. We show how the boost rate may be computed numerically via equations similar to those appearing in canonical investigations of black-hole thermodynamics (although here holding at an outer two-surface rather than the bifurcate two-surface of a Killing horizon). We demonstrate the numerical scheme on a model example, the quasilocal boost of a spherical three-ball in Minkowski spacetime. Developing our general formalism with recent hyperbolic formulations of the Einstein equations in mind, we use Anderson and York's 'Einstein-Christoffel' hyperbolic system as the evolution equations for our numerical simulation of the model.
Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit
2015-09-01
The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to other related schemes. As a result, our scheme is very appropriate for practical applications in TMIS.
Path Finding on High-Dimensional Free Energy Landscapes
NASA Astrophysics Data System (ADS)
Díaz Leines, Grisell; Ensing, Bernd
2012-07-01
We present a method for determining the average transition path and the free energy along this path in the space of selected collective variables. The formalism is based upon a history-dependent bias along a flexible path variable within the metadynamics framework but with a trivial scaling of the cost with the number of collective variables. Controlling the sampling of the orthogonal modes recovers the average path and the minimum free energy path as the limiting cases. The method is applied to resolve the path and the free energy of a conformational transition in alanine dipeptide.
Outline of a novel architecture for cortical computation.
Majumdar, Kaushik
2008-03-01
In this paper a novel architecture for cortical computation has been proposed. This architecture is composed of computing paths consisting of neurons and synapses. These paths have been decomposed into lateral, longitudinal and vertical components. Cortical computation has then been decomposed into lateral computation (LaC), longitudinal computation (LoC) and vertical computation (VeC). It has been shown that various loop structures in the cortical circuit play important roles in cortical computation as well as in memory storage and retrieval, keeping in conformity with the molecular basis of short and long term memory. A new learning scheme for the brain has also been proposed and how it is implemented within the proposed architecture has been explained. A few mathematical results about the architecture have been proposed, some of which are without proof.
An ICA based MIMO-OFDM VLC scheme
NASA Astrophysics Data System (ADS)
Jiang, Fangqing; Deng, Honggui; Xiao, Wei; Tao, Shaohua; Zhu, Kaicheng
2015-07-01
In this paper, we propose a novel ICA based MIMO-OFDM VLC scheme, where ICA is applied to convert the MIMO-OFDM channel into several SISO-OFDM channels to reduce computational complexity in channel estimation, without any spectral overhead. Besides, the FM is first investigated to further modulate the OFDM symbols to eliminate the correlation of the signals, so as to improve the separation performance of the ICA algorithm. In the 4×4MIMO-OFDM VLC simulation experiment, LOS path and NLOS paths are both considered, each transmitting signal at 100 Mb/s. Simulation results show that the BER of the proposed scheme reaches the 10-5 level at SNR=20 dB, which is a large improvement compared to the traditional schemes.
Scenario of solid waste reuse in Khulna city of Bangladesh
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bari, Quazi H., E-mail: qhbari@yahoo.com; Mahbub Hassan, K.; Haque, R.
2012-12-15
The reuse and recycling of waste materials are now sincerely considered to be an integral part of solid waste management in many parts of the world. In this context, a vast number of options ranging from small scale decentralized to larger scale centralized plants have been adopted. This study aimed at investigating the waste reuse schemes in Khulna city located in the southern part of Bangladesh and ranked third largest city in the country. The shops for reusable material (SRM) were mostly situated around railway, waterway, and truck station markets which provided easy transportation to further locations. For the reusesmore » of waste materials and products, a chain system was found to collect reusable wastes under a total number of 310 identified SRM with 859 persons directly or indirectly involved in the scheme. This was a decentralized waste management system with self sufficient (autonomous) management. According to mass balance, about 38.52 tons d{sup -1} solid wastes were reused in Khulna city area, accounting for 7.65% of the total generated wastes. This study revealed that apparently a silent, systematic, smooth, and clean reuse chain has been established in Khulna city area under private initiatives, whose sustainability was confirmed over the years in the country without any official or formal funds. However, proper adjustment between the higher and lower chain in the materials flow path, as well as personal hygiene training for the workers, would further improve the achievements of the established reuse scheme.« less
Scenario of solid waste reuse in Khulna city of Bangladesh.
Bari, Quazi H; Mahbub Hassan, K; Haque, R
2012-12-01
The reuse and recycling of waste materials are now sincerely considered to be an integral part of solid waste management in many parts of the world. In this context, a vast number of options ranging from small scale decentralized to larger scale centralized plants have been adopted. This study aimed at investigating the waste reuse schemes in Khulna city located in the southern part of Bangladesh and ranked third largest city in the country. The shops for reusable material (SRM) were mostly situated around railway, waterway, and truck station markets which provided easy transportation to further locations. For the reuses of waste materials and products, a chain system was found to collect reusable wastes under a total number of 310 identified SRM with 859 persons directly or indirectly involved in the scheme. This was a decentralized waste management system with self sufficient (autonomous) management. According to mass balance, about 38.52 tons d(-1) solid wastes were reused in Khulna city area, accounting for 7.65% of the total generated wastes. This study revealed that apparently a silent, systematic, smooth, and clean reuse chain has been established in Khulna city area under private initiatives, whose sustainability was confirmed over the years in the country without any official or formal funds. However, proper adjustment between the higher and lower chain in the materials flow path, as well as personal hygiene training for the workers, would further improve the achievements of the established reuse scheme. Copyright © 2012 Elsevier Ltd. All rights reserved.
Ziaja, Beata; Saxena, Vikrant; Son, Sang-Kil; Medvedev, Nikita; Barbrel, Benjamin; Woloncewicz, Bianca; Stransky, Michal
2016-05-01
We report on the kinetic Boltzmann approach adapted for simulations of highly ionized matter created from a solid by its x-ray irradiation. X rays can excite inner-shell electrons, which leads to the creation of deeply lying core holes. Their relaxation, especially in heavier elements, can take complicated paths, leading to a large number of active configurations. Their number can be so large that solving the set of respective evolution equations becomes computationally inefficient and another modeling approach should be used instead. To circumvent this complexity, the commonly used continuum models employ a superconfiguration scheme. Here, we propose an alternative approach which still uses "true" atomic configurations but limits their number by restricting the sample relaxation to the predominant relaxation paths. We test its reliability, performing respective calculations for a bulk material consisting of light atoms and comparing the results with a full calculation including all relaxation paths. Prospective application for heavy elements is discussed.
CC, CS, and IOS generalized phenomenological cross sections for atom--diatom mixtures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fitz, D.E.; Kouri, D.J.; Evans, D.
1981-05-01
Close coupled expressions for phenomenological cross sections which describe transport properties of atom--diatom mixtures are obtained in the total-J coupling scheme and are related to the bracket integrals of kinetic theory. Coupled states and infinite order sudden expressions for the generalized phenomenological cross sections using initial, final, and average l-labeling are also given. Particular care is taken to use a phase convention for the CS and IOS approximations which is consistent with the Arthurs--Dalgarno formalism and which gives the correct behavior of degeneracy averaged differential cross sections.
NASA Astrophysics Data System (ADS)
Agrawal, Anuj; Bhatia, Vimal; Prakash, Shashi
2018-01-01
Efficient utilization of spectrum is a key concern in the soon to be deployed elastic optical networks (EONs). To perform routing in EONs, various fixed routing (FR), and fixed-alternate routing (FAR) schemes are ubiquitously used. FR, and FAR schemes calculate a fixed route, and a prioritized list of a number of alternate routes, respectively, between different pairs of origin o and target t nodes in the network. The route calculation performed using FR and FAR schemes is predominantly based on either the physical distance, known as k -shortest paths (KSP), or on the hop count (HC). For survivable optical networks, FAR usually calculates link-disjoint (LD) paths. These conventional routing schemes have been efficiently used for decades in communication networks. However, in this paper, it has been demonstrated that these commonly used routing schemes cannot utilize the network spectral resources optimally in the newly introduced EONs. Thus, we propose a new routing scheme for EON, namely, k -distance adaptive paths (KDAP) that efficiently utilizes the benefit of distance-adaptive modulation, and bit rate-adaptive superchannel capability inherited by EON to improve spectrum utilization. In the proposed KDAP, routes are found and prioritized on the basis of bit rate, distance, spectrum granularity, and the number of links used for a particular route. To evaluate the performance of KSP, HC, LD, and the proposed KDAP, simulations have been performed for three different sized networks, namely, 7-node test network (TEST7), NSFNET, and 24-node US backbone network (UBN24). We comprehensively assess the performance of various conventional, and the proposed routing schemes by solving both the RSA and the dual RSA problems under homogeneous and heterogeneous traffic requirements. Simulation results demonstrate that there is a variation amongst the performance of KSP, HC, and LD, depending on the o - t pair, and the network topology and its connectivity. However, the proposed KDAP always performs better for all the considered networks and traffic scenarios, as compared to the conventional routing schemes, namely, KSP, HC, and LD. The proposed KDAP achieves up to 60 % , and 10.46 % improvement in terms of spectrum utilization, and resource utilization ratio, respectively, over the conventional routing schemes.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pramanik, Souvik, E-mail: souvick.in@gmail.com; Moussa, Mohamed, E-mail: mohamed.ibrahim@fsc.bu.edu.eg; Faizal, Mir, E-mail: f2mir@uwaterloo.ca
In this paper, the deformation of the Heisenberg algebra, consistent with both the generalized uncertainty principle and doubly special relativity, has been analyzed. It has been observed that, though this algebra can give rise to fractional derivative terms in the corresponding quantum mechanical Hamiltonian, a formal meaning can be given to them by using the theory of harmonic extensions of function. Depending on this argument, the expression of the propagator of the path integral corresponding to the deformed Heisenberg algebra, has been obtained. In particular, the consistent expression of the one dimensional free particle propagator has been evaluated explicitly. Withmore » this propagator in hand, it has been shown that, even in free particle case, normal generalized uncertainty principle and doubly special relativity show very much different result.« less
Putz, Mihai V.
2009-01-01
The density matrix theory, the ancestor of density functional theory, provides the immediate framework for Path Integral (PI) development, allowing the canonical density be extended for the many-electronic systems through the density functional closure relationship. Yet, the use of path integral formalism for electronic density prescription presents several advantages: assures the inner quantum mechanical description of the system by parameterized paths; averages the quantum fluctuations; behaves as the propagator for time-space evolution of quantum information; resembles Schrödinger equation; allows quantum statistical description of the system through partition function computing. In this framework, four levels of path integral formalism were presented: the Feynman quantum mechanical, the semiclassical, the Feynman-Kleinert effective classical, and the Fokker-Planck non-equilibrium ones. In each case the density matrix or/and the canonical density were rigorously defined and presented. The practical specializations for quantum free and harmonic motions, for statistical high and low temperature limits, the smearing justification for the Bohr’s quantum stability postulate with the paradigmatic Hydrogen atomic excursion, along the quantum chemical calculation of semiclassical electronegativity and hardness, of chemical action and Mulliken electronegativity, as well as by the Markovian generalizations of Becke-Edgecombe electronic focalization functions – all advocate for the reliability of assuming PI formalism of quantum mechanics as a versatile one, suited for analytically and/or computationally modeling of a variety of fundamental physical and chemical reactivity concepts characterizing the (density driving) many-electronic systems. PMID:20087467
Putz, Mihai V
2009-11-10
The density matrix theory, the ancestor of density functional theory, provides the immediate framework for Path Integral (PI) development, allowing the canonical density be extended for the many-electronic systems through the density functional closure relationship. Yet, the use of path integral formalism for electronic density prescription presents several advantages: assures the inner quantum mechanical description of the system by parameterized paths; averages the quantum fluctuations; behaves as the propagator for time-space evolution of quantum information; resembles Schrödinger equation; allows quantum statistical description of the system through partition function computing. In this framework, four levels of path integral formalism were presented: the Feynman quantum mechanical, the semiclassical, the Feynman-Kleinert effective classical, and the Fokker-Planck non-equilibrium ones. In each case the density matrix or/and the canonical density were rigorously defined and presented. The practical specializations for quantum free and harmonic motions, for statistical high and low temperature limits, the smearing justification for the Bohr's quantum stability postulate with the paradigmatic Hydrogen atomic excursion, along the quantum chemical calculation of semiclassical electronegativity and hardness, of chemical action and Mulliken electronegativity, as well as by the Markovian generalizations of Becke-Edgecombe electronic focalization functions - all advocate for the reliability of assuming PI formalism of quantum mechanics as a versatile one, suited for analytically and/or computationally modeling of a variety of fundamental physical and chemical reactivity concepts characterizing the (density driving) many-electronic systems.
d'Alessio, M. A.; Williams, C.F.
2007-01-01
A suite of new techniques in thermochronometry allow analysis of the thermal history of a sample over a broad range of temperature sensitivities. New analysis tools must be developed that fully and formally integrate these techniques, allowing a single geologic interpretation of the rate and timing of exhumation and burial events consistent with all data. We integrate a thermal model of burial and exhumation, (U-Th)/He age modeling, and fission track age and length modeling. We then use a genetic algorithm to efficiently explore possible time-exhumation histories of a vertical sample profile (such as a borehole), simultaneously solving for exhumation and burial rates as well as changes in background heat flow. We formally combine all data in a rigorous statistical fashion. By parameterizing the model in terms of exhumation rather than time-temperature paths (as traditionally done in fission track modeling), we can ensure that exhumation histories result in a sedimentary basin whose thickness is consistent with the observed basin, a physically based constraint that eliminates otherwise acceptable thermal histories. We apply the technique to heat flow and thermochronometry data from the 2.1 -km-deep San Andreas Fault Observatory at Depth pilot hole near the San Andreas fault, California. We find that the site experienced <1 km of exhumation or burial since the onset of San Andreas fault activity ???30 Ma.
Generalized quantum interference of correlated photon pairs.
Kim, Heonoh; Lee, Sang Min; Moon, Han Seb
2015-05-07
Superposition and indistinguishablility between probability amplitudes have played an essential role in observing quantum interference effects of correlated photons. The Hong-Ou-Mandel interference and interferences of the path-entangled photon number state are of special interest in the field of quantum information technologies. However, a fully generalized two-photon quantum interferometric scheme accounting for the Hong-Ou-Mandel scheme and path-entangled photon number states has not yet been proposed. Here we report the experimental demonstrations of the generalized two-photon interferometry with both the interferometric properties of the Hong-Ou-Mandel effect and the fully unfolded version of the path-entangled photon number state using photon-pair sources, which are independently generated by spontaneous parametric down-conversion. Our experimental scheme explains two-photon interference fringes revealing single- and two-photon coherence properties in a single interferometer setup. Using the proposed interferometric measurement, it is possible to directly estimate the joint spectral intensity of a photon pair source.
Global Estimates of Errors in Quantum Computation by the Feynman-Vernon Formalism
NASA Astrophysics Data System (ADS)
Aurell, Erik
2018-06-01
The operation of a quantum computer is considered as a general quantum operation on a mixed state on many qubits followed by a measurement. The general quantum operation is further represented as a Feynman-Vernon double path integral over the histories of the qubits and of an environment, and afterward tracing out the environment. The qubit histories are taken to be paths on the two-sphere S^2 as in Klauder's coherent-state path integral of spin, and the environment is assumed to consist of harmonic oscillators initially in thermal equilibrium, and linearly coupled to to qubit operators \\hat{S}_z. The environment can then be integrated out to give a Feynman-Vernon influence action coupling the forward and backward histories of the qubits. This representation allows to derive in a simple way estimates that the total error of operation of a quantum computer without error correction scales linearly with the number of qubits and the time of operation. It also allows to discuss Kitaev's toric code interacting with an environment in the same manner.
Global Estimates of Errors in Quantum Computation by the Feynman-Vernon Formalism
NASA Astrophysics Data System (ADS)
Aurell, Erik
2018-04-01
The operation of a quantum computer is considered as a general quantum operation on a mixed state on many qubits followed by a measurement. The general quantum operation is further represented as a Feynman-Vernon double path integral over the histories of the qubits and of an environment, and afterward tracing out the environment. The qubit histories are taken to be paths on the two-sphere S^2 as in Klauder's coherent-state path integral of spin, and the environment is assumed to consist of harmonic oscillators initially in thermal equilibrium, and linearly coupled to to qubit operators \\hat{S}_z . The environment can then be integrated out to give a Feynman-Vernon influence action coupling the forward and backward histories of the qubits. This representation allows to derive in a simple way estimates that the total error of operation of a quantum computer without error correction scales linearly with the number of qubits and the time of operation. It also allows to discuss Kitaev's toric code interacting with an environment in the same manner.
Classical geometry to quantum behavior correspondence in a virtual extra dimension
NASA Astrophysics Data System (ADS)
Dolce, Donatello
2012-09-01
In the Lorentz invariant formalism of compact space-time dimensions the assumption of periodic boundary conditions represents a consistent semi-classical quantization condition for relativistic fields. In Dolce (2011) [18] we have shown, for instance, that the ordinary Feynman path integral is obtained from the interference between the classical paths with different winding numbers associated with the cyclic dynamics of the field solutions. By means of the boundary conditions, the kinematical information of interactions can be encoded on the relativistic geometrodynamics of the boundary, see Dolce (2012) [8]. Furthermore, such a purely four-dimensional theory is manifestly dual to an extra-dimensional field theory. The resulting correspondence between extra-dimensional geometrodynamics and ordinary quantum behavior can be interpreted in terms of AdS/CFT correspondence. By applying this approach to a simple Quark-Gluon-Plasma freeze-out model we obtain fundamental analogies with basic aspects of AdS/QCD phenomenology.
One-loop corrections to light cone wave functions: The dipole picture DIS cross section
NASA Astrophysics Data System (ADS)
Hänninen, H.; Lappi, T.; Paatelainen, R.
2018-06-01
We develop methods to perform loop calculations in light cone perturbation theory using a helicity basis, refining the method introduced in our earlier work. In particular this includes implementing a consistent way to contract the four-dimensional tensor structures from the helicity vectors with d-dimensional tensors arising from loop integrals, in a way that can be fully automatized. We demonstrate this explicitly by calculating the one-loop correction to the virtual photon to quark-antiquark dipole light cone wave function. This allows us to calculate the deep inelastic scattering cross section in the dipole formalism to next-to-leading order accuracy. Our results, obtained using the four dimensional helicity scheme, agree with the recent calculation by Beuf using conventional dimensional regularization, confirming the regularization scheme independence of this cross section.
Boson expansion theory in the seniority scheme
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tamura, T.; Li, C.; Pedrocchi, V.G.
1985-12-01
A boson expansion formalism in the seniority scheme is presented and its relation with number-conserving quasiparticle calculations is elucidated. Accuracy and convergence are demonstrated numerically. A comparative discussion with other related approaches is given.
User guide for MODPATH version 6 - A particle-tracking model for MODFLOW
Pollock, David W.
2012-01-01
MODPATH is a particle-tracking post-processing model that computes three-dimensional flow paths using output from groundwater flow simulations based on MODFLOW, the U.S. Geological Survey (USGS) finite-difference groundwater flow model. This report documents MODPATH version 6. Previous versions were documented in USGS Open-File Reports 89-381 and 94-464. The program uses a semianalytical particle-tracking scheme that allows an analytical expression of a particle's flow path to be obtained within each finite-difference grid cell. A particle's path is computed by tracking the particle from one cell to the next until it reaches a boundary, an internal sink/source, or satisfies another termination criterion. Data input to MODPATH consists of a combination of MODFLOW input data files, MODFLOW head and flow output files, and other input files specific to MODPATH. Output from MODPATH consists of several output files, including a number of particle coordinate output files intended to serve as input data for other programs that process, analyze, and display the results in various ways. MODPATH is written in FORTRAN and can be compiled by any FORTRAN compiler that fully supports FORTRAN-2003 or by most commercially available FORTRAN-95 compilers that support the major FORTRAN-2003 language extensions.
Addendum to "Free energies from integral equation theories: enforcing path independence".
Kast, Stefan M
2006-01-01
The variational formalism developed for the analysis of the path dependence of free energies from integral equation theories [S. M. Kast, Phys. Rev. E 67, 041203 (2003)] is extended in order to allow for the three-dimensional treatment of arbitrarily shaped solutes.
Multi-path interferometric Josephson directional amplifier for qubit readout
NASA Astrophysics Data System (ADS)
Abdo, Baleegh; Bronn, Nicholas T.; Jinka, Oblesh; Olivadese, Salvatore; Brink, Markus; Chow, Jerry M.
2018-04-01
We realize and characterize a quantum-limited, directional Josephson amplifier suitable for qubit readout. The device consists of two nondegenerate, three-wave-mixing amplifiers that are coupled together in an interferometric scheme, embedded in a printed circuit board. Nonreciprocity is generated by applying a phase gradient between the same-frequency pumps feeding the device, which plays the role of the magnetic field in a Faraday medium. Directional amplification and reflection-gain elimination are induced via wave interference between multiple paths in the system. We measure and discuss the main figures of merit of the device and show that the experimental results are in good agreement with theory. An improved version of this directional amplifier is expected to eliminate the need for bulky, off-chip isolation stages that generally separate quantum systems and preamplifiers in high-fidelity, quantum-nondemolition measurement setups.
High-Order Entropy Stable Finite Difference Schemes for Nonlinear Conservation Laws: Finite Domains
NASA Technical Reports Server (NTRS)
Fisher, Travis C.; Carpenter, Mark H.
2013-01-01
Developing stable and robust high-order finite difference schemes requires mathematical formalism and appropriate methods of analysis. In this work, nonlinear entropy stability is used to derive provably stable high-order finite difference methods with formal boundary closures for conservation laws. Particular emphasis is placed on the entropy stability of the compressible Navier-Stokes equations. A newly derived entropy stable weighted essentially non-oscillatory finite difference method is used to simulate problems with shocks and a conservative, entropy stable, narrow-stencil finite difference approach is used to approximate viscous terms.
2015-01-01
The 0–0 energies of 80 medium and large molecules have been computed with a large panel of theoretical formalisms. We have used an approach computationally tractable for large molecules, that is, the structural and vibrational parameters are obtained with TD-DFT, the solvent effects are accounted for with the PCM model, whereas the total and transition energies have been determined with TD-DFT and with five wave function approaches accounting for contributions from double excitations, namely, CIS(D), ADC(2), CC2, SCS-CC2, and SOS-CC2, as well as Green’s function based BSE/GW approach. Atomic basis sets including diffuse functions have been systematically applied, and several variations of the PCM have been evaluated. Using solvent corrections obtained with corrected linear-response approach, we found that three schemes, namely, ADC(2), CC2, and BSE/GW allow one to reach a mean absolute deviation smaller than 0.15 eV compared to the measurements, the two former yielding slightly better correlation with experiments than the latter. CIS(D), SCS-CC2, and SOS-CC2 provide significantly larger deviations, though the latter approach delivers highly consistent transition energies. In addition, we show that (i) ADC(2) and CC2 values are extremely close to each other but for systems absorbing at low energies; (ii) the linear-response PCM scheme tends to overestimate solvation effects; and that (iii) the average impact of nonequilibrium correction on 0–0 energies is negligible. PMID:26574326
Algebraic diagrammatic construction formalism with three-body interactions
NASA Astrophysics Data System (ADS)
Raimondi, Francesco; Barbieri, Carlo
2018-05-01
Background: Self-consistent Green's function theory has recently been extended to the basic formalism needed to account for three-body interactions [Carbone, Cipollone, Barbieri, Rios, and Polls, Phys. Rev. C 88, 054326 (2013), 10.1103/PhysRevC.88.054326]. The contribution of three-nucleon forces has so far been included in ab initio calculations on nuclear matter and finite nuclei only as averaged two-nucleon forces. Purpose: We derive the working equations for all possible two- and three-nucleon terms that enter the expansion of the self-energy up to the third order, thus including the interaction-irreducible (i.e., not averaged) diagrams with three-nucleon forces that have been previously neglected. Methods: We employ the algebraic diagrammatic construction up to the third order as an organization scheme for generating a nonperturbative self-energy, in which ring (particle-hole) and ladder (particle-particle) diagrams are resummed to all orders. Results: We derive expressions of the static and dynamic self-energy up to the third order, by taking into account the set of diagrams required when either the skeleton or nonskeleton expansions of the single-particle propagator are assumed. A hierarchy of importance among different diagrams is revealed, and a particular emphasis is given to a third-order diagram [see Fig. 2(c)] that is expected to play a significant role among those featuring an interaction-irreducible three-nucleon force. Conclusion: A consistent formalism to resum at infinite order correlations induced by three-nucleon forces in the self-consistent Green's function theory is now available and ready to be implemented in the many-body solvers.
A New Hybrid Scheme for Preventing Channel Interference and Collision in Mobile Networks
NASA Astrophysics Data System (ADS)
Kim, Kyungjun; Han, Kijun
This paper proposes a new hybrid scheme based on a given set of channels for preventing channel interference and collision in mobile networks. The proposed scheme is designed for improving system performance, focusing on enhancement of performance related to path breakage and channel interference. The objective of this scheme is to improve the performance of inter-node communication. Simulation results from this paper show that the new hybrid scheme can reduce a more control message overhead than a conventional random scheme.
Student Teachers’ Proof Schemes on Proof Tasks Involving Inequality: Deductive or Inductive?
NASA Astrophysics Data System (ADS)
Rosyidi, A. H.; Kohar, A. W.
2018-01-01
Exploring student teachers’ proof ability is crucial as it is important for improving the quality of their learning process and help their future students learn how to construct a proof. Hence, this study aims at exploring at the proof schemes of student teachers in the beginning of their studies. Data were collected from 130 proofs resulted by 65 Indonesian student teachers on two proof tasks involving algebraic inequality. To analyse, the proofs were classified into the refined proof schemes level proposed by Lee (2016) ranging from inductive, which only provides irrelevant inferences, to deductive proofs, which consider addressing formal representation. Findings present several examples of each of Lee’s level on the student teachers’ proofs spanning from irrelevant inferences, novice use of examples or logical reasoning, strategic use examples for reasoning, deductive inferences with major and minor logical coherence, and deductive proof with informal and formal representation. Besides, it was also found that more than half of the students’ proofs coded as inductive schemes, which does not meet the requirement for doing the proof for the proof tasks examined in this study. This study suggests teacher educators in teacher colleges to reform the curriculum regarding proof learning which can accommodate the improvement of student teachers’ proving ability from inductive to deductive proof as well from informal to formal proof.
NASA Astrophysics Data System (ADS)
Giovambattista, N.; Sciortino, F.; Starr, F. W.; Poole, P. H.
The potential energy landscape (PEL) formalism is a valuable approach within statistical mechanics for describing supercooled liquids and glasses. We use the PEL formalism and computer simulations to study the transformation between low-density (LDL) and high-density liquid (HDL) water, and between low-density (LDA) and high-density amorphous ice (HDA). We employ the ST2 water model that exhibits a LDL-HDL first-order phase transition and a sharp LDA-HDA transformation, as observed in experiments. Our results are consistent with the view that LDA and HDA configurations are associated with two distinct regions (megabasins) of the PEL that are separated by a potential energy barrier. At higher temperature, we find that LDL configurations are located in the same megabasin as LDA, and that HDL configurations are located in the same megabasin as HDA. We show that the pressure-induced LDL-HDL and LDA-HDA transformations occur along paths that interconnect these two megabasins, but that the path followed by the liquid and the amorphous ice differ. We also study the liquid-to-ice-VII first-order phase transition. The PEL properties across this transition are qualitatively similar to the changes found during the LDA-HDA transformation, supporting the interpretation that the LDA-HDA transformation is a first-order-like phase transition between out-of-equilibrium states.
Cao, Cong; Duan, Yu-Wen; Chen, Xi; Zhang, Ru; Wang, Tie-Jun; Wang, Chuan
2017-07-24
Quantum router is a key element needed for the construction of future complex quantum networks. However, quantum routing with photons, and its inverse, quantum decoupling, are difficult to implement as photons do not interact, or interact very weakly in nonlinear media. In this paper, we investigate the possibility of implementing photonic quantum routing based on effects in cavity quantum electrodynamics, and present a scheme for single-photon quantum routing controlled by the other photon using a hybrid system consisting of a single nitrogen-vacancy (NV) center coupled with a whispering-gallery-mode resonator-waveguide structure. Different from the cases in which classical information is used to control the path of quantum signals, both the control and signal photons are quantum in our implementation. Compared with the probabilistic quantum routing protocols based on linear optics, our scheme is deterministic and also scalable to multiple photons. We also present a scheme for single-photon quantum decoupling from an initial state with polarization and spatial-mode encoding, which can implement an inverse operation to the quantum routing. We discuss the feasibility of our schemes by considering current or near-future techniques, and show that both the schemes can operate effectively in the bad-cavity regime. We believe that the schemes could be key building blocks for future complex quantum networks and large-scale quantum information processing.
Quantum gravity model with fundamental spinor fields
NASA Astrophysics Data System (ADS)
Obukhov, Yu. N.; Hehl, F. W.
2014-01-01
We discuss the possibility that gravitational potentials (metric, coframe and connection) may emerge as composite fields from more fundamental spinor constituents. We use the formalism of Poincaré gauge gravity as an appropriate theoretical scheme for the rigorous development of such an approach. We postulate the constitutive relations of an elastic Cosserat type continuum that models spacetime. These generalized Hooke and MacCullagh type laws consistently take into account the translational and Lorentz rotational deformations, respectively. The resulting theory extends the recently proposed Diakonov model. An intriguing feature of our theory is that in the lowest approximation it reproduces Heisenberg's nonlinear spinor model.
Standard model anatomy of WIMP dark matter direct detection. I. Weak-scale matching
NASA Astrophysics Data System (ADS)
Hill, Richard J.; Solon, Mikhail P.
2015-02-01
We present formalism necessary to determine weak-scale matching coefficients in the computation of scattering cross sections for putative dark matter candidates interacting with the Standard Model. We pay particular attention to the heavy-particle limit. A consistent renormalization scheme in the presence of nontrivial residual masses is implemented. Two-loop diagrams appearing in the matching to gluon operators are evaluated. Details are given for the computation of matching coefficients in the universal limit of WIMP-nucleon scattering for pure states of arbitrary quantum numbers, and for singlet-doublet and doublet-triplet mixed states.
A method for exponential propagation of large systems of stiff nonlinear differential equations
NASA Technical Reports Server (NTRS)
Friesner, Richard A.; Tuckerman, Laurette S.; Dornblaser, Bright C.; Russo, Thomas V.
1989-01-01
A new time integrator for large, stiff systems of linear and nonlinear coupled differential equations is described. For linear systems, the method consists of forming a small (5-15-term) Krylov space using the Jacobian of the system and carrying out exact exponential propagation within this space. Nonlinear corrections are incorporated via a convolution integral formalism; the integral is evaluated via approximate Krylov methods as well. Gains in efficiency ranging from factors of 2 to 30 are demonstrated for several test problems as compared to a forward Euler scheme and to the integration package LSODE.
Energy management of three-dimensional minimum-time intercept. [for aircraft flight optimization
NASA Technical Reports Server (NTRS)
Kelley, H. J.; Cliff, E. M.; Visser, H. G.
1985-01-01
A real-time computer algorithm to control and optimize aircraft flight profiles is described and applied to a three-dimensional minimum-time intercept mission. The proposed scheme has roots in two well known techniques: singular perturbations and neighboring-optimal guidance. Use of singular-perturbation ideas is made in terms of the assumed trajectory-family structure. A heading/energy family of prestored point-mass-model state-Euler solutions is used as the baseline in this scheme. The next step is to generate a near-optimal guidance law that will transfer the aircraft to the vicinity of this reference family. The control commands fed to the autopilot (bank angle and load factor) consist of the reference controls plus correction terms which are linear combinations of the altitude and path-angle deviations from reference values, weighted by a set of precalculated gains. In this respect the proposed scheme resembles neighboring-optimal guidance. However, in contrast to the neighboring-optimal guidance scheme, the reference control and state variables as well as the feedback gains are stored as functions of energy and heading in the present approach. Some numerical results comparing open-loop optimal and approximate feedback solutions are presented.
Generalized quantum interference of correlated photon pairs
Kim, Heonoh; Lee, Sang Min; Moon, Han Seb
2015-01-01
Superposition and indistinguishablility between probability amplitudes have played an essential role in observing quantum interference effects of correlated photons. The Hong-Ou-Mandel interference and interferences of the path-entangled photon number state are of special interest in the field of quantum information technologies. However, a fully generalized two-photon quantum interferometric scheme accounting for the Hong-Ou-Mandel scheme and path-entangled photon number states has not yet been proposed. Here we report the experimental demonstrations of the generalized two-photon interferometry with both the interferometric properties of the Hong-Ou-Mandel effect and the fully unfolded version of the path-entangled photon number state using photon-pair sources, which are independently generated by spontaneous parametric down-conversion. Our experimental scheme explains two-photon interference fringes revealing single- and two-photon coherence properties in a single interferometer setup. Using the proposed interferometric measurement, it is possible to directly estimate the joint spectral intensity of a photon pair source. PMID:25951143
NASA Technical Reports Server (NTRS)
Carpenter, Mark H.; Gottlieb, David; Abarbanel, Saul; Don, Wai-Sun
1993-01-01
The conventional method of imposing time dependent boundary conditions for Runge-Kutta (RK) time advancement reduces the formal accuracy of the space-time method to first order locally, and second order globally, independently of the spatial operator. This counter intuitive result is analyzed in this paper. Two methods of eliminating this problem are proposed for the linear constant coefficient case: (1) impose the exact boundary condition only at the end of the complete RK cycle, (2) impose consistent intermediate boundary conditions derived from the physical boundary condition and its derivatives. The first method, while retaining the RK accuracy in all cases, results in a scheme with much reduced CFL condition, rendering the RK scheme less attractive. The second method retains the same allowable time step as the periodic problem. However it is a general remedy only for the linear case. For non-linear hyperbolic equations the second method is effective only for for RK schemes of third order accuracy or less. Numerical studies are presented to verify the efficacy of each approach.
Towards a true aerosol-and-cloud retrieval scheme
NASA Astrophysics Data System (ADS)
Thomas, Gareth; Poulsen, Caroline; Povey, Adam; McGarragh, Greg; Jerg, Matthias; Siddans, Richard; Grainger, Don
2014-05-01
The Optimal Retrieval of Aerosol and Cloud (ORAC) - formally the Oxford-RAL Aerosol and Cloud retrieval - offers a framework that can provide consistent and well characterised properties of both aerosols and clouds from a range of imaging satellite instruments. Several practical issues stand in the way of achieving the potential of this combined scheme however; in particular the sometimes conflicting priorities and requirements of aerosol and cloud retrieval problems, and the question of the unambiguous identification of aerosol and cloud pixels. This presentation will present recent developments made to the ORAC scheme for both aerosol and cloud, and detail how these are being integrated into a single retrieval framework. The implementation of a probabilistic method for pixel identification will also be presented, for both cloud detection and aerosol/cloud type selection. The method is based on Bayesian methods applied the optimal estimation retrieval output of ORAC and is particularly aimed at providing additional information in the so-called "twilight zone", where pixels can't be unambiguously identified as either aerosol or cloud and traditional cloud or aerosol products do not provide results.
A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method
Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Chen, Wei
2016-01-01
With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment. Current key management researches pay less attention to the security of sensor networks with MS. This paper proposes a hybrid key management schemes based on a Polynomial Pool-based key pre-distribution and Basic Random key pre-distribution (PPBR) to be used in WSNs with MS. The scheme takes full advantages of these two kinds of methods to improve the cracking difficulty of the key system. The storage effectiveness and the network resilience can be significantly enhanced as well. The tree-based path key establishment method is introduced to effectively solve the problem of communication link connectivity. Simulation clearly shows that the proposed scheme performs better in terms of network resilience, connectivity and storage effectiveness compared to other widely used schemes. PMID:27070624
NASA Technical Reports Server (NTRS)
Mutambara, Arthur G. O.; Litt, Jonathan
1998-01-01
This report addresses the problem of path planning and control of robotic manipulators which have joint-position limits and joint-rate limits. The manipulators move autonomously and carry out variable tasks in a dynamic, unstructured and cluttered environment. The issue considered is whether the robotic manipulator can achieve all its tasks, and if it cannot, the objective is to identify the closest achievable goal. This problem is formalized and systematically solved for generic manipulators by using inverse kinematics and forward kinematics. Inverse kinematics are employed to define the subspace, workspace and constrained workspace, which are then used to identify when a task is not achievable. The closest achievable goal is obtained by determining weights for an optimal control redistribution scheme. These weights are quantified by using forward kinematics. Conditions leading to joint rate limits are identified, in particular it is established that all generic manipulators have singularities at the boundary of their workspace, while some have loci of singularities inside their workspace. Once the manipulator singularity is identified the command redistribution scheme is used to compute the closest achievable Cartesian velocities. Two examples are used to illustrate the use of the algorithm: A three link planar manipulator and the Unimation Puma 560. Implementation of the derived algorithm is effected by using a supervisory expert system to check whether the desired goal lies in the constrained workspace and if not, to evoke the redistribution scheme which determines the constraint relaxation between end effector position and orientation, and then computes optimal gains.
Connecting different TMD factorization formalisms in QCD
Collins, John; Rogers, Ted C.
2017-09-11
In the original Collins-Soper-Sterman (CSS) presentation of the results of transverse-momentum-dependent (TMD) factorization for the Drell-Yan process, results for perturbative coefficients can be obtained from calculations for collinear factorization. Here we show how to use these results, plus known results for the quark form factor, to obtain coefficients for TMD factorization in more recent formulations, e.g., that due to Collins, and apply them to known results at ordermore » $$\\alpha_s^2$$ and $$\\alpha_s^3$$. We also show that the ``non-perturbative'' functions as obtained from fits to data are equal in the two schemes. We compile the higher-order perturbative inputs needed for the updated CSS scheme by appealing to results obtained in a variety of different formalisms. In addition, we derive the connection between both versions of the CSS formalism and several formalisms based in soft-collinear effective theory (SCET). As a result, our work uses some important new results for factorization for the quark form factor, which we derive.« less
Connecting different TMD factorization formalisms in QCD
NASA Astrophysics Data System (ADS)
Collins, John; Rogers, Ted C.
2017-09-01
In the original Collins-Soper-Sterman (CSS) presentation of the results of transverse-momentum-dependent (TMD) factorization for the Drell-Yan process, results for perturbative coefficients can be obtained from calculations for collinear factorization. Here we show how to use these results, plus known results for the quark form factor, to obtain coefficients for TMD factorization in more recent formulations, e.g., that due to Collins, and apply them to known results at order αs2 and αs3. We also show that the "nonperturbative" functions as obtained from fits to data are equal in the two schemes. We compile the higher-order perturbative inputs needed for the updated CSS scheme by appealing to results obtained in a variety of different formalisms. In addition, we derive the connection between both versions of the CSS formalism and several formalisms based in soft-collinear effective theory (SCET). Our work uses some important new results for factorization for the quark form factor, which we derive.
Connecting different TMD factorization formalisms in QCD
DOE Office of Scientific and Technical Information (OSTI.GOV)
Collins, John; Rogers, Ted C.
In the original Collins-Soper-Sterman (CSS) presentation of the results of transverse-momentum-dependent (TMD) factorization for the Drell-Yan process, results for perturbative coefficients can be obtained from calculations for collinear factorization. Here we show how to use these results, plus known results for the quark form factor, to obtain coefficients for TMD factorization in more recent formulations, e.g., that due to Collins, and apply them to known results at ordermore » $$\\alpha_s^2$$ and $$\\alpha_s^3$$. We also show that the ``non-perturbative'' functions as obtained from fits to data are equal in the two schemes. We compile the higher-order perturbative inputs needed for the updated CSS scheme by appealing to results obtained in a variety of different formalisms. In addition, we derive the connection between both versions of the CSS formalism and several formalisms based in soft-collinear effective theory (SCET). As a result, our work uses some important new results for factorization for the quark form factor, which we derive.« less
A systematic study of finite BRST-BFV transformations in generalized Hamiltonian formalism
NASA Astrophysics Data System (ADS)
Batalin, Igor A.; Lavrov, Peter M.; Tyutin, Igor V.
2014-09-01
We study systematically finite BRST-BFV transformations in the generalized Hamiltonian formalism. We present explicitly their Jacobians and the form of a solution to the compensation equation determining the functional field dependence of finite Fermionic parameters, necessary to generate an arbitrary finite change of gauge-fixing functions in the path integral.
Kinematics, controls, and path planning results for a redundant manipulator
NASA Technical Reports Server (NTRS)
Gretz, Bruce; Tilley, Scott W.
1989-01-01
The inverse kinematics solution, a modal position control algorithm, and path planning results for a 7 degree of freedom manipulator are presented. The redundant arm consists of two links with shoulder and elbow joints and a spherical wrist. The inverse kinematics problem for tip position is solved and the redundant joint is identified. It is also shown that a locus of tip positions exists in which there are kinematic limitations on self-motion. A computationally simple modal position control algorithm has been developed which guarantees a nearly constant closed-loop dynamic response throughout the workspace. If all closed-loop poles are assigned to the same location, the algorithm can be implemented with very little computation. To further reduce the required computation, the modal gains are updated only at discrete time intervals. Criteria are developed for the frequency of these updates. For commanding manipulator movements, a 5th-order spline which minimizes jerk provides a smooth tip-space path. Schemes for deriving a corresponding joint-space trajectory are discussed. Modifying the trajectory to avoid joint torque saturation when a tip payload is added is also considered. Simulation results are presented.
NASA Astrophysics Data System (ADS)
Wang, Fuyin; Xie, Jiehui; Hu, Zhengliang; Xiong, Shuidong; Luo, Hong; Hu, Yongming
2014-05-01
Study of fiber optic extrinsic Fabry-Pérot sensors utilizing state-of-the-art MEMS technology mostly focus on sensor fabrication for various applications, while the signal interrogation is still insatiable to current application. In this paper, we propose a white light path matched differential interferometer dynamic sensing system utilizing phase generated carrier demodulation scheme. A step motor with a movable mirror and a fiber-wound piezoelectric transducer string are used to act path matching and phase modulation respectively. Experimental results show that the sensing signal could be correctly recovered with low distortion and the phase noise spectrum level is less than -100 dB re. rad/√Hz above 2.5 kHz.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zheng, Xue; Klein, S. A.; Ma, H. -Y.
To assess marine boundary layer (MBL) cloud simulations in three versions of the Community Atmosphere Model (CAM), three sets of short-term global hindcasts are performed and compared to Atmospheric Radiation Measurement Program (ARM) observations on Graciosa Island in the Azores from June 2009 to December 2010. Here, the three versions consist of CAM5.3 with default schemes (CAM5.3), CAM5.3 with Cloud Layers Unified By Binormals (CLUBB-MG1), and CAM5.3 with CLUBB and updated microphysics scheme (CLUBB-MG2). Our results show that relative to CAM5.3 default schemes, simulations with CLUBB better represent MBL cloud base height, the height of the major cloud layer, andmore » the daily cloud cover variability. CLUBB also better simulates the relationship of cloud fraction to cloud liquid water path (LWP) most likely due to CLUBB's consistent treatment of these variables through a probability distribution function (PDF) approach. Subcloud evaporation of precipitation is substantially enhanced in simulations with CLUBB-MG2 and is more realistic based on the limited observational estimate. Despite these improvements, all model versions underestimate MBL cloud cover. CLUBB-MG2 reduces biases in in-cloud LWP (clouds are not too bright) but there are still too few of MBL clouds due to an underestimate in the frequency of overcast scenes. Thus, combining CLUBB with MG2 scheme better simulates MBL cloud processes, but because biases remain in MBL cloud cover CLUBB-MG2 does not improve the simulation of the surface shortwave cloud radiative effect (CRE SW).« less
Zheng, Xue; Klein, S. A.; Ma, H. -Y.; ...
2016-07-19
To assess marine boundary layer (MBL) cloud simulations in three versions of the Community Atmosphere Model (CAM), three sets of short-term global hindcasts are performed and compared to Atmospheric Radiation Measurement Program (ARM) observations on Graciosa Island in the Azores from June 2009 to December 2010. Here, the three versions consist of CAM5.3 with default schemes (CAM5.3), CAM5.3 with Cloud Layers Unified By Binormals (CLUBB-MG1), and CAM5.3 with CLUBB and updated microphysics scheme (CLUBB-MG2). Our results show that relative to CAM5.3 default schemes, simulations with CLUBB better represent MBL cloud base height, the height of the major cloud layer, andmore » the daily cloud cover variability. CLUBB also better simulates the relationship of cloud fraction to cloud liquid water path (LWP) most likely due to CLUBB's consistent treatment of these variables through a probability distribution function (PDF) approach. Subcloud evaporation of precipitation is substantially enhanced in simulations with CLUBB-MG2 and is more realistic based on the limited observational estimate. Despite these improvements, all model versions underestimate MBL cloud cover. CLUBB-MG2 reduces biases in in-cloud LWP (clouds are not too bright) but there are still too few of MBL clouds due to an underestimate in the frequency of overcast scenes. Thus, combining CLUBB with MG2 scheme better simulates MBL cloud processes, but because biases remain in MBL cloud cover CLUBB-MG2 does not improve the simulation of the surface shortwave cloud radiative effect (CRE SW).« less
Coherence and visibility for vectorial light.
Luis, Alfredo
2010-08-01
Two-path interference of transversal vectorial waves is embedded within a larger scheme: this is four-path interference between four scalar waves. This comprises previous approaches to coherence between vectorial waves and restores the equivalence between correlation-based coherence and visibility.
Multiresolution motion planning for autonomous agents via wavelet-based cell decompositions.
Cowlagi, Raghvendra V; Tsiotras, Panagiotis
2012-10-01
We present a path- and motion-planning scheme that is "multiresolution" both in the sense of representing the environment with high accuracy only locally and in the sense of addressing the vehicle kinematic and dynamic constraints only locally. The proposed scheme uses rectangular multiresolution cell decompositions, efficiently generated using the wavelet transform. The wavelet transform is widely used in signal and image processing, with emerging applications in autonomous sensing and perception systems. The proposed motion planner enables the simultaneous use of the wavelet transform in both the perception and in the motion-planning layers of vehicle autonomy, thus potentially reducing online computations. We rigorously prove the completeness of the proposed path-planning scheme, and we provide numerical simulation results to illustrate its efficacy.
Space of states in operator BFV-formalism
DOE Office of Scientific and Technical Information (OSTI.GOV)
Batalin, I.A.; Tyutin, I.V.
1993-05-15
The dynamically adequate Fock realization of the extended space of asymptotic states is given within the framework of the operator BFV-formalism and of the Dirac quantization scheme as well. Physical subspace is picked out and established to be naturally isomorphic to the Dirac space of states. The formal mechanism (unitary [var epsilon]-limit), by means of which the operator BFV-dynamics reduces to the Dirac one, is studied. 10 refs.
Literature Review on Concurrent Dual Career Development in the URL (unrestricted Line)
1989-06-01
Career Development Systems, (3) Multiple Career Paths in Organizations, (4) Skills Required for Management, (5) Predicting Career Success , (6) Skill...10 Sum m ary .............................................................. 11 Predicting Career Success ................................................. 11...Career Paths in Organizations, (4) Skills Required for Management, (5) Predicting Career Success , (6) Skill Requirements of Jobs, (7) Formal Training, (8
Molloy, Kevin; Shehu, Amarda
2013-01-01
Many proteins tune their biological function by transitioning between different functional states, effectively acting as dynamic molecular machines. Detailed structural characterization of transition trajectories is central to understanding the relationship between protein dynamics and function. Computational approaches that build on the Molecular Dynamics framework are in principle able to model transition trajectories at great detail but also at considerable computational cost. Methods that delay consideration of dynamics and focus instead on elucidating energetically-credible conformational paths connecting two functionally-relevant structures provide a complementary approach. Effective sampling-based path planning methods originating in robotics have been recently proposed to produce conformational paths. These methods largely model short peptides or address large proteins by simplifying conformational space. We propose a robotics-inspired method that connects two given structures of a protein by sampling conformational paths. The method focuses on small- to medium-size proteins, efficiently modeling structural deformations through the use of the molecular fragment replacement technique. In particular, the method grows a tree in conformational space rooted at the start structure, steering the tree to a goal region defined around the goal structure. We investigate various bias schemes over a progress coordinate for balance between coverage of conformational space and progress towards the goal. A geometric projection layer promotes path diversity. A reactive temperature scheme allows sampling of rare paths that cross energy barriers. Experiments are conducted on small- to medium-size proteins of length up to 214 amino acids and with multiple known functionally-relevant states, some of which are more than 13Å apart of each-other. Analysis reveals that the method effectively obtains conformational paths connecting structural states that are significantly different. A detailed analysis on the depth and breadth of the tree suggests that a soft global bias over the progress coordinate enhances sampling and results in higher path diversity. The explicit geometric projection layer that biases the exploration away from over-sampled regions further increases coverage, often improving proximity to the goal by forcing the exploration to find new paths. The reactive temperature scheme is shown effective in increasing path diversity, particularly in difficult structural transitions with known high-energy barriers.
Bio-Inspired Genetic Algorithms with Formalized Crossover Operators for Robotic Applications.
Zhang, Jie; Kang, Man; Li, Xiaojuan; Liu, Geng-Yang
2017-01-01
Genetic algorithms are widely adopted to solve optimization problems in robotic applications. In such safety-critical systems, it is vitally important to formally prove the correctness when genetic algorithms are applied. This paper focuses on formal modeling of crossover operations that are one of most important operations in genetic algorithms. Specially, we for the first time formalize crossover operations with higher-order logic based on HOL4 that is easy to be deployed with its user-friendly programing environment. With correctness-guaranteed formalized crossover operations, we can safely apply them in robotic applications. We implement our technique to solve a path planning problem using a genetic algorithm with our formalized crossover operations, and the results show the effectiveness of our technique.
NASA Astrophysics Data System (ADS)
Simone, Gabriele; Cordone, Roberto; Serapioni, Raul Paolo; Lecca, Michela
2017-05-01
Retinex theory estimates the human color sensation at any observed point by correcting its color based on the spatial arrangement of the colors in proximate regions. We revise two recent path-based, edge-aware Retinex implementations: Termite Retinex (TR) and Energy-driven Termite Retinex (ETR). As the original Retinex implementation, TR and ETR scan the neighborhood of any image pixel by paths and rescale their chromatic intensities by intensity levels computed by reworking the colors of the pixels on the paths. Our interest in TR and ETR is due to their unique, content-based scanning scheme, which uses the image edges to define the paths and exploits a swarm intelligence model for guiding the spatial exploration of the image. The exploration scheme of ETR has been showed to be particularly effective: its paths are local minima of an energy functional, designed to favor the sampling of image pixels highly relevant to color sensation. Nevertheless, since its computational complexity makes ETR poorly practicable, here we present a light version of it, named Light Energy-driven TR, and obtained from ETR by implementing a modified, optimized minimization procedure and by exploiting parallel computing.
Planning 3-D collision-free paths using spheres
NASA Technical Reports Server (NTRS)
Bonner, Susan; Kelley, Robert B.
1989-01-01
A scheme for the representation of objects, the Successive Spherical Approximation (SSA), facilitates the rapid planning of collision-free paths in a 3-D, dynamic environment. The hierarchical nature of the SSA allows collision-free paths to be determined efficiently while still providing for the exact representation of dynamic objects. The concept of a freespace cell is introduced to allow human 3-D conceptual knowledge to be used in facilitating satisfying choices for paths. Collisions can be detected at a rate better than 1 second per environment object per path. This speed enables the path planning process to apply a hierarchy of rules to create a heuristically satisfying collision-free path.
Das, Ashok Kumar
2015-03-01
An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.
Multidimensional radiative transfer with multilevel atoms. II. The non-linear multigrid method.
NASA Astrophysics Data System (ADS)
Fabiani Bendicho, P.; Trujillo Bueno, J.; Auer, L.
1997-08-01
A new iterative method for solving non-LTE multilevel radiative transfer (RT) problems in 1D, 2D or 3D geometries is presented. The scheme obtains the self-consistent solution of the kinetic and RT equations at the cost of only a few (<10) formal solutions of the RT equation. It combines, for the first time, non-linear multigrid iteration (Brandt, 1977, Math. Comp. 31, 333; Hackbush, 1985, Multi-Grid Methods and Applications, springer-Verlag, Berlin), an efficient multilevel RT scheme based on Gauss-Seidel iterations (cf. Trujillo Bueno & Fabiani Bendicho, 1995ApJ...455..646T), and accurate short-characteristics formal solution techniques. By combining a valid stopping criterion with a nested-grid strategy a converged solution with the desired true error is automatically guaranteed. Contrary to the current operator splitting methods the very high convergence speed of the new RT method does not deteriorate when the grid spatial resolution is increased. With this non-linear multigrid method non-LTE problems discretized on N grid points are solved in O(N) operations. The nested multigrid RT method presented here is, thus, particularly attractive in complicated multilevel transfer problems where small grid-sizes are required. The properties of the method are analyzed both analytically and with illustrative multilevel calculations for Ca II in 1D and 2D schematic model atmospheres.
NASA Astrophysics Data System (ADS)
Batalin, Igor A.; Lavrov, Peter M.; Tyutin, Igor V.
2014-09-01
We study systematically finite BRST-BFV transformations in Sp(2)-extended generalized Hamiltonian formalism. We present explicitly their Jacobians and the form of a solution to the compensation equation determining the functional field dependence of finite Fermionic parameters, necessary to generate arbitrary finite change of gauge-fixing functions in the path integral.
Formal language constrained path problems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barrett, C.; Jacob, R.; Marathe, M.
1997-07-08
In many path finding problems arising in practice, certain patterns of edge/vertex labels in the labeled graph being traversed are allowed/preferred, while others are disallowed. Motivated by such applications as intermodal transportation planning, the authors investigate the complexity of finding feasible paths in a labeled network, where the mode choice for each traveler is specified by a formal language. The main contributions of this paper include the following: (1) the authors show that the problem of finding a shortest path between a source and destination for a traveler whose mode choice is specified as a context free language is solvablemore » efficiently in polynomial time, when the mode choice is specified as a regular language they provide algorithms with improved space and time bounds; (2) in contrast, they show that the problem of finding simple paths between a source and a given destination is NP-hard, even when restricted to very simple regular expressions and/or very simple graphs; (3) for the class of treewidth bounded graphs, they show that (i) the problem of finding a regular language constrained simple path between source and a destination is solvable in polynomial time and (ii) the extension to finding context free language constrained simple paths is NP-complete. Several extensions of these results are presented in the context of finding shortest paths with additional constraints. These results significantly extend the results in [MW95]. As a corollary of the results, they obtain a polynomial time algorithm for the BEST k-SIMILAR PATH problem studied in [SJB97]. The previous best algorithm was given by [SJB97] and takes exponential time in the worst case.« less
Path length differencing and energy conservation of the S[sub N] Boltzmann/Spencer-Lewis equation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Filippone, W.L.; Monahan, S.P.
It is shown that the S[sub N] Boltzmann/Spencer-Lewis equations conserve energy locally if and only if they satisfy particle balance and diamond differencing is used in path length. In contrast, the spatial differencing schemes have no bearing on the energy balance. Energy is conserved globally if it is conserved locally and the multigroup cross sections are energy conserving. Although the coupled electron-photon cross sections generated by CEPXS conserve particles and charge, they do not precisely conserve energy. It is demonstrated that these cross sections can be adjusted such that particles, charge, and energy are conserved. Finally, since a conventional negativemore » flux fixup destroys energy balance when applied to path legend, a modified fixup scheme that does not is presented.« less
A Comprehensive Study of Data Collection Schemes Using Mobile Sinks in Wireless Sensor Networks
Khan, Abdul Waheed; Abdullah, Abdul Hanan; Anisi, Mohammad Hossein; Bangash, Javed Iqbal
2014-01-01
Recently sink mobility has been exploited in numerous schemes to prolong the lifetime of wireless sensor networks (WSNs). Contrary to traditional WSNs where sensory data from sensor field is ultimately sent to a static sink, mobile sink-based approaches alleviate energy-holes issues thereby facilitating balanced energy consumption among nodes. In mobility scenarios, nodes need to keep track of the latest location of mobile sinks for data delivery. However, frequent propagation of sink topological updates undermines the energy conservation goal and therefore should be controlled. Furthermore, controlled propagation of sinks' topological updates affects the performance of routing strategies thereby increasing data delivery latency and reducing packet delivery ratios. This paper presents a taxonomy of various data collection/dissemination schemes that exploit sink mobility. Based on how sink mobility is exploited in the sensor field, we classify existing schemes into three classes, namely path constrained, path unconstrained, and controlled sink mobility-based schemes. We also organize existing schemes based on their primary goals and provide a comparative study to aid readers in selecting the appropriate scheme in accordance with their particular intended applications and network dynamics. Finally, we conclude our discussion with the identification of some unresolved issues in pursuit of data delivery to a mobile sink. PMID:24504107
NASA Astrophysics Data System (ADS)
Feng, Xueshang; Li, Caixia; Xiang, Changqing; Zhang, Man; Li, HuiChao; Wei, Fengsi
2017-11-01
A second-order path-conservative scheme with a Godunov-type finite-volume method has been implemented to advance the equations of single-fluid solar wind plasma magnetohydrodynamics (MHD) in time. This code operates on the six-component composite grid system in three-dimensional spherical coordinates with hexahedral cells of quadrilateral frustum type. The generalized Osher-Solomon Riemann solver is employed based on a numerical integration of the path-dependent dissipation matrix. For simplicity, the straight line segment path is used, and the path integral is evaluated in a fully numerical way by a high-order numerical Gauss-Legendre quadrature. Besides its very close similarity to Godunov type, the resulting scheme retains the attractive features of the original solver: it is nonlinear, free of entropy-fix, differentiable, and complete, in that each characteristic field results in a different numerical viscosity, due to the full use of the MHD eigenstructure. By using a minmod limiter for spatial oscillation control, the path-conservative scheme is realized for the generalized Lagrange multiplier and the extended generalized Lagrange multiplier formulation of solar wind MHD systems. This new model that is second order in space and time is written in the FORTRAN language with Message Passing Interface parallelization and validated in modeling the time-dependent large-scale structure of the solar corona, driven continuously by Global Oscillation Network Group data. To demonstrate the suitability of our code for the simulation of solar wind, we present selected results from 2009 October 9 to 2009 December 29 show its capability of producing a structured solar corona in agreement with solar coronal observations.
An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity
Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian
2016-01-01
User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.’s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.’s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance. PMID:27101305
NASA Astrophysics Data System (ADS)
MacArt, Jonathan F.; Mueller, Michael E.
2016-12-01
Two formally second-order accurate, semi-implicit, iterative methods for the solution of scalar transport-reaction equations are developed for Direct Numerical Simulation (DNS) of low Mach number turbulent reacting flows. The first is a monolithic scheme based on a linearly implicit midpoint method utilizing an approximately factorized exact Jacobian of the transport and reaction operators. The second is an operator splitting scheme based on the Strang splitting approach. The accuracy properties of these schemes, as well as their stability, cost, and the effect of chemical mechanism size on relative performance, are assessed in two one-dimensional test configurations comprising an unsteady premixed flame and an unsteady nonpremixed ignition, which have substantially different Damköhler numbers and relative stiffness of transport to chemistry. All schemes demonstrate their formal order of accuracy in the fully-coupled convergence tests. Compared to a (non-)factorized scheme with a diagonal approximation to the chemical Jacobian, the monolithic, factorized scheme using the exact chemical Jacobian is shown to be both more stable and more economical. This is due to an improved convergence rate of the iterative procedure, and the difference between the two schemes in convergence rate grows as the time step increases. The stability properties of the Strang splitting scheme are demonstrated to outpace those of Lie splitting and monolithic schemes in simulations at high Damköhler number; however, in this regime, the monolithic scheme using the approximately factorized exact Jacobian is found to be the most economical at practical CFL numbers. The performance of the schemes is further evaluated in a simulation of a three-dimensional, spatially evolving, turbulent nonpremixed planar jet flame.
Jooya, Hossein Z.; Reihani, Kamran; Chu, Shih-I
2016-11-21
We propose a graph-theoretical formalism to study generic circuit quantum electrodynamics systems consisting of a two level qubit coupled with a single-mode resonator in arbitrary coupling strength regimes beyond rotating-wave approximation. We define colored-weighted graphs, and introduce different products between them to investigate the dynamics of superconducting qubits in transverse, longitudinal, and bidirectional coupling schemes. In conclusion, the intuitive and predictive picture provided by this method, and the simplicity of the mathematical construction, are demonstrated with some numerical studies of the multiphoton resonance processes and quantum interference phenomena for the superconducting qubit systems driven by intense ac fields.
NASA Astrophysics Data System (ADS)
Ku, Seung-Hoe; Hager, R.; Chang, C. S.; Chacon, L.; Chen, G.; EPSI Team
2016-10-01
The cancelation problem has been a long-standing issue for long wavelengths modes in electromagnetic gyrokinetic PIC simulations in toroidal geometry. As an attempt of resolving this issue, we implemented a fully implicit time integration scheme in the full-f, gyrokinetic PIC code XGC1. The new scheme - based on the implicit Vlasov-Darwin PIC algorithm by G. Chen and L. Chacon - can potentially resolve cancelation problem. The time advance for the field and the particle equations is space-time-centered, with particle sub-cycling. The resulting system of equations is solved by a Picard iteration solver with fixed-point accelerator. The algorithm is implemented in the parallel velocity formalism instead of the canonical parallel momentum formalism. XGC1 specializes in simulating the tokamak edge plasma with magnetic separatrix geometry. A fully implicit scheme could be a way to accurate and efficient gyrokinetic simulations. We will test if this numerical scheme overcomes the cancelation problem, and reproduces the dispersion relation of Alfven waves and tearing modes in cylindrical geometry. Funded by US DOE FES and ASCR, and computing resources provided by OLCF through ALCC.
Deducing trapdoor primitives in public key encryption schemes
NASA Astrophysics Data System (ADS)
Pandey, Chandra
2005-03-01
Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.
Recognising Prior Learning: Investigating the Future of Informal Learning, a Northern Ireland Study
ERIC Educational Resources Information Center
O'Hagan, Celia; McAleavy, Gerry; Storan, John
2005-01-01
Credit accumulation and transfer schemes (CATS) have developed as a means to facilitate access and the recognition and development of formal learning experiences across educational sectors and providers. Modularisation and credit developments have significantly affected the provision of formal learning opportunities over the last three decades.…
{ital R}-matrix theory, formal Casimirs and the periodic Toda lattice
DOE Office of Scientific and Technical Information (OSTI.GOV)
Morosi, C.; Pizzocchero, L.
The nonunitary {ital r}-matrix theory and the associated bi- and triHamiltonian schemes are considered. The language of Poisson pencils and of their formal Casimirs is applied in this framework to characterize the biHamiltonian chains of integrals of motion, pointing out the role of the Schur polynomials in these constructions. This formalism is subsequently applied to the periodic Toda lattice. Some different algebraic settings and Lax formulations proposed in the literature for this system are analyzed in detail, and their full equivalence is exploited. In particular, the equivalence between the loop algebra approach and the method of differential-difference operators is illustrated;more » moreover, two alternative Lax formulations are considered, and appropriate reduction algorithms are found in both cases, allowing us to derive the multiHamiltonian formalism from {ital r}-matrix theory. The systems of integrals for the periodic Toda lattice known after Flaschka and H{acute e}non, and their functional relations, are recovered through systematic application of the previously outlined schemes. {copyright} {ital 1996 American Institute of Physics.}« less
Homography-based control scheme for mobile robots with nonholonomic and field-of-view constraints.
López-Nicolás, Gonzalo; Gans, Nicholas R; Bhattacharya, Sourabh; Sagüés, Carlos; Guerrero, Josechu J; Hutchinson, Seth
2010-08-01
In this paper, we present a visual servo controller that effects optimal paths for a nonholonomic differential drive robot with field-of-view constraints imposed by the vision system. The control scheme relies on the computation of homographies between current and goal images, but unlike previous homography-based methods, it does not use the homography to compute estimates of pose parameters. Instead, the control laws are directly expressed in terms of individual entries in the homography matrix. In particular, we develop individual control laws for the three path classes that define the language of optimal paths: rotations, straight-line segments, and logarithmic spirals. These control laws, as well as the switching conditions that define how to sequence path segments, are defined in terms of the entries of homography matrices. The selection of the corresponding control law requires the homography decomposition before starting the navigation. We provide a controllability and stability analysis for our system and give experimental results.
Provable Transient Recovery for Frame-Based, Fault-Tolerant Computing Systems
NASA Technical Reports Server (NTRS)
DiVito, Ben L.; Butler, Ricky W.
1992-01-01
We present a formal verification of the transient fault recovery aspects of the Reliable Computing Platform (RCP), a fault-tolerant computing system architecture for digital flight control applications. The RCP uses NMR-style redundancy to mask faults and internal majority voting to purge the effects of transient faults. The system design has been formally specified and verified using the EHDM verification system. Our formalization accommodates a wide variety of voting schemes for purging the effects of transients.
Modeling and Detecting Feature Interactions among Integrated Services of Home Network Systems
NASA Astrophysics Data System (ADS)
Igaki, Hiroshi; Nakamura, Masahide
This paper presents a framework for formalizing and detecting feature interactions (FIs) in the emerging smart home domain. We first establish a model of home network system (HNS), where every networked appliance (or the HNS environment) is characterized as an object consisting of properties and methods. Then, every HNS service is defined as a sequence of method invocations of the appliances. Within the model, we next formalize two kinds of FIs: (a) appliance interactions and (b) environment interactions. An appliance interaction occurs when two method invocations conflict on the same appliance, whereas an environment interaction arises when two method invocations conflict indirectly via the environment. Finally, we propose offline and online methods that detect FIs before service deployment and during execution, respectively. Through a case study with seven practical services, it is shown that the proposed framework is generic enough to capture feature interactions in HNS integrated services. We also discuss several FI resolution schemes within the proposed framework.
A new line-of-sight approach to the non-linear Cosmic Microwave Background
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fidler, Christian; Koyama, Kazuya; Pettinari, Guido W., E-mail: christian.fidler@port.ac.uk, E-mail: kazuya.koyama@port.ac.uk, E-mail: guido.pettinari@gmail.com
2015-04-01
We develop the transport operator formalism, a new line-of-sight integration framework to calculate the anisotropies of the Cosmic Microwave Background (CMB) at the linear and non-linear level. This formalism utilises a transformation operator that removes all inhomogeneous propagation effects acting on the photon distribution function, thus achieving a split between perturbative collisional effects at recombination and non-perturbative line-of-sight effects at later times. The former can be computed in the framework of standard cosmological perturbation theory with a second-order Boltzmann code such as SONG, while the latter can be treated within a separate perturbative scheme allowing the use of non-linear Newtonianmore » potentials. We thus provide a consistent framework to compute all physical effects contained in the Boltzmann equation and to combine the standard remapping approach with Boltzmann codes at any order in perturbation theory, without assuming that all sources are localised at recombination.« less
NASA Astrophysics Data System (ADS)
Shinya, A.; Ishihara, T.; Inoue, K.; Nozaki, K.; Kita, S.; Notomi, M.
2018-02-01
We propose an optical parallel adder based on a binary decision diagram that can calculate simply by propagating light through electrically controlled optical pass gates. The CARRY and CARRY operations are multiplexed in one circuit by a wavelength division multiplexing scheme to reduce the number of optical elements, and only a single gate constitutes the critical path for one digit calculation. The processing time reaches picoseconds per digit when we use a 100-μm-long optical path gates, which is ten times faster than a CMOS circuit.
Architecture of PAU survey camera readout electronics
NASA Astrophysics Data System (ADS)
Castilla, Javier; Cardiel-Sas, Laia; De Vicente, Juan; Illa, Joseph; Jimenez, Jorge; Maiorino, Marino; Martinez, Gustavo
2012-07-01
PAUCam is a new camera for studying the physics of the accelerating universe. The camera will consist of eighteen 2Kx4K HPK CCDs: sixteen for science and two for guiding. The camera will be installed at the prime focus of the WHT (William Herschel Telescope). In this contribution, the architecture of the readout electronics system is presented. Back- End and Front-End electronics are described. Back-End consists of clock, bias and video processing boards, mounted on Monsoon crates. The Front-End is based on patch panel boards. These boards are plugged outside the camera feed-through panel for signal distribution. Inside the camera, individual preamplifier boards plus kapton cable completes the path to connect to each CCD. The overall signal distribution and grounding scheme is shown in this paper.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Reaugh, J E; Lee, E L
2002-07-01
Mixture rules for partially reacted explosives differ amongst various models. For instance, JWL++ uses a partial pressure addition to compute an average zonal pressure, Ignition and Growth requires pressure equilibration and thermal equilibration of temperature dependent JWL EOSs, CHEETAH In Line RF also assumes temperature and pressure equilibration. It has been suggested in the past that a more realistic equilibration scheme should comprise isentropic pressure equilibration of the separate reacted and unreacted phases. This turns out not to be a proper path for equilibration. Rather, we find that the only internally consistent method is the evaluation of the equilibrium pressuremore » that satisfies the particular conditions of reactant and product resulting from deflagration in a fixed volume.« less
UMDR: Multi-Path Routing Protocol for Underwater Ad Hoc Networks with Directional Antenna
NASA Astrophysics Data System (ADS)
Yang, Jianmin; Liu, Songzuo; Liu, Qipei; Qiao, Gang
2018-01-01
This paper presents a new routing scheme for underwater ad hoc networks based on directional antennas. Ad hoc networks with directional antennas have become a hot research topic because of space reuse may increase networks capacity. At present, researchers have applied traditional self-organizing routing protocols (such as DSR, AODV) [1] [2] on this type of networks, and the routing scheme is based on the shortest path metric. However, such routing schemes often suffer from long transmission delays and frequent link fragmentation along the intermediate nodes of the selected route. This is caused by a unique feature of directional transmission, often called as “deafness”. In this paper, we take a different approach to explore the advantages of space reuse through multipath routing. This paper introduces the validity of the conventional routing scheme in underwater ad hoc networks with directional antennas, and presents a special design of multipath routing algorithm for directional transmission. The experimental results show a significant performance improvement in throughput and latency.
Code-Time Diversity for Direct Sequence Spread Spectrum Systems
Hassan, A. Y.
2014-01-01
Time diversity is achieved in direct sequence spread spectrum by receiving different faded delayed copies of the transmitted symbols from different uncorrelated channel paths when the transmission signal bandwidth is greater than the coherence bandwidth of the channel. In this paper, a new time diversity scheme is proposed for spread spectrum systems. It is called code-time diversity. In this new scheme, N spreading codes are used to transmit one data symbol over N successive symbols interval. The diversity order in the proposed scheme equals to the number of the used spreading codes N multiplied by the number of the uncorrelated paths of the channel L. The paper represents the transmitted signal model. Two demodulators structures will be proposed based on the received signal models from Rayleigh flat and frequency selective fading channels. Probability of error in the proposed diversity scheme is also calculated for the same two fading channels. Finally, simulation results are represented and compared with that of maximal ration combiner (MRC) and multiple-input and multiple-output (MIMO) systems. PMID:24982925
Accurate Exchange-Correlation Energies for the Warm Dense Electron Gas.
Malone, Fionn D; Blunt, N S; Brown, Ethan W; Lee, D K K; Spencer, J S; Foulkes, W M C; Shepherd, James J
2016-09-09
The density matrix quantum Monte Carlo (DMQMC) method is used to sample exact-on-average N-body density matrices for uniform electron gas systems of up to 10^{124} matrix elements via a stochastic solution of the Bloch equation. The results of these calculations resolve a current debate over the accuracy of the data used to parametrize finite-temperature density functionals. Exchange-correlation energies calculated using the real-space restricted path-integral formalism and the k-space configuration path-integral formalism disagree by up to ∼10% at certain reduced temperatures T/T_{F}≤0.5 and densities r_{s}≤1. Our calculations confirm the accuracy of the configuration path-integral Monte Carlo results available at high density and bridge the gap to lower densities, providing trustworthy data in the regime typical of planetary interiors and solids subject to laser irradiation. We demonstrate that the DMQMC method can calculate free energies directly and present exact free energies for T/T_{F}≥1 and r_{s}≤2.
Migration mechanisms and diffusion barriers of vacancies in Ga2O3
NASA Astrophysics Data System (ADS)
Kyrtsos, Alexandros; Matsubara, Masahiko; Bellotti, Enrico
2017-06-01
We employ the nudged elastic band and the dimer methods within the standard density functional theory (DFT) formalism to study the migration of the oxygen and gallium vacancies in the monoclinic structure of β -Ga2O3 . We identify all the first nearest neighbor paths and calculate the migration barriers for the diffusion of the oxygen and gallium vacancies. We also identify the metastable sites of the gallium vacancies which are critical for the diffusion of the gallium atoms. The migration barriers for the diffusion of the gallium vacancies are lower than the migration barriers for oxygen vacancies by 1 eV on average, suggesting that the gallium vacancies are mobile at lower temperatures. Using the calculated migration barriers we estimate the annealing temperature of these defects within the harmonic transition state theory formalism, finding excellent agreement with the observed experimental annealing temperatures. Finally, we suggest the existence of percolation paths which enable the migration of the species without utilizing all the migration paths of the crystal.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mendes, Albert C.R., E-mail: albert@fisica.ufjf.br; Takakura, Flavio I., E-mail: takakura@fisica.ufjf.br; Abreu, Everton M.C., E-mail: evertonabreu@ufrrj.br
In this work we have obtained a higher-derivative Lagrangian for a charged fluid coupled with the electromagnetic fluid and the Dirac’s constraints analysis was discussed. A set of first-class constraints fixed by noncovariant gauge condition were obtained. The path integral formalism was used to obtain the partition function for the corresponding higher-derivative Hamiltonian and the Faddeev–Popov ansatz was used to construct an effective Lagrangian. Through the partition function, a Stefan–Boltzmann type law was obtained. - Highlights: • Higher-derivative Lagrangian for a charged fluid. • Electromagnetic coupling and Dirac’s constraint analysis. • Partition function through path integral formalism. • Stefan–Boltzmann-kind lawmore » through the partition function.« less
The uniform quantized electron gas revisited
NASA Astrophysics Data System (ADS)
Lomba, Enrique; Høye, Johan S.
2017-11-01
In this article we continue and extend our recent work on the correlation energy of the quantized electron gas of uniform density at temperature T=0 . As before, we utilize the methods, properties, and results obtained by means of classical statistical mechanics. These were extended to quantized systems via the Feynman path integral formalism. The latter translates the quantum problem into a classical polymer problem in four dimensions. Again, the well known RPA (random phase approximation) is recovered as a basic result which we then modify and improve upon. Here we analyze the condition of thermodynamic self-consistency. Our numerical calculations exhibit a remarkable agreement with well known results of a standard parameterization of Monte Carlo correlation energies.
Li, Bai; Gong, Li-gang; Yang, Wen-lun
2014-01-01
Unmanned combat aerial vehicles (UCAVs) have been of great interest to military organizations throughout the world due to their outstanding capabilities to operate in dangerous or hazardous environments. UCAV path planning aims to obtain an optimal flight route with the threats and constraints in the combat field well considered. In this work, a novel artificial bee colony (ABC) algorithm improved by a balance-evolution strategy (BES) is applied in this optimization scheme. In this new algorithm, convergence information during the iteration is fully utilized to manipulate the exploration/exploitation accuracy and to pursue a balance between local exploitation and global exploration capabilities. Simulation results confirm that BE-ABC algorithm is more competent for the UCAV path planning scheme than the conventional ABC algorithm and two other state-of-the-art modified ABC algorithms.
NASA Astrophysics Data System (ADS)
Olson, Jonathan P.; Motes, Keith R.; Birchall, Patrick M.; Studer, Nick M.; LaBorde, Margarite; Moulder, Todd; Rohde, Peter P.; Dowling, Jonathan P.
2017-07-01
Quantum number-path entanglement is a resource for supersensitive quantum metrology and in particular provides for sub-shot-noise or even Heisenberg-limited sensitivity. However, such number-path entanglement is thought to have been resource intensive to create in the first place, typically requiring either very strong nonlinearities or nondeterministic preparation schemes with feedforward, which are difficult to implement. Recently [K. R. Motes et al., Phys. Rev. Lett. 114, 170802 (2015), 10.1103/PhysRevLett.114.170802], it was shown that number-path entanglement from a BosonSampling inspired interferometer can be used to beat the shot-noise limit. In this paper we compare and contrast different interferometric schemes, discuss resource counting, calculate exact quantum Cramér-Rao bounds, and study details of experimental errors.
PathVisio-Faceted Search: an exploration tool for multi-dimensional navigation of large pathways
Fried, Jake Y.; Luna, Augustin
2013-01-01
Purpose: The PathVisio-Faceted Search plugin helps users explore and understand complex pathways by overlaying experimental data and data from webservices, such as Ensembl BioMart, onto diagrams drawn using formalized notations in PathVisio. The plugin then provides a filtering mechanism, known as a faceted search, to find and highlight diagram nodes (e.g. genes and proteins) of interest based on imported data. The tool additionally provides a flexible scripting mechanism to handle complex queries. Availability: The PathVisio-Faceted Search plugin is compatible with PathVisio 3.0 and above. PathVisio is compatible with Windows, Mac OS X and Linux. The plugin, documentation, example diagrams and Groovy scripts are available at http://PathVisio.org/wiki/PathVisioFacetedSearchHelp. The plugin is free, open-source and licensed by the Apache 2.0 License. Contact: augustin@mail.nih.gov or jakeyfried@gmail.com PMID:23547033
Multi-scale Eulerian model within the new National Environmental Modeling System
NASA Astrophysics Data System (ADS)
Janjic, Zavisa; Janjic, Tijana; Vasic, Ratko
2010-05-01
The unified Non-hydrostatic Multi-scale Model on the Arakawa B grid (NMMB) is being developed at NCEP within the National Environmental Modeling System (NEMS). The finite-volume horizontal differencing employed in the model preserves important properties of differential operators and conserves a variety of basic and derived dynamical and quadratic quantities. Among these, conservation of energy and enstrophy improves the accuracy of nonlinear dynamics of the model. Within further model development, advection schemes of fourth order of formal accuracy have been developed. It is argued that higher order advection schemes should not be used in the thermodynamic equation in order to preserve consistency with the second order scheme used for computation of the pressure gradient force. Thus, the fourth order scheme is applied only to momentum advection. Three sophisticated second order schemes were considered for upgrade. Two of them, proposed in Janjic(1984), conserve energy and enstrophy, but with enstrophy calculated differently. One of them conserves enstrophy as computed by the most accurate second order Laplacian operating on stream function. The other scheme conserves enstrophy as computed from the B grid velocity. The third scheme (Arakawa 1972) is arithmetic mean of the former two. It does not conserve enstrophy strictly, but it conserves other quadratic quantities that control the nonlinear energy cascade. Linearization of all three schemes leads to the same second order linear advection scheme. The second order term of the truncation error of the linear advection scheme has a special form so that it can be eliminated by simply preconditioning the advected quantity. Tests with linear advection of a cone confirm the advantage of the fourth order scheme. However, if a localized, large amplitude and high wave-number pattern is present in initial conditions, the clear advantage of the fourth order scheme disappears. In real data runs, problems with noisy data may appear due to mountains. Thus, accuracy and formal accuracy may not be synonymous. The nonlinear fourth order schemes are quadratic conservative and reduce to the Arakawa Jacobian in case of non-divergent flow. In case of general flow the conservation properties of the new momentum advection schemes impose stricter constraint on the nonlinear cascade than the original second order schemes. However, for non-divergent flow, the conservation properties of the fourth order schemes cannot be proven in the same way as those of the original second order schemes. Therefore, nonlinear tests were carried out in order to check how well the fourth order schemes control the nonlinear energy cascade. In the tests nonlinear shallow water equations are solved in a rotating rectangular domain (Janjic, 1984). The domain is covered with only 17 x 17 grid points. A diagnostic quantity is used to monitor qualitative changes in the spectrum over 116 days of simulated time. All schemes maintained meaningful solutions throughout the test. Among the second order schemes, the best result was obtained with the scheme that conserved enstrophy as computed by the second order Laplacian of the stream function. It was closely followed by the Arakawa (1972) scheme, while the remaining scheme was distant third. The fourth order schemes ranked in the same order, and were competitive throughout the experiments with their second order counterparts in preventing accumulation of energy at small scales. Finally, the impact was examined of the fourth order momentum advection on global medium range forecasts. The 500 mb anomaly correlation coefficient is used as a measure of success of the forecasts. Arakawa, A., 1972: Design of the UCLA general circulation model. Tech. Report No. 7, Department of Meteorology, University of California, Los Angeles, 116 pp. Janjic, Z. I., 1984: Non-linear advection schemes and energy cascade on semi-staggered grids. Monthly Weather Review, 112, 1234-1245.
Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming
2016-01-01
With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks.
Sasaki, Akira; Kojo, Masashi; Hirose, Kikuji; Goto, Hidekazu
2011-11-02
The path-integral renormalization group and direct energy minimization method of practical first-principles electronic structure calculations for multi-body systems within the framework of the real-space finite-difference scheme are introduced. These two methods can handle higher dimensional systems with consideration of the correlation effect. Furthermore, they can be easily extended to the multicomponent quantum systems which contain more than two kinds of quantum particles. The key to the present methods is employing linear combinations of nonorthogonal Slater determinants (SDs) as multi-body wavefunctions. As one of the noticeable results, the same accuracy as the variational Monte Carlo method is achieved with a few SDs. This enables us to study the entire ground state consisting of electrons and nuclei without the need to use the Born-Oppenheimer approximation. Recent activities on methodological developments aiming towards practical calculations such as the implementation of auxiliary field for Coulombic interaction, the treatment of the kinetic operator in imaginary-time evolutions, the time-saving double-grid technique for bare-Coulomb atomic potentials and the optimization scheme for minimizing the total-energy functional are also introduced. As test examples, the total energy of the hydrogen molecule, the atomic configuration of the methylene and the electronic structures of two-dimensional quantum dots are calculated, and the accuracy, availability and possibility of the present methods are demonstrated.
NASA Astrophysics Data System (ADS)
Mehari, Abraham; Koppen, Barbara Van; McCartney, Matthew; Lankford, Bruce
Tanzania is currently attempting to improve water resources management through formal water rights and water fees systems, and formal institutions. The water rights system is expected to facilitate water allocation. The water fees system aims at cost-recovery for water resources management services. To enhance community involvement in water management, Water User Associations (WUAs) are being established and, in areas with growing upstream-downstream conflicts, apex bodies of all users along the stressed river stretch. The Mkoji sub-catchment (MSC) in the Rufiji basin is one of the first where these formal water management systems are being attempted. This paper analyzes the effectiveness of these systems in the light of their expected merits and the consequences of the juxtaposition of contemporary laws with traditional approaches. The study employed mainly qualitative, but also quantitative approaches on social and technical variables. Major findings were: (1) a good mix of formal (water fees and WUAs) and traditional (rotation-based water sharing, the Zamu) systems improved village-level water management services and reduced intra-scheme conflicts; (2) the water rights system has not brought abstractions into line with allocations and (3) so far, the MSC Apex body failed to mitigate inter-scheme conflicts. A more sophisticated design of allocation infrastructure and institutions is recommended.
Employee Participation and Involvement. Background Paper No. 35b.
ERIC Educational Resources Information Center
Levine, David I.; Strauss, George
Formal worker participation schemes, such as the quality circles and related employee involvement schemes that have been introduced in 75 percent of Fortune 500 companies, are likely to have a lasting impact on the way many organizations work. In a majority of empirical studies, direct participation is associated with at least a short-run…
Generalization of the event-based Carnevale-Hines integration scheme for integrate-and-fire models.
van Elburg, Ronald A J; van Ooyen, Arjen
2009-07-01
An event-based integration scheme for an integrate-and-fire neuron model with exponentially decaying excitatory synaptic currents and double exponential inhibitory synaptic currents has been introduced by Carnevale and Hines. However, the integration scheme imposes nonphysiological constraints on the time constants of the synaptic currents, which hamper its general applicability. This letter addresses this problem in two ways. First, we provide physical arguments demonstrating why these constraints on the time constants can be relaxed. Second, we give a formal proof showing which constraints can be abolished. As part of our formal proof, we introduce the generalized Carnevale-Hines lemma, a new tool for comparing double exponentials as they naturally occur in many cascaded decay systems, including receptor-neurotransmitter dissociation followed by channel closing. Through repeated application of the generalized lemma, we lift most of the original constraints on the time constants. Thus, we show that the Carnevale-Hines integration scheme for the integrate-and-fire model can be employed for simulating a much wider range of neuron and synapse types than was previously thought.
The uniform electron gas at warm dense matter conditions
NASA Astrophysics Data System (ADS)
Dornheim, Tobias; Groth, Simon; Bonitz, Michael
2018-05-01
Motivated by the current high interest in the field of warm dense matter research, in this article we review the uniform electron gas (UEG) at finite temperature and over a broad density range relevant for warm dense matter applications. We provide an exhaustive overview of different simulation techniques, focusing on recent developments in the dielectric formalism (linear response theory) and quantum Monte Carlo (QMC) methods. Our primary focus is on two novel QMC methods that have recently allowed us to achieve breakthroughs in the thermodynamics of the warm dense electron gas: Permutation blocking path integral MC (PB-PIMC) and configuration path integral MC (CPIMC). In fact, a combination of PB-PIMC and CPIMC has allowed for a highly accurate description of the warm dense UEG over a broad density-temperature range. We are able to effectively avoid the notorious fermion sign problem, without invoking uncontrolled approximations such as the fixed node approximation. Furthermore, a new finite-size correction scheme is presented that makes it possible to treat the UEG in the thermodynamic limit without loss of accuracy. In addition, we in detail discuss the construction of a parametrization of the exchange-correlation free energy, on the basis of these data - the central thermodynamic quantity that provides a complete description of the UEG and is of crucial importance as input for the simulation of real warm dense matter applications, e.g., via thermal density functional theory. A second major aspect of this review is the use of our ab initio simulation results to test previous theories, including restricted PIMC, finite-temperature Green functions, the classical mapping by Perrot and Dharma-wardana, and various dielectric methods such as the random phase approximation, or the Singwi-Tosi-Land-Sjölander (both in the static and quantum versions), Vashishta-Singwi and the recent Tanaka scheme for the local field correction. Thus, for the first time, thorough benchmarks of the accuracy of important approximation schemes regarding various quantities such as different energies, in particular the exchange-correlation free energy, and the static structure factor, are possible. In the final part of this paper, we outline a way how to rigorously extend our QMC studies to the inhomogeneous electron gas. We present first ab initio data for the static density response and for the static local field correction.
2013-01-01
Background Many proteins tune their biological function by transitioning between different functional states, effectively acting as dynamic molecular machines. Detailed structural characterization of transition trajectories is central to understanding the relationship between protein dynamics and function. Computational approaches that build on the Molecular Dynamics framework are in principle able to model transition trajectories at great detail but also at considerable computational cost. Methods that delay consideration of dynamics and focus instead on elucidating energetically-credible conformational paths connecting two functionally-relevant structures provide a complementary approach. Effective sampling-based path planning methods originating in robotics have been recently proposed to produce conformational paths. These methods largely model short peptides or address large proteins by simplifying conformational space. Methods We propose a robotics-inspired method that connects two given structures of a protein by sampling conformational paths. The method focuses on small- to medium-size proteins, efficiently modeling structural deformations through the use of the molecular fragment replacement technique. In particular, the method grows a tree in conformational space rooted at the start structure, steering the tree to a goal region defined around the goal structure. We investigate various bias schemes over a progress coordinate for balance between coverage of conformational space and progress towards the goal. A geometric projection layer promotes path diversity. A reactive temperature scheme allows sampling of rare paths that cross energy barriers. Results and conclusions Experiments are conducted on small- to medium-size proteins of length up to 214 amino acids and with multiple known functionally-relevant states, some of which are more than 13Å apart of each-other. Analysis reveals that the method effectively obtains conformational paths connecting structural states that are significantly different. A detailed analysis on the depth and breadth of the tree suggests that a soft global bias over the progress coordinate enhances sampling and results in higher path diversity. The explicit geometric projection layer that biases the exploration away from over-sampled regions further increases coverage, often improving proximity to the goal by forcing the exploration to find new paths. The reactive temperature scheme is shown effective in increasing path diversity, particularly in difficult structural transitions with known high-energy barriers. PMID:24565158
On processed splitting methods and high-order actions in path-integral Monte Carlo simulations.
Casas, Fernando
2010-10-21
Processed splitting methods are particularly well adapted to carry out path-integral Monte Carlo (PIMC) simulations: since one is mainly interested in estimating traces of operators, only the kernel of the method is necessary to approximate the thermal density matrix. Unfortunately, they suffer the same drawback as standard, nonprocessed integrators: kernels of effective order greater than two necessarily involve some negative coefficients. This problem can be circumvented, however, by incorporating modified potentials into the composition, thus rendering schemes of higher effective order. In this work we analyze a family of fourth-order schemes recently proposed in the PIMC setting, paying special attention to their linear stability properties, and justify their observed behavior in practice. We also propose a new fourth-order scheme requiring the same computational cost but with an enlarged stability interval.
Do we face a fourth paradigm shift in medicine--algorithms in education?
Eitel, F; Kanz, K G; Hortig, E; Tesche, A
2000-08-01
Medicine has evolved toward rationalization since the Enlightenment, favouring quantitative measures. Now, a paradigm shift toward control through formalization can be observed in health care whose structures and processes are subjected to increasing standardization. However, educational reforms and curricula do not yet adequately respond to this shift. The aim of this article is to describe innovative approaches in medical education for adapting to these changes. The study design is a descriptive case report relying on a literature review and on a reform project's evaluation. Concept mapping is used to graphically represent relationships among concepts, i.e. defined terms from educational literature. Definitions of 'concept map', 'guideline' and 'algorithm' are presented. A prototypical algorithm for organizational decision making in the project's instructional design is shown. Evaluation results of intrinsic learning motivation are demonstrated: intrinsic learning motivation depends upon students' perception of their competence exhibiting path coefficients varying from 0.42 to 0.51. Perception of competence varies with the type of learning environment. An innovative educational format, called 'evidence-based learning (EBL)' is deduced from these findings and described here. Effects of formalization consist of structuring decision making about implementation of different learning environments or about minimizing variance in teaching or learning. Unintended effects of formalization such as implementation problems and bureaucracy are discussed. Formalized tools for designing medical education are available. Specific instructional designs influence students' learning motivation. Concept maps are suitable for controlling educational quality, thus enabling the paradigm shift in medical education.
Formal Solutions for Polarized Radiative Transfer. II. High-order Methods
DOE Office of Scientific and Technical Information (OSTI.GOV)
Janett, Gioele; Steiner, Oskar; Belluzzi, Luca, E-mail: gioele.janett@irsol.ch
When integrating the radiative transfer equation for polarized light, the necessity of high-order numerical methods is well known. In fact, well-performing high-order formal solvers enable higher accuracy and the use of coarser spatial grids. Aiming to provide a clear comparison between formal solvers, this work presents different high-order numerical schemes and applies the systematic analysis proposed by Janett et al., emphasizing their advantages and drawbacks in terms of order of accuracy, stability, and computational cost.
Benchmarking the Bethe–Salpeter Formalism on a Standard Organic Molecular Set
2015-01-01
We perform benchmark calculations of the Bethe–Salpeter vertical excitation energies for the set of 28 molecules constituting the well-known Thiel’s set, complemented by a series of small molecules representative of the dye chemistry field. We show that Bethe–Salpeter calculations based on a molecular orbital energy spectrum obtained with non-self-consistent G0W0 calculations starting from semilocal DFT functionals dramatically underestimate the transition energies. Starting from the popular PBE0 hybrid functional significantly improves the results even though this leads to an average −0.59 eV redshift compared to reference calculations for Thiel’s set. It is shown, however, that a simple self-consistent scheme at the GW level, with an update of the quasiparticle energies, not only leads to a much better agreement with reference values, but also significantly reduces the impact of the starting DFT functional. On average, the Bethe–Salpeter scheme based on self-consistent GW calculations comes close to the best time-dependent DFT calculations with the PBE0 functional with a 0.98 correlation coefficient and a 0.18 (0.25) eV mean absolute deviation compared to TD-PBE0 (theoretical best estimates) with a tendency to be red-shifted. We also observe that TD-DFT and the standard adiabatic Bethe–Salpeter implementation may differ significantly for states implying a large multiple excitation character. PMID:26207104
Korotkova, Olga; Avramov-Zamurovic, Svetlana; Malek-Madani, Reza; Nelson, Charles
2011-10-10
A number of field experiments measuring the fluctuating intensity of a laser beam propagating along horizontal paths in the maritime environment is performed over sub-kilometer distances at the United States Naval Academy. Both above the ground and over the water links are explored. Two different detection schemes, one photographing the beam on a white board, and the other capturing the beam directly using a ccd sensor, gave consistent results. The probability density function (pdf) of the fluctuating intensity is reconstructed with the help of two theoretical models: the Gamma-Gamma and the Gamma-Laguerre, and compared with the intensity's histograms. It is found that the on-ground experimental results are in good agreement with theoretical predictions. The results obtained above the water paths lead to appreciable discrepancies, especially in the case of the Gamma-Gamma model. These discrepancies are attributed to the presence of the various scatterers along the path of the beam, such as water droplets, aerosols and other airborne particles. Our paper's main contribution is providing a methodology for computing the pdf function of the laser beam intensity in the maritime environment using field measurements.
Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru
2016-10-01
Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security verification of our scheme using the widely accepted AVISPA tool. High security and extra functionality features allow our proposed scheme to be applicable for telecare medicine information systems which is used for e-health care medical applications. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Nonlinear robust controller design for multi-robot systems with unknown payloads
NASA Technical Reports Server (NTRS)
Song, Y. D.; Anderson, J. N.; Homaifar, A.; Lai, H. Y.
1992-01-01
This work is concerned with the control problem of a multi-robot system handling a payload with unknown mass properties. Force constraints at the grasp points are considered. Robust control schemes are proposed that cope with the model uncertainty and achieve asymptotic path tracking. To deal with the force constraints, a strategy for optimally sharing the task is suggested. This strategy basically consists of two steps. The first detects the robots that need help and the second arranges that help. It is shown that the overall system is not only robust to uncertain payload parameters, but also satisfies the force constraints.
ERIC Educational Resources Information Center
Fanaro, Maria de los Angeles; Arlego, Marcelo; Otero, Maria Rita
2012-01-01
This work comprises an investigation about basic Quantum Mechanics (QM) teaching in the high school. The organization of the concepts does not follow a historical line. The Path Integrals method of Feynman has been adopted as a Reference Conceptual Structure that is an alternative to the canonical formalism. We have designed a didactic sequence…
Giovambattista, Nicolas; Sciortino, Francesco; Starr, Francis W; Poole, Peter H
2016-12-14
The potential energy landscape (PEL) formalism is a valuable approach within statistical mechanics to describe supercooled liquids and glasses. Here we use the PEL formalism and computer simulations to study the pressure-induced transformations between low-density amorphous ice (LDA) and high-density amorphous ice (HDA) at different temperatures. We employ the ST2 water model for which the LDA-HDA transformations are remarkably sharp, similar to what is observed in experiments, and reminiscent of a first-order phase transition. Our results are consistent with the view that LDA and HDA configurations are associated with two distinct regions (megabasins) of the PEL that are separated by a potential energy barrier. At higher temperature, we find that low-density liquid (LDL) configurations are located in the same megabasin as LDA, and that high-density liquid (HDL) configurations are located in the same megabasin as HDA. We show that the pressure-induced LDL-HDL and LDA-HDA transformations occur along paths that interconnect these two megabasins, but that the path followed by the liquid is different from the path followed by the amorphous solid. At higher pressure, we also study the liquid-to-ice-VII first-order phase transition, and find that the behavior of the PEL properties across this transition is qualitatively similar to the changes found during the LDA-HDA transformation. This similarity supports the interpretation that the LDA-HDA transformation is a first-order phase transition between out-of-equilibrium states. Finally, we compare the PEL properties explored during the LDA-HDA transformations in ST2 water with those reported previously for SPC/E water, for which the LDA-HDA transformations are rather smooth. This comparison illuminates the previous work showing that, at accessible computer times scales, a liquid-liquid phase transition occurs in the case of ST2 water, but not for SPC/E water.
NASA Astrophysics Data System (ADS)
Giovambattista, Nicolas; Sciortino, Francesco; Starr, Francis W.; Poole, Peter H.
2016-12-01
The potential energy landscape (PEL) formalism is a valuable approach within statistical mechanics to describe supercooled liquids and glasses. Here we use the PEL formalism and computer simulations to study the pressure-induced transformations between low-density amorphous ice (LDA) and high-density amorphous ice (HDA) at different temperatures. We employ the ST2 water model for which the LDA-HDA transformations are remarkably sharp, similar to what is observed in experiments, and reminiscent of a first-order phase transition. Our results are consistent with the view that LDA and HDA configurations are associated with two distinct regions (megabasins) of the PEL that are separated by a potential energy barrier. At higher temperature, we find that low-density liquid (LDL) configurations are located in the same megabasin as LDA, and that high-density liquid (HDL) configurations are located in the same megabasin as HDA. We show that the pressure-induced LDL-HDL and LDA-HDA transformations occur along paths that interconnect these two megabasins, but that the path followed by the liquid is different from the path followed by the amorphous solid. At higher pressure, we also study the liquid-to-ice-VII first-order phase transition, and find that the behavior of the PEL properties across this transition is qualitatively similar to the changes found during the LDA-HDA transformation. This similarity supports the interpretation that the LDA-HDA transformation is a first-order phase transition between out-of-equilibrium states. Finally, we compare the PEL properties explored during the LDA-HDA transformations in ST2 water with those reported previously for SPC/E water, for which the LDA-HDA transformations are rather smooth. This comparison illuminates the previous work showing that, at accessible computer times scales, a liquid-liquid phase transition occurs in the case of ST2 water, but not for SPC/E water.
Tanaka, Shigenori
2016-12-07
Correlational and thermodynamic properties of homogeneous electron liquids at finite temperatures are theoretically analyzed in terms of dielectric response formalism with the hypernetted-chain (HNC) approximation and its modified version. The static structure factor and the local-field correction to describe the strong Coulomb-coupling effects beyond the random-phase approximation are self-consistently calculated through solution to integral equations in the paramagnetic (spin unpolarized) and ferromagnetic (spin polarized) states. In the ground state with the normalized temperature θ=0, the present HNC scheme well reproduces the exchange-correlation energies obtained by quantum Monte Carlo (QMC) simulations over the whole fluid phase (the coupling constant r s ≤100), i.e., within 1% and 2% deviations from putative best QMC values in the paramagnetic and ferromagnetic states, respectively. As compared with earlier studies based on the Singwi-Tosi-Land-Sjölander and modified convolution approximations, some improvements on the correlation energies and the correlation functions including the compressibility sum rule are found in the intermediate to strong coupling regimes. When applied to the electron fluids at intermediate Fermi degeneracies (θ≈1), the static structure factors calculated in the HNC scheme show good agreements with the results obtained by the path integral Monte Carlo (PIMC) simulation, while a small negative region in the radial distribution function is observed near the origin, which may be associated with a slight overestimation for the exchange-correlation hole in the HNC approximation. The interaction energies are calculated for various combinations of density and temperature parameters ranging from strong to weak degeneracy and from weak to strong coupling, and the HNC values are then parametrized as functions of r s and θ. The HNC exchange-correlation free energies obtained through the coupling-constant integration show reasonable agreements with earlier results including the PIMC-based fitting over the whole fluid region at finite degeneracies in the paramagnetic state. In contrast, a systematic difference between the HNC and PIMC results is observed in the ferromagnetic state, which suggests a necessity of further studies on the exchange-correlation free energies from both aspects of analytical theory and simulation.
Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming
2016-01-01
With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.’s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks. PMID:26866606
Neural-network Kohn-Sham exchange-correlation potential and its out-of-training transferability
NASA Astrophysics Data System (ADS)
Nagai, Ryo; Akashi, Ryosuke; Sasaki, Shu; Tsuneyuki, Shinji
2018-06-01
We incorporate in the Kohn-Sham self-consistent equation a trained neural-network projection from the charge density distribution to the Hartree-exchange-correlation potential n → VHxc for a possible numerical approach to the exact Kohn-Sham scheme. The potential trained through a newly developed scheme enables us to evaluate the total energy without explicitly treating the formula of the exchange-correlation energy. With a case study of a simple model, we show that the well-trained neural-network VHxc achieves accuracy for the charge density and total energy out of the model parameter range used for the training, indicating that the property of the elusive ideal functional form of VHxc can approximately be encapsulated by the machine-learning construction. We also exemplify a factor that crucially limits the transferability—the boundary in the model parameter space where the number of the one-particle bound states changes—and see that this is cured by setting the training parameter range across that boundary. The training scheme and insights from the model study apply to more general systems, opening a novel path to numerically efficient Kohn-Sham potential.
Wang, Jinke; Guo, Haoyan
2016-01-01
This paper presents a fully automatic framework for lung segmentation, in which juxta-pleural nodule problem is brought into strong focus. The proposed scheme consists of three phases: skin boundary detection, rough segmentation of lung contour, and pulmonary parenchyma refinement. Firstly, chest skin boundary is extracted through image aligning, morphology operation, and connective region analysis. Secondly, diagonal-based border tracing is implemented for lung contour segmentation, with maximum cost path algorithm used for separating the left and right lungs. Finally, by arc-based border smoothing and concave-based border correction, the refined pulmonary parenchyma is obtained. The proposed scheme is evaluated on 45 volumes of chest scans, with volume difference (VD) 11.15 ± 69.63 cm 3 , volume overlap error (VOE) 3.5057 ± 1.3719%, average surface distance (ASD) 0.7917 ± 0.2741 mm, root mean square distance (RMSD) 1.6957 ± 0.6568 mm, maximum symmetric absolute surface distance (MSD) 21.3430 ± 8.1743 mm, and average time-cost 2 seconds per image. The preliminary results on accuracy and complexity prove that our scheme is a promising tool for lung segmentation with juxta-pleural nodules.
Towards a framework of nuclear competencies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ghitescu, P.
For the countries considering the introduction of a nuclear energy program, the management of human resources should be a part of the wider integrated management system in order to ensure long term safe and reliable operation. Nuclear energy strategy and approaches to human resources development should take into consideration such fundamental aspects as: development and implementation of a workforce plan, required competencies and qualifications, prerequisites for staffing a nuclear energy program, needed training programs and training facilities, qualification and training requirements. Development of common instruments that respond to the above needs and vision has lead to a new concept ofmore » European Credit System for Vocational Education and Training. The European Credit System for Vocational Education and Training (ECVET) is based on definition of 'learning outcomes ' in terms of knowledge, skills and competence, and on identification of portfolios of learning outcomes that allow an individual to prove competencies in a coherent manner. ECVET proposes a common understanding of basic definitions of education and training as well as of the new proposed concepts and it should be recognized by all employers in the EU. In this context, a number of 'Euratom Fission Training Schemes' (EFTS) have been launched in specific areas where a shortage of skilled professionals has been identified. In these schemes the competence building is the result of traditional education plus life-long learning, non-traditional learning, and other forms of educational experiences, relying, in particular, on border-less mobility to get acquainted with various sectors. Each particular Training Scheme should follow a similar path for the achievement of the designed learning outcomes (knowledge, skills, and attitudes). This path to the Training Scheme consists of different activities regarding: definition of training scheme learning outcomes and modules, assessment of prerequisites and student selection, student interview for development of individual training plan, start of the training activities under a specific training scheme. The introduction and recognition of ECVET will lead to a common taxonomy of competencies, and will provide also information about qualifications and units in numerical form, enabling mutual recognition of a training scheme. The description of the learning outcomes to be achieved for qualifying to a specific job profile may follow the analysis phase of the systematic approach to training (SAT). This would ensure a common tool, already used by all trainers. All these steps contribute to establishing of a framework of nuclear competencies recognized and accepted throughout member states. (authors)« less
NASA Astrophysics Data System (ADS)
Moradi, Mahmoud; Sagui, Celeste; Roland, Christopher
2014-01-01
We have developed a formalism for investigating transition pathways and transition probabilities for rare events in biomolecular systems. In this paper, we set the theoretical framework for employing nonequilibrium work relations to estimate the relative reaction rates associated with different classes of transition pathways. Particularly, we derive an extension of Crook's transient fluctuation theorem, which relates the relative transition rates of driven systems in the forward and reverse directions, and allows for the calculation of these relative rates using work measurements (e.g., in Steered Molecular Dynamics). The formalism presented here can be combined with Transition Path Theory to relate the equilibrium and driven transition rates. The usefulness of this framework is illustrated by means of a Gaussian model and a driven proline dimer.
NASA Technical Reports Server (NTRS)
Kuehn, C. E.; Himwich, W. E.; Clark, T. A.; Ma, C.
1991-01-01
The internal consistency of the baseline-length measurements derived from analysis of several independent VLBI experiments is an estimate of the measurement precision. The paper investigates whether the inclusion of water vapor radiometer (WVR) data as an absolute calibration of the propagation delay due to water vapor improves the precision of VLBI baseline-length measurements. The paper analyzes 28 International Radio Interferometric Surveying runs between June 1988 and January 1989; WVR measurements were made during each session. The addition of WVR data decreased the scatter of the length measurements of the baselines by 5-10 percent. The observed reduction in the scatter of the baseline lengths is less than what is expected from the behavior of the formal errors, which suggest that the baseline-length measurement precision should improve 10-20 percent if WVR data are included in the analysis. The discrepancy between the formal errors and the baseline-length results can be explained as the consequence of systematic errors in the dry-mapping function parameters, instrumental biases in the WVR and the barometer, or both.
Effective long wavelength scalar dynamics in de Sitter
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moss, Ian; Rigopoulos, Gerasimos, E-mail: ian.moss@newcastle.ac.uk, E-mail: gerasimos.rigopoulos@ncl.ac.uk
We discuss the effective infrared theory governing a light scalar's long wavelength dynamics in de Sitter spacetime. We show how the separation of scales around the physical curvature radius k / a ∼ H can be performed consistently with a window function and how short wavelengths can be integrated out in the Schwinger-Keldysh path integral formalism. At leading order, and for time scales Δ t >> H {sup −1}, this results in the well-known Starobinsky stochastic evolution. However, our approach allows for the computation of quantum UV corrections, generating an effective potential on which the stochastic dynamics takes place. Themore » long wavelength stochastic dynamical equations are now second order in time, incorporating temporal scales Δ t ∼ H {sup −1} and resulting in a Kramers equation for the probability distribution—more precisely the Wigner function—in contrast to the more usual Fokker-Planck equation. This feature allows us to non-perturbatively evaluate, within the stochastic formalism, not only expectation values of field correlators, but also the stress-energy tensor of φ.« less
A depictive neural model for the representation of motion verbs.
Rao, Sunil; Aleksander, Igor
2011-11-01
In this paper, we present a depictive neural model for the representation of motion verb semantics in neural models of visual awareness. The problem of modelling motion verb representation is shown to be one of function application, mapping a set of given input variables defining the moving object and the path of motion to a defined output outcome in the motion recognition context. The particular function-applicative implementation and consequent recognition model design presented are seen as arising from a noun-adjective recognition model enabling the recognition of colour adjectives as applied to a set of shapes representing objects to be recognised. The presence of such a function application scheme and a separately implemented position identification and path labelling scheme are accordingly shown to be the primitives required to enable the design and construction of a composite depictive motion verb recognition scheme. Extensions to the presented design to enable the representation of transitive verbs are also discussed.
Contrasting lexical similarity and formal definitions in SNOMED CT: consistency and implications.
Agrawal, Ankur; Elhanan, Gai
2014-02-01
To quantify the presence of and evaluate an approach for detection of inconsistencies in the formal definitions of SNOMED CT (SCT) concepts utilizing a lexical method. Utilizing SCT's Procedure hierarchy, we algorithmically formulated similarity sets: groups of concepts with similar lexical structure of their fully specified name. We formulated five random samples, each with 50 similarity sets, based on the same parameter: number of parents, attributes, groups, all the former as well as a randomly selected control sample. All samples' sets were reviewed for types of formal definition inconsistencies: hierarchical, attribute assignment, attribute target values, groups, and definitional. For the Procedure hierarchy, 2111 similarity sets were formulated, covering 18.1% of eligible concepts. The evaluation revealed that 38 (Control) to 70% (Different relationships) of similarity sets within the samples exhibited significant inconsistencies. The rate of inconsistencies for the sample with different relationships was highly significant compared to Control, as well as the number of attribute assignment and hierarchical inconsistencies within their respective samples. While, at this time of the HITECH initiative, the formal definitions of SCT are only a minor consideration, in the grand scheme of sophisticated, meaningful use of captured clinical data, they are essential. However, significant portion of the concepts in the most semantically complex hierarchy of SCT, the Procedure hierarchy, are modeled inconsistently in a manner that affects their computability. Lexical methods can efficiently identify such inconsistencies and possibly allow for their algorithmic resolution. Copyright © 2013 Elsevier Inc. All rights reserved.
Energy-optimal path planning by stochastic dynamically orthogonal level-set optimization
NASA Astrophysics Data System (ADS)
Subramani, Deepak N.; Lermusiaux, Pierre F. J.
2016-04-01
A stochastic optimization methodology is formulated for computing energy-optimal paths from among time-optimal paths of autonomous vehicles navigating in a dynamic flow field. Based on partial differential equations, the methodology rigorously leverages the level-set equation that governs time-optimal reachability fronts for a given relative vehicle-speed function. To set up the energy optimization, the relative vehicle-speed and headings are considered to be stochastic and new stochastic Dynamically Orthogonal (DO) level-set equations are derived. Their solution provides the distribution of time-optimal reachability fronts and corresponding distribution of time-optimal paths. An optimization is then performed on the vehicle's energy-time joint distribution to select the energy-optimal paths for each arrival time, among all stochastic time-optimal paths for that arrival time. Numerical schemes to solve the reduced stochastic DO level-set equations are obtained, and accuracy and efficiency considerations are discussed. These reduced equations are first shown to be efficient at solving the governing stochastic level-sets, in part by comparisons with direct Monte Carlo simulations. To validate the methodology and illustrate its accuracy, comparisons with semi-analytical energy-optimal path solutions are then completed. In particular, we consider the energy-optimal crossing of a canonical steady front and set up its semi-analytical solution using a energy-time nested nonlinear double-optimization scheme. We then showcase the inner workings and nuances of the energy-optimal path planning, considering different mission scenarios. Finally, we study and discuss results of energy-optimal missions in a wind-driven barotropic quasi-geostrophic double-gyre ocean circulation.
NASA Astrophysics Data System (ADS)
Antamoshkin, O. A.; Kilochitskaya, T. R.; Ontuzheva, G. A.; Stupina, A. A.; Tynchenko, V. S.
2018-05-01
This study reviews the problem of allocation of resources in the heterogeneous distributed information processing systems, which may be formalized in the form of a multicriterion multi-index problem with the linear constraints of the transport type. The algorithms for solution of this problem suggest a search for the entire set of Pareto-optimal solutions. For some classes of hierarchical systems, it is possible to significantly speed up the procedure of verification of a system of linear algebraic inequalities for consistency due to the reducibility of them to the stream models or the application of other solution schemes (for strongly connected structures) that take into account the specifics of the hierarchies under consideration.
BRST theory without Hamiltonian and Lagrangian
NASA Astrophysics Data System (ADS)
Lyakhovich, S. L.; Sharapov, A. A.
2005-03-01
We consider a generic gauge system, whose physical degrees of freedom are obtained by restriction on a constraint surface followed by factorization with respect to the action of gauge transformations; in so doing, no Hamiltonian structure or action principle is supposed to exist. For such a generic gauge system we construct a consistent BRST formulation, which includes the conventional BV Lagrangian and BFV Hamiltonian schemes as particular cases. If the original manifold carries a weak Poisson structure (a bivector field giving rise to a Poisson bracket on the space of physical observables) the generic gauge system is shown to admit deformation quantization by means of the Kontsevich formality theorem. A sigma-model interpretation of this quantization algorithm is briefly discussed.
Quantum synchronization of chaotic oscillator behaviors among coupled BEC-optomechanical systems
NASA Astrophysics Data System (ADS)
Li, Wenlin; Li, Chong; Song, Heshan
2017-03-01
We consider and theoretically analyze a Bose-Einstein condensate (BEC) trapped inside an optomechanical system consisting of single-mode optical cavity with a moving end mirror. The BEC is formally analogous to a mirror driven by radiation pressure with strong nonlinear coupling. Such a nonlinear enhancement can make the oscillator display chaotic behavior. By establishing proper oscillator couplings, we find that this chaotic motion can be synchronized with other oscillators, even an oscillator network. We also discuss the scheme feasibility by analyzing recent experiment parameters. Our results provide a promising platform for the quantum signal transmission and quantum logic control, and they are of potential applications in quantum information processing and quantum networks.
Multidimensional optical spectroscopy of a single molecule in a current-carrying state
NASA Astrophysics Data System (ADS)
Rahav, S.; Mukamel, S.
2010-12-01
The nonlinear optical signals from an open system consisting of a molecule connected to metallic leads, in response to a sequence of impulsive pulses, are calculated using a superoperator formalism. Two detection schemes are considered: coherent stimulated emission and incoherent fluorescence. The two provide similar but not identical information. The necessary superoperator correlation functions are evaluated either by converting them to ordinary (Hilbert space) operators which are then expanded in many-body states, or by using Wick's theorem for superoperators to factorize them into nonequilibrium two point Green's functions. As an example we discuss a stimulated Raman process that shows resonances involving two different charge states of the molecule in the same signal.
Palynostratigraphy of northeast Libya
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1991-08-01
Although significant amount of palynostratigraphic data relating to sections of various ages from different parts of North Africa were available, no formal proposal for an integrated comprehensive zonation applicable throughout the region existed. As the result of an 8-year program of research sponsored by Arabian Gulf Oil Co., (AGOCO) and carried out in cooperation with Garyounis University Research Centre and members of the Commission Internationale de Microflore du Paleozoique and AGOCO staff, a proposal has been presented for a formal palynostratigraphic zonation scheme which extends from the Ordovician to the Lower Cretaceous. The study based on both core and cuttingmore » samples form a large number of wells in Cyrenaica establishes a series of assemblage range zones with nominated zonal taxa. This scheme not only facilitates more accurate correlation within the Libyan region but also provides a formal basis for more precise assessment of intra-basin correlation within the North Africa and the opportunity to determine the extent of palaeolatitudinal variation between North Africa and the standard reference sections in northwest Europe.« less
Data-Driven Modeling of Solar Corona by a New 3d Path-Conservative Osher-Solomon MHD Odel
NASA Astrophysics Data System (ADS)
Feng, X. S.; Li, C.
2017-12-01
A second-order path-conservative scheme with Godunov-type finite volume method (FVM) has been implemented to advance the equations of single-fluid solar wind plasma magnetohydrodynamics (MHD) in time. This code operates on the six-component composite grid system in 3D spherical coordinates with hexahedral cells of quadrilateral frustum type. The generalized Osher-Solomon Riemann solver is employed based on a numerical integration of the path-dependentdissipation matrix. For simplicity, the straight line segment path is used and the path-integral is evaluated in a fully numerical way by high-order numerical Gauss-Legendre quadrature. Besides its closest similarity to Godunov, the resulting scheme retains the attractive features of the original solver: it is nonlinear, free of entropy-fix, differentiable and complete in that each characteristic field results in a different numerical viscosity, due to the full use of the MHD eigenstructure. By using a minmod limiter for spatial oscillation control, the pathconservative scheme is realized for the generalized Lagrange multiplier (GLM) and the extended generalized Lagrange multiplier (EGLM) formulation of solar wind MHD systems. This new model of second-order in space and time is written in FORTRAN language with Message Passing Interface (MPI) parallelization, and validated in modeling time-dependent large-scale structure of solar corona, driven continuously by the Global Oscillation Network Group (GONG) data. To demonstrate the suitability of our code for the simulation of solar wind, we present selected results from October 9th, 2009 to December 29th, 2009 , & Year 2008 to show its capability of producing structured solar wind in agreement with the observations.
NASA Astrophysics Data System (ADS)
Miki, Nobuhiko; Atarashi, Hiroyuki; Higuchi, Kenichi; Sawahashi, Mamoru; Nakagawa, Masao
This paper presents experimental evaluations of the effect of time diversity obtained by hybrid automatic repeat request (HARQ) with soft combining in space and path diversity schemes on orthogonal frequency division multiplexing (OFDM)-based packet radio access in a downlink broadband multipath fading channel. The effect of HARQ is analyzed through laboratory experiments employing fading simulators and field experiments conducted in downtown Yokosuka near Tokyo. After confirming the validity of experimental results based on numerical analysis of the time diversity gain in HARQ, we show by the experimental results that, for a fixed modulation and channel coding scheme (MCS), time diversity obtained by HARQ is effective in reducing the required received signal-to-interference plus noise power ratio (SINR) according to an increase in the number of transmissions, K, up to 10, even when the diversity effects are obtained through two-branch antenna diversity reception and path diversity using a number of multipaths greater than 12 observed in a real fading channel. Meanwhile, in combined use with the adaptive modulation and channel coding (AMC) scheme associated with space and path diversity, we clarify that the gain obtained by time diversity is almost saturated at the maximum number of transmissions in HARQ, K' = 4 in Chase combining and K' = 2 in Incremental redundancy, since the improvement in the residual packet error rate (PER) obtained through time diversity becomes small owing to the low PER in the initial packet transmission arising from appropriately selecting the optimum MCS in AMC. However, the experimental results elucidate that the time diversity in HARQ with soft combining associated with antenna diversity reception is effective in improving the throughput even in a broadband multipath channel with sufficient path diversity.
A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6
NASA Astrophysics Data System (ADS)
You, Ilsun; Sakurai, Kouichi; Hori, Yoshiaki
Recently, the security scheme, proposed by Kempf and Koodli, has been adopted as a security standard for Fast handover for Mobile IPv6. But, it does not prevent denial of service attacks while resulting in high computation cost. More importantly, we find that it is still vulnerable to redirection attacks because it fails to secure the Unsolicited Neighbor Advertisement messages. In this paper, Kempf-Koodli's scheme is formally analyzed through BAN-logic and its weaknesses are demonstrated.
A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments
Huang, Yuanfei; Ma, Fangchao
2017-01-01
In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.’s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.’s scheme still has weaknesses. In this paper, we show that Moon et al.’s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient. PMID:29121050
A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.
Guo, Hua; Wang, Pei; Zhang, Xiyong; Huang, Yuanfei; Ma, Fangchao
2017-01-01
In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.'s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.'s scheme still has weaknesses. In this paper, we show that Moon et al.'s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient.
An asymptotic preserving unified gas kinetic scheme for gray radiative transfer equations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sun, Wenjun, E-mail: sun_wenjun@iapcm.ac.cn; Jiang, Song, E-mail: jiang@iapcm.ac.cn; Xu, Kun, E-mail: makxu@ust.hk
The solutions of radiative transport equations can cover both optical thin and optical thick regimes due to the large variation of photon's mean-free path and its interaction with the material. In the small mean free path limit, the nonlinear time-dependent radiative transfer equations can converge to an equilibrium diffusion equation due to the intensive interaction between radiation and material. In the optical thin limit, the photon free transport mechanism will emerge. In this paper, we are going to develop an accurate and robust asymptotic preserving unified gas kinetic scheme (AP-UGKS) for the gray radiative transfer equations, where the radiation transportmore » equation is coupled with the material thermal energy equation. The current work is based on the UGKS framework for the rarefied gas dynamics [14], and is an extension of a recent work [12] from a one-dimensional linear radiation transport equation to a nonlinear two-dimensional gray radiative system. The newly developed scheme has the asymptotic preserving (AP) property in the optically thick regime in the capturing of diffusive solution without using a cell size being smaller than the photon's mean free path and time step being less than the photon collision time. Besides the diffusion limit, the scheme can capture the exact solution in the optical thin regime as well. The current scheme is a finite volume method. Due to the direct modeling for the time evolution solution of the interface radiative intensity, a smooth transition of the transport physics from optical thin to optical thick can be accurately recovered. Many numerical examples are included to validate the current approach.« less
Diagrammar in classical scalar field theory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cattaruzza, E., E-mail: Enrico.Cattaruzza@gmail.com; Gozzi, E., E-mail: gozzi@ts.infn.it; INFN, Sezione di Trieste
2011-09-15
In this paper we analyze perturbatively a g{phi}{sup 4}classical field theory with and without temperature. In order to do that, we make use of a path-integral approach developed some time ago for classical theories. It turns out that the diagrams appearing at the classical level are many more than at the quantum level due to the presence of extra auxiliary fields in the classical formalism. We shall show that a universal supersymmetry present in the classical path-integral mentioned above is responsible for the cancelation of various diagrams. The same supersymmetry allows the introduction of super-fields and super-diagrams which considerably simplifymore » the calculations and make the classical perturbative calculations almost 'identical' formally to the quantum ones. Using the super-diagrams technique, we develop the classical perturbation theory up to third order. We conclude the paper with a perturbative check of the fluctuation-dissipation theorem. - Highlights: > We provide the Feynman diagrams of perturbation theory for a classical field theory. > We give a super-formalism which links the quantum diagrams to the classical ones. > We check perturbatively the fluctuation-dissipation theorem.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Messud, J.; Dinh, P. M.; Suraud, Eric
2009-10-15
We propose a simplification of the time-dependent self-interaction correction (TD-SIC) method using two sets of orbitals, applying the optimized effective potential (OEP) method. The resulting scheme is called time-dependent 'generalized SIC-OEP'. A straightforward approximation, using the spatial localization of one set of orbitals, leads to the 'generalized SIC-Slater' formalism. We show that it represents a great improvement compared to the traditional SIC-Slater and Krieger-Li-Iafrate formalisms.
NASA Astrophysics Data System (ADS)
Messud, J.; Dinh, P. M.; Reinhard, P.-G.; Suraud, Eric
2009-10-01
We propose a simplification of the time-dependent self-interaction correction (TD-SIC) method using two sets of orbitals, applying the optimized effective potential (OEP) method. The resulting scheme is called time-dependent “generalized SIC-OEP.” A straightforward approximation, using the spatial localization of one set of orbitals, leads to the “generalized SIC-Slater” formalism. We show that it represents a great improvement compared to the traditional SIC-Slater and Krieger-Li-Iafrate formalisms.
A novel representation for planning 3-D collision-free paths
NASA Technical Reports Server (NTRS)
Bonner, Susan; Kelley, Robert B.
1990-01-01
A new scheme for the representation of objects, the successive spherical approximation (SSA), facilitates the rapid planning of collision-free paths in a dynamic three-dimensional environment. The hierarchical nature of the SSA allows collisions to be determined efficiently while still providing an exact representation of objects. The rapidity with which collisions can be detected, less than 1 sec per environment object per path, makes it possible to use a generate-and-test path-planning strategy driven by human conceptual knowledge to determine collision-free paths in a matter of seconds on a Sun 3/180 computer. A hierarchy of rules, based on the concept of a free space cell, is used to find heuristically satisfying collision-free paths in a structured environment.
Recent advances in nuclear fission theory: pre- and post-scission physics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Talou, Patrick; Kawano, Toshihiko; Bouland, Olivier
2010-01-01
Recent advances in the modeling of the nuclear fission process for data evaluation purposes are reviewed. In particular, it is stressed that a more comprehensive approach to fission data is needed if predictive capability is to be achieved. The link between pre- and post-scission data is clarified, and a path forward to evaluate those data in a consistent and comprehensive manner is presented. Two examples are given: (i) the modeling of fission cross-sections in the R-matrix formalism, for which results for Pu isotopes from 239 to 242 are presented; (ii) the modeling of prompt fission neutrons in the Monte Carlomore » Hauser-Feshbach framework. Results for neutron-induced fission on {sup 235}U are discussed.« less
Fresh look at the Abelian and non-Abelian Landau-Khalatnikov-Fradkin transformations
NASA Astrophysics Data System (ADS)
De Meerleer, T.; Dudal, D.; Sorella, S. P.; Dall'Olio, P.; Bashir, A.
2018-04-01
The Landau-Khalatnikov-Fradkin transformations (LKFTs) allow one to interpolate n -point functions between different gauges. We first offer an alternative derivation of these LKFTs for the gauge and fermions field in the Abelian (QED) case when working in the class of linear covariant gauges. Our derivation is based on the introduction of a gauge invariant transversal gauge field, which allows a natural generalization to the non-Abelian (QCD) case of the LKFTs. To our knowledge, within this rigorous formalism, this is the first construction of the LKFTs beyond QED. The renormalizability of our setup is guaranteed to all orders. We also offer a direct path integral derivation in the non-Abelian case, finding full consistency.
ERIC Educational Resources Information Center
Collings, Rosalyn; Swanson, Vivien; Watkins, Ruth
2016-01-01
Although mentoring has become increasingly popular within UK higher education, there is little evaluative research. The current longitudinal study aimed to evaluate the usage of a peer mentoring scheme during a first semester at university amongst 124 students. Results indicate that during the first week at university the majority accessed the…
An Obstacle-Tolerant Path Planning Algorithm for Mobile-Anchor-Node-Assisted Localization
Tsai, Rong-Guei
2018-01-01
The location information obtained using a sensor is a critical requirement in wireless sensor networks. Numerous localization schemes have been proposed, among which mobile-anchor-node-assisted localization (MANAL) can reduce costs and overcome environmental constraints. A mobile anchor node (MAN) provides its own location information to assist the localization of sensor nodes. Numerous path planning schemes have been proposed for MANAL, but most scenarios assume the absence of obstacles in the environment. However, in a realistic environment, sensor nodes cannot be located because the obstacles block the path traversed by the MAN, thereby rendering the sensor incapable of receiving sufficient three location information from the MAN. This study proposes the obstacle-tolerant path planning (OTPP) approach to solve the sensor location problem owing to obstacle blockage. OTPP can approximate the optimum beacon point number and path planning, thereby ensuring that all the unknown nodes can receive the three location information from the MAN and reduce the number of MAN broadcast packet times. Experimental results demonstrate that OTPP performs better than Z-curves because it reduces the total number of beacon points utilized and is thus more suitable in an obstacle-present environment. Compared to the Z-curve, OTPP can reduce localization error and improve localization coverage. PMID:29547582
A Model of Adding Relations in Multi-levels to a Formal Organization Structure with Two Subordinates
NASA Astrophysics Data System (ADS)
Sawada, Kiyoshi; Amano, Kazuyuki
2009-10-01
This paper proposes a model of adding relations in multi-levels to a formal organization structure with two subordinates such that the communication of information between every member in the organization becomes the most efficient. When edges between every pair of nodes with the same depth in L (L = 1, 2, …, H) levels are added to a complete binary tree of height H, an optimal set of depths {N1, N2, …, NL} (H⩾N1>N2> …>NL⩾1) is obtained by maximizing the total shortening path length which is the sum of shortening lengths of shortest paths between every pair of all nodes in the complete binary tree. It is shown that {N1, N2, …, NL}* = {H, H-1, …, H-L+1}.
A CLS-based survivable and energy-saving WDM-PON architecture
NASA Astrophysics Data System (ADS)
Zhu, Min; Zhong, Wen-De; Zhang, Zhenrong; Luan, Feng
2013-11-01
We propose and demonstrate an improved survivable and energy-saving WDM-PON with colorless ONUs. It incorporates both energy-saving and self-healing operations. A simple effective energy-saving scheme is proposed by including an energy-saving control unit in the OLT and a control unit at each ONU. The energy-saving scheme realizes both dozing and sleep (offline) modes, which greatly improves the energy-saving efficiency for WDM-PONs. An intelligent protection switching scheme is designed in the OLT, which can distinguish if an ONU is in dozing/sleep (offline) state or a fiber is faulty. Moreover, by monitoring the optical power of each channel on both working and protection paths, the OLT can know the connection status of every fiber path, thus facilitating an effective protection switching and a faster failure recovery. The improved WDM-PON architecture not only significantly reduces energy consumption, but also performs self-healing operation in practical operation scenarios. The scheme feasibility is experimentally verified with 10 Gbit/s downstream and 1.25 Gbit/s upstream transmissions. We also examine the energy-saving efficiency of our proposed energy-saving scheme by simulation, which reveals that energy saving mainly arises from the dozing mode, not from the sleep mode when the ONU is in the online state.
pathChirp: Efficient Available Bandwidth Estimation for Network Paths
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cottrell, Les
2003-04-30
This paper presents pathChirp, a new active probing tool for estimating the available bandwidth on a communication network path. Based on the concept of ''self-induced congestion,'' pathChirp features an exponential flight pattern of probes we call a chirp. Packet chips offer several significant advantages over current probing schemes based on packet pairs or packet trains. By rapidly increasing the probing rate within each chirp, pathChirp obtains a rich set of information from which to dynamically estimate the available bandwidth. Since it uses only packet interarrival times for estimation, pathChirp does not require synchronous nor highly stable clocks at the sendermore » and receiver. We test pathChirp with simulations and Internet experiments and find that it provides good estimates of the available bandwidth while using only a fraction of the number of probe bytes that current state-of-the-art techniques use.« less
Hedged Monte-Carlo: low variance derivative pricing with objective probabilities
NASA Astrophysics Data System (ADS)
Potters, Marc; Bouchaud, Jean-Philippe; Sestovic, Dragan
2001-01-01
We propose a new ‘hedged’ Monte-Carlo ( HMC) method to price financial derivatives, which allows to determine simultaneously the optimal hedge. The inclusion of the optimal hedging strategy allows one to reduce the financial risk associated with option trading, and for the very same reason reduces considerably the variance of our HMC scheme as compared to previous methods. The explicit accounting of the hedging cost naturally converts the objective probability into the ‘risk-neutral’ one. This allows a consistent use of purely historical time series to price derivatives and obtain their residual risk. The method can be used to price a large class of exotic options, including those with path dependent and early exercise features.
Das, Ashok Kumar; Bruhadeshwar, Bezawada
2013-10-01
Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.
Perceptually Guided Photo Retargeting.
Xia, Yingjie; Zhang, Luming; Hong, Richang; Nie, Liqiang; Yan, Yan; Shao, Ling
2016-04-22
We propose perceptually guided photo retargeting, which shrinks a photo by simulating a human's process of sequentially perceiving visually/semantically important regions in a photo. In particular, we first project the local features (graphlets in this paper) onto a semantic space, wherein visual cues such as global spatial layout and rough geometric context are exploited. Thereafter, a sparsity-constrained learning algorithm is derived to select semantically representative graphlets of a photo, and the selecting process can be interpreted by a path which simulates how a human actively perceives semantics in a photo. Furthermore, we learn the prior distribution of such active graphlet paths (AGPs) from training photos that are marked as esthetically pleasing by multiple users. The learned priors enforce the corresponding AGP of a retargeted photo to be maximally similar to those from the training photos. On top of the retargeting model, we further design an online learning scheme to incrementally update the model with new photos that are esthetically pleasing. The online update module makes the algorithm less dependent on the number and contents of the initial training data. Experimental results show that: 1) the proposed AGP is over 90% consistent with human gaze shifting path, as verified by the eye-tracking data, and 2) the retargeting algorithm outperforms its competitors significantly, as AGP is more indicative of photo esthetics than conventional saliency maps.
Unconditionally Secure Blind Signatures
NASA Astrophysics Data System (ADS)
Hara, Yuki; Seito, Takenobu; Shikata, Junji; Matsumoto, Tsutomu
The blind signature scheme introduced by Chaum allows a user to obtain a valid signature for a message from a signer such that the message is kept secret for the signer. Blind signature schemes have mainly been studied from a viewpoint of computational security so far. In this paper, we study blind signatures in unconditional setting. Specifically, we newly introduce a model of unconditionally secure blind signature schemes (USBS, for short). Also, we propose security notions and their formalization in our model. Finally, we propose a construction method for USBS that is provably secure in our security notions.
Detecting Topological Defect Dark Matter Using Coherent Laser Ranging System
Yang, Wanpeng; Leng, Jianxiao; Zhang, Shuangyou; Zhao, Jianye
2016-01-01
In the last few decades, optical frequency combs with high intensity, broad optical bandwidth, and directly traceable discrete wavelengths have triggered rapid developments in distance metrology. However, optical frequency combs to date have been limited to determine the absolute distance to an object (such as satellite missions). We propose a scheme for the detection of topological defect dark matter using a coherent laser ranging system composed of dual-combs and an optical clock via nongravitational signatures. The dark matter field, which comprises a defect, may interact with standard model particles, including quarks and photons, resulting in the alteration of their masses. Thus, a topological defect may function as a dielectric material with a distinctive frequency-depend index of refraction, which would cause the time delay of a periodic extraterrestrial or terrestrial light. When a topological defect passes through the Earth, the optical path of long-distance vacuum path is altered, this change in optical path can be detected through the coherent laser ranging system. Compared to continuous wavelength(cw) laser interferometry methods, dual-comb interferometry in our scheme excludes systematic misjudgement by measuring the absolute optical path length. PMID:27389642
A formalism for the systematic treatment of rapidity logarithms in Quantum Field Theory
NASA Astrophysics Data System (ADS)
Chiu, Jui-Yu; Jain, Ambar; Neill, Duff; Rothstein, Ira Z.
2012-05-01
Many observables in QCD rely upon the resummation of perturbation theory to retain predictive power. Resummation follows after one factorizes the cross section into the relevant modes. The class of observables which are sensitive to soft recoil effects are particularly challenging to factorize and resum since they involve rapidity logarithms. Such observables include: transverse momentum distributions at p T much less then the high energy scattering scale, jet broadening, exclusive hadroproduction and decay, as well as the Sudakov form factor. In this paper we will present a formalism which allows one to factorize and resum the perturbative series for such observables in a systematic fashion through the notion of a "rapidity renormalization group". That is, a Collin-Soper like equation is realized as a renormalization group equation, but has a more universal applicability to observables beyond the traditional transverse momentum dependent parton distribution functions (TMDPDFs) and the Sudakov form factor. This formalism has the feature that it allows one to track the (non-standard) scheme dependence which is inherent in any sce- nario where one performs a resummation of rapidity divergences. We present a pedagogical introduction to the formalism by applying it to the well-known massive Sudakov form fac- tor. The formalism is then used to study observables of current interest. A factorization theorem for the transverse momentum distribution of Higgs production is presented along with the result for the resummed cross section at NLL. Our formalism allows one to define gauge invariant TMDPDFs which are independent of both the hard scattering amplitude and the soft function, i.e. they are universal. We present details of the factorization and re- summation of the jet broadening cross section including a renormalization in p ⊥ space. We furthermore show how to regulate and renormalize exclusive processes which are plagued by endpoint singularities in such a way as to allow for a consistent resummation.
Break-even cost of cloning in genetic improvement of dairy cattle.
Dematawewa, C M; Berger, P J
1998-04-01
Twelve different models for alternative progeny-testing schemes based on genetic and economic gains were compared. The first 10 alternatives were considered to be optimally operating progeny-testing schemes. Alternatives 1 to 5 considered the following combinations of technologies: 1) artificial insemination, 2) artificial insemination with sexed semen, 3) artificial insemination with embryo transfer, 4) artificial insemination and embryo transfer with few bulls as sires, and 5) artificial insemination, embryo transfer, and sexed semen with few bulls, respectively. Alternatives 6 to 12 considered cloning from dams. Alternatives 11 and 12 considered a regular progeny-testing scheme that had selection gains (intensity x accuracy x genetic standard deviation) of 890, 300, 600, and 89 kg, respectively, for the four paths. The sums of the generation intervals of the four paths were 19 yr for the first 8 alternatives and 19.5, 22, 29, and 29.5 yr for alternatives 9 to 12, respectively. Rates of genetic gain in milk yield for alternatives 1 to 5 were 257, 281, 316, 327, and 340 kg/yr, respectively. The rate of gain for other alternatives increased as number of clones increased. The use of three records per clone increased both accuracy and generation interval of a path. Cloning was highly beneficial for progeny-testing schemes with lower intensity and accuracy of selection. The discounted economic gain (break-even cost) per clone was the highest ($84) at current selection levels using sexed semen and three records on clones of the dam. The total cost associated with cloning has to be below $84 for cloning to be an economically viable option.
Minimax terminal approach problem in two-level hierarchical nonlinear discrete-time dynamical system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shorikov, A. F., E-mail: afshorikov@mail.ru
We consider a discrete–time dynamical system consisting of three controllable objects. The motions of all objects are given by the corresponding vector nonlinear or linear discrete–time recurrent vector relations, and control system for its has two levels: basic (first or I level) that is dominating and subordinate level (second or II level) and both have different criterions of functioning and united a priori by determined informational and control connections defined in advance. For the dynamical system in question, we propose a mathematical formalization in the form of solving a multistep problem of two-level hierarchical minimax program control over the terminalmore » approach process with incomplete information and give a general scheme for its solving.« less
NASA Astrophysics Data System (ADS)
Khramov, A. P.; Shurov, N. I.
2014-08-01
Some consequences of the hypothesis of the absence of free F- ions in cryolite-alumina melts are observed. The melt at 1 < CR < 3 is assumed to consist of the complexes AlF{6/3-}, AlF{5/2-}, AlF{4/-}, Al2OF{6/2-}, and Al2O2F{4/2-}, and alkali metal cations. A formal-stoichiometric study of the processes occurring during electrolysis is performed on the basis of the accepted hypothesis. Judgments about some of the features of the electrode reactions and chemical reactions in the electrolyte volume are presented. The reaction schemes for the instances with and without the subsequent/preceding chemical reaction near the electrode or in the molten salt volume are given. The mass flows of various forms of ionic complexes through the electrolyte volume are given for these schemes. Definitive conclusions are not made in the study, but the range of possible variants for the electrochemical routes of the overall chemical reaction in the cell is limited.
Dynamic Network-Based Epistasis Analysis: Boolean Examples
Azpeitia, Eugenio; Benítez, Mariana; Padilla-Longoria, Pablo; Espinosa-Soto, Carlos; Alvarez-Buylla, Elena R.
2011-01-01
In this article we focus on how the hierarchical and single-path assumptions of epistasis analysis can bias the inference of gene regulatory networks. Here we emphasize the critical importance of dynamic analyses, and specifically illustrate the use of Boolean network models. Epistasis in a broad sense refers to gene interactions, however, as originally proposed by Bateson, epistasis is defined as the blocking of a particular allelic effect due to the effect of another allele at a different locus (herein, classical epistasis). Classical epistasis analysis has proven powerful and useful, allowing researchers to infer and assign directionality to gene interactions. As larger data sets are becoming available, the analysis of classical epistasis is being complemented with computer science tools and system biology approaches. We show that when the hierarchical and single-path assumptions are not met in classical epistasis analysis, the access to relevant information and the correct inference of gene interaction topologies is hindered, and it becomes necessary to consider the temporal dynamics of gene interactions. The use of dynamical networks can overcome these limitations. We particularly focus on the use of Boolean networks that, like classical epistasis analysis, relies on logical formalisms, and hence can complement classical epistasis analysis and relax its assumptions. We develop a couple of theoretical examples and analyze them from a dynamic Boolean network model perspective. Boolean networks could help to guide additional experiments and discern among alternative regulatory schemes that would be impossible or difficult to infer without the elimination of these assumption from the classical epistasis analysis. We also use examples from the literature to show how a Boolean network-based approach has resolved ambiguities and guided epistasis analysis. Our article complements previous accounts, not only by focusing on the implications of the hierarchical and single-path assumption, but also by demonstrating the importance of considering temporal dynamics, and specifically introducing the usefulness of Boolean network models and also reviewing some key properties of network approaches. PMID:22645556
NASA Astrophysics Data System (ADS)
Janse van Rensburg, E. J.
2010-08-01
In this paper the models of pulled Dyck paths in Janse van Rensburg (2010 J. Phys. A: Math. Theor. 43 215001) are generalized to pulled Motzkin path models. The generating functions of pulled Motzkin paths are determined in terms of series over trinomial coefficients and the elastic response of a Motzkin path pulled at its endpoint (see Orlandini and Whittington (2004 J. Phys. A: Math. Gen. 37 5305-14)) is shown to be R(f) = 0 for forces pushing the endpoint toward the adsorbing line and R(f) = f(1 + 2cosh f))/(2sinh f) → f as f → ∞, for forces pulling the path away from the X-axis. In addition, the elastic response of a Motzkin path pulled at its midpoint is shown to be R(f) = 0 for forces pushing the midpoint toward the adsorbing line and R(f) = f(1 + 2cosh (f/2))/sinh (f/2) → 2f as f → ∞, for forces pulling the path away from the X-axis. Formal combinatorial identities arising from pulled Motzkin path models are also presented. These identities are the generalization of combinatorial identities obtained in directed paths models to their natural trinomial counterparts.
Fokker-Planck description of electron and photon transport in homogeneous media
DOE Office of Scientific and Technical Information (OSTI.GOV)
Akcasu, A.Z.; Holloway, J.P.
1997-06-01
Starting from a Fokker-Planck description of particle transport, which is valid when the scattering is forwardly peaked and the energy change in scattering is small, we systematically obtain an approximate diffusionlike equation for the particle density by eliminating the direction variable {bold {cflx {Omega}}} with an elimination scheme based on Zwanzig{close_quote}s projection operator formalism in the interaction representation. The elimination procedure closely follows one described by Grigolini and Marchesoni [in {ital Memory Function Approaches to Stochastic Problems in Condensed Matter}, edited by Myron W. Evans, Paolo Grigolini, and Guiseppe P. Parravicini, Advances in Physical Chemistry, Vol. 62 (Wiley-Interscience, New York,more » 1985), Chap. II, p. 29], but with a different projection operator. The resulting diffusion equation is correct up to the second order in the coupling operator between the particle direction and position variable. The diffusion coefficients and mobility in the resulting diffusion equation depend on the initial distribution of the particles in direction and on the path length traveled by the particles. The full solution is obtained for a monoenergetic and monodirectional pulsed point source of particles in an infinite homogeneous medium. This solution is used to study the penetration and the transverse and longitudinal spread of the particles as they are transported through the medium. Application to diffusive wave spectroscopy in calculating the path-length distribution of photons, as well as application to dose calculations in tissue due to an electron beam are mentioned. {copyright} {ital 1997} {ital The American Physical Society}« less
A Self-Adaptive Capacitive Compensation Technique for Body Channel Communication.
Mao, Jingna; Yang, Huazhong; Lian, Yong; Zhao, Bo
2017-10-01
In wireless body area network, capacitive-coupling body channel communication (CC-BCC) has the potential to attain better energy efficiency over conventional wireless communication schemes. The CC-BCC scheme utilizes the human body as the forward signal transmission medium, reducing the path loss in wireless body-centric communications. However, the backward path is formed by the coupling capacitance between the ground electrodes (GEs) of transmitter (Tx) and receiver (Rx), which increases the path loss and results in a body posture dependent backward impedance. Conventional methods use a fixed inductor to resonate with the backward capacitor to compensate the path loss, while it's not effective in compensating the variable backward impedance induced by the body movements. In this paper, we propose a self-adaptive capacitive compensation (SACC) technique to address such a problem. A backward distance detector is introduced to estimate the distance between two GEs of Tx and Rx, and a backward capacitance model is built to calculate the backward capacitance. The calculated backward capacitance at varying body posture is compensated by a digitally controlled tunable inductor (DCTI). The proposed SACC technique is validated by a prototype CC-BCC system, and measurements are taken on human subjects. The measurement results show that 9dB-16 dB channel enhancement can be achieved at a backward path distance of 1 cm-10 cm.
Statechart Analysis with Symbolic PathFinder
NASA Technical Reports Server (NTRS)
Pasareanu, Corina S.
2012-01-01
We report here on our on-going work that addresses the automated analysis and test case generation for software systems modeled using multiple Statechart formalisms. The work is motivated by large programs such as NASA Exploration, that involve multiple systems that interact via safety-critical protocols and are designed with different Statechart variants. To verify these safety-critical systems, we have developed Polyglot, a framework for modeling and analysis of model-based software written using different Statechart formalisms. Polyglot uses a common intermediate representation with customizable Statechart semantics and leverages the analysis and test generation capabilities of the Symbolic PathFinder tool. Polyglot is used as follows: First, the structure of the Statechart model (expressed in Matlab Stateflow or Rational Rhapsody) is translated into a common intermediate representation (IR). The IR is then translated into Java code that represents the structure of the model. The semantics are provided as "pluggable" modules.
Wormholes and the cosmological constant problem.
NASA Astrophysics Data System (ADS)
Klebanov, I.
The author reviews the cosmological constant problem and the recently proposed wormhole mechanism for its solution. Summation over wormholes in the Euclidean path integral for gravity turns all the coupling parameters into dynamical variables, sampled from a probability distribution. A formal saddle point analysis results in a distribution with a sharp peak at the cosmological constant equal to zero, which appears to solve the cosmological constant problem. He discusses the instabilities of the gravitational Euclidean path integral and the difficulties with its interpretation. He presents an alternate formalism for baby universes, based on the "third quantization" of the Wheeler-De Witt equation. This approach is analyzed in a minisuperspace model for quantum gravity, where it reduces to simple quantum mechanics. Once again, the coupling parameters become dynamical. Unfortunately, the a priori probability distribution for the cosmological constant and other parameters is typically a smooth function, with no sharp peaks.
Quantum asymmetry between time and space
2016-01-01
An asymmetry exists between time and space in the sense that physical systems inevitably evolve over time, whereas there is no corresponding ubiquitous translation over space. The asymmetry, which is presumed to be elemental, is represented by equations of motion and conservation laws that operate differently over time and space. If, however, the asymmetry was found to be due to deeper causes, this conventional view of time evolution would need reworking. Here we show, using a sum-over-paths formalism, that a violation of time reversal (T) symmetry might be such a cause. If T symmetry is obeyed, then the formalism treats time and space symmetrically such that states of matter are localized both in space and in time. In this case, equations of motion and conservation laws are undefined or inapplicable. However, if T symmetry is violated, then the same sum over paths formalism yields states that are localized in space and distributed without bound over time, creating an asymmetry between time and space. Moreover, the states satisfy an equation of motion (the Schrödinger equation) and conservation laws apply. This suggests that the time–space asymmetry is not elemental as currently presumed, and that T violation may have a deep connection with time evolution. PMID:26997899
Adolescent thinking ála Piaget: The formal stage.
Dulit, E
1972-12-01
Two of the formal-stage experiments of Piaget and Inhelder, selected largely for their closeness to the concepts defining the stage, were replicated with groups of average and gifted adolescents. This report describes the relevant Piagetian concepts (formal stage, concrete stage) in context, gives the methods and findings of this study, and concludes with a section discussing implications and making some reformulations which generally support but significantly qualify some of the central themes of the Piaget-Inhelder work. Fully developed formal-stage thinking emerges as far from commonplace among normal or average adolescents (by marked contrast with the impression created by the Piaget-Inhelder text, which chooses to report no middle or older adolescents who function at less than fully formal levels). In this respect, the formal stage differs appreciably from the earlier Piagetian stages, and early adolescence emerges as the age for which a "single path" model of cognitive development becomes seriously inadequate and a more complex model becomes essential. Formal-stage thinking seems best conceptualized, like most other aspects of psychological maturity, as a potentiality only partially attained by most and fully attained only by some.
Auctionable fixed transmission rights for congestion management
NASA Astrophysics Data System (ADS)
Alomoush, Muwaffaq Irsheid
Electric power deregulation has proposed a major change to the regulated utility monopoly. The change manifests the main part of engineers' efforts to reshape three components of today's regulated monopoly: generation, distribution and transmission. In this open access deregulated power market, transmission network plays a major role, and transmission congestion is a major problem that requires further consideration especially when inter-zonal/intra-zonal scheme is implemented. Declaring that engineering studies and experience are the criteria to define zonal boundaries or defining a zone based on the fact that a zone is a densely interconnected area (lake) and paths connecting these densely interconnected areas are inter-zonal lines will render insufficient and fuzzy definitions. Moreover, a congestion problem formulation should take into consideration interactions between intra-zonal and inter-zonal flows and their effects on power systems. In this thesis, we introduce a procedure for minimizing the number of adjustments of preferred schedules to alleviate congestion and apply control schemes to minimize interactions between zones. In addition, we give the zone definition a certain criterion based on the Locational Marginal Price (LMP). This concept will be used to define congestion zonal boundaries and to decide whether any zone should be merged with another zone or split into new zones. The thesis presents a unified scheme that combines zonal and FTR schemes to manage congestion. This combined scheme is utilized with LMPs to define zonal boundaries more appropriately. The presented scheme gains the best features of the FTR scheme, which are providing financial certainty, maximizing the efficient use of the system and making users pay for the actual use of congested paths. LMPs may give an indication of the impact of wheeling transactions, and calculations of and comparisons of LMPs with and without wheeling transactions should be adequate criteria to approve the transaction by the ISO, take a decision to expand the existing system, or retain the original structure of the system. Also, the thesis investigates the impact of wheeling transactions on congestion management, where we present a generalized mathematical model for the Fixed Transmission Right (FTR) auction. The auction guarantees FTR availability to all participants on a non-discriminatory basis, in which system users are permitted to buy, sell and trade FTRs through an auction. When FTRs are utilized with LMPs, they increase the efficient use of the transmission system and let a transmission customer gain advantageous features such as acquiring a mechanism to offset the extra cost due to congestion charges, providing financial and operational certainty and making system users pay for the actual use of the congested paths. The thesis also highlighted FTR trading in secondary markets to self-arrange access across different paths, create long-term transmission rights and provide more commercial certainty.
NASA Astrophysics Data System (ADS)
Byers, David Alan
The purpose of this study was to identify specific career development attributes of contemporary senior-level airport executives and to evaluate the relationship of these attributes to the level of satisfaction airport executives have in their career choice. Attribute sets that were examined included early aviation interests, health factors, psychological factors, demographic factors, formal education, and other aviation-related experiences. A hypothesized causal model that expressed direct and indirect effects among these attributes relative to airport executives' career satisfaction was tested using sample data collected from 708 airport executives from general aviation and commercial service airport throughout the United States. Applying a multiple regression analysis strategy to the model, the overall results revealed that 16% of the variability in airport executives' career satisfaction scores was due to the collective influence of the six research attribute sets, this was significant. The results of the path analysis also indicated that four attribute sets (early aviation interests, health factors, formal education, and other aviation-related experiences) had respective direct significant effects on participants' career satisfaction. Early aviation interests, health factors, and demographic factors had additional indirect effects on career satisfaction; all were mediated by formal education attitude. These results were inconsistent with the hypothesized path model and a revised model was developed to reflect the sample data. The findings suggest that airport executives, as a group, are satisfied with their career choice. Early aviation interests appear to play an important role for influencing the career field selection phase of career development. The study also suggests health factors, formal education, and other aviation-related experiences such as flight training or military experience influence the compromise phase of career development. Each of these four factors had significant effects on career satisfaction. In addition to its applicability to airport executives, the study provides a generalized path model for investigating factors influencing the career development, compromise, and satisfaction process in other vocations.
A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.
Hao, Zhuo; Zhong, Sheng; Yu, Nenghai
2013-01-01
A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.
A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics
Yu, Nenghai
2013-01-01
A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725
China’s Evolving Foreign Policy in Africa: A New Direction for China’s Non-Intervention Strategy?
2014-09-01
Xiaoping instituted economic reforms aimed at opening up China’s economy to international trade and China began on its path towards double- digit growth.99...rebellion by the nomadic Tuaregs in the north paved the way for Al Qaeda in the Lands of the Islamic Maghreb (AQIM)’s takeover of Northern Mali. The...marginalization through the creation of a formal state with formal, defined borders. The nomadic lifestyle of the Tuaregs was no longer accepted under
NASA Astrophysics Data System (ADS)
Batalin, I. A.; Bering, K.; Damgaard, P. H.
1998-03-01
We present a superfield formulation of the quantization program for theories with first-class constraints. An exact operator formulation is given, and we show how to set up a phase-space path integral entirely in terms of superfields. BRST transformations and canonical transformations enter on equal footing, and they allow us to establish a superspace analog of the BFV theorem. We also present a formal derivation of the Lagrangian superfield analogue of the field-antifield formalism by an integration over half of the phase-space variables.
Fuel quality-processing study. Volume 1: Overview and results
NASA Technical Reports Server (NTRS)
Jones, G. E., Jr.
1982-01-01
The methods whereby the intermediate results were obtained are outlined, and the evaluation of the feasible paths from liquid fossil fuel sources to generated electricity is presented. The segments from which these paths were built are the results from the fuel upgrading schemes, on-site treatments, and exhaust gas treatments detailed in the subsequent volumes. The salient cost and quality parameters are included.
NASA Astrophysics Data System (ADS)
Yadav, Dharmendra Singh; Babu, Sarath; Manoj, B. S.
2018-03-01
Spectrum conflict during primary and backup routes assignment in elastic optical networks results in increased resource consumption as well as high Bandwidth Blocking Probability. In order to avoid such conflicts, we propose a new scheme, Quasi Path Restoration (QPR), where we divide the available spectrum into two: (1) primary spectrum (for primary routes allocation) and (2) backup spectrum (for rerouting the data on link failures). QPR exhibits three advantages over existing survivable strategies such as Shared Path Protection (SPP), Primary First Fit Backup Last Fit (PFFBLF), Jointly Releasing and re-establishment Defragmentation SPP (JRDSSPP), and Path Restoration (PR): (1) the conflict between primary and backup spectrum during route assignment is completely eliminated, (2) upon a link failure, connection recovery requires less backup resources compared to SPP, PFFBLF, and PR, and (3) availability of the same backup spectrum on each link improves the recovery guarantee. The performance of our scheme is analyzed with different primary backup spectrum partitions on varying connection-request demands and number of frequency slots. Our results show that QPR provides better connection recovery guarantee and Backup Resources Utilization (BRU) compared to bandwidth recovery of PR strategy. In addition, we compare QPR with Shared Path Protection and Primary First-Fit Backup Last Fit strategies in terms of Bandwidth Blocking Probability (BBP) and average frequency slots per connection request. Simulation results show that BBP of SPP, PFFBLF, and JRDSPP varies between 18.59% and 14.42%, while in QPR, BBP ranges from 2.55% to 17.76% for Cost239, NSFNET, and ARPANET topologies. Also, QPR provides bandwidth recovery between 93.61% and 100%, while in PR, the recovery ranges from 86.81% to 98.99%. It is evident from our analysis that QPR provides a reasonable trade-off between bandwidth blocking probability and connection recoverability.
Xie, Qi; Liu, Wenhao; Wang, Shengbao; Han, Lidong; Hu, Bin; Wu, Ting
2014-09-01
Patient's privacy-preserving, security and mutual authentication between patient and the medical server are the important mechanism in connected health care applications, such as telecare medical information systems and personally controlled health records systems. In 2013, Wen showed that Das et al.'s scheme is vulnerable to the replay attack, user impersonation attacks and off-line guessing attacks, and then proposed an improved scheme using biometrics, password and smart card to overcome these weaknesses. However, we show that Wen's scheme is still vulnerable to off-line password guessing attacks, does not provide user's anonymity and perfect forward secrecy. Further, we propose an improved scheme to fix these weaknesses, and use the applied pi calculus based formal verification tool ProVerif to prove the security and authentication.
NASA Astrophysics Data System (ADS)
Cho, Minhaeng
2018-05-01
Parametric down-conversion is a second-order nonlinear optical process annihilating a pump photon and creating a pair of photons in the signal and idler modes. Then, by using two parametric down-converters and introducing a path indistinguishability for the two generated idler modes, a quantum coherence between two conjugate signal beams can be induced. Such a double spontaneous or stimulated parametric down-conversion scheme has been used to demonstrate quantum spectroscopy and imaging with undetected idler photons via measuring one-photon interference between their correlated signal beams. Recently, we considered another quantum optical measurement scheme utilizing W-type tripartite entangled signal photons that can be generated by employing three spontaneous parametric down-conversion crystals and by inducing coherences or path-indistinguishabilities between their correlated idler beams and between quantum vacuum fields. Here, we consider an extended triple stimulated parametric down-conversion scheme for quantum optical measurement of sample properties with undetected idler and photons. Noting the real effect of vacuum field indistinguishability on the fringe visibility as well as the role of zero-point field energy in the interferometry, we show that this scheme is an ideal and efficient way to create a coherent state of W-type entangled signal photons. We anticipate that this scheme would be of critical use in further developing quantum optical measurements in spectroscopy and microscopy with undetected photons.
Cho, Minhaeng
2018-05-14
Parametric down-conversion is a second-order nonlinear optical process annihilating a pump photon and creating a pair of photons in the signal and idler modes. Then, by using two parametric down-converters and introducing a path indistinguishability for the two generated idler modes, a quantum coherence between two conjugate signal beams can be induced. Such a double spontaneous or stimulated parametric down-conversion scheme has been used to demonstrate quantum spectroscopy and imaging with undetected idler photons via measuring one-photon interference between their correlated signal beams. Recently, we considered another quantum optical measurement scheme utilizing W-type tripartite entangled signal photons that can be generated by employing three spontaneous parametric down-conversion crystals and by inducing coherences or path-indistinguishabilities between their correlated idler beams and between quantum vacuum fields. Here, we consider an extended triple stimulated parametric down-conversion scheme for quantum optical measurement of sample properties with undetected idler and photons. Noting the real effect of vacuum field indistinguishability on the fringe visibility as well as the role of zero-point field energy in the interferometry, we show that this scheme is an ideal and efficient way to create a coherent state of W-type entangled signal photons. We anticipate that this scheme would be of critical use in further developing quantum optical measurements in spectroscopy and microscopy with undetected photons.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, Z.; Bessa, M. A.; Liu, W.K.
A predictive computational theory is shown for modeling complex, hierarchical materials ranging from metal alloys to polymer nanocomposites. The theory can capture complex mechanisms such as plasticity and failure that span across multiple length scales. This general multiscale material modeling theory relies on sound principles of mathematics and mechanics, and a cutting-edge reduced order modeling method named self-consistent clustering analysis (SCA) [Zeliang Liu, M.A. Bessa, Wing Kam Liu, “Self-consistent clustering analysis: An efficient multi-scale scheme for inelastic heterogeneous materials,” Comput. Methods Appl. Mech. Engrg. 306 (2016) 319–341]. SCA reduces by several orders of magnitude the computational cost of micromechanical andmore » concurrent multiscale simulations, while retaining the microstructure information. This remarkable increase in efficiency is achieved with a data-driven clustering method. Computationally expensive operations are performed in the so-called offline stage, where degrees of freedom (DOFs) are agglomerated into clusters. The interaction tensor of these clusters is computed. In the online or predictive stage, the Lippmann-Schwinger integral equation is solved cluster-wise using a self-consistent scheme to ensure solution accuracy and avoid path dependence. To construct a concurrent multiscale model, this scheme is applied at each material point in a macroscale structure, replacing a conventional constitutive model with the average response computed from the microscale model using just the SCA online stage. A regularized damage theory is incorporated in the microscale that avoids the mesh and RVE size dependence that commonly plagues microscale damage calculations. The SCA method is illustrated with two cases: a carbon fiber reinforced polymer (CFRP) structure with the concurrent multiscale model and an application to fatigue prediction for additively manufactured metals. For the CFRP problem, a speed up estimated to be about 43,000 is achieved by using the SCA method, as opposed to FE2, enabling the solution of an otherwise computationally intractable problem. The second example uses a crystal plasticity constitutive law and computes the fatigue potency of extrinsic microscale features such as voids. This shows that local stress and strain are capture sufficiently well by SCA. This model has been incorporated in a process-structure-properties prediction framework for process design in additive manufacturing.« less
NASA Technical Reports Server (NTRS)
Tralli, David M.; Lichten, Stephen M.; Herring, Thomas A.
1992-01-01
Kalman filter estimates of zenith nondispersive atmospheric path delays at Westford, Massachusetts, Fort Davis, Texas, and Mojave, California, were obtained from independent analyses of data collected during January and February 1988 using the GPS and VLBI. The apparent accuracy of the path delays is inferred by examining the estimates and covariances from both sets of data. The ability of the geodetic data to resolve zenith path delay fluctuations is determined by comparing further the GPS Kalman filter estimates with corresponding wet path delays derived from water vapor radiometric data available at Mojave over two 8-hour data spans within the comparison period. GPS and VLBI zenith path delay estimates agree well within one standard deviation formal uncertainties (from 10-20 mm for GPS and 3-15 mm for VLBI) in four out of the five possible comparisons, with maximum differences of 5 and 21 mm over 8- to 12-hour data spans.
Importance biasing scheme implemented in the PRIZMA code
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kandiev, I.Z.; Malyshkin, G.N.
1997-12-31
PRIZMA code is intended for Monte Carlo calculations of linear radiation transport problems. The code has wide capabilities to describe geometry, sources, material composition, and to obtain parameters specified by user. There is a capability to calculate path of particle cascade (including neutrons, photons, electrons, positrons and heavy charged particles) taking into account possible transmutations. Importance biasing scheme was implemented to solve the problems which require calculation of functionals related to small probabilities (for example, problems of protection against radiation, problems of detection, etc.). The scheme enables to adapt trajectory building algorithm to problem peculiarities.
High resolution schemes and the entropy condition
NASA Technical Reports Server (NTRS)
Osher, S.; Chakravarthy, S.
1983-01-01
A systematic procedure for constructing semidiscrete, second order accurate, variation diminishing, five point band width, approximations to scalar conservation laws, is presented. These schemes are constructed to also satisfy a single discrete entropy inequality. Thus, in the convex flux case, convergence is proven to be the unique physically correct solution. For hyperbolic systems of conservation laws, this construction is used formally to extend the first author's first order accurate scheme, and show (under some minor technical hypotheses) that limit solutions satisfy an entropy inequality. Results concerning discrete shocks, a maximum principle, and maximal order of accuracy are obtained. Numerical applications are also presented.
Energy-Efficient Deadline-Aware Data-Gathering Scheme Using Multiple Mobile Data Collectors.
Dasgupta, Rumpa; Yoon, Seokhoon
2017-04-01
In wireless sensor networks, the data collected by sensors are usually forwarded to the sink through multi-hop forwarding. However, multi-hop forwarding can be inefficient due to the energy hole problem and high communications overhead. Moreover, when the monitored area is large and the number of sensors is small, sensors cannot send the data via multi-hop forwarding due to the lack of network connectivity. In order to address those problems of multi-hop forwarding, in this paper, we consider a data collection scheme that uses mobile data collectors (MDCs), which visit sensors and collect data from them. Due to the recent breakthroughs in wireless power transfer technology, MDCs can also be used to recharge the sensors to keep them from draining their energy. In MDC-based data-gathering schemes, a big challenge is how to find the MDCs' traveling paths in a balanced way, such that their energy consumption is minimized and the packet-delay constraint is satisfied. Therefore, in this paper, we aim at finding the MDCs' paths, taking energy efficiency and delay constraints into account. We first define an optimization problem, named the delay-constrained energy minimization (DCEM) problem, to find the paths for MDCs. An integer linear programming problem is formulated to find the optimal solution. We also propose a two-phase path-selection algorithm to efficiently solve the DCEM problem. Simulations are performed to compare the performance of the proposed algorithms with two heuristics algorithms for the vehicle routing problem under various scenarios. The simulation results show that the proposed algorithms can outperform existing algorithms in terms of energy efficiency and packet delay.
Energy-Efficient Deadline-Aware Data-Gathering Scheme Using Multiple Mobile Data Collectors
Dasgupta, Rumpa; Yoon, Seokhoon
2017-01-01
In wireless sensor networks, the data collected by sensors are usually forwarded to the sink through multi-hop forwarding. However, multi-hop forwarding can be inefficient due to the energy hole problem and high communications overhead. Moreover, when the monitored area is large and the number of sensors is small, sensors cannot send the data via multi-hop forwarding due to the lack of network connectivity. In order to address those problems of multi-hop forwarding, in this paper, we consider a data collection scheme that uses mobile data collectors (MDCs), which visit sensors and collect data from them. Due to the recent breakthroughs in wireless power transfer technology, MDCs can also be used to recharge the sensors to keep them from draining their energy. In MDC-based data-gathering schemes, a big challenge is how to find the MDCs’ traveling paths in a balanced way, such that their energy consumption is minimized and the packet-delay constraint is satisfied. Therefore, in this paper, we aim at finding the MDCs’ paths, taking energy efficiency and delay constraints into account. We first define an optimization problem, named the delay-constrained energy minimization (DCEM) problem, to find the paths for MDCs. An integer linear programming problem is formulated to find the optimal solution. We also propose a two-phase path-selection algorithm to efficiently solve the DCEM problem. Simulations are performed to compare the performance of the proposed algorithms with two heuristics algorithms for the vehicle routing problem under various scenarios. The simulation results show that the proposed algorithms can outperform existing algorithms in terms of energy efficiency and packet delay. PMID:28368300
Magnetic penetration depth in the organic superconductor κ-[BEDT-TTF]2Cu[NCS]2
NASA Astrophysics Data System (ADS)
Harshman, D. R.; Kleiman, R. N.; Haddon, R. C.; Chichester-Hicks, S. V.; Kaplan, M. L.; Rupp, L. W., Jr.; Pfiz, T.; Williams, D. Ll.; Mitzi, D. B.
1990-03-01
We report the first direct measurement of the effective magnetic penetration depth in oriented single crystals of κ-[BEDT-TTF]2Cu[NCS]2, with Tc(5 G)~=9 K. Results yield an effective in-plane value of λbceff(0)~=9800 Å (for Hext~=3 kG), and a temperature dependence consistent with conventional s-wave pairing. Comparison with the London penetration depth, λL(0) (estimated to be ~=5100 Å), indicates a tendency toward dirty-limit superconductivity, with the ratio of coherence length over mean free path of ξbc0/lbc~=2.7. From our results, it appears unnecessary to invoke any unconventional pairing schemes to explain the superconductivity in this material.
Ecrh on Asdex Upgrade - System Extension, New Modes of Operation, Plasma Physics Results
NASA Astrophysics Data System (ADS)
Stober, J.; Wagner, D.; Giannone, L.; Leuterer, F.; Marascheck, M.; Mlynek, A.; Monaco, F.; Münich, M.; Poli, E.; Reich, M.; Schmid-Lorch, D.; Schütz, H.; Schweinzer, J.; Treutterer, W.; Zohm, H.; Meier, A.; Scherer, Th.; Flamm, J.; Thumm, M.; Höhnle, H.; Kasparek, W.; Stroth, U.; Chirkov, A. V.; Denisov, G. G.; Litvak, A.; Malygin, S. A.; Myasnikov, V. E.; Nichiporenko, V. O.; Popov, L. G.; Soluyanova, E. A.; Tai, E. M.
2011-02-01
The ECRH system at ASDEX Upgrade is currently extended from 1.6 MW to 5 MW. The extension so far consists of 2-frequency units, which use single diamond-disk vacuum-windows to transmit power at the natural resonances of these disks (105 & 140 GHz). For the last unit of this extension two additional intermediate non-resonant frequencies are foreseen, requiring new window concepts. For the torus a polarisation-independent double-disk window has been developed. For the gyrotron a grooved diamond disk is actually favoured, for which the grooved surfaces act as anti-reflective coating. Since ASDEX Upgrade operates with completely W-covered plasma facing components, central ECRH is often applied to suppresses W-accumulation in the plasma center. In order to extend the operational range for central ECRH, X3- and O2-heating schemes were developed. Both are characterized by incomplete single-path absorption. For X3 heating, the X2 resonance at the pedestal on the high field side is used as a 'beam-dump', for the O2 scheme a specific reflector tile on the inner heat shield enforces a second path through the plasma center. The geometry for NTM control had to be modified to allow simultaneous central heating. In real-time the ECRH position can be determined either by ray-tracing based on real-time equilibria and density profiles or from ECE for modulated ECRH power. Fast real-time ECE also allows to determine the NTM position. Further major physics applications of the system are summarized.
Extension of loop quantum gravity to f(R) theories.
Zhang, Xiangdong; Ma, Yongge
2011-04-29
The four-dimensional metric f(R) theories of gravity are cast into connection-dynamical formalism with real su(2) connections as configuration variables. Through this formalism, the classical metric f(R) theories are quantized by extending the loop quantization scheme of general relativity. Our results imply that the nonperturbative quantization procedure of loop quantum gravity is valid not only for general relativity but also for a rather general class of four-dimensional metric theories of gravity.
A theoretical framework to predict the most likely ion path in particle imaging.
Collins-Fekete, Charles-Antoine; Volz, Lennart; Portillo, Stephen K N; Beaulieu, Luc; Seco, Joao
2017-03-07
In this work, a generic rigorous Bayesian formalism is introduced to predict the most likely path of any ion crossing a medium between two detection points. The path is predicted based on a combination of the particle scattering in the material and measurements of its initial and final position, direction and energy. The path estimate's precision is compared to the Monte Carlo simulated path. Every ion from hydrogen to carbon is simulated in two scenarios, (1) where the range is fixed and (2) where the initial velocity is fixed. In the scenario where the range is kept constant, the maximal root-mean-square error between the estimated path and the Monte Carlo path drops significantly between the proton path estimate (0.50 mm) and the helium path estimate (0.18 mm), but less so up to the carbon path estimate (0.09 mm). However, this scenario is identified as the configuration that maximizes the dose while minimizing the path resolution. In the scenario where the initial velocity is fixed, the maximal root-mean-square error between the estimated path and the Monte Carlo path drops significantly between the proton path estimate (0.29 mm) and the helium path estimate (0.09 mm) but increases for heavier ions up to carbon (0.12 mm). As a result, helium is found to be the particle with the most accurate path estimate for the lowest dose, potentially leading to tomographic images of higher spatial resolution.
Aerial Refueling Clearance Process Guide
2014-08-21
using multinational/bi-lateral agreements such as the ATARES Agreement, cross servicing agreements, replacement in kind agreements, Foreign Military...Lighting 8.7.8 External Paint Scheme 8.8 External Weapons/Drop Tanks 9.0 Physical /Aerodynamic Influences 9.1 Boom Clear Path To Receptacle dhkARSAG DOC...Cold Nose Sw. 8.5 External Fuel Tanks 9.0 Physical /Aerodynamic Influence R. 9.1 Probe Clear Path ie: Obstructions, Instruments etc. 9.2 Drogue Hookup
The Grand Tour via Geodesic Interpolation of 2-frames
NASA Technical Reports Server (NTRS)
Asimov, Daniel; Buja, Andreas
1994-01-01
Grand tours are a class of methods for visualizing multivariate data, or any finite set of points in n-space. The idea is to create an animation of data projections by moving a 2-dimensional projection plane through n-space. The path of planes used in the animation is chosen so that it becomes dense, that is, it comes arbitrarily close to any plane. One of the original inspirations for the grand tour was the experience of trying to comprehend an abstract sculpture in a museum. One tends to walk around the sculpture, viewing it from many different angles. A useful class of grand tours is based on the idea of continuously interpolating an infinite sequence of randomly chosen planes. Visiting randomly (more precisely: uniformly) distributed planes guarantees denseness of the interpolating path. In computer implementations, 2-dimensional orthogonal projections are specified by two 1-dimensional projections which map to the horizontal and vertical screen dimensions, respectively. Hence, a grand tour is specified by a path of pairs of orthonormal projection vectors. This paper describes an interpolation scheme for smoothly connecting two pairs of orthonormal vectors, and thus for constructing interpolating grand tours. The scheme is optimal in the sense that connecting paths are geodesics in a natural Riemannian geometry.
Fully-relativistic full-potential multiple scattering theory: A pathology-free scheme
NASA Astrophysics Data System (ADS)
Liu, Xianglin; Wang, Yang; Eisenbach, Markus; Stocks, G. Malcolm
2018-03-01
The Green function plays an essential role in the Korringa-Kohn-Rostoker(KKR) multiple scattering method. In practice, it is constructed from the regular and irregular solutions of the local Kohn-Sham equation and robust methods exist for spherical potentials. However, when applied to a non-spherical potential, numerical errors from the irregular solutions give rise to pathological behaviors of the charge density at small radius. Here we present a full-potential implementation of the fully-relativistic KKR method to perform ab initio self-consistent calculation by directly solving the Dirac differential equations using the generalized variable phase (sine and cosine matrices) formalism Liu et al. (2016). The pathology around the origin is completely eliminated by carrying out the energy integration of the single-site Green function along the real axis. By using an efficient pole-searching technique to identify the zeros of the well-behaved Jost matrices, we demonstrated that this scheme is numerically stable and computationally efficient, with speed comparable to the conventional contour energy integration method, while free of the pathology problem of the charge density. As an application, this method is utilized to investigate the crystal structures of polonium and their bulk properties, which is challenging for a conventional real-energy scheme. The noble metals are also calculated, both as a test of our method and to study the relativistic effects.
Fully-relativistic full-potential multiple scattering theory: A pathology-free scheme
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, Xianglin; Wang, Yang; Eisenbach, Markus
The Green function plays an essential role in the Korringa–Kohn–Rostoker(KKR) multiple scattering method. In practice, it is constructed from the regular and irregular solutions of the local Kohn–Sham equation and robust methods exist for spherical potentials. However, when applied to a non-spherical potential, numerical errors from the irregular solutions give rise to pathological behaviors of the charge density at small radius. Here we present a full-potential implementation of the fully-relativistic KKR method to perform ab initio self-consistent calculation by directly solving the Dirac differential equations using the generalized variable phase (sine and cosine matrices) formalism Liu et al. (2016). Themore » pathology around the origin is completely eliminated by carrying out the energy integration of the single-site Green function along the real axis. Here, by using an efficient pole-searching technique to identify the zeros of the well-behaved Jost matrices, we demonstrated that this scheme is numerically stable and computationally efficient, with speed comparable to the conventional contour energy integration method, while free of the pathology problem of the charge density. As an application, this method is utilized to investigate the crystal structures of polonium and their bulk properties, which is challenging for a conventional real-energy scheme. The noble metals are also calculated, both as a test of our method and to study the relativistic effects.« less
The anatomy of choice: active inference and agency.
Friston, Karl; Schwartenbeck, Philipp; Fitzgerald, Thomas; Moutoussis, Michael; Behrens, Timothy; Dolan, Raymond J
2013-01-01
This paper considers agency in the setting of embodied or active inference. In brief, we associate a sense of agency with prior beliefs about action and ask what sorts of beliefs underlie optimal behavior. In particular, we consider prior beliefs that action minimizes the Kullback-Leibler (KL) divergence between desired states and attainable states in the future. This allows one to formulate bounded rationality as approximate Bayesian inference that optimizes a free energy bound on model evidence. We show that constructs like expected utility, exploration bonuses, softmax choice rules and optimism bias emerge as natural consequences of this formulation. Previous accounts of active inference have focused on predictive coding and Bayesian filtering schemes for minimizing free energy. Here, we consider variational Bayes as an alternative scheme that provides formal constraints on the computational anatomy of inference and action-constraints that are remarkably consistent with neuroanatomy. Furthermore, this scheme contextualizes optimal decision theory and economic (utilitarian) formulations as pure inference problems. For example, expected utility theory emerges as a special case of free energy minimization, where the sensitivity or inverse temperature (of softmax functions and quantal response equilibria) has a unique and Bayes-optimal solution-that minimizes free energy. This sensitivity corresponds to the precision of beliefs about behavior, such that attainable goals are afforded a higher precision or confidence. In turn, this means that optimal behavior entails a representation of confidence about outcomes that are under an agent's control.
Fully-relativistic full-potential multiple scattering theory: A pathology-free scheme
Liu, Xianglin; Wang, Yang; Eisenbach, Markus; ...
2017-10-28
The Green function plays an essential role in the Korringa–Kohn–Rostoker(KKR) multiple scattering method. In practice, it is constructed from the regular and irregular solutions of the local Kohn–Sham equation and robust methods exist for spherical potentials. However, when applied to a non-spherical potential, numerical errors from the irregular solutions give rise to pathological behaviors of the charge density at small radius. Here we present a full-potential implementation of the fully-relativistic KKR method to perform ab initio self-consistent calculation by directly solving the Dirac differential equations using the generalized variable phase (sine and cosine matrices) formalism Liu et al. (2016). Themore » pathology around the origin is completely eliminated by carrying out the energy integration of the single-site Green function along the real axis. Here, by using an efficient pole-searching technique to identify the zeros of the well-behaved Jost matrices, we demonstrated that this scheme is numerically stable and computationally efficient, with speed comparable to the conventional contour energy integration method, while free of the pathology problem of the charge density. As an application, this method is utilized to investigate the crystal structures of polonium and their bulk properties, which is challenging for a conventional real-energy scheme. The noble metals are also calculated, both as a test of our method and to study the relativistic effects.« less
Axioms for Obligation and Robustness with Temporal Logic
NASA Astrophysics Data System (ADS)
French, Tim; McCabe-Dansted, John C.; Reynolds, Mark
RoCTL* was proposed to model and specify the robustness of reactive systems. RoCTL* extended CTL* with the addition of Obligatory and Robustly operators, which quantify over failure-free paths and paths with one more failure respectively. This paper gives an axiomatisation for all the operators of RoCTL* with the exception of the Until operator; this fragment is able to express similar contrary-to-duty obligations to the full RoCTL* logic. We call this formal system NORA, and give a completeness proof. We also consider the fragments of the language containing only path quantifiers (but where variables are dependent on histories). We examine semantic properties and potential axiomatisations for these fragments.
A reliable transmission protocol for ZigBee-based wireless patient monitoring.
Chen, Shyr-Kuen; Kao, Tsair; Chan, Chia-Tai; Huang, Chih-Ning; Chiang, Chih-Yen; Lai, Chin-Yu; Tung, Tse-Hua; Wang, Pi-Chung
2012-01-01
Patient monitoring systems are gaining their importance as the fast-growing global elderly population increases demands for caretaking. These systems use wireless technologies to transmit vital signs for medical evaluation. In a multihop ZigBee network, the existing systems usually use broadcast or multicast schemes to increase the reliability of signals transmission; however, both the schemes lead to significantly higher network traffic and end-to-end transmission delay. In this paper, we present a reliable transmission protocol based on anycast routing for wireless patient monitoring. Our scheme automatically selects the closest data receiver in an anycast group as a destination to reduce the transmission latency as well as the control overhead. The new protocol also shortens the latency of path recovery by initiating route recovery from the intermediate routers of the original path. On the basis of a reliable transmission scheme, we implement a ZigBee device for fall monitoring, which integrates fall detection, indoor positioning, and ECG monitoring. When the triaxial accelerometer of the device detects a fall, the current position of the patient is transmitted to an emergency center through a ZigBee network. In order to clarify the situation of the fallen patient, 4-s ECG signals are also transmitted. Our transmission scheme ensures the successful transmission of these critical messages. The experimental results show that our scheme is fast and reliable. We also demonstrate that our devices can seamlessly integrate with the next generation technology of wireless wide area network, worldwide interoperability for microwave access, to achieve real-time patient monitoring.
A Dynamic Resilience Approach for WDM Optical Networks
NASA Astrophysics Data System (ADS)
Garg, Amit Kumar
2017-12-01
Optical fibres have been developed as a transmission medium to carry traffic in order to provide various services in telecommunications platform. Failure of this fibre caused loss of data which can interrupt communication services. This paper has been focused only on survivable schemes in order to guarantee both protection and restoration in WDM optical networks. In this paper, a dynamic resilience approach has been proposed whose objective is to route the flows in a way which minimizes the total amount of bandwidth used for working and protection paths. In the proposed approach, path-based protection is utilized because it yields lower overhead and is also suitable for global optimization where, in case of a single link failure, all the flows utilizing the failed link are re-routed to a pre-computed set of paths. The simulation results demonstrate that proposed approach is much more efficient as it provides better quality of services (QoS) in terms of network resource utilization, blocking probability etc. as compared to conventional protection and restoration schemes. The proposed approach seems to offer an attractive combination of features, with both ring like speed and mesh-like efficiency.
Processing uncertain RFID data in traceability supply chains.
Xie, Dong; Xiao, Jie; Guo, Guangjun; Jiang, Tong
2014-01-01
Radio Frequency Identification (RFID) is widely used to track and trace objects in traceability supply chains. However, massive uncertain data produced by RFID readers are not effective and efficient to be used in RFID application systems. Following the analysis of key features of RFID objects, this paper proposes a new framework for effectively and efficiently processing uncertain RFID data, and supporting a variety of queries for tracking and tracing RFID objects. We adjust different smoothing windows according to different rates of uncertain data, employ different strategies to process uncertain readings, and distinguish ghost, missing, and incomplete data according to their apparent positions. We propose a comprehensive data model which is suitable for different application scenarios. In addition, a path coding scheme is proposed to significantly compress massive data by aggregating the path sequence, the position, and the time intervals. The scheme is suitable for cyclic or long paths. Moreover, we further propose a processing algorithm for group and independent objects. Experimental evaluations show that our approach is effective and efficient in terms of the compression and traceability queries.
Processing Uncertain RFID Data in Traceability Supply Chains
Xie, Dong; Xiao, Jie
2014-01-01
Radio Frequency Identification (RFID) is widely used to track and trace objects in traceability supply chains. However, massive uncertain data produced by RFID readers are not effective and efficient to be used in RFID application systems. Following the analysis of key features of RFID objects, this paper proposes a new framework for effectively and efficiently processing uncertain RFID data, and supporting a variety of queries for tracking and tracing RFID objects. We adjust different smoothing windows according to different rates of uncertain data, employ different strategies to process uncertain readings, and distinguish ghost, missing, and incomplete data according to their apparent positions. We propose a comprehensive data model which is suitable for different application scenarios. In addition, a path coding scheme is proposed to significantly compress massive data by aggregating the path sequence, the position, and the time intervals. The scheme is suitable for cyclic or long paths. Moreover, we further propose a processing algorithm for group and independent objects. Experimental evaluations show that our approach is effective and efficient in terms of the compression and traceability queries. PMID:24737978
Bio-ontologies: current trends and future directions
Bodenreider, Olivier; Stevens, Robert
2006-01-01
In recent years, as a knowledge-based discipline, bioinformatics has been made more computationally amenable. After its beginnings as a technology advocated by computer scientists to overcome problems of heterogeneity, ontology has been taken up by biologists themselves as a means to consistently annotate features from genotype to phenotype. In medical informatics, artifacts called ontologies have been used for a longer period of time to produce controlled lexicons for coding schemes. In this article, we review the current position in ontologies and how they have become institutionalized within biomedicine. As the field has matured, the much older philosophical aspects of ontology have come into play. With this and the institutionalization of ontology has come greater formality. We review this trend and what benefits it might bring to ontologies and their use within biomedicine. PMID:16899495
Multifunction interferometry using the electron mobility visibility and mean free path relationship.
Pornsuwancharoen, N; Youplao, P; Amiri, I S; Aziz, M S; Tran, Q L; Ali, J; Yupapin, P; Grattan, K T V
2018-05-08
A conventional Michelson interferometer is modified and used to form the various types of interferometers. The basic system consists of a conventional Michelson interferometer with silicon-graphene-gold embedded between layers on the ports. When light from the monochromatic source is input into the system via the input port (silicon waveguide), the change in optical path difference (OPD) of light traveling in the stacked layers introduces the change in the optical phase, which affects to the electron mean free path within the gold layer, induces the change in the overall electron mobility can be seen by the interferometer output visibility. Further plasmonic waves are introduced on the graphene thin film and the electron mobility occurred within the gold layer, in which the light-electron energy conversion in terms of the electron mobility can be observed, the gold layer length is 100 nm. The measurement resolution in terms of the OPD of ∼50 nm is achieved. In applications, the outputs of the drop port device of the modified Michelson interferometer can be arranged by the different detectors, where the polarized light outputs, the photon outputs, the electron spin outputs can be obtained by the interference fringe visibility, mobility visibility and the spin up-down splitting output energies. The modified Michelson interferometer theory and the detection schemes are given in details. © 2018 Wiley Periodicals, Inc.
Optimization research of railway passenger transfer scheme based on ant colony algorithm
NASA Astrophysics Data System (ADS)
Ni, Xiang
2018-05-01
The optimization research of railway passenger transfer scheme can provide strong support for railway passenger transport system, and its essence is path search. This paper realized the calculation of passenger transfer scheme for high speed railway when giving the time and stations of departure and arrival. The specific method that used were generating a passenger transfer service network of high-speed railway, establishing optimization model and searching by Ant Colony Algorithm. Finally, making analysis on the scheme from LanZhouxi to BeiJingXi which were based on high-speed railway network of China in 2017. The results showed that the transfer network and model had relatively high practical value and operation efficiency.
On the security of two remote user authentication schemes for telecare medical information systems.
Kim, Kee-Won; Lee, Jae-Dong
2014-05-01
The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.
Jarzynski equality in the context of maximum path entropy
NASA Astrophysics Data System (ADS)
González, Diego; Davis, Sergio
2017-06-01
In the global framework of finding an axiomatic derivation of nonequilibrium Statistical Mechanics from fundamental principles, such as the maximum path entropy - also known as Maximum Caliber principle -, this work proposes an alternative derivation of the well-known Jarzynski equality, a nonequilibrium identity of great importance today due to its applications to irreversible processes: biological systems (protein folding), mechanical systems, among others. This equality relates the free energy differences between two equilibrium thermodynamic states with the work performed when going between those states, through an average over a path ensemble. In this work the analysis of Jarzynski's equality will be performed using the formalism of inference over path space. This derivation highlights the wide generality of Jarzynski's original result, which could even be used in non-thermodynamical settings such as social systems, financial and ecological systems.
FDE-vdW: A van der Waals inclusive subsystem density-functional theory.
Kevorkyants, Ruslan; Eshuis, Henk; Pavanello, Michele
2014-07-28
We present a formally exact van der Waals inclusive electronic structure theory, called FDE-vdW, based on the Frozen Density Embedding formulation of subsystem Density-Functional Theory. In subsystem DFT, the energy functional is composed of subsystem additive and non-additive terms. We show that an appropriate definition of the long-range correlation energy is given by the value of the non-additive correlation functional. This functional is evaluated using the fluctuation-dissipation theorem aided by a formally exact decomposition of the response functions into subsystem contributions. FDE-vdW is derived in detail and several approximate schemes are proposed, which lead to practical implementations of the method. We show that FDE-vdW is Casimir-Polder consistent, i.e., it reduces to the generalized Casimir-Polder formula for asymptotic inter-subsystems separations. Pilot calculations of binding energies of 13 weakly bound complexes singled out from the S22 set show a dramatic improvement upon semilocal subsystem DFT, provided that an appropriate exchange functional is employed. The convergence of FDE-vdW with basis set size is discussed, as well as its dependence on the choice of associated density functional approximant.
FDE-vdW: A van der Waals inclusive subsystem density-functional theory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kevorkyants, Ruslan; Pavanello, Michele, E-mail: m.pavanello@rutgers.edu; Eshuis, Henk
2014-07-28
We present a formally exact van der Waals inclusive electronic structure theory, called FDE-vdW, based on the Frozen Density Embedding formulation of subsystem Density-Functional Theory. In subsystem DFT, the energy functional is composed of subsystem additive and non-additive terms. We show that an appropriate definition of the long-range correlation energy is given by the value of the non-additive correlation functional. This functional is evaluated using the fluctuation–dissipation theorem aided by a formally exact decomposition of the response functions into subsystem contributions. FDE-vdW is derived in detail and several approximate schemes are proposed, which lead to practical implementations of the method.more » We show that FDE-vdW is Casimir-Polder consistent, i.e., it reduces to the generalized Casimir-Polder formula for asymptotic inter-subsystems separations. Pilot calculations of binding energies of 13 weakly bound complexes singled out from the S22 set show a dramatic improvement upon semilocal subsystem DFT, provided that an appropriate exchange functional is employed. The convergence of FDE-vdW with basis set size is discussed, as well as its dependence on the choice of associated density functional approximant.« less
Active inference and epistemic value.
Friston, Karl; Rigoli, Francesco; Ognibene, Dimitri; Mathys, Christoph; Fitzgerald, Thomas; Pezzulo, Giovanni
2015-01-01
We offer a formal treatment of choice behavior based on the premise that agents minimize the expected free energy of future outcomes. Crucially, the negative free energy or quality of a policy can be decomposed into extrinsic and epistemic (or intrinsic) value. Minimizing expected free energy is therefore equivalent to maximizing extrinsic value or expected utility (defined in terms of prior preferences or goals), while maximizing information gain or intrinsic value (or reducing uncertainty about the causes of valuable outcomes). The resulting scheme resolves the exploration-exploitation dilemma: Epistemic value is maximized until there is no further information gain, after which exploitation is assured through maximization of extrinsic value. This is formally consistent with the Infomax principle, generalizing formulations of active vision based upon salience (Bayesian surprise) and optimal decisions based on expected utility and risk-sensitive (Kullback-Leibler) control. Furthermore, as with previous active inference formulations of discrete (Markovian) problems, ad hoc softmax parameters become the expected (Bayes-optimal) precision of beliefs about, or confidence in, policies. This article focuses on the basic theory, illustrating the ideas with simulations. A key aspect of these simulations is the similarity between precision updates and dopaminergic discharges observed in conditioning paradigms.
Landau's statistical mechanics for quasi-particle models
NASA Astrophysics Data System (ADS)
Bannur, Vishnu M.
2014-04-01
Landau's formalism of statistical mechanics [following L. D. Landau and E. M. Lifshitz, Statistical Physics (Pergamon Press, Oxford, 1980)] is applied to the quasi-particle model of quark-gluon plasma. Here, one starts from the expression for pressure and develop all thermodynamics. It is a general formalism and consistent with our earlier studies [V. M. Bannur, Phys. Lett. B647, 271 (2007)] based on Pathria's formalism [following R. K. Pathria, Statistical Mechanics (Butterworth-Heinemann, Oxford, 1977)]. In Pathria's formalism, one starts from the expression for energy density and develop thermodynamics. Both the formalisms are consistent with thermodynamics and statistical mechanics. Under certain conditions, which are wrongly called thermodynamic consistent relation, we recover other formalism of quasi-particle system, like in M. I. Gorenstein and S. N. Yang, Phys. Rev. D52, 5206 (1995), widely studied in quark-gluon plasma.
Greedy data transportation scheme with hard packet deadlines for wireless ad hoc networks.
Lee, HyungJune
2014-01-01
We present a greedy data transportation scheme with hard packet deadlines in ad hoc sensor networks of stationary nodes and multiple mobile nodes with scheduled trajectory path and arrival time. In the proposed routing strategy, each stationary ad hoc node en route decides whether to relay a shortest-path stationary node toward destination or a passing-by mobile node that will carry closer to destination. We aim to utilize mobile nodes to minimize the total routing cost as far as the selected route can satisfy the end-to-end packet deadline. We evaluate our proposed routing algorithm in terms of routing cost, packet delivery ratio, packet delivery time, and usability of mobile nodes based on network level simulations. Simulation results show that our proposed algorithm fully exploits the remaining time till packet deadline to turn into networking benefits of reducing the overall routing cost and improving packet delivery performance. Also, we demonstrate that the routing scheme guarantees packet delivery with hard deadlines, contributing to QoS improvement in various network services.
Greedy Data Transportation Scheme with Hard Packet Deadlines for Wireless Ad Hoc Networks
Lee, HyungJune
2014-01-01
We present a greedy data transportation scheme with hard packet deadlines in ad hoc sensor networks of stationary nodes and multiple mobile nodes with scheduled trajectory path and arrival time. In the proposed routing strategy, each stationary ad hoc node en route decides whether to relay a shortest-path stationary node toward destination or a passing-by mobile node that will carry closer to destination. We aim to utilize mobile nodes to minimize the total routing cost as far as the selected route can satisfy the end-to-end packet deadline. We evaluate our proposed routing algorithm in terms of routing cost, packet delivery ratio, packet delivery time, and usability of mobile nodes based on network level simulations. Simulation results show that our proposed algorithm fully exploits the remaining time till packet deadline to turn into networking benefits of reducing the overall routing cost and improving packet delivery performance. Also, we demonstrate that the routing scheme guarantees packet delivery with hard deadlines, contributing to QoS improvement in various network services. PMID:25258736
Efficient micromagnetics for magnetic storage devices
NASA Astrophysics Data System (ADS)
Escobar Acevedo, Marco Antonio
Micromagnetics is an important component for advancing the magnetic nanostructures understanding and design. Numerous existing and prospective magnetic devices rely on micromagnetic analysis, these include hard disk drives, magnetic sensors, memories, microwave generators, and magnetic logic. The ability to examine, describe, and predict the magnetic behavior, and macroscopic properties of nanoscale magnetic systems is essential for improving the existing devices, for progressing in their understanding, and for enabling new technologies. This dissertation describes efficient micromagnetic methods as required for magnetic storage analysis. Their performance and accuracy is demonstrated by studying realistic, complex, and relevant micromagnetic system case studies. An efficient methodology for dynamic micromagnetics in large scale simulations is used to study the writing process in a full scale model of a magnetic write head. An efficient scheme, tailored for micromagnetics, to find the minimum energy state on a magnetic system is presented. This scheme can be used to calculate hysteresis loops. An efficient scheme, tailored for micromagnetics, to find the minimum energy path between two stable states on a magnetic system is presented. This minimum energy path is intimately related to the thermal stability.
On the Perturbative Equivalence Between the Hamiltonian and Lagrangian Quantizations
NASA Astrophysics Data System (ADS)
Batalin, I. A.; Tyutin, I. V.
The Hamiltonian (BFV) and Lagrangian (BV) quantization schemes are proved to be perturbatively equivalent to each other. It is shown in particular that the quantum master equation being treated perturbatively possesses a local formal solution.
NASA Astrophysics Data System (ADS)
Hayami, Masao; Seino, Junji; Nakai, Hiromi
2018-03-01
This article proposes a gauge-origin independent formalism of the nuclear magnetic shielding constant in the two-component relativistic framework based on the unitary transformation. The proposed scheme introduces the gauge factor and the unitary transformation into the atomic orbitals. The two-component relativistic equation is formulated by block-diagonalizing the Dirac Hamiltonian together with gauge factors. This formulation is available for arbitrary relativistic unitary transformations. Then, the infinite-order Douglas-Kroll-Hess (IODKH) transformation is applied to the present formulation. Next, the analytical derivatives of the IODKH Hamiltonian for the evaluation of the nuclear magnetic shielding constant are derived. Results obtained from the numerical assessments demonstrate that the present formulation removes the gauge-origin dependence completely. Furthermore, the formulation with the IODKH transformation gives results that are close to those in four-component and other two-component relativistic schemes.
Optimal Management of Redundant Control Authority for Fault Tolerance
NASA Technical Reports Server (NTRS)
Wu, N. Eva; Ju, Jianhong
2000-01-01
This paper is intended to demonstrate the feasibility of a solution to a fault tolerant control problem. It explains, through a numerical example, the design and the operation of a novel scheme for fault tolerant control. The fundamental principle of the scheme was formalized in [5] based on the notion of normalized nonspecificity. The novelty lies with the use of a reliability criterion for redundancy management, and therefore leads to a high overall system reliability.
Biometrics based authentication scheme for session initiation protocol.
Xie, Qi; Tang, Zhixiong
2016-01-01
Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.
Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks
NASA Astrophysics Data System (ADS)
Fu, Minglei; Chai, Zhicheng; Le, Zichun
2016-03-01
With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.
Formal Verification for a Next-Generation Space Shuttle
NASA Technical Reports Server (NTRS)
Nelson, Stacy D.; Pecheur, Charles; Koga, Dennis (Technical Monitor)
2002-01-01
This paper discusses the verification and validation (V&2) of advanced software used for integrated vehicle health monitoring (IVHM), in the context of NASA's next-generation space shuttle. We survey the current VBCV practice and standards used in selected NASA projects, review applicable formal verification techniques, and discuss their integration info existing development practice and standards. We also describe two verification tools, JMPL2SMV and Livingstone PathFinder, that can be used to thoroughly verify diagnosis applications that use model-based reasoning, such as the Livingstone system.
Quantum localization of classical mechanics
NASA Astrophysics Data System (ADS)
Batalin, Igor A.; Lavrov, Peter M.
2016-07-01
Quantum localization of classical mechanics within the BRST-BFV and BV (or field-antifield) quantization methods are studied. It is shown that a special choice of gauge fixing functions (or BRST-BFV charge) together with the unitary limit leads to Hamiltonian localization in the path integral of the BRST-BFV formalism. In turn, we find that a special choice of gauge fixing functions being proportional to extremals of an initial non-degenerate classical action together with a very special solution of the classical master equation result in Lagrangian localization in the partition function of the BV formalism.
Finding Chemical Reaction Paths with a Multilevel Preconditioning Protocol
2015-01-01
Finding transition paths for chemical reactions can be computationally costly owing to the level of quantum-chemical theory needed for accuracy. Here, we show that a multilevel preconditioning scheme that was recently introduced (Tempkin et al. J. Chem. Phys.2014, 140, 184114) can be used to accelerate quantum-chemical string calculations. We demonstrate the method by finding minimum-energy paths for two well-characterized reactions: tautomerization of malonaldehyde and Claissen rearrangement of chorismate to prephanate. For these reactions, we show that preconditioning density functional theory (DFT) with a semiempirical method reduces the computational cost for reaching a converged path that is an optimum under DFT by several fold. The approach also shows promise for free energy calculations when thermal noise can be controlled. PMID:25516726
Quantum particles in general spacetimes: A tangent bundle formalism
NASA Astrophysics Data System (ADS)
Wohlfarth, Mattias N. R.
2018-06-01
Using tangent bundle geometry we construct an equivalent reformulation of classical field theory on flat spacetimes which simultaneously encodes the perspectives of multiple observers. Its generalization to curved spacetimes realizes a new type of nonminimal coupling of the fields and is shown to admit a canonical quantization procedure. For the resulting quantum theory we demonstrate the emergence of a particle interpretation, fully consistent with general relativistic geometry. The path dependency of parallel transport forces each observer to carry their own quantum state; we find that the communication of the corresponding quantum information may generate extra particles on curved spacetimes. A speculative link between quantum information and spacetime curvature is discussed which might lead to novel explanations for quantum decoherence and vanishing interference in double-slit or interaction-free measurement scenarios, in the mere presence of additional observers.
On the Formal Verification of Conflict Detection Algorithms
NASA Technical Reports Server (NTRS)
Munoz, Cesar; Butler, Ricky W.; Carreno, Victor A.; Dowek, Gilles
2001-01-01
Safety assessment of new air traffic management systems is a main issue for civil aviation authorities. Standard techniques such as testing and simulation have serious limitations in new systems that are significantly more autonomous than the older ones. In this paper, we present an innovative approach, based on formal verification, for establishing the correctness of conflict detection systems. Fundamental to our approach is the concept of trajectory, which is a continuous path in the x-y plane constrained by physical laws and operational requirements. From the Model of trajectories, we extract, and formally prove, high level properties that can serve as a framework to analyze conflict scenarios. We use the Airborne Information for Lateral Spacing (AILS) alerting algorithm as a case study of our approach.
Liu, Hao; Zhu, Lili; Bai, Shuming; Shi, Qiang
2014-04-07
We investigated applications of the hierarchical equation of motion (HEOM) method to perform high order perturbation calculations of reduced quantum dynamics for a harmonic bath with arbitrary spectral densities. Three different schemes are used to decompose the bath spectral density into analytical forms that are suitable to the HEOM treatment: (1) The multiple Lorentzian mode model that can be obtained by numerically fitting the model spectral density. (2) The combined Debye and oscillatory Debye modes model that can be constructed by fitting the corresponding classical bath correlation function. (3) A new method that uses undamped harmonic oscillator modes explicitly in the HEOM formalism. Methods to extract system-bath correlations were investigated for the above bath decomposition schemes. We also show that HEOM in the undamped harmonic oscillator modes can give detailed information on the partial Wigner transform of the total density operator. Theoretical analysis and numerical simulations of the spin-Boson dynamics and the absorption line shape of molecular dimers show that the HEOM formalism for high order perturbations can serve as an important tool in studying the quantum dissipative dynamics in the intermediate coupling regime.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, Hao; Zhu, Lili; Bai, Shuming
2014-04-07
We investigated applications of the hierarchical equation of motion (HEOM) method to perform high order perturbation calculations of reduced quantum dynamics for a harmonic bath with arbitrary spectral densities. Three different schemes are used to decompose the bath spectral density into analytical forms that are suitable to the HEOM treatment: (1) The multiple Lorentzian mode model that can be obtained by numerically fitting the model spectral density. (2) The combined Debye and oscillatory Debye modes model that can be constructed by fitting the corresponding classical bath correlation function. (3) A new method that uses undamped harmonic oscillator modes explicitly inmore » the HEOM formalism. Methods to extract system-bath correlations were investigated for the above bath decomposition schemes. We also show that HEOM in the undamped harmonic oscillator modes can give detailed information on the partial Wigner transform of the total density operator. Theoretical analysis and numerical simulations of the spin-Boson dynamics and the absorption line shape of molecular dimers show that the HEOM formalism for high order perturbations can serve as an important tool in studying the quantum dissipative dynamics in the intermediate coupling regime.« less
Acharya, Vikas; Haywood, Matthew; Kokkinos, Naomi; Raithatha, Anisha; Francis, Sinthuja; Sharma, Rishi
2018-01-01
General practitioners (GPs) are key members of the health care profession who are required to have a considerable breadth of knowledge to manage and treat patients effectively in the community. Their skills and experience varies depending on the medical school they attended and their foundation training and specialist GP training schemes. Exposure to ear, nose, and throat (ENT)-specific pathology is often insufficient due to the lack of formal otolaryngology rotations, minimal relevant teaching opportunities, and inconsistencies in curricula, despite ENT-related pathology presentations being one of the commonest consultations in primary care. We undertook a learning needs assessment among Watford general practice vocational training scheme trainees to assess whether they lacked confidence in managing typical ENT pathology, as well as to ascertain whether they felt a formal and focused ENT teaching session would be beneficial to them. The results suggested they were interested in such a session, and therefore we organized a formal program on the assessment and management of acute and common ENT pathologies with a postteaching questionnaire to evaluate participant confidence in these domains. The results showed an improvement in participant knowledge and confidence regarding the assessment and management of ENT pathologies following the teaching session intervention. In addition, most attendees were overall very satisfied with the session. This study highlights the need for teaching specifically tailored to the learning needs of general practice vocational training scheme trainees, particularly in niche specialties, in order to prepare them adequately for clinical practice in the community setting.
Student’s scheme in solving mathematics problems
NASA Astrophysics Data System (ADS)
Setyaningsih, Nining; Juniati, Dwi; Suwarsono
2018-03-01
The purpose of this study was to investigate students’ scheme in solving mathematics problems. Scheme are data structures for representing the concepts stored in memory. In this study, we used it in solving mathematics problems, especially ratio and proportion topics. Scheme is related to problem solving that assumes that a system is developed in the human mind by acquiring a structure in which problem solving procedures are integrated with some concepts. The data were collected by interview and students’ written works. The results of this study revealed are students’ scheme in solving the problem of ratio and proportion as follows: (1) the content scheme, where students can describe the selected components of the problem according to their prior knowledge, (2) the formal scheme, where students can explain in construct a mental model based on components that have been selected from the problem and can use existing schemes to build planning steps, create something that will be used to solve problems and (3) the language scheme, where students can identify terms, or symbols of the components of the problem.Therefore, by using the different strategies to solve the problems, the students’ scheme in solving the ratio and proportion problems will also differ.
Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho
2017-04-25
User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.
Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho
2017-01-01
User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.’s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme. PMID:28441331
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian
2015-06-01
The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.
Wang, Chenyu; Xu, Guoai; Sun, Jing
2017-12-19
As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows-Abadi-Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.
Xu, Guoai; Sun, Jing
2017-01-01
As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme. PMID:29257066
FORMAL UNCERTAINTY ANALYSIS OF A LAGRANGIAN PHOTOCHEMICAL AIR POLLUTION MODEL. (R824792)
This study applied Monte Carlo analysis with Latin
hypercube sampling to evaluate the effects of uncertainty
in air parcel trajectory paths, emissions, rate constants,
deposition affinities, mixing heights, and atmospheric stability
on predictions from a vertically...
A quantum dot close to Stoner instability: The role of the Berry phase
DOE Office of Scientific and Technical Information (OSTI.GOV)
Saha, Arijit, E-mail: arijitsahahri@gmail.com; Gefen, Yuval; Burmistrov, Igor
2012-10-15
The physics of a quantum dot with electron-electron interactions is well captured by the so called 'Universal Hamiltonian' if the dimensionless conductance of the dot is much higher than unity. Within this scheme interactions are represented by three spatially independent terms which describe the charging energy, the spin-exchange and the interaction in the Cooper channel. In this paper we concentrate on the exchange interaction and generalize the functional bosonization formalism developed earlier for the charging energy. This turned out to be challenging as the effective bosonic action is formulated in terms of a vector field and is non-abelian due tomore » the non-commutativity of the spin operators. Here we develop a geometric approach which is particularly useful in the mesoscopic Stoner regime, i.e., when the strong exchange interaction renders the system close to the Stoner instability. We show that it is sufficient to sum over the adiabatic paths of the bosonic vector field and, for these paths, the crucial role is played by the Berry phase. Using these results we were able to calculate the magnetic susceptibility of the dot. The latter, in close vicinity of the Stoner instability point, matches very well with the exact solution [I.S. Burmistrov, Y. Gefen, M.N. Kiselev, JETP Lett. 92 (2010) 179]. - Highlights: Black-Right-Pointing-Pointer We consider a conducting QD whose dynamics is governed by exchange interaction. Black-Right-Pointing-Pointer We study the model within the 'Universal Hamiltonian' framework. Black-Right-Pointing-Pointer The ensuing bosonic action is non-abelian (hence non-trivial). Black-Right-Pointing-Pointer We find that the low energy dynamics is governed by a fluctuating Berry phase term. Black-Right-Pointing-Pointer We calculate the partition function and the zero frequency magnetic susceptibility.« less
NASA Astrophysics Data System (ADS)
Qin, Yi; Lin, Yanluan; Xu, Shiming; Ma, Hsi-Yen; Xie, Shaocheng
2018-02-01
Low clouds strongly impact the radiation budget of the climate system, but their simulation in most GCMs has remained a challenge, especially over the subtropical stratocumulus region. Assuming a Gaussian distribution for the subgrid-scale total water and liquid water potential temperature, a new statistical cloud scheme is proposed and tested in NCAR Community Atmospheric Model version 5 (CAM5). The subgrid-scale variance is diagnosed from the turbulent and shallow convective processes in CAM5. The approach is able to maintain the consistency between cloud fraction and cloud condensate and thus alleviates the adjustment needed in the default relative humidity-based cloud fraction scheme. Short-term forecast simulations indicate that low cloud fraction and liquid water content, including their diurnal cycle, are improved due to a proper consideration of subgrid-scale variance over the southeastern Pacific Ocean region. Compared with the default cloud scheme, the new approach produced the mean climate reasonably well with improved shortwave cloud forcing (SWCF) due to more reasonable low cloud fraction and liquid water path over regions with predominant low clouds. Meanwhile, the SWCF bias over the tropical land regions is also alleviated. Furthermore, the simulated marine boundary layer clouds with the new approach extend further offshore and agree better with observations. The new approach is able to obtain the top of atmosphere (TOA) radiation balance with a slightly alleviated double ITCZ problem in preliminary coupled simulations. This study implies that a close coupling of cloud processes with other subgrid-scale physical processes is a promising approach to improve cloud simulations.
The anatomy of choice: dopamine and decision-making
Friston, Karl; Schwartenbeck, Philipp; FitzGerald, Thomas; Moutoussis, Michael; Behrens, Timothy; Dolan, Raymond J.
2014-01-01
This paper considers goal-directed decision-making in terms of embodied or active inference. We associate bounded rationality with approximate Bayesian inference that optimizes a free energy bound on model evidence. Several constructs such as expected utility, exploration or novelty bonuses, softmax choice rules and optimism bias emerge as natural consequences of free energy minimization. Previous accounts of active inference have focused on predictive coding. In this paper, we consider variational Bayes as a scheme that the brain might use for approximate Bayesian inference. This scheme provides formal constraints on the computational anatomy of inference and action, which appear to be remarkably consistent with neuroanatomy. Active inference contextualizes optimal decision theory within embodied inference, where goals become prior beliefs. For example, expected utility theory emerges as a special case of free energy minimization, where the sensitivity or inverse temperature (associated with softmax functions and quantal response equilibria) has a unique and Bayes-optimal solution. Crucially, this sensitivity corresponds to the precision of beliefs about behaviour. The changes in precision during variational updates are remarkably reminiscent of empirical dopaminergic responses—and they may provide a new perspective on the role of dopamine in assimilating reward prediction errors to optimize decision-making. PMID:25267823
The anatomy of choice: dopamine and decision-making.
Friston, Karl; Schwartenbeck, Philipp; FitzGerald, Thomas; Moutoussis, Michael; Behrens, Timothy; Dolan, Raymond J
2014-11-05
This paper considers goal-directed decision-making in terms of embodied or active inference. We associate bounded rationality with approximate Bayesian inference that optimizes a free energy bound on model evidence. Several constructs such as expected utility, exploration or novelty bonuses, softmax choice rules and optimism bias emerge as natural consequences of free energy minimization. Previous accounts of active inference have focused on predictive coding. In this paper, we consider variational Bayes as a scheme that the brain might use for approximate Bayesian inference. This scheme provides formal constraints on the computational anatomy of inference and action, which appear to be remarkably consistent with neuroanatomy. Active inference contextualizes optimal decision theory within embodied inference, where goals become prior beliefs. For example, expected utility theory emerges as a special case of free energy minimization, where the sensitivity or inverse temperature (associated with softmax functions and quantal response equilibria) has a unique and Bayes-optimal solution. Crucially, this sensitivity corresponds to the precision of beliefs about behaviour. The changes in precision during variational updates are remarkably reminiscent of empirical dopaminergic responses-and they may provide a new perspective on the role of dopamine in assimilating reward prediction errors to optimize decision-making.
Efficient Radiative Transfer for Dynamically Evolving Stratified Atmospheres
NASA Astrophysics Data System (ADS)
Judge, Philip G.
2017-12-01
We present a fast multi-level and multi-atom non-local thermodynamic equilibrium radiative transfer method for dynamically evolving stratified atmospheres, such as the solar atmosphere. The preconditioning method of Rybicki & Hummer (RH92) is adopted. But, pressed for the need of speed and stability, a “second-order escape probability” scheme is implemented within the framework of the RH92 method, in which frequency- and angle-integrals are carried out analytically. While minimizing the computational work needed, this comes at the expense of numerical accuracy. The iteration scheme is local, the formal solutions for the intensities are the only non-local component. At present the methods have been coded for vertical transport, applicable to atmospheres that are highly stratified. The probabilistic method seems adequately fast, stable, and sufficiently accurate for exploring dynamical interactions between the evolving MHD atmosphere and radiation using current computer hardware. Current 2D and 3D dynamics codes do not include this interaction as consistently as the current method does. The solutions generated may ultimately serve as initial conditions for dynamical calculations including full 3D radiative transfer. The National Center for Atmospheric Research is sponsored by the National Science Foundation.
Generalized Gibbs state with modified Redfield solution: Exact agreement up to second order
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thingna, Juzar; Wang, Jian-Sheng; Haenggi, Peter
A novel scheme for the steady state solution of the standard Redfield quantum master equation is developed which yields agreement with the exact result for the corresponding reduced density matrix up to second order in the system-bath coupling strength. We achieve this objective by use of an analytic continuation of the off-diagonal matrix elements of the Redfield solution towards its diagonal limit. Notably, our scheme does not require the provision of yet higher order relaxation tensors. Testing this modified method for a heat bath consisting of a collection of harmonic oscillators we assess that the system relaxes towards its correctmore » coupling-dependent, generalized quantum Gibbs state in second order. We numerically compare our formulation for a damped quantum harmonic system with the nonequilibrium Green's function formalism: we find good agreement at low temperatures for coupling strengths that are even larger than expected from the very regime of validity of the second-order Redfield quantum master equation. Yet another advantage of our method is that it markedly reduces the numerical complexity of the problem; thus, allowing to study efficiently large-sized system Hilbert spaces.« less
Applications of QCD factorization in multiscale Hadronic scattering
NASA Astrophysics Data System (ADS)
Wang, Bowen
In this thesis I apply QCD factorization theorems to two important hadronic processes. In the first study, I treat the inclusive cross section of the production of massive quarks through neutral current deep inelasitc scattering (DIS): (n/a). In this study I work out a method to consistently organize the QCD radiative contributions up to O(alphas 3) (N3LO), with a proper inclusion of the heavy quark mass dependence at different momentum scales. The generic implementation of the mass dependence developed in this thesis can be used by calculations in both an intermediate-mass factorization scheme and a general-mass factorization scheme. The mass effect is relevant to the predictions for Higgs, and W and Z cross sections measured at the LHC. The second study examines the transverse-momentum distribution of the lepton-pair production in Drell-yan process. The theory predictions based on the Collins-Soper-Sterman (CSS) resummation formalism at NNLL accuracy are compared with the new data on the angular distribution *eta of Drell-Yan pairs measured at the Tevatron and the LHC. The main finding is that the nonperturbative component of the CSS resummed cross section plays a crucial part in explaining the data in the small transverse momentum region.
Spin-dependent optimized effective potential formalism for open and closed systems
NASA Astrophysics Data System (ADS)
Rigamonti, S.; Horowitz, C. M.; Proetto, C. R.
2015-12-01
Orbital-based exchange (x ) correlation (c ) energy functionals, leading to the optimized effective potential (OEP) formalism of density-functional theory (DFT), are gaining increasing importance in ground-state DFT, as applied to the calculation of the electronic structure of closed systems with a fixed number of particles, such as atoms and molecules. These types of functionals prove also to be extremely valuable for dealing with solid-state systems with reduced dimensionality, such as is the case of electrons trapped at the interface between two different semiconductors, or narrow metallic slabs. In both cases, electrons build a quasi-two-dimensional electron gas, or Q2DEG. We provide here a general DFT-OEP formal scheme valid both for Q2DEGs either isolated (closed) or in contact with a particle bath (open), and show that both possible representations are equivalent, being the choice of one or the other essentially a question of convenience. Based on this equivalence, a calculation scheme is proposed which avoids the noninvertibility problem of the density response function for closed systems. We also consider the case of spontaneously spin-polarized Q2DEGs, and find that far from the region where the Q2DEG is localized, the exact x -only exchange potential approaches two different, spin-dependent asymptotic limits. As an example, aside from these formal results, we also provide numerical results for a spin-polarized jellium slab, using the new OEP formalism for closed systems. The accuracy of the Krieger-Li-Iafrate approximation has been also tested for the same system, and found to be as good as it is for atoms and molecules.
Convergence of quasiparticle self-consistent GW calculations of transition metal monoxides
NASA Astrophysics Data System (ADS)
Das, Suvadip; Coulter, John E.; Manousakis, Efstratios
2015-03-01
We have investigated the electronic structure of the transition metal monoxides MnO, CoO, and NiO in their undistorted rock-salt structure within a fully iterated quasiparticle self-consistent GW (QPscGW) scheme. We have studied the convergence of the QPscGW method, i.e., how the quasiparticle energy eigenvalues and wavefunctions converge as a function of the QPscGW iterations, and compared the converged outputs obtained from different starting wavefunctions. We found that the convergence is slow and that a one-shot G0W0 calculation does not significantly improve the initial eigenvalues and states. In some cases the ``path'' to convergence may go through energy band reordering which cannot be captured by the simple initial unperturbed Hamiltonian. When a fully iterated solution is reached, the converged density of states, band-gaps and magnetic moments of these oxides are found to be only weakly dependent on the choice of the starting wavefunctions and in reasonable agreement with the experiment. National High Magnetic Field Laboratory.
NASA Astrophysics Data System (ADS)
Maraschek, M.; Gude, A.; Igochine, V.; Zohm, H.; Alessi, E.; Bernert, M.; Cianfarani, C.; Coda, S.; Duval, B.; Esposito, B.; Fietz, S.; Fontana, M.; Galperti, C.; Giannone, L.; Goodman, T.; Granucci, G.; Marelli, L.; Novak, S.; Paccagnella, R.; Pautasso, G.; Piovesan, P.; Porte, L.; Potzel, S.; Rapson, C.; Reich, M.; Sauter, O.; Sheikh, U.; Sozzi, C.; Spizzo, G.; Stober, J.; Treutterer, W.; ZancaP; ASDEX Upgrade Team; TCV Team; the EUROfusion MST1 Team
2018-01-01
Routine reaction to approaching disruptions in tokamaks is currently largely limited to machine protection by mitigating an ongoing disruption, which remains a basic requirement for ITER and DEMO [1]. Nevertheless, a mitigated disruption still generates stress to the device. Additionally, in future fusion devices, high-performance discharge time itself will be very valuable. Instead of reacting only on generic features, occurring shortly before the disruption, the ultimate goal is to actively avoid approaching disruptions at an early stage, sustain the discharges whenever possible and restrict mitigated disruptions to major failures. Knowledge of the most relevant root causes and the corresponding chain of events leading to disruption, the disruption path, is a prerequisite. For each disruption path, physics-based sensors and adequate actuators must be defined and their limitations considered. Early reaction facilitates the efficiency of the actuators and enhances the probability of a full recovery. Thus, sensors that detect potential disruptions in time are to be identified. Once the entrance into a disruption path is detected, we propose a hierarchy of actions consisting of (I) recovery of the discharge to full performance or at least continuation with a less disruption-prone backup scenario, (II) complete avoidance of disruption to sustain the discharge or at least delay it for a controlled termination and, (III), only as last resort, a disruption mitigation. Based on the understanding of disruption paths, a hierarchical and path-specific handling strategy must be developed. Such schemes, testable in present devices, could serve as guidelines for ITER and DEMO operation. For some disruption paths, experiments have been performed at ASDEX Upgrade and TCV. Disruptions were provoked in TCV by impurity injection into ELMy H-mode discharges and in ASDEX Upgrade by forcing a density limit in H-mode discharges. The new approach proposed in this paper is discussed for these cases. For the H-mode density limit sensors used so far react too late. Thus a plasma-state boundary is proposed, that can serve as an adequate early sensor for avoiding density limit disruptions in H-modes and for recovery to full performance.
NASA Technical Reports Server (NTRS)
Schlesinger, R. E.
1985-01-01
The impact of upstream-biased corrections for third-order spatial truncation error on the stability and phase error of the two-dimensional Crowley combined advective scheme with the cross-space term included is analyzed, putting primary emphasis on phase error reduction. The various versions of the Crowley scheme are formally defined, and their stability and phase error characteristics are intercompared using a linear Fourier component analysis patterned after Fromm (1968, 1969). The performances of the schemes under prototype simulation conditions are tested using time-dependent numerical experiments which advect an initially cone-shaped passive scalar distribution in each of three steady nondivergent flows. One such flow is solid rotation, while the other two are diagonal uniform flow and a strongly deformational vortex.
Development of a methodology for classifying software errors
NASA Technical Reports Server (NTRS)
Gerhart, S. L.
1976-01-01
A mathematical formalization of the intuition behind classification of software errors is devised and then extended to a classification discipline: Every classification scheme should have an easily discernible mathematical structure and certain properties of the scheme should be decidable (although whether or not these properties hold is relative to the intended use of the scheme). Classification of errors then becomes an iterative process of generalization from actual errors to terms defining the errors together with adjustment of definitions according to the classification discipline. Alternatively, whenever possible, small scale models may be built to give more substance to the definitions. The classification discipline and the difficulties of definition are illustrated by examples of classification schemes from the literature and a new study of observed errors in published papers of programming methodologies.
Determining the Impact of Personal Mobility Carbon Allowance Schemes in Transportation Networks
Aziz, H. M. Abdul; Ukkusuri, Satish V.; Zhan, Xianyuan
2016-10-17
We know that personal mobility carbon allowance (PMCA) schemes are designed to reduce carbon consumption from transportation networks. PMCA schemes influence the travel decision process of users and accordingly impact the system metrics including travel time and greenhouse gas (GHG) emissions. Here, we develop a multi-user class dynamic user equilibrium model to evaluate the transportation system performance when PMCA scheme is implemented. The results using Sioux-Falls test network indicate that PMCA schemes can achieve the emissions reduction goals for transportation networks. Further, users characterized by high value of travel time are found to be less sensitive to carbon budget inmore » the context of work trips. Results also show that PMCA scheme can lead to higher emissions for a path compared with the case without PMCA because of flow redistribution. The developed network equilibrium model allows us to examine the change in system states at different carbon allocation levels and to design parameters of PMCA schemes accounting for population heterogeneity.« less
Determining the Impact of Personal Mobility Carbon Allowance Schemes in Transportation Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aziz, H. M. Abdul; Ukkusuri, Satish V.; Zhan, Xianyuan
We know that personal mobility carbon allowance (PMCA) schemes are designed to reduce carbon consumption from transportation networks. PMCA schemes influence the travel decision process of users and accordingly impact the system metrics including travel time and greenhouse gas (GHG) emissions. Here, we develop a multi-user class dynamic user equilibrium model to evaluate the transportation system performance when PMCA scheme is implemented. The results using Sioux-Falls test network indicate that PMCA schemes can achieve the emissions reduction goals for transportation networks. Further, users characterized by high value of travel time are found to be less sensitive to carbon budget inmore » the context of work trips. Results also show that PMCA scheme can lead to higher emissions for a path compared with the case without PMCA because of flow redistribution. The developed network equilibrium model allows us to examine the change in system states at different carbon allocation levels and to design parameters of PMCA schemes accounting for population heterogeneity.« less
Roesler, Erika L.; Posselt, Derek J.; Rood, Richard B.
2017-04-06
Three-dimensional large eddy simulations (LES) are used to analyze a springtime Arctic mixed-phase stratocumulus observed on 26 April 2008 during the Indirect and Semi-Direct Aerosol Campaign. Two subgrid-scale turbulence parameterizations are compared. The first scheme is a 1.5-order turbulent kinetic energy (1.5-TKE) parameterization that has been previously applied to boundary layer cloud simulations. The second scheme, Cloud Layers Unified By Binormals (CLUBB), provides higher-order turbulent closure with scale awareness. The simulations, in comparisons with observations, show that both schemes produce the liquid profiles within measurement variability but underpredict ice water mass and overpredict ice number concentration. The simulation using CLUBBmore » underpredicted liquid water path more than the simulation using the 1.5-TKE scheme, so the turbulent length scale and horizontal grid box size were increased to increase liquid water path and reduce dissipative energy. The LES simulations show this stratocumulus cloud to maintain a closed cellular structure, similar to observations. The updraft and downdraft cores self-organize into a larger meso-γ-scale convective pattern with the 1.5-TKE scheme, but the cores remain more isotropic with the CLUBB scheme. Additionally, the cores are often composed of liquid and ice instead of exclusively containing one or the other. Furthermore, these results provide insight into traditionally unresolved and unmeasurable aspects of an Arctic mixed-phase cloud. From analysis, this cloud's updraft and downdraft cores appear smaller than other closed-cell stratocumulus such as midlatitude stratocumulus and Arctic autumnal mixed-phase stratocumulus due to the weaker downdrafts and lower precipitation rates.« less
Microwave Power Combiners for Signals of Arbitrary Amplitude
NASA Technical Reports Server (NTRS)
Conroy, Bruce; Hoppe, Daniel
2009-01-01
Schemes for combining power from coherent microwave sources of arbitrary (unequal or equal) amplitude have been proposed. Most prior microwave-power-combining schemes are limited to sources of equal amplitude. The basic principle of the schemes now proposed is to use quasi-optical components to manipulate the polarizations and phases of two arbitrary-amplitude input signals in such a way as to combine them into one output signal having a specified, fixed polarization. To combine power from more than two sources, one could use multiple powercombining stages based on this principle, feeding the outputs of lower-power stages as inputs to higher-power stages. Quasi-optical components suitable for implementing these schemes include grids of parallel wires, vane polarizers, and a variety of waveguide structures. For the sake of brevity, the remainder of this article illustrates the basic principle by focusing on one scheme in which a wire grid and two vane polarizers would be used. Wire grids are the key quasi-optical elements in many prior equal-power combiners. In somewhat oversimplified terms, a wire grid reflects an incident beam having an electric field parallel to the wires and passes an incident beam having an electric field perpendicular to the wires. In a typical prior equal-power combining scheme, one provides for two properly phased, equal-amplitude signals having mutually perpendicular linear polarizations to impinge from two mutually perpendicular directions on a wire grid in a plane oriented at an angle of 45 with respect to both beam axes. The wires in the grid are oriented to pass one of the incident beams straight through onto the output path and to reflect the other incident beam onto the output path along with the first-mentioned beam.
Numerical study of read scheme in one-selector one-resistor crossbar array
NASA Astrophysics Data System (ADS)
Kim, Sungho; Kim, Hee-Dong; Choi, Sung-Jin
2015-12-01
A comprehensive numerical circuit analysis of read schemes of a one selector-one resistance change memory (1S1R) crossbar array is carried out. Three schemes-the ground, V/2, and V/3 schemes-are compared with each other in terms of sensing margin and power consumption. Without the aid of a complex analytical approach or SPICE-based simulation, a simple numerical iteration method is developed to simulate entire current flows and node voltages within a crossbar array. Understanding such phenomena is essential in successfully evaluating the electrical specifications of selectors for suppressing intrinsic drawbacks of crossbar arrays, such as sneaky current paths and series line resistance problems. This method provides a quantitative tool for the accurate analysis of crossbar arrays and provides guidelines for developing an optimal read scheme, array configuration, and selector device specifications.
NASA Technical Reports Server (NTRS)
Crane, R. K.; Blood, D. W.
1979-01-01
A single model for a standard of comparison for other models when dealing with rain attenuation problems in system design and experimentation is proposed. Refinements to the Global Rain Production Model are incorporated. Path loss and noise estimation procedures as the basic input to systems design for earth-to-space microwave links operating at frequencies from 1 to 300 GHz are provided. Topics covered include gaseous absorption, attenuation by rain, ionospheric and tropospheric scintillation, low elevation angle effects, radome attenuation, diversity schemes, link calculation, and receiver noise emission by atmospheric gases, rain, and antenna contributions.
NASA Astrophysics Data System (ADS)
Nightingale, James; Wang, Qi; Grecos, Christos
2011-03-01
Users of the next generation wireless paradigm known as multihomed mobile networks expect satisfactory quality of service (QoS) when accessing streamed multimedia content. The recent H.264 Scalable Video Coding (SVC) extension to the Advanced Video Coding standard (AVC), offers the facility to adapt real-time video streams in response to the dynamic conditions of multiple network paths encountered in multihomed wireless mobile networks. Nevertheless, preexisting streaming algorithms were mainly proposed for AVC delivery over multipath wired networks and were evaluated by software simulation. This paper introduces a practical, hardware-based testbed upon which we implement and evaluate real-time H.264 SVC streaming algorithms in a realistic multihomed wireless mobile networks environment. We propose an optimised streaming algorithm with multi-fold technical contributions. Firstly, we extended the AVC packet prioritisation schemes to reflect the three-dimensional granularity of SVC. Secondly, we designed a mechanism for evaluating the effects of different streamer 'read ahead window' sizes on real-time performance. Thirdly, we took account of the previously unconsidered path switching and mobile networks tunnelling overheads encountered in real-world deployments. Finally, we implemented a path condition monitoring and reporting scheme to facilitate the intelligent path switching. The proposed system has been experimentally shown to offer a significant improvement in PSNR of the received stream compared with representative existing algorithms.
Which coordinate system for modelling path integration?
Vickerstaff, Robert J; Cheung, Allen
2010-03-21
Path integration is a navigation strategy widely observed in nature where an animal maintains a running estimate, called the home vector, of its location during an excursion. Evidence suggests it is both ancient and ubiquitous in nature, and has been studied for over a century. In that time, canonical and neural network models have flourished, based on a wide range of assumptions, justifications and supporting data. Despite the importance of the phenomenon, consensus and unifying principles appear lacking. A fundamental issue is the neural representation of space needed for biological path integration. This paper presents a scheme to classify path integration systems on the basis of the way the home vector records and updates the spatial relationship between the animal and its home location. Four extended classes of coordinate systems are used to unify and review both canonical and neural network models of path integration, from the arthropod and mammalian literature. This scheme demonstrates analytical equivalence between models which may otherwise appear unrelated, and distinguishes between models which may superficially appear similar. A thorough analysis is carried out of the equational forms of important facets of path integration including updating, steering, searching and systematic errors, using each of the four coordinate systems. The type of available directional cue, namely allothetic or idiothetic, is also considered. It is shown that on balance, the class of home vectors which includes the geocentric Cartesian coordinate system, appears to be the most robust for biological systems. A key conclusion is that deducing computational structure from behavioural data alone will be difficult or impossible, at least in the absence of an analysis of random errors. Consequently it is likely that further theoretical insights into path integration will require an in-depth study of the effect of noise on the four classes of home vectors. Copyright 2009 Elsevier Ltd. All rights reserved.
Identifying decohering paths in closed quantum systems
NASA Technical Reports Server (NTRS)
Albrecht, Andreas
1990-01-01
A specific proposal is discussed for how to identify decohering paths in a wavefunction of the universe. The emphasis is on determining the correlations among subsystems and then considering how these correlations evolve. The proposal is similar to earlier ideas of Schroedinger and of Zeh, but in other ways it is closer to the decoherence functional of Griffiths, Omnes, and Gell-Mann and Hartle. There are interesting differences with each of these which are discussed. Once a given coarse-graining is chosen, the candidate paths are fixed in this scheme, and a single well defined number measures the degree of decoherence for each path. The normal probability sum rules are exactly obeyed (instantaneously) by these paths regardless of the level of decoherence. Also briefly discussed is how one might quantify some other aspects of classicality. The important role that concrete calculations play in testing this and other proposals is stressed.
ERIC Educational Resources Information Center
Downey, Peter R.
2004-01-01
This is a story of transformation at Sheffield Hallam University, UK. It describes the progress and thinking along the path to introducing the university's vision of sustainability since the conclusion of EMSU 1999. It describes how sustainable practice has been incorporated within the formal democratic structures of the university, and describes…
Perturbative Quantum Gauge Theories on Manifolds with Boundary
NASA Astrophysics Data System (ADS)
Cattaneo, Alberto S.; Mnev, Pavel; Reshetikhin, Nicolai
2018-01-01
This paper introduces a general perturbative quantization scheme for gauge theories on manifolds with boundary, compatible with cutting and gluing, in the cohomological symplectic (BV-BFV) formalism. Explicit examples, like abelian BF theory and its perturbations, including nontopological ones, are presented.
Marsalek, Ondrej; Markland, Thomas E
2016-02-07
Path integral molecular dynamics simulations, combined with an ab initio evaluation of interactions using electronic structure theory, incorporate the quantum mechanical nature of both the electrons and nuclei, which are essential to accurately describe systems containing light nuclei. However, path integral simulations have traditionally required a computational cost around two orders of magnitude greater than treating the nuclei classically, making them prohibitively costly for most applications. Here we show that the cost of path integral simulations can be dramatically reduced by extending our ring polymer contraction approach to ab initio molecular dynamics simulations. By using density functional tight binding as a reference system, we show that our ring polymer contraction scheme gives rapid and systematic convergence to the full path integral density functional theory result. We demonstrate the efficiency of this approach in ab initio simulations of liquid water and the reactive protonated and deprotonated water dimer systems. We find that the vast majority of the nuclear quantum effects are accurately captured using contraction to just the ring polymer centroid, which requires the same number of density functional theory calculations as a classical simulation. Combined with a multiple time step scheme using the same reference system, which allows the time step to be increased, this approach is as fast as a typical classical ab initio molecular dynamics simulation and 35× faster than a full path integral calculation, while still exactly including the quantum sampling of nuclei. This development thus offers a route to routinely include nuclear quantum effects in ab initio molecular dynamics simulations at negligible computational cost.
Finding Chemical Reaction Paths with a Multilevel Preconditioning Protocol
Kale, Seyit; Sode, Olaseni; Weare, Jonathan; ...
2014-11-07
Finding transition paths for chemical reactions can be computationally costly owing to the level of quantum-chemical theory needed for accuracy. Here, we show that a multilevel preconditioning scheme that was recently introduced (Tempkin et al. J. Chem. Phys. 2014, 140, 184114) can be used to accelerate quantum-chemical string calculations. We demonstrate the method by finding minimum-energy paths for two well-characterized reactions: tautomerization of malonaldehyde and Claissen rearrangement of chorismate to prephanate. For these reactions, we show that preconditioning density functional theory (DFT) with a semiempirical method reduces the computational cost for reaching a converged path that is an optimum undermore » DFT by several fold. In conclusion, the approach also shows promise for free energy calculations when thermal noise can be controlled.« less
Antoine, D; Morel, A
1998-04-20
Single and multiple scattering by molecules or by atmospheric aerosols only (homogeneous scattering), and heterogeneous scattering by aerosols and molecules, are recorded in Monte Carlo simulations. It is shown that heterogeneous scattering (1) always contributes significantly to the path reflectance (rho(path)), (2) is realized at the expense of homogeneous scattering, (3) decreases when aerosols are absorbing, and (4) introduces deviations in the spectral dependencies of reflectances compared with the Rayleigh exponent and the aerosol angstrom exponent. The ratio of rho(path) to the Rayleigh reflectance for an aerosol-free atmosphere is linearly related to the aerosol optical thickness. This result provides a basis for a new scheme for atmospheric correction of remotely sensed ocean color observations.
Heuristic approaches for energy-efficient shared restoration in WDM networks
NASA Astrophysics Data System (ADS)
Alilou, Shahab
In recent years, there has been ongoing research on the design of energy-efficient Wavelength Division Multiplexing (WDM) networks. The explosive growth of Internet traffic has led to increased power consumption of network components. Network survivability has also been a relevant research topic, as it plays a crucial role in assuring continuity of service with no disruption, regardless of network component failure. Network survivability mechanisms tend to utilize considerable resources such as spare capacity in order to protect and restore information. This thesis investigates techniques for reducing energy demand and enhancing energy efficiency in the context of network survivability. We propose two novel heuristic energy-efficient shared protection approaches for WDM networks. These approaches intend to save energy by setting on sleep mode devices that are not being used while providing shared backup paths to satisfy network survivability. The first approach exploits properties of a math series in order to assign weight to the network links. It aims at reducing power consumption at the network indirectly by aggregating traffic on a set of nodes and links with high traffic load level. Routing traffic on links and nodes that are already under utilization makes it possible for the links and nodes with no load to be set on sleep mode. The second approach is intended to dynamically route traffic through nodes and links with high traffic load level. Similar to the first approach, this approach computes a pair of paths for every newly arrived demand. It computes these paths for every new demand by comparing the power consumption of nodes and links in the network before the demand arrives with their potential power consumption if they are chosen along the paths of this demand. Simulations of two different networks were used to compare the total network power consumption obtained using the proposed techniques against a standard shared-path restoration scheme. Shared-path restoration is a network survivability method in which a link-disjoint backup path and wavelength is reserved at the time of call setup for a working path. However, in order to reduce spare capacity consumption, this reserved backup path and wavelength may be shared with other backup paths. Pool Sharing Scheme (PSS) is employed to implement shared-path restoration scheme [1]. In an optical network, the failure of a single link leads to the failure of all the lightpaths that pass through that particular link. PSS ensures that the amount of backup bandwidth required on a link to restore the failed connections will not be more than the total amount of reserved backup bandwidth on that link. Simulation results indicate that the proposed approaches lead to up to 35% power savings in WDM networks when traffic load is low. However, power saving decreases to 14% at high traffic load level. Furthermore, in terms of the total capacity consumption for working paths, PSS outperforms the two proposed approaches, as expected. In terms of total capacity consumption all the approaches behave similarly. In general, at low traffic load level, the two proposed approaches behave similar to PSS in terms of average link load, and the ratio of block demands. Nevertheless, at high traffic load, the proposed approaches result in higher ratio of blocked demands than PSS. They also lead to higher average link load than PSS for the equal number of generated demands.
A physically-based retrieval of cloud liquid water from SSM/I measurements
NASA Technical Reports Server (NTRS)
Greenwald, Thomas J.; Stephens, Graeme L.; Vonder Haar, Thomas H.
1992-01-01
A simple physical scheme is proposed for retrieving cloud liquid water over the ice-free global oceans from Special Sensor Microwave/Imager (SSM/I) observations. Details of the microwave retrieval scheme are discussed, and the microwave-derived liquid water amounts are compared with the ground radiometer and AVHRR-derived liquid water for stratocumulus clouds off the coast of California. Global distributions of the liquid water path derived by the method proposed here are presented.
NASA Technical Reports Server (NTRS)
Xu, Kuan-Man; Luo, Yali; Morrison, Hugh; Mcfarquhar, G.M.
2008-01-01
Single-layer mixed-phase stratiform (MPS) Arctic clouds, which formed under conditions of large surface heat flux combined with general subsidence during a subperiod of the Atmospheric Radiation Measurement (ARM) Program Mixed-Phase Arctic Cloud Experiment (M-PACE), are simulated with a cloud resolving model (CRM). The CRM is implemented with either an advanced two-moment (M05) or a commonly used one-moment (L83) bulk microphysics scheme and a state-of-the-art radiative transfer scheme. The CONTROL simulation, that uses the M05 scheme and observed aerosol size distribution and ice nulei (IN) number concentration, reproduces the magnitudes and vertical structures of cloud liquid water content (LWC), total ice water content (IWC), number concentration and effective radius of cloud droplets as suggested by the M-PACE observations. It underestimates ice crystal number concentrations by an order of magnitude and overestimates effective radius of ice crystals by a factor of 2-3. The OneM experiment, that uses the L83 scheme, produces values of liquid water path (LWP) and ice plus snow water path (ISWP) that were about 30% and 4 times, respectively, of those produced by the CONTROL. Its vertical profile of IWC exhibits a bimodal distribution in contrast to the constant distribution of IWC produced in the CONTROL and observations.
Adaptive Tracking Control for Robots With an Interneural Computing Scheme.
Tsai, Feng-Sheng; Hsu, Sheng-Yi; Shih, Mau-Hsiang
2018-04-01
Adaptive tracking control of mobile robots requires the ability to follow a trajectory generated by a moving target. The conventional analysis of adaptive tracking uses energy minimization to study the convergence and robustness of the tracking error when the mobile robot follows a desired trajectory. However, in the case that the moving target generates trajectories with uncertainties, a common Lyapunov-like function for energy minimization may be extremely difficult to determine. Here, to solve the adaptive tracking problem with uncertainties, we wish to implement an interneural computing scheme in the design of a mobile robot for behavior-based navigation. The behavior-based navigation adopts an adaptive plan of behavior patterns learning from the uncertainties of the environment. The characteristic feature of the interneural computing scheme is the use of neural path pruning with rewards and punishment interacting with the environment. On this basis, the mobile robot can be exploited to change its coupling weights in paths of neural connections systematically, which can then inhibit or enhance the effect of flow elimination in the dynamics of the evolutionary neural network. Such dynamical flow translation ultimately leads to robust sensory-to-motor transformations adapting to the uncertainties of the environment. A simulation result shows that the mobile robot with the interneural computing scheme can perform fault-tolerant behavior of tracking by maintaining suitable behavior patterns at high frequency levels.
2012-01-01
Background Globally, extending financial protection and equitable access to health services to those outside the formal sector employment is a major challenge for achieving universal coverage. While some favour contributory schemes, others have embraced tax-funded health service cover for those outside the formal sector. This paper critically examines the issue of how to cover those outside the formal sector through the lens of stakeholder views on the proposed one-time premium payment (OTPP) policy in Ghana. Discussion Ghana in 2004 implemented a National Health Insurance Scheme, based on a contributory model where service benefits are restricted to those who contribute (with some groups exempted from contributing), as the policy direction for moving towards universal coverage. In 2008, the OTPP system was proposed as an alternative way of ensuring coverage for those outside formal sector employment. There are divergent stakeholder views with regard to the meaning of the one-time premium and how it will be financed and sustained. Our stakeholder interviews indicate that the underlying issue being debated is whether the current contributory NHIS model for those outside the formal employment sector should be maintained or whether services for this group should be tax funded. However, the advantages and disadvantages of these alternatives are not being explored in an explicit or systematic way and are obscured by the considerable confusion about the likely design of the OTPP policy. We attempt to contribute to the broader debate about how best to fund coverage for those outside the formal sector by unpacking some of these issues and pointing to the empirical evidence needed to shed even further light on appropriate funding mechanisms for universal health systems. Summary The Ghanaian debate on OTPP is related to one of the most important challenges facing low- and middle-income countries seeking to achieve a universal health care system. It is critical that there is more extensive debate on the advantages and disadvantages of alternative funding mechanisms, supported by a solid evidence base, and with the policy objective of universal coverage providing the guiding light. PMID:23102454
Mapping the Evolution of Scientific Fields
Herrera, Mark; Roberts, David C.; Gulbahce, Natali
2010-01-01
Despite the apparent cross-disciplinary interactions among scientific fields, a formal description of their evolution is lacking. Here we describe a novel approach to study the dynamics and evolution of scientific fields using a network-based analysis. We build an idea network consisting of American Physical Society Physics and Astronomy Classification Scheme (PACS) numbers as nodes representing scientific concepts. Two PACS numbers are linked if there exist publications that reference them simultaneously. We locate scientific fields using a community finding algorithm, and describe the time evolution of these fields over the course of 1985–2006. The communities we identify map to known scientific fields, and their age depends on their size and activity. We expect our approach to quantifying the evolution of ideas to be relevant for making predictions about the future of science and thus help to guide its development. PMID:20463949
Mapping the evolution of scientific fields.
Herrera, Mark; Roberts, David C; Gulbahce, Natali
2010-05-04
Despite the apparent cross-disciplinary interactions among scientific fields, a formal description of their evolution is lacking. Here we describe a novel approach to study the dynamics and evolution of scientific fields using a network-based analysis. We build an idea network consisting of American Physical Society Physics and Astronomy Classification Scheme (PACS) numbers as nodes representing scientific concepts. Two PACS numbers are linked if there exist publications that reference them simultaneously. We locate scientific fields using a community finding algorithm, and describe the time evolution of these fields over the course of 1985-2006. The communities we identify map to known scientific fields, and their age depends on their size and activity. We expect our approach to quantifying the evolution of ideas to be relevant for making predictions about the future of science and thus help to guide its development.
NASA Astrophysics Data System (ADS)
Ohwada, Taku; Shibata, Yuki; Kato, Takuma; Nakamura, Taichi
2018-06-01
Developed is a high-order accurate shock-capturing scheme for the compressible Euler/Navier-Stokes equations; the formal accuracy is 5th order in space and 4th order in time. The performance and efficiency of the scheme are validated in various numerical tests. The main ingredients of the scheme are nothing special; they are variants of the standard numerical flux, MUSCL, the usual Lagrange's polynomial and the conventional Runge-Kutta method. The scheme can compute a boundary layer accurately with a rational resolution and capture a stationary contact discontinuity sharply without inner points. And yet it is endowed with high resistance against shock anomalies (carbuncle phenomenon, post-shock oscillations, etc.). A good balance between high robustness and low dissipation is achieved by blending three types of numerical fluxes according to physical situation in an intuitively easy-to-understand way. The performance of the scheme is largely comparable to that of WENO5-Rusanov, while its computational cost is 30-40% less than of that of the advanced scheme.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2016-06-08
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2016-01-01
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382
ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
NASA Astrophysics Data System (ADS)
You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki
Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.
NASA Astrophysics Data System (ADS)
Kalthoff, Mona; Keim, Frederik; Krull, Holger; Uhrig, Götz S.
2017-05-01
The density matrix formalism and the equation of motion approach are two semi-analytical methods that can be used to compute the non-equilibrium dynamics of correlated systems. While for a bilinear Hamiltonian both formalisms yield the exact result, for any non-bilinear Hamiltonian a truncation is necessary. Due to the fact that the commonly used truncation schemes differ for these two methods, the accuracy of the obtained results depends significantly on the chosen approach. In this paper, both formalisms are applied to the quantum Rabi model. This allows us to compare the approximate results and the exact dynamics of the system and enables us to discuss the accuracy of the approximations as well as the advantages and the disadvantages of both methods. It is shown to which extent the results fulfill physical requirements for the observables and which properties of the methods lead to unphysical results.
Dynamic principle for ensemble control tools.
Samoletov, A; Vasiev, B
2017-11-28
Dynamical equations describing physical systems in contact with a thermal bath are commonly extended by mathematical tools called "thermostats." These tools are designed for sampling ensembles in statistical mechanics. Here we propose a dynamic principle underlying a range of thermostats which is derived using fundamental laws of statistical physics and ensures invariance of the canonical measure. The principle covers both stochastic and deterministic thermostat schemes. Our method has a clear advantage over a range of proposed and widely used thermostat schemes that are based on formal mathematical reasoning. Following the derivation of the proposed principle, we show its generality and illustrate its applications including design of temperature control tools that differ from the Nosé-Hoover-Langevin scheme.
A Novel Friendly Jamming Scheme in Industrial Crowdsensing Networks against Eavesdropping Attack.
Li, Xuran; Wang, Qiu; Dai, Hong-Ning; Wang, Hao
2018-06-14
Eavesdropping attack is one of the most serious threats in industrial crowdsensing networks. In this paper, we propose a novel anti-eavesdropping scheme by introducing friendly jammers to an industrial crowdsensing network. In particular, we establish a theoretical framework considering both the probability of eavesdropping attacks and the probability of successful transmission to evaluate the effectiveness of our scheme. Our framework takes into account various channel conditions such as path loss, Rayleigh fading, and the antenna type of friendly jammers. Our results show that using jammers in industrial crowdsensing networks can effectively reduce the eavesdropping risk while having no significant influence on legitimate communications.
Efficient Data Gathering in 3D Linear Underwater Wireless Sensor Networks Using Sink Mobility
Akbar, Mariam; Javaid, Nadeem; Khan, Ayesha Hussain; Imran, Muhammad; Shoaib, Muhammad; Vasilakos, Athanasios
2016-01-01
Due to the unpleasant and unpredictable underwater environment, designing an energy-efficient routing protocol for underwater wireless sensor networks (UWSNs) demands more accuracy and extra computations. In the proposed scheme, we introduce a mobile sink (MS), i.e., an autonomous underwater vehicle (AUV), and also courier nodes (CNs), to minimize the energy consumption of nodes. MS and CNs stop at specific stops for data gathering; later on, CNs forward the received data to the MS for further transmission. By the mobility of CNs and MS, the overall energy consumption of nodes is minimized. We perform simulations to investigate the performance of the proposed scheme and compare it to preexisting techniques. Simulation results are compared in terms of network lifetime, throughput, path loss, transmission loss and packet drop ratio. The results show that the proposed technique performs better in terms of network lifetime, throughput, path loss and scalability. PMID:27007373
Efficient Data Gathering in 3D Linear Underwater Wireless Sensor Networks Using Sink Mobility.
Akbar, Mariam; Javaid, Nadeem; Khan, Ayesha Hussain; Imran, Muhammad; Shoaib, Muhammad; Vasilakos, Athanasios
2016-03-19
Due to the unpleasant and unpredictable underwater environment, designing an energy-efficient routing protocol for underwater wireless sensor networks (UWSNs) demands more accuracy and extra computations. In the proposed scheme, we introduce a mobile sink (MS), i.e., an autonomous underwater vehicle (AUV), and also courier nodes (CNs), to minimize the energy consumption of nodes. MS and CNs stop at specific stops for data gathering; later on, CNs forward the received data to the MS for further transmission. By the mobility of CNs and MS, the overall energy consumption of nodes is minimized. We perform simulations to investigate the performance of the proposed scheme and compare it to preexisting techniques. Simulation results are compared in terms of network lifetime, throughput, path loss, transmission loss and packet drop ratio. The results show that the proposed technique performs better in terms of network lifetime, throughput, path loss and scalability.
A novel method for trajectory planning of cooperative mobile manipulators.
Bolandi, Hossein; Ehyaei, Amir Farhad
2011-01-01
We have designed a two-stage scheme to consider the trajectory planning problem of two mobile manipulators for cooperative transportation of a rigid body in the presence of static obstacles. In the first stage, with regard to the static obstacles, we develop a method that searches the workspace for the shortest possible path between the start and goal configurations, by constructing a graph on a portion of the configuration space that satisfies the collision and closure constraints. The final stage is to calculate a sequence of time-optimal trajectories to go between the consecutive points of the path, with regard to the nonholonomic constraints and the maximum allowed joint accelerations. This approach allows geometric constraints such as joint limits and closed-chain constraints, along with differential constraints such as nonholonomic velocity constraints and acceleration limits, to be incorporated into the planning scheme. The simulation results illustrate the effectiveness of the proposed method.
A Novel Method for Trajectory Planning of Cooperative Mobile Manipulators
Bolandi, Hossein; Ehyaei, Amir Farhad
2011-01-01
We have designed a two-stage scheme to consider the trajectory planning problem of two mobile manipulators for cooperative transportation of a rigid body in the presence of static obstacles. In the first stage, with regard to the static obstacles, we develop a method that searches the workspace for the shortest possible path between the start and goal configurations, by constructing a graph on a portion of the configuration space that satisfies the collision and closure constraints. The final stage is to calculate a sequence of time-optimal trajectories to go between the consecutive points of the path, with regard to the nonholonomic constraints and the maximum allowed joint accelerations. This approach allows geometric constraints such as joint limits and closed-chain constraints, along with differential constraints such as nonholonomic velocity constraints and acceleration limits, to be incorporated into the planning scheme. The simulation results illustrate the effectiveness of the proposed method. PMID:22606656
An Experiment of GMPLS-Based Dispersion Compensation Control over In-Field Fibers
NASA Astrophysics Data System (ADS)
Seno, Shoichiro; Horiuchi, Eiichi; Yoshida, Sota; Sugihara, Takashi; Onohara, Kiyoshi; Kamei, Misato; Baba, Yoshimasa; Kubo, Kazuo; Mizuochi, Takashi
As ROADMs (Reconfigurable Optical Add/Drop Multiplexers) are becoming widely used in metro/core networks, distributed control of wavelength paths by extended GMPLS (Generalized MultiProtocol Label Switching) protocols has attracted much attention. For the automatic establishment of an arbitrary wavelength path satisfying dynamic traffic demands over a ROADM or WXC (Wavelength Cross Connect)-based network, precise determination of chromatic dispersion over the path and optimized assignment of dispersion compensation capabilities at related nodes are essential. This paper reports an experiment over in-field fibers where GMPLS-based control was applied for the automatic discovery of chromatic dispersion, path computation, and wavelength path establishment with dynamic adjustment of variable dispersion compensation. The GMPLS-based control scheme, which the authors called GMPLS-Plus, extended GMPLS's distributed control architecture with attributes for automatic discovery, advertisement, and signaling of chromatic dispersion. In this experiment, wavelength paths with distances of 24km and 360km were successfully established and error-free data transmission was verified. The experiment also confirmed path restoration with dynamic compensation adjustment upon fiber failure.
Mining the Values in the Curriculum.
ERIC Educational Resources Information Center
Ryan, Kevin
1993-01-01
Schools must provide opportunities for students to discover what is most worth knowing, as they prepare to be citizens, good workers, good private individuals. Formal curriculum is one vehicle for teaching Tao (universal path to becoming a good person). Hidden curriculum can also convey profound teachings, if a spirit of fairness predominates,…
Exploring Communities of Music in Virginia's Shenandoah Valley
ERIC Educational Resources Information Center
Dabback, William M.
2010-01-01
Community music practices may offer paths to broaden the scope of the music education field by providing meaningful alternatives to traditional approaches found in many formal music education systems. As specific social settings shape and define community music, prominent researchers have called for further investigation into practices in the…
A Transactions Cost Economics Approach to Defense Acquisition Management
2006-12-30
A path-breaking econometric study (Masten et al., 1991) based on the procurement of components and services by a large naval shipbuilder indicates...philosophy with four formal levels of hierarchical IPTs—from project-level working groups to over- arching OSD-level “teams.” Key in the IPT concept is
Civil War. NBER Working Paper No. 14801
ERIC Educational Resources Information Center
Blattman, Christopher; Miguel, Edward
2009-01-01
Most nations have experienced an internal armed conflict since 1960. The past decade has witnessed an explosion of research into the causes and consequences of civil wars, belatedly bringing the topic into the economics mainstream. This article critically reviews this interdisciplinary literature and charts productive paths forward. Formal theory…
Building Path Diagrams for Multilevel Models
ERIC Educational Resources Information Center
Curran, Patrick J.; Bauer, Daniel J.
2007-01-01
Multilevel models have come to play an increasingly important role in many areas of social science research. However, in contrast to other modeling strategies, there is currently no widely used approach for graphically diagramming multilevel models. Ideally, such diagrams would serve two functions: to provide a formal structure for deriving the…
Review of localization in geometry
NASA Astrophysics Data System (ADS)
Pestun, Vasily
2017-11-01
Review of localization in geometry: equivariant cohomology, characteristic classes, Atiyah-Bott-Berline-Vergne formula, Atiyah-Singer equivariant index formula, Mathai-Quillen formalism, and application to path integrals. This is a contribution to the review issue ‘Localization techniques in quantum field theories’ (ed Pestun and Zabzine) which contains 17 chapters available at [1].
The anatomy of choice: active inference and agency
Friston, Karl; Schwartenbeck, Philipp; FitzGerald, Thomas; Moutoussis, Michael; Behrens, Timothy; Dolan, Raymond J.
2013-01-01
This paper considers agency in the setting of embodied or active inference. In brief, we associate a sense of agency with prior beliefs about action and ask what sorts of beliefs underlie optimal behavior. In particular, we consider prior beliefs that action minimizes the Kullback–Leibler (KL) divergence between desired states and attainable states in the future. This allows one to formulate bounded rationality as approximate Bayesian inference that optimizes a free energy bound on model evidence. We show that constructs like expected utility, exploration bonuses, softmax choice rules and optimism bias emerge as natural consequences of this formulation. Previous accounts of active inference have focused on predictive coding and Bayesian filtering schemes for minimizing free energy. Here, we consider variational Bayes as an alternative scheme that provides formal constraints on the computational anatomy of inference and action—constraints that are remarkably consistent with neuroanatomy. Furthermore, this scheme contextualizes optimal decision theory and economic (utilitarian) formulations as pure inference problems. For example, expected utility theory emerges as a special case of free energy minimization, where the sensitivity or inverse temperature (of softmax functions and quantal response equilibria) has a unique and Bayes-optimal solution—that minimizes free energy. This sensitivity corresponds to the precision of beliefs about behavior, such that attainable goals are afforded a higher precision or confidence. In turn, this means that optimal behavior entails a representation of confidence about outcomes that are under an agent's control. PMID:24093015
Computational Psychiatry and the Challenge of Schizophrenia.
Krystal, John H; Murray, John D; Chekroud, Adam M; Corlett, Philip R; Yang, Genevieve; Wang, Xiao-Jing; Anticevic, Alan
2017-05-01
Schizophrenia research is plagued by enormous challenges in integrating and analyzing large datasets and difficulties developing formal theories related to the etiology, pathophysiology, and treatment of this disorder. Computational psychiatry provides a path to enhance analyses of these large and complex datasets and to promote the development and refinement of formal models for features of this disorder. This presentation introduces the reader to the notion of computational psychiatry and describes discovery-oriented and theory-driven applications to schizophrenia involving machine learning, reinforcement learning theory, and biophysically-informed neural circuit models. Published by Oxford University Press on behalf of the Maryland Psychiatric Research Center 2017.
Fediai, Artem; Ryndyk, Dmitry A; Cuniberti, Gianaurelio
2016-10-05
Up to now, the electrical properties of the contacts between 3D metals and 2D materials have never been computed at a fully ab initio level due to the huge number of atomic orbitals involved in a current path from an electrode to a pristine 2D material. As a result, there are still numerous open questions and controversial theories on the electrical properties of systems with 3D/2D interfaces-for example, the current path and the contact length scalability. Our work provides a first-principles solution to this long-standing problem with the use of the modular approach, a method which rigorously combines a Green function formalism with the density functional theory (DFT) for this particular contact type. The modular approach is a general approach valid for any 3D/2D contact. As an example, we apply it to the most investigated among 3D/2D contacts-metal/graphene contacts-and show its abilities and consistency by comparison with existing experimental data. As it is applicable to any 3D/2D interface, the modular approach allows the engineering of 3D/2D contacts with the pre-defined electrical properties.
Judging without criteria? Sickness certification in Dutch disability schemes.
Meershoek, Agnes; Krumeich, Anja; Vos, Rein
2007-05-01
The gate-keeping function that physicians perform in determining clients' physical and mental incapacities is widely assumed to be the main reason for the rising numbers of disabled people. The sharp rise in the number of disabled has led many to claim that the disability benefits schemes are untenable. In order to regain public control and to make disabled eligibility procedures more transparent guidelines have been introduced in which medical evaluations are conceptualised as formal rational decisions. It is, however, questionable whether such measures are helpful in achieving their stated aims. This paper is based on ethnographic research on the ways physicians evaluate the eligibility of clients for disability benefits. It argues that assessing incapacity involves much more than formal rational decision-making. Doctors' reasoning is contextual and deliberative in character, and thus their assessment of a client's incapacity is less a technical matter than a normative one. Instead of generating transparency, guidelines based on formal rationality make the complex deliberations on which such judgments are based invisible, because they deny the normative dimension of medical expert decision-making. Therefore, different measures have to be developed that allow this normative dimension to be articulated, since insight into this normative dimension is a necessary pre-condition to be able to criticise disability judgments at all.
A Mutual Authentication Framework for Wireless Medical Sensor Networks.
Srinivas, Jangirala; Mishra, Dheerendra; Mukhopadhyay, Sourav
2017-05-01
Wireless medical sensor networks (WMSN) comprise of distributed sensors, which can sense human physiological signs and monitor the health condition of the patient. It is observed that providing privacy to the patient's data is an important issue and can be challenging. The information passing is done via the public channel in WMSN. Thus, the patient, sensitive information can be obtained by eavesdropping or by unauthorized use of handheld devices which the health professionals use in monitoring the patient. Therefore, there is an essential need of restricting the unauthorized access to the patient's medical information. Hence, the efficient authentication scheme for the healthcare applications is needed to preserve the privacy of the patients' vital signs. To ensure secure and authorized communication in WMSN, we design a symmetric key based authentication protocol for WMSN environment. The proposed protocol uses only computationally efficient operations to achieve lightweight attribute. We analyze the security of the proposed protocol. We use a formal security proof algorithm to show the scheme security against known attacks. We also use the Automated Validation of Internet Security Protocols and Applications (AVISPA) simulator to show protocol secure against man-in-the-middle attack and replay attack. Additionally, we adopt an informal analysis to discuss the key attributes of the proposed scheme. From the formal proof of security, we can see that an attacker has a negligible probability of breaking the protocol security. AVISPA simulator also demonstrates the proposed scheme security against active attacks, namely, man-in-the-middle attack and replay attack. Additionally, through the comparison of computational efficiency and security attributes with several recent results, proposed scheme seems to be battered.
Borghi, Josephine; Maluka, Stephen; Kuwawenaruwa, August; Makawia, Suzan; Tantau, Juma; Mtei, Gemini; Ally, Mariam; Macha, Jane
2013-06-13
The National Health Insurance Fund (NHIF), a compulsory formal sector scheme took over the management of the Community Health Fund (CHF), a voluntary informal sector scheme, in 2009. This study assesses the origins of the reform, its effect on management and reporting structures, financial flow adequacy, reform communication and acceptability to key stakeholders, and initial progress towards universal coverage. The study relied on national data sources and an in-depth collective case study of a rural and an urban district to assess awareness and acceptability of the reform, and fund availability and use relative to need in a sample of facilities. The reform was driven by a national desire to expand coverage and increase access to services. Despite initial delays, the CHF has been embedded within the NHIF organisational structure, bringing more intensive and qualified supervision closer to the district. National CHF membership has more than doubled. However, awareness of the reform was limited below the district level due to the reform's top-down nature. The reform was generally acceptable to key stakeholders, who expected that benefits between schemes would be harmonised.The reform was unable to institute changes to the CHF design or district management structures because it has so far been unable to change CHF legislation which also limits facility capacity to use CHF revenue. Further, revenue generated is currently insufficient to offset treatment and administration costs, and the reform did not improve the revenue to cost ratio. Administrative costs are also likely to have increased as a result of the reform. Informal sector schemes can benefit from merger with formal sector schemes through improved data systems, supervision, and management support. However, effects will be maximised if legal frameworks can be harmonised early on and a reduction in administrative costs is not guaranteed.
Update schemes of multi-velocity floor field cellular automaton for pedestrian dynamics
NASA Astrophysics Data System (ADS)
Luo, Lin; Fu, Zhijian; Cheng, Han; Yang, Lizhong
2018-02-01
Modeling pedestrian movement is an interesting problem both in statistical physics and in computational physics. Update schemes of cellular automaton (CA) models for pedestrian dynamics govern the schedule of pedestrian movement. Usually, different update schemes make the models behave in different ways, which should be carefully recalibrated. Thus, in this paper, we investigated the influence of four different update schemes, namely parallel/synchronous scheme, random scheme, order-sequential scheme and shuffled scheme, on pedestrian dynamics. The multi-velocity floor field cellular automaton (FFCA) considering the changes of pedestrians' moving properties along walking paths and heterogeneity of pedestrians' walking abilities was used. As for parallel scheme only, the collisions detection and resolution should be considered, resulting in a great difference from any other update schemes. For pedestrian evacuation, the evacuation time is enlarged, and the difference in pedestrians' walking abilities is better reflected, under parallel scheme. In face of a bottleneck, for example a exit, using a parallel scheme leads to a longer congestion period and a more dispersive density distribution. The exit flow and the space-time distribution of density and velocity have significant discrepancies under four different update schemes when we simulate pedestrian flow with high desired velocity. Update schemes may have no influence on pedestrians in simulation to create tendency to follow others, but sequential and shuffled update scheme may enhance the effect of pedestrians' familiarity with environments.
Reconciling different equations for proton conduction using the Meyer-Neldel compensation rule
NASA Astrophysics Data System (ADS)
Jones, Alan G.
2014-02-01
Proton conduction in nominally anhydrous minerals is the likely explanation for moderate values of electrical resistivity observed in the lithospheric and sublithospheric mantle. However, results from the various laboratories making the controlled measurements on mantle minerals, predominantly olivine, are not in agreement with one another. Importantly, the groups use different formalisms to fit their experimental data. In this paper, we show that neither of the two formalisms employed by the various laboratories is consistent with the Meyer-Neldel Rule (MNR), or Compensation Law, by which the preexponent term of the Arrhenian equation is linearly related to the activation energy term. We also demonstrate why the formalism of Karato and colleagues can be used at low water contents (100 wt ppm and below), whereas at higher water contents (above 300 wt ppm), the formalism of Yoshino's and Poe's labs needs to be employed. A new MNR self-consistent formalism is presented that is applicable over all water contents. MNR consistency appears to operate for most processes that can be described by an Arrhenius equation, so its adoption through an MNR consistent formalism is highly recommended when fitting experimental observations.
Grasp planning under uncertainty
NASA Technical Reports Server (NTRS)
Erkmen, A. M.; Stephanou, H. E.
1989-01-01
The planning of dexterous grasps for multifingered robot hands operating in uncertain environments is covered. A sensor-based approach to the planning of a reach path prior to grasping is first described. An on-line, joint space finger path planning algorithm for the enclose phase of grasping was then developed. The algorithm minimizes the impact momentum of the hand. It uses a Preshape Jacobian matrix to map task-level hand preshape requirements into kinematic constraints. A master slave scheme avoids inter-finger collisions and reduces the dimensionality of the planning problem.
Yan, Fei; Christmas, William; Kittler, Josef
2008-10-01
In this paper, we propose a multilayered data association scheme with graph-theoretic formulation for tracking multiple objects that undergo switching dynamics in clutter. The proposed scheme takes as input object candidates detected in each frame. At the object candidate level, "tracklets'' are "grown'' from sets of candidates that have high probabilities of containing only true positives. At the tracklet level, a directed and weighted graph is constructed, where each node is a tracklet, and the edge weight between two nodes is defined according to the "compatibility'' of the two tracklets. The association problem is then formulated as an all-pairs shortest path (APSP) problem in this graph. Finally, at the path level, by analyzing the APSPs, all object trajectories are identified, and track initiation and track termination are automatically dealt with. By exploiting a special topological property of the graph, we have also developed a more efficient APSP algorithm than the general-purpose ones. The proposed data association scheme is applied to tennis sequences to track tennis balls. Experiments show that it works well on sequences where other data association methods perform poorly or fail completely.
Cross-layer restoration with software defined networking based on IP over optical transport networks
NASA Astrophysics Data System (ADS)
Yang, Hui; Cheng, Lei; Deng, Junni; Zhao, Yongli; Zhang, Jie; Lee, Young
2015-10-01
The IP over optical transport network is a very promising networking architecture applied to the interconnection of geographically distributed data centers due to the performance guarantee of low delay, huge bandwidth and high reliability at a low cost. It can enable efficient resource utilization and support heterogeneous bandwidth demands in highly-available, cost-effective and energy-effective manner. In case of cross-layer link failure, to ensure a high-level quality of service (QoS) for user request after the failure becomes a research focus. In this paper, we propose a novel cross-layer restoration scheme for data center services with software defined networking based on IP over optical network. The cross-layer restoration scheme can enable joint optimization of IP network and optical network resources, and enhance the data center service restoration responsiveness to the dynamic end-to-end service demands. We quantitatively evaluate the feasibility and performances through the simulation under heavy traffic load scenario in terms of path blocking probability and path restoration latency. Numeric results show that the cross-layer restoration scheme improves the recovery success rate and minimizes the overall recovery time.
Home care in Austria: the interplay of family orientation, cash-for-care and migrant care.
Österle, August; Bauer, Gudrun
2012-05-01
This article discusses the development of the home care sector in Austria. It analyses what impacts the interplay of the traditional family orientation to care, a universal cash-for-care scheme (reaching about 5% of the population) and a growing migrant care sector have on formal home care in Austria. The article is based on an analysis of research papers, policy documents and statistical data covering the period from the introduction of the cash-for-care scheme in 1993 up to 2011. Some authors have argued that generous cash benefits with no direct link to service use - as in the case of Austria - limit the development of home care, particularly in countries with a traditionally strong family orientation towards long-term care. Additionally, a tradition of family care and an emphasis on cash benefits may be conducive to the employment of migrant carers in private households, as a potential substitute for both family care and formal care. Despite this context, Austria has seen a substantial increase in formal home care over the past two decades. This has been driven by clients using their increased purchasing power and by policy priorities emphasising the extension of home care. Migrant care work was regularised in 2007, and the analysis suggests that while migrant care has usually worked as a substitute for other care arrangements, migrant care can also become a more integral element of care schemes. The article concludes that family orientation, unconditional cash benefits and the use of migrant carers do not necessarily preclude the development of a strong social service sector. However, there is a risk that budgetary limitations will primarily affect social service development. © 2011 Blackwell Publishing Ltd.
Reliable multicast protocol specifications flow control and NACK policy
NASA Technical Reports Server (NTRS)
Callahan, John R.; Montgomery, Todd L.; Whetten, Brian
1995-01-01
This appendix presents the flow and congestion control schemes recommended for RMP and a NACK policy based on the whiteboard tool. Because RMP uses a primarily NACK based error detection scheme, there is no direct feedback path through which receivers can signal losses through low buffer space or congestion. Reliable multicast protocols also suffer from the fact that throughput for a multicast group must be divided among the members of the group. This division is usually very dynamic in nature and therefore does not lend itself well to a priori determination. These facts have led the flow and congestion control schemes of RMP to be made completely orthogonal to the protocol specification. This allows several differing schemes to be used in different environments to produce the best results. As a default, a modified sliding window scheme based on previous algorithms are suggested and described below.
Multispectral scanner system parameter study and analysis software system description, volume 2
NASA Technical Reports Server (NTRS)
Landgrebe, D. A. (Principal Investigator); Mobasseri, B. G.; Wiersma, D. J.; Wiswell, E. R.; Mcgillem, C. D.; Anuta, P. E.
1978-01-01
The author has identified the following significant results. The integration of the available methods provided the analyst with the unified scanner analysis package (USAP), the flexibility and versatility of which was superior to many previous integrated techniques. The USAP consisted of three main subsystems; (1) a spatial path, (2) a spectral path, and (3) a set of analytic classification accuracy estimators which evaluated the system performance. The spatial path consisted of satellite and/or aircraft data, data correlation analyzer, scanner IFOV, and random noise model. The output of the spatial path was fed into the analytic classification and accuracy predictor. The spectral path consisted of laboratory and/or field spectral data, EXOSYS data retrieval, optimum spectral function calculation, data transformation, and statistics calculation. The output of the spectral path was fended into the stratified posterior performance estimator.
Formal verification of an oral messages algorithm for interactive consistency
NASA Technical Reports Server (NTRS)
Rushby, John
1992-01-01
The formal specification and verification of an algorithm for Interactive Consistency based on the Oral Messages algorithm for Byzantine Agreement is described. We compare our treatment with that of Bevier and Young, who presented a formal specification and verification for a very similar algorithm. Unlike Bevier and Young, who observed that 'the invariant maintained in the recursive subcases of the algorithm is significantly more complicated than is suggested by the published proof' and who found its formal verification 'a fairly difficult exercise in mechanical theorem proving,' our treatment is very close to the previously published analysis of the algorithm, and our formal specification and verification are straightforward. This example illustrates how delicate choices in the formulation of the problem can have significant impact on the readability of its formal specification and on the tractability of its formal verification.
Interactogeneous: Disease Gene Prioritization Using Heterogeneous Networks and Full Topology Scores
Gonçalves, Joana P.; Francisco, Alexandre P.; Moreau, Yves; Madeira, Sara C.
2012-01-01
Disease gene prioritization aims to suggest potential implications of genes in disease susceptibility. Often accomplished in a guilt-by-association scheme, promising candidates are sorted according to their relatedness to known disease genes. Network-based methods have been successfully exploiting this concept by capturing the interaction of genes or proteins into a score. Nonetheless, most current approaches yield at least some of the following limitations: (1) networks comprise only curated physical interactions leading to poor genome coverage and density, and bias toward a particular source; (2) scores focus on adjacencies (direct links) or the most direct paths (shortest paths) within a constrained neighborhood around the disease genes, ignoring potentially informative indirect paths; (3) global clustering is widely applied to partition the network in an unsupervised manner, attributing little importance to prior knowledge; (4) confidence weights and their contribution to edge differentiation and ranking reliability are often disregarded. We hypothesize that network-based prioritization related to local clustering on graphs and considering full topology of weighted gene association networks integrating heterogeneous sources should overcome the above challenges. We term such a strategy Interactogeneous. We conducted cross-validation tests to assess the impact of network sources, alternative path inclusion and confidence weights on the prioritization of putative genes for 29 diseases. Heat diffusion ranking proved the best prioritization method overall, increasing the gap to neighborhood and shortest paths scores mostly on single source networks. Heterogeneous associations consistently delivered superior performance over single source data across the majority of methods. Results on the contribution of confidence weights were inconclusive. Finally, the best Interactogeneous strategy, heat diffusion ranking and associations from the STRING database, was used to prioritize genes for Parkinson’s disease. This method effectively recovered known genes and uncovered interesting candidates which could be linked to pathogenic mechanisms of the disease. PMID:23185389
Branduardi, Davide; Faraldo-Gómez, José D
2013-09-10
The string method is a molecular-simulation technique that aims to calculate the minimum free-energy path of a chemical reaction or conformational transition, in the space of a pre-defined set of reaction coordinates that is typically highly dimensional. Any descriptor may be used as a reaction coordinate, but arguably the Cartesian coordinates of the atoms involved are the most unprejudiced and intuitive choice. Cartesian coordinates, however, present a non-trivial problem, in that they are not invariant to rigid-body molecular rotations and translations, which ideally ought to be unrestricted in the simulations. To overcome this difficulty, we reformulate the framework of the string method to integrate an on-the-fly structural-alignment algorithm. This approach, referred to as SOMA (String method with Optimal Molecular Alignment), enables the use of Cartesian reaction coordinates in freely tumbling molecular systems. In addition, this scheme permits the dissection of the free-energy change along the most probable path into individual atomic contributions, thus revealing the dominant mechanism of the simulated process. This detailed analysis also provides a physically-meaningful criterion to coarse-grain the representation of the path. To demonstrate the accuracy of the method we analyze the isomerization of the alanine dipeptide in vacuum and the chair-to-inverted-chair transition of β -D mannose in explicit water. Notwithstanding the simplicity of these systems, the SOMA approach reveals novel insights into the atomic mechanism of these isomerizations. In both cases, we find that the dynamics and the energetics of these processes are controlled by interactions involving only a handful of atoms in each molecule. Consistent with this result, we show that a coarse-grained SOMA calculation defined in terms of these subsets of atoms yields nearidentical minimum free-energy paths and committor distributions to those obtained via a highly-dimensional string.
Branduardi, Davide; Faraldo-Gómez, José D.
2014-01-01
The string method is a molecular-simulation technique that aims to calculate the minimum free-energy path of a chemical reaction or conformational transition, in the space of a pre-defined set of reaction coordinates that is typically highly dimensional. Any descriptor may be used as a reaction coordinate, but arguably the Cartesian coordinates of the atoms involved are the most unprejudiced and intuitive choice. Cartesian coordinates, however, present a non-trivial problem, in that they are not invariant to rigid-body molecular rotations and translations, which ideally ought to be unrestricted in the simulations. To overcome this difficulty, we reformulate the framework of the string method to integrate an on-the-fly structural-alignment algorithm. This approach, referred to as SOMA (String method with Optimal Molecular Alignment), enables the use of Cartesian reaction coordinates in freely tumbling molecular systems. In addition, this scheme permits the dissection of the free-energy change along the most probable path into individual atomic contributions, thus revealing the dominant mechanism of the simulated process. This detailed analysis also provides a physically-meaningful criterion to coarse-grain the representation of the path. To demonstrate the accuracy of the method we analyze the isomerization of the alanine dipeptide in vacuum and the chair-to-inverted-chair transition of β-D mannose in explicit water. Notwithstanding the simplicity of these systems, the SOMA approach reveals novel insights into the atomic mechanism of these isomerizations. In both cases, we find that the dynamics and the energetics of these processes are controlled by interactions involving only a handful of atoms in each molecule. Consistent with this result, we show that a coarse-grained SOMA calculation defined in terms of these subsets of atoms yields nearidentical minimum free-energy paths and committor distributions to those obtained via a highly-dimensional string. PMID:24729762
NASA Astrophysics Data System (ADS)
Popescu, Mihaela; Shyy, Wei; Garbey, Marc
2005-12-01
In developing suitable numerical techniques for computational aero-acoustics, the dispersion-relation-preserving (DRP) scheme by Tam and co-workers and the optimized prefactored compact (OPC) scheme by Ashcroft and Zhang have shown desirable properties of reducing both dissipative and dispersive errors. These schemes, originally based on the finite difference, attempt to optimize the coefficients for better resolution of short waves with respect to the computational grid while maintaining pre-determined formal orders of accuracy. In the present study, finite volume formulations of both schemes are presented to better handle the nonlinearity and complex geometry encountered in many engineering applications. Linear and nonlinear wave equations, with and without viscous dissipation, have been adopted as the test problems. Highlighting the principal characteristics of the schemes and utilizing linear and nonlinear wave equations with different wavelengths as the test cases, the performance of these approaches is documented. For the linear wave equation, there is no major difference between the DRP and OPC schemes. For the nonlinear wave equations, the finite volume version of both DRP and OPC schemes offers substantially better solutions in regions of high gradient or discontinuity.
Towards Internet QoS provisioning based on generic distributed QoS adaptive routing engine.
Haikal, Amira Y; Badawy, M; Ali, Hesham A
2014-01-01
Increasing efficiency and quality demands of modern Internet technologies drive today's network engineers to seek to provide quality of service (QoS). Internet QoS provisioning gives rise to several challenging issues. This paper introduces a generic distributed QoS adaptive routing engine (DQARE) architecture based on OSPFxQoS. The innovation of the proposed work in this paper is its undependability on the used QoS architectures and, moreover, splitting of the control strategy from data forwarding mechanisms, so we guarantee a set of absolute stable mechanisms on top of which Internet QoS can be built. DQARE architecture is furnished with three relevant traffic control schemes, namely, service differentiation, QoS routing, and traffic engineering. The main objective of this paper is to (i) provide a general configuration guideline for service differentiation, (ii) formalize the theoretical properties of different QoS routing algorithms and then introduce a QoS routing algorithm (QOPRA) based on dynamic programming technique, and (iii) propose QoS multipath forwarding (QMPF) model for paths diversity exploitation. NS2-based simulations proved the DQARE superiority in terms of delay, packet delivery ratio, throughput, and control overhead. Moreover, extensive simulations are used to compare the proposed QOPRA algorithm and QMPF model with their counterparts in the literature.
Towards Internet QoS Provisioning Based on Generic Distributed QoS Adaptive Routing Engine
Haikal, Amira Y.; Badawy, M.; Ali, Hesham A.
2014-01-01
Increasing efficiency and quality demands of modern Internet technologies drive today's network engineers to seek to provide quality of service (QoS). Internet QoS provisioning gives rise to several challenging issues. This paper introduces a generic distributed QoS adaptive routing engine (DQARE) architecture based on OSPFxQoS. The innovation of the proposed work in this paper is its undependability on the used QoS architectures and, moreover, splitting of the control strategy from data forwarding mechanisms, so we guarantee a set of absolute stable mechanisms on top of which Internet QoS can be built. DQARE architecture is furnished with three relevant traffic control schemes, namely, service differentiation, QoS routing, and traffic engineering. The main objective of this paper is to (i) provide a general configuration guideline for service differentiation, (ii) formalize the theoretical properties of different QoS routing algorithms and then introduce a QoS routing algorithm (QOPRA) based on dynamic programming technique, and (iii) propose QoS multipath forwarding (QMPF) model for paths diversity exploitation. NS2-based simulations proved the DQARE superiority in terms of delay, packet delivery ratio, throughput, and control overhead. Moreover, extensive simulations are used to compare the proposed QOPRA algorithm and QMPF model with their counterparts in the literature. PMID:25309955
NASA Technical Reports Server (NTRS)
Chui, T. C. P.; Shao, M.; Redding, D.; Gursel, Y.; Boden, A.
1995-01-01
We discuss the effect of mirror birefringence in two optical schemes designed to detect the quantum-electrodynamics (QED) predictions of vacuum birefringence under the influence of a strong magnetic field, B. Both schemes make use of a high finesse Fabry-Perot cavity (F-P) to increase the average path length of the light in the magnetic field. The first scheme, which we called the frequency scheme, is based on measurement of the beat frequency of two orthogonal polarized laser beams in the cavity. We show that mirror birefringence contributes to the detection uncertainties in first order, resulting in a high susceptibility to small thermal disturbances. We estimate that an unreasonably high thermal stability of 10-9 K is required to resolve the effect to 0.1%. In the second scheme, which we called the polarization rotation scheme, laser polarized at 45 relative to the B field is injected into the cavity.
A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays
2014-07-18
incentive scheme for Tor relying on two novel concepts. We introduce TorCoin, an “altcoin” that uses the Bitcoin protocol to re- ward relays for...or altcoin, based on the Bitcoin protocol [8]. Unlike Bitcoin , its proof-of-work scheme is based on bandwidth rather than computation. To “mine” a...concepts. We introduce TorCoin, an altcoin" that uses the Bitcoin protocol to re- ward relays for contributing bandwidth. Relays mine" TorCoins, then
Resampling approach for anomalous change detection
NASA Astrophysics Data System (ADS)
Theiler, James; Perkins, Simon
2007-04-01
We investigate the problem of identifying pixels in pairs of co-registered images that correspond to real changes on the ground. Changes that are due to environmental differences (illumination, atmospheric distortion, etc.) or sensor differences (focus, contrast, etc.) will be widespread throughout the image, and the aim is to avoid these changes in favor of changes that occur in only one or a few pixels. Formal outlier detection schemes (such as the one-class support vector machine) can identify rare occurrences, but will be confounded by pixels that are "equally rare" in both images: they may be anomalous, but they are not changes. We describe a resampling scheme we have developed that formally addresses both of these issues, and reduces the problem to a binary classification, a problem for which a large variety of machine learning tools have been developed. In principle, the effects of misregistration will manifest themselves as pervasive changes, and our method will be robust against them - but in practice, misregistration remains a serious issue.
Traditional risk-sharing arrangements and informal social insurance in Eritrea.
Habtom, GebreMichael Kibreab; Ruys, Pieter
2007-01-01
In Eritrea neither the state nor the market is effective in providing health insurance to low-income people (in rural and informal job sector). Schemes intended for the informal sector are confronted with low and irregular incomes of target populations and consequently negligible potential for profit making. Because of this there, are no formal health insurance systems in Eritrea that cover people in the traditional (or informal) sector of the economy. In the absence of formal safety nets traditional Eritrean societies use their local social capital to alleviate unexpected social costs. In Eritrea traditional risk-sharing arrangements are made within extended families and mutual aid community associations. This study reveals that in a situation where the state no longer provides free public health services any more and access to private insurance is denied, the extension of the voluntary mutual aid community associations to Mahber-based health insurance schemes at the local level is a viable way for providing modern health services.
Classifying quantum entanglement through topological links
NASA Astrophysics Data System (ADS)
Quinta, Gonçalo M.; André, Rui
2018-04-01
We propose an alternative classification scheme for quantum entanglement based on topological links. This is done by identifying a nonrigid ring to a particle, attributing the act of cutting and removing a ring to the operation of tracing out the particle, and associating linked rings to entangled particles. This analogy naturally leads us to a classification of multipartite quantum entanglement based on all possible distinct links for a given number of rings. To determine all different possibilities, we develop a formalism that associates any link to a polynomial, with each polynomial thereby defining a distinct equivalence class. To demonstrate the use of this classification scheme, we choose qubit quantum states as our example of physical system. A possible procedure to obtain qubit states from the polynomials is also introduced, providing an example state for each link class. We apply the formalism for the quantum systems of three and four qubits and demonstrate the potential of these tools in a context of qubit networks.
Ohuchi, Hiroko
2007-11-01
A novel method that can greatly improve the dosimetric sensitivity limit of a radiochromic film (RCF) through use of a set of color components, e.g., red and green, outputs from a RGB color scanner has been developed. RCFs are known to have microscopic and macroscopic nonuniformities, which come from the thickness variations in the film's active radiochromic layer and coating. These variations in the response make the optical signal-to-noise ratio lower, resulting in lower film sensitivity. To mitigate the effects of RCF nonuniform response, an optical common-mode rejection (CMR) was developed. The CMR compensates nonuniform response by creating a ratio of the two signals where the factors common to both numerator and denominator cancel out. The CMR scheme was applied to the mathematical operation of creating a ratio using two components, red and green outputs from a scanner. The two light component lights are neighboring wavebands about 100 nm apart and suffer a common fate, with the exception of wavelength-dependent events, having passed together along common attenuation paths. Two types of dose-response curves as a function of delivered dose ranging from 3.7 mGy to 8.1 Gy for 100 kV x-ray beams were obtained with the optical CMR scheme and the conventional analysis method using red component, respectively. In the range of 3.7 mGy to 81 mGy, the optical densities obtained with the optical CMR showed a good consistency among eight measured samples and an improved consistency with a linear fit within 1 standard deviation of each measured optical densities, while those with the conventional analysis exhibited a large discrepancy among eight samples and did not show a consistency with a linear fit.
Crustal interpretation of the MAGSAT data in the continental United States
NASA Technical Reports Server (NTRS)
Won, I. J.; Son, K. H.
1982-01-01
The processing of MAGSAT scalar data to construct a crustal magnetic anomaly map over the continental U.S. involves removal of the reference field model, a path-by-path subtraction of a low order polynomial through a least-squares fit to reduce orbital offset errors, and a two dimensional spectral filtering to mitigate the spectral bias induced by the path-by-path orbital correction scheme. The resultant anomaly map shows reasonably good correlations with an aeromagnetic map derived from the project MAGNET. Prominent satellite magnetic anomalies are identified in terms of geological provinces and age boundaries. An inversion method was applied to MAGSAT data which produces both the Curie depth topography and laterally varying magnetic susceptibility of the crust. A contoured Curie depth map thus derived shows general agreements with a crustal thickness map based on seismic data.
Input-output-controlled nonlinear equation solvers
NASA Technical Reports Server (NTRS)
Padovan, Joseph
1988-01-01
To upgrade the efficiency and stability of the successive substitution (SS) and Newton-Raphson (NR) schemes, the concept of input-output-controlled solvers (IOCS) is introduced. By employing the formal properties of the constrained version of the SS and NR schemes, the IOCS algorithm can handle indefiniteness of the system Jacobian, can maintain iterate monotonicity, and provide for separate control of load incrementation and iterate excursions, as well as having other features. To illustrate the algorithmic properties, the results for several benchmark examples are presented. These define the associated numerical efficiency and stability of the IOCS.
Hierarchical Parallelism in Finite Difference Analysis of Heat Conduction
NASA Technical Reports Server (NTRS)
Padovan, Joseph; Krishna, Lala; Gute, Douglas
1997-01-01
Based on the concept of hierarchical parallelism, this research effort resulted in highly efficient parallel solution strategies for very large scale heat conduction problems. Overall, the method of hierarchical parallelism involves the partitioning of thermal models into several substructured levels wherein an optimal balance into various associated bandwidths is achieved. The details are described in this report. Overall, the report is organized into two parts. Part 1 describes the parallel modelling methodology and associated multilevel direct, iterative and mixed solution schemes. Part 2 establishes both the formal and computational properties of the scheme.
NASA Astrophysics Data System (ADS)
Fukushima, Kimichika; Sato, Hikaru
2018-04-01
Ultraviolet self-interaction energies in field theory sometimes contain meaningful physical quantities. The self-energies in such as classical electrodynamics are usually subtracted from the rest mass. For the consistent treatment of energies as sources of curvature in the Einstein field equations, this study includes these subtracted self-energies into vacuum energy expressed by the constant Lambda (used in such as Lambda-CDM). In this study, the self-energies in electrodynamics and macroscopic classical Einstein field equations are examined, using the formalisms with the ultraviolet cut-off scheme. One of the cut-off formalisms is the field theory in terms of the step-function-type basis functions, developed by the present authors. The other is a continuum theory of a fundamental particle with the same cut-off length. Based on the effectiveness of the continuum theory with the cut-off length shown in the examination, the dominant self-energy is the quadratic term of the Higgs field at a quantum level (classical self-energies are reduced to logarithmic forms by quantum corrections). The cut-off length is then determined to reproduce today's tiny value of Lambda for vacuum energy. Additionally, a field with nonperiodic vanishing boundary conditions is treated, showing that the field has no zero-point energy.
A study of the response of nonlinear springs
NASA Technical Reports Server (NTRS)
Hyer, M. W.; Knott, T. W.; Johnson, E. R.
1991-01-01
The various phases to developing a methodology for studying the response of a spring-reinforced arch subjected to a point load are discussed. The arch is simply supported at its ends with both the spring and the point load assumed to be at midspan. The spring is present to off-set the typical snap through behavior normally associated with arches, and to provide a structure that responds with constant resistance over a finite displacement. The various phases discussed consist of the following: (1) development of the closed-form solution for the shallow arch case; (2) development of a finite difference analysis to study (shallow) arches; and (3) development of a finite element analysis for studying more general shallow and nonshallow arches. The two numerical analyses rely on a continuation scheme to move the solution past limit points, and to move onto bifurcated paths, both characteristics being common to the arch problem. An eigenvalue method is used for a continuation scheme. The finite difference analysis is based on a mixed formulation (force and displacement variables) of the governing equations. The governing equations for the mixed formulation are in first order form, making the finite difference implementation convenient. However, the mixed formulation is not well-suited for the eigenvalue continuation scheme. This provided the motivation for the displacement based finite element analysis. Both the finite difference and the finite element analyses are compared with the closed form shallow arch solution. Agreement is excellent, except for the potential problems with the finite difference analysis and the continuation scheme. Agreement between the finite element analysis and another investigator's numerical analysis for deep arches is also good.
NASA Astrophysics Data System (ADS)
Arrowsmith, Stephen J.; Marcillo, Omar; Drob, Douglas P.
2013-10-01
We present a methodology for infrasonic remote sensing of winds in the stratosphere that does not require discrete ground-truth events. Our method uses measured time delays between arrays of sensors to provide group velocities (referred to here as celerities) and then minimizes the difference between observed and predicted celerities by perturbing an initial atmospheric specification. Because we focus on interarray propagation effects, it is not necessary to simulate the full propagation path from source to receiver. This feature allows us to use a relatively simple forward model that is applicable over short-regional distances. By focusing on stratospheric returns, we show that our non-linear inversion scheme converges much better if the starting model contains a strong stratospheric duct. Using the Horizontal Wind Model (HWM)/Mass Spectrometer Incoherent Scatter (MSISE) empirical climatology as a starting model, we demonstrate that the inversion scheme is robust to large uncertainties in backazimuth, but that uncertainties in the measured trace velocity and celerity require the use of prior constraints to ensure suitable convergence. The inversion of synthetic data, using realistic estimates of measurement error, shows that our scheme will nevertheless improve upon a starting model under most scenarios. The inversion scheme is applied to infrasound data recorded from a large event on 2010 December 25, which is presumed to be a bolide, using data from a nine-element infrasound network in Utah. We show that our recorded data require a stronger zonal wind speed in the stratosphere than is present in the HWM profile, and are more consistent with the Ground-to-Space (G2S) profile.
Computing the optimal path in stochastic dynamical systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bauver, Martha; Forgoston, Eric, E-mail: eric.forgoston@montclair.edu; Billings, Lora
2016-08-15
In stochastic systems, one is often interested in finding the optimal path that maximizes the probability of escape from a metastable state or of switching between metastable states. Even for simple systems, it may be impossible to find an analytic form of the optimal path, and in high-dimensional systems, this is almost always the case. In this article, we formulate a constructive methodology that is used to compute the optimal path numerically. The method utilizes finite-time Lyapunov exponents, statistical selection criteria, and a Newton-based iterative minimizing scheme. The method is applied to four examples. The first example is a two-dimensionalmore » system that describes a single population with internal noise. This model has an analytical solution for the optimal path. The numerical solution found using our computational method agrees well with the analytical result. The second example is a more complicated four-dimensional system where our numerical method must be used to find the optimal path. The third example, although a seemingly simple two-dimensional system, demonstrates the success of our method in finding the optimal path where other numerical methods are known to fail. In the fourth example, the optimal path lies in six-dimensional space and demonstrates the power of our method in computing paths in higher-dimensional spaces.« less
Acoustic velocity meter systems
Laenen, Antonius
1985-01-01
Acoustic velocity meter (AVM) systems operate on the principles that the point-to-point upstream traveltime of an acoustic pulse is longer than the downstream traveltime and that this difference in traveltime can be accurately measured by electronic devices. An AVM system is capable of recording water velocity (and discharge) under a wide range of conditions, but some constraints apply: 1. Accuracy is reduced and performance is degraded if the acoustic path is not a continuous straight line. The path can be bent by reflection if it is too close to a stream boundary or by refraction if it passes through density gradients resulting from variations in either water temperature or salinity. For paths of less than 100 m, a temperature gradient of 0.1' per meter causes signal bending less than 0.6 meter at midchannel, and satisfactory velocity results can be obtained. Reflection from stream boundaries can cause signal cancellation if boundaries are too close to signal path. 2. Signal strength is attenuated by particles or bubbles that absorb, spread, or scatter sound. The concentration of particles or bubbles that can be tolerated is a function of the path length and frequency of the acoustic signal. 3. Changes in streamline orientation can affect system accuracy if the variability is random. 4. Errors relating to signal resolution are much larger for a single threshold detection scheme than for multiple threshold schemes. This report provides methods for computing the effect of various conditions on the accuracy of a record obtained from an AVM. The equipment must be adapted to the site. Field reconnaissance and preinstallation analysis to detect possible problems are critical for proper installation and operation of an AVM system.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Marsalek, Ondrej; Markland, Thomas E., E-mail: tmarkland@stanford.edu
Path integral molecular dynamics simulations, combined with an ab initio evaluation of interactions using electronic structure theory, incorporate the quantum mechanical nature of both the electrons and nuclei, which are essential to accurately describe systems containing light nuclei. However, path integral simulations have traditionally required a computational cost around two orders of magnitude greater than treating the nuclei classically, making them prohibitively costly for most applications. Here we show that the cost of path integral simulations can be dramatically reduced by extending our ring polymer contraction approach to ab initio molecular dynamics simulations. By using density functional tight binding asmore » a reference system, we show that our ring polymer contraction scheme gives rapid and systematic convergence to the full path integral density functional theory result. We demonstrate the efficiency of this approach in ab initio simulations of liquid water and the reactive protonated and deprotonated water dimer systems. We find that the vast majority of the nuclear quantum effects are accurately captured using contraction to just the ring polymer centroid, which requires the same number of density functional theory calculations as a classical simulation. Combined with a multiple time step scheme using the same reference system, which allows the time step to be increased, this approach is as fast as a typical classical ab initio molecular dynamics simulation and 35× faster than a full path integral calculation, while still exactly including the quantum sampling of nuclei. This development thus offers a route to routinely include nuclear quantum effects in ab initio molecular dynamics simulations at negligible computational cost.« less
Effective bandwidth guaranteed routing schemes for MPLS traffic engineering
NASA Astrophysics Data System (ADS)
Wang, Bin; Jain, Nidhi
2001-07-01
In this work, we present online algorithms for dynamic routing bandwidth guaranteed label switched paths (LSPs) where LSP set-up requests (in terms of a pair of ingress and egress routers as well as its bandwidth requirement) arrive one by one and there is no a priori knowledge regarding future LSP set-up requests. In addition, we consider rerouting of LSPs in this work. Rerouting of LSPs has not been well studied in previous work on LSP routing. The need of LSP rerouting arises in a number of ways: occurrence of faults (link and/or node failures), re-optimization of existing LSPs' routes to accommodate traffic fluctuation, requests with higher priorities, and so on. We formulate the bandwidth guaranteed LSP routing with rerouting capability as a multi-commodity flow problem. The solution to this problem is used as the benchmark for comparing other computationally less costly algorithms studied in this paper. Furthermore, to more efficiently utilize the network resources, we propose online routing algorithms which route bandwidth demands over multiple paths at the ingress router to satisfy the customer requests while providing better service survivability. Traffic splitting and distribution over the multiple paths are carefully handled using table-based hashing schemes while the order of packets within a flow is preserved. Preliminary simulations are conducted to show the performance of different design choices and the effectiveness of the rerouting and multi-path routing algorithms in terms of LSP set-up request rejection probability and bandwidth blocking probability.
Security enhanced multi-factor biometric authentication scheme using bio-hash function.
Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho
2017-01-01
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.
Variable-spot ion beam figuring
NASA Astrophysics Data System (ADS)
Wu, Lixiang; Qiu, Keqiang; Fu, Shaojun
2016-03-01
This paper introduces a new scheme of ion beam figuring (IBF), or rather variable-spot IBF, which is conducted at a constant scanning velocity with variable-spot ion beam collimated by a variable diaphragm. It aims at improving the reachability and adaptation of the figuring process within the limits of machine dynamics by varying the ion beam spot size instead of the scanning velocity. In contrast to the dwell time algorithm in the conventional IBF, the variable-spot IBF adopts a new algorithm, which consists of the scan path programming and the trajectory optimization using pattern search. In this algorithm, instead of the dwell time, a new concept, integral etching time, is proposed to interpret the process of variable-spot IBF. We conducted simulations to verify its feasibility and practicality. The simulation results indicate the variable-spot IBF is a promising alternative to the conventional approach.
Finite BRST-BFV transformations for dynamical systems with second-class constraints
NASA Astrophysics Data System (ADS)
Batalin, Igor A.; Lavrov, Peter M.; Tyutin, Igor V.
2015-06-01
We study finite field-dependent BRST-BFV transformations for dynamical systems with first- and second-class constraints within the generalized Hamiltonian formalism. We find explicitly their Jacobians and the form of a solution to the compensation equation necessary for generating an arbitrary finite change of gauge-fixing functionals in the path integral.
ERIC Educational Resources Information Center
Kelly, Hope
2014-01-01
Open educational resources (OER) are making their way into a variety of educational contexts from formal lesson planning to just in time learning. Educators and training professionals have been recognized as an important audience for these materials. The concepts of "self-efficacy" and "outcome judgment" from social cognitive…
ERIC Educational Resources Information Center
Kelleher, John
2013-01-01
This article describes John Kelleher's experience in observing the creations of his preschool daughter. Both he and his wife are formally trained in the arts, and looked forward to guiding their daughter down an artistic path. In his mind, what makes a great artist usually involves a great deal of technical ability and commitment to a complex…
Making Light Rays Visible in 3-D
ERIC Educational Resources Information Center
Logiurato, F.; Gratton, L. M.; Oss, S.
2007-01-01
Students become deeply involved in physics classes when spectacular demonstrations take over from abstract and formal presentations. In this paper we propose a simple experimental setup in which the wave behavior of light can be made spectacularly evident along the whole path of the light beam in a practically unlimited number of configurations.…
The Career Paths of Doctoral Graduates in Austria
ERIC Educational Resources Information Center
Schwabe, Markus
2011-01-01
Economists and policy makers often emphasise the importance of human capital as a key determinant in the pursuit of economic growth. The highest formal qualification in the educational system is the doctorate, which is attained after the first stage of tertiary education at ISCED 6 level. Doctorate holders play a central role in research and…
Relevancy in Problem Solving: A Computational Framework
ERIC Educational Resources Information Center
Kwisthout, Johan
2012-01-01
When computer scientists discuss the computational complexity of, for example, finding the shortest path from building A to building B in some town or city, their starting point typically is a formal description of the problem at hand, e.g., a graph with weights on every edge where buildings correspond to vertices, routes between buildings to…
Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.
Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen
2018-04-28
Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.
A New Measure of Text Formality: An Analysis of Discourse of Mao Zedong
ERIC Educational Resources Information Center
Li, Haiying; Graesser, Arthur C.; Conley, Mark; Cai, Zhiqiang; Pavlik, Philip I., Jr.; Pennebaker, James W.
2016-01-01
Formality has long been of interest in the study of discourse, with periodic discussions of the best measure of formality and the relationship between formality and text categories. In this research, we explored what features predict formality as humans perceive the construct. We categorized a corpus consisting of 1,158 discourse samples published…
Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Kumar, Neeraj
2015-11-01
In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System, where the patient and medical server exchange medical information using Internet. We have found that most of the schemes are not usable for practical applications due to known security weaknesses. It is also worth to note that unrestricted number of patients login to the single medical server across the globe. Therefore, the computation and maintenance overhead would be high and the server may fail to provide services. In this article, we have designed a medical system architecture and a standard mutual authentication scheme for single medical server, where the patient can securely exchange medical data with the doctor(s) via trusted central medical server over any insecure network. We then explored the security of the scheme with its resilience to attacks. Moreover, we formally validated the proposed scheme through the simulation using Automated Validation of Internet Security Schemes and Applications software whose outcomes confirm that the scheme is protected against active and passive attacks. The performance comparison demonstrated that the proposed scheme has lower communication cost than the existing schemes in literature. In addition, the computation cost of the proposed scheme is nearly equal to the exiting schemes. The proposed scheme not only efficient in terms of different security attacks, but it also provides an efficient login, mutual authentication, session key agreement and verification and password update phases along with password recovery.
Physical angular momentum separation for QED
NASA Astrophysics Data System (ADS)
Sun, Weimin
2017-04-01
We study the non-uniqueness problem of the gauge-invariant angular momentum separation for the case of QED, which stems from the recent controversy concerning the proper definitions of the orbital angular momentum and spin operator of the individual parts of a gauge field system. For the free quantum electrodynamics without matter, we show that the basic requirement of Euclidean symmetry selects a unique physical angular momentum separation scheme from the multitude of the possible angular momentum separation schemes constructed using the various gauge-invariant extensions (GIEs). Based on these results, we propose a set of natural angular momentum separation schemes for the case of interacting QED by invoking the formalism of asymptotic fields. Some perspectives on such a problem for the case of QCD are briefly discussed.
NASA Astrophysics Data System (ADS)
Chen, Zuojing; Polizzi, Eric
2010-11-01
Effective modeling and numerical spectral-based propagation schemes are proposed for addressing the challenges in time-dependent quantum simulations of systems ranging from atoms, molecules, and nanostructures to emerging nanoelectronic devices. While time-dependent Hamiltonian problems can be formally solved by propagating the solutions along tiny simulation time steps, a direct numerical treatment is often considered too computationally demanding. In this paper, however, we propose to go beyond these limitations by introducing high-performance numerical propagation schemes to compute the solution of the time-ordered evolution operator. In addition to the direct Hamiltonian diagonalizations that can be efficiently performed using the new eigenvalue solver FEAST, we have designed a Gaussian propagation scheme and a basis-transformed propagation scheme (BTPS) which allow to reduce considerably the simulation times needed by time intervals. It is outlined that BTPS offers the best computational efficiency allowing new perspectives in time-dependent simulations. Finally, these numerical schemes are applied to study the ac response of a (5,5) carbon nanotube within a three-dimensional real-space mesh framework.
Symbiotic Navigation in Multi-Robot Systems with Remote Obstacle Knowledge Sharing
Ravankar, Abhijeet; Ravankar, Ankit A.; Kobayashi, Yukinori; Emaru, Takanori
2017-01-01
Large scale operational areas often require multiple service robots for coverage and task parallelism. In such scenarios, each robot keeps its individual map of the environment and serves specific areas of the map at different times. We propose a knowledge sharing mechanism for multiple robots in which one robot can inform other robots about the changes in map, like path blockage, or new static obstacles, encountered at specific areas of the map. This symbiotic information sharing allows the robots to update remote areas of the map without having to explicitly navigate those areas, and plan efficient paths. A node representation of paths is presented for seamless sharing of blocked path information. The transience of obstacles is modeled to track obstacles which might have been removed. A lazy information update scheme is presented in which only relevant information affecting the current task is updated for efficiency. The advantages of the proposed method for path planning are discussed against traditional method with experimental results in both simulation and real environments. PMID:28678193
NASA Astrophysics Data System (ADS)
Li, Xiaohui; Sun, Zhenping; Cao, Dongpu; Liu, Daxue; He, Hangen
2017-03-01
This study proposes a novel integrated local trajectory planning and tracking control (ILTPTC) framework for autonomous vehicles driving along a reference path with obstacles avoidance. For this ILTPTC framework, an efficient state-space sampling-based trajectory planning scheme is employed to smoothly follow the reference path. A model-based predictive path generation algorithm is applied to produce a set of smooth and kinematically-feasible paths connecting the initial state with the sampling terminal states. A velocity control law is then designed to assign a speed value at each of the points along the generated paths. An objective function considering both safety and comfort performance is carefully formulated for assessing the generated trajectories and selecting the optimal one. For accurately tracking the optimal trajectory while overcoming external disturbances and model uncertainties, a combined feedforward and feedback controller is developed. Both simulation analyses and vehicle testing are performed to verify the effectiveness of the proposed ILTPTC framework, and future research is also briefly discussed.
Efficient path-based computations on pedigree graphs with compact encodings
2012-01-01
A pedigree is a diagram of family relationships, and it is often used to determine the mode of inheritance (dominant, recessive, etc.) of genetic diseases. Along with rapidly growing knowledge of genetics and accumulation of genealogy information, pedigree data is becoming increasingly important. In large pedigree graphs, path-based methods for efficiently computing genealogical measurements, such as inbreeding and kinship coefficients of individuals, depend on efficient identification and processing of paths. In this paper, we propose a new compact path encoding scheme on large pedigrees, accompanied by an efficient algorithm for identifying paths. We demonstrate the utilization of our proposed method by applying it to the inbreeding coefficient computation. We present time and space complexity analysis, and also manifest the efficiency of our method for evaluating inbreeding coefficients as compared to previous methods by experimental results using pedigree graphs with real and synthetic data. Both theoretical and experimental results demonstrate that our method is more scalable and efficient than previous methods in terms of time and space requirements. PMID:22536898
Efficient computation of kinship and identity coefficients on large pedigrees.
Cheng, En; Elliott, Brendan; Ozsoyoglu, Z Meral
2009-06-01
With the rapidly expanding field of medical genetics and genetic counseling, genealogy information is becoming increasingly abundant. An important computation on pedigree data is the calculation of identity coefficients, which provide a complete description of the degree of relatedness of a pair of individuals. The areas of application of identity coefficients are numerous and diverse, from genetic counseling to disease tracking, and thus, the computation of identity coefficients merits special attention. However, the computation of identity coefficients is not done directly, but rather as the final step after computing a set of generalized kinship coefficients. In this paper, we first propose a novel Path-Counting Formula for calculating generalized kinship coefficients, which is motivated by Wright's path-counting method for computing inbreeding coefficient. We then present an efficient and scalable scheme for calculating generalized kinship coefficients on large pedigrees using NodeCodes, a special encoding scheme for expediting the evaluation of queries on pedigree graph structures. Furthermore, we propose an improved scheme using Family NodeCodes for the computation of generalized kinship coefficients, which is motivated by the significant improvement of using Family NodeCodes for inbreeding coefficient over the use of NodeCodes. We also perform experiments for evaluating the efficiency of our method, and compare it with the performance of the traditional recursive algorithm for three individuals. Experimental results demonstrate that the resulting scheme is more scalable and efficient than the traditional recursive methods for computing generalized kinship coefficients.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ovchinnikov, Mikhail; Ackerman, Andrew; Avramov, Alex
Large-eddy simulations of mixed-phase Arctic clouds by 11 different models are analyzed with the goal of improving understanding and model representation of processes controlling the evolution of these clouds. In a case based on observations from the Indirect and Semi-Direct Aerosol Campaign (ISDAC), it is found that ice number concentration, Ni, exerts significant influence on the cloud structure. Increasing Ni leads to a substantial reduction in liquid water path (LWP) and potential cloud dissipation, in agreement with earlier studies. By comparing simulations with the same microphysics coupled to different dynamical cores as well as the same dynamics coupled to differentmore » microphysics schemes, it is found that the ice water path (IWP) is mainly controlled by ice microphysics, while the inter-model differences in LWP are largely driven by physics and numerics of the dynamical cores. In contrast to previous intercomparisons, all models here use the same ice particle properties (i.e., mass-size, mass-fall speed, and mass-capacitance relationships) and a common radiation parameterization. The constrained setup exposes the importance of ice particle size distributions (PSD) in influencing cloud evolution. A clear separation in LWP and IWP predicted by models with bin and bulk microphysical treatments is documented and attributed primarily to the assumed shape of ice PSD used in bulk schemes. Compared to the bin schemes that explicitly predict the PSD, schemes assuming exponential ice PSD underestimate ice growth by vapor deposition and overestimate mass-weighted fall speed leading to an underprediction of IWP by a factor of two in the considered case.« less
Sensitivity of CAM5-simulated Arctic clouds and radiation to ice nucleation parameterization
Xie, Shaocheng; Liu, Xiaohong; Zhao, Chuanfeng; ...
2013-08-06
Sensitivity of Arctic clouds and radiation in the Community Atmospheric Model, version 5, to the ice nucleation process is examined by testing a new physically based ice nucleation scheme that links the variation of ice nuclei (IN) number concentration to aerosol properties. The default scheme parameterizes the IN concentration simply as a function of ice supersaturation. The new scheme leads to a significant reduction in simulated IN concentration at all latitudes while changes in cloud amounts and properties are mainly seen at high- and midlatitude storm tracks. In the Arctic, there is a considerable increase in midlevel clouds and amore » decrease in low-level clouds, which result from the complex interaction among the cloud macrophysics, microphysics, and large-scale environment. The smaller IN concentrations result in an increase in liquid water path and a decrease in ice water path caused by the slowdown of the Bergeron–Findeisen process in mixed-phase clouds. Overall, there is an increase in the optical depth of Arctic clouds, which leads to a stronger cloud radiative forcing (net cooling) at the top of the atmosphere. The comparison with satellite data shows that the new scheme slightly improves low-level cloud simulations over most of the Arctic but produces too many midlevel clouds. Considerable improvements are seen in the simulated low-level clouds and their properties when compared with Arctic ground-based measurements. As a result, issues with the observations and the model–observation comparison in the Arctic region are discussed.« less
Accuracy of acoustic velocity metering systems for measurement of low velocity in open channels
Laenen, Antonius; Curtis, R. E.
1989-01-01
Acoustic velocity meter (AVM) accuracy depends on equipment limitations, the accuracy of acoustic-path length and angle determination, and the stability of the mean velocity to acoustic-path velocity relation. Equipment limitations depend on path length and angle, transducer frequency, timing oscillator frequency, and signal-detection scheme. Typically, the velocity error from this source is about +or-1 to +or-10 mms/sec. Error in acoustic-path angle or length will result in a proportional measurement bias. Typically, an angle error of one degree will result in a velocity error of 2%, and a path-length error of one meter in 100 meter will result in an error of 1%. Ray bending (signal refraction) depends on path length and density gradients present in the stream. Any deviation from a straight acoustic path between transducer will change the unique relation between path velocity and mean velocity. These deviations will then introduce error in the mean velocity computation. Typically, for a 200-meter path length, the resultant error is less than one percent, but for a 1,000 meter path length, the error can be greater than 10%. Recent laboratory and field tests have substantiated assumptions of equipment limitations. Tow-tank tests of an AVM system with a 4.69-meter path length yielded an average standard deviation error of 9.3 mms/sec, and the field tests of an AVM system with a 20.5-meter path length yielded an average standard deviation error of a 4 mms/sec. (USGS)
Path description of coordinate-space amplitudes
NASA Astrophysics Data System (ADS)
Erdoǧan, Ozan; Sterman, George
2017-06-01
We develop a coordinate version of light-cone-ordered perturbation theory, for general time-ordered products of fields, by carrying out integrals over one light-cone coordinate for each interaction vertex. The resulting expressions depend on the lengths of paths, measured in the same light-cone coordinate. Each path is associated with a denominator equal to a "light-cone deficit," analogous to the "energy deficits" of momentum-space time- or light-cone-ordered perturbation theory. In effect, the role played by intermediate states in momentum space is played by paths between external fields in coordinate space. We derive a class of identities satisfied by coordinate diagrams, from which their imaginary parts can be derived. Using scalar QED as an example, we show how the eikonal approximation arises naturally when the external points in a Green function approach the light cone, and we give applications to products of Wilson lines. Although much of our discussion is directed at massless fields in four dimensions, we extend the formalism to massive fields and dimensional regularization.
Formal Solutions for Polarized Radiative Transfer. I. The DELO Family
DOE Office of Scientific and Technical Information (OSTI.GOV)
Janett, Gioele; Carlin, Edgar S.; Steiner, Oskar
The discussion regarding the numerical integration of the polarized radiative transfer equation is still open and the comparison between the different numerical schemes proposed by different authors in the past is not fully clear. Aiming at facilitating the comprehension of the advantages and drawbacks of the different formal solvers, this work presents a reference paradigm for their characterization based on the concepts of order of accuracy , stability , and computational cost . Special attention is paid to understand the numerical methods belonging to the Diagonal Element Lambda Operator family, in an attempt to highlight their specificities.
Safety programmes in the Egyptian construction industry.
Hassanein, Amr A G; Hanna, Ragaa S
2007-12-01
This study is aimed at exploring the nature of the safety programmes applied by large-size contractors operating in Egypt. Results revealed that safety programmes applied by those contractors were less formal than the programmes applied by their American counterparts. Only three contractors out of the surveyed sample had accident records broken down by projects, provided workers with formal safety orientation, and trained safety personnel on first-aid. The study recommended that reforms to the scheme of the employers' contribution to social insurance are necessary. This is meant to serve as a strong incentive for safety management.
NASA Astrophysics Data System (ADS)
Kapania, Nitin R.; Gerdes, J. Christian
2015-12-01
This paper presents a feedback-feedforward steering controller that simultaneously maintains vehicle stability at the limits of handling while minimising lateral path tracking deviation. The design begins by considering the performance of a baseline controller with a lookahead feedback scheme and a feedforward algorithm based on a nonlinear vehicle handling diagram. While this initial design exhibits desirable stability properties at the limits of handling, the steady-state path deviation increases significantly at highway speeds. Results from both linear and nonlinear analyses indicate that lateral path tracking deviations are minimised when vehicle sideslip is held tangent to the desired path at all times. Analytical results show that directly incorporating this sideslip tangency condition into the steering feedback dramatically improves lateral path tracking, but at the expense of poor closed-loop stability margins. However, incorporating the desired sideslip behaviour into the feedforward loop creates a robust steering controller capable of accurate path tracking and oversteer correction at the physical limits of tyre friction. Experimental data collected from an Audi TTS test vehicle driving at the handling limits on a full length race circuit demonstrates the improved performance of the final controller design.
Exact stochastic unraveling of an optical coherence dynamics by cumulant expansion
NASA Astrophysics Data System (ADS)
Olšina, Jan; Kramer, Tobias; Kreisbeck, Christoph; Mančal, Tomáš
2014-10-01
A numerically exact Monte Carlo scheme for calculation of open quantum system dynamics is proposed and implemented. The method consists of a Monte Carlo summation of a perturbation expansion in terms of trajectories in Liouville phase-space with respect to the coupling between the excited states of the molecule. The trajectories are weighted by a complex decoherence factor based on the second-order cumulant expansion of the environmental evolution. The method can be used with an arbitrary environment characterized by a general correlation function and arbitrary coupling strength. It is formally exact for harmonic environments, and it can be used with arbitrary temperature. Time evolution of an optically excited Frenkel exciton dimer representing a molecular exciton interacting with a charge transfer state is calculated by the proposed method. We calculate the evolution of the optical coherence elements of the density matrix and linear absorption spectrum, and compare them with the predictions of standard simulation methods.
NASA Astrophysics Data System (ADS)
Ben Achour, Jibril; Brahma, Suddhasattwa
2018-06-01
When applying the techniques of loop quantum gravity (LQG) to symmetry-reduced gravitational systems, one first regularizes the scalar constraint using holonomy corrections, prior to quantization. In inhomogeneous system, where a residual spatial diffeomorphism symmetry survives, such modification of the gauge generator generating time reparametrization can potentially lead to deformations or anomalies in the modified algebra of first-class constraints. When working with self-dual variables, it has already been shown that, for spherically symmetric geometry coupled to a scalar field, the holonomy-modified constraints do not generate any modifications to general covariance, as one faces in the real variables formulation, and can thus accommodate local degrees of freedom in such inhomogeneous models. In this paper, we extend this result to Gowdy cosmologies in the self-dual Ashtekar formulation. Furthermore, we show that the introduction of a μ ¯-scheme in midisuperspace models, as is required in the "improved dynamics" of LQG, is possible in the self-dual formalism while being out of reach in the current effective models using real-valued Ashtekar-Barbero variables. Our results indicate the advantages of using the self-dual variables to obtain a covariant loop regularization prior to quantization in inhomogeneous symmetry-reduced polymer models, additionally implementing the crucial μ ¯-scheme, and thus a consistent semiclassical limit.
[Upon scientific accuracy scheme at clinical specialties].
Ortega Calvo, M
2006-11-01
Will be medical specialties like sciences in the future? Yes, progressively they will. Accuracy in clinical specialties will be dissimilar in the future because formal-logic mathematics, quantum physics advances and relativity theory utilities. Evidence based medicine is now helping to clinical specialties on scientific accuracy by the way of decision theory.
Nearly deterministic quantum Fredkin gate based on weak cross-Kerr nonlinearity
NASA Astrophysics Data System (ADS)
Wu, Yun-xiang; Zhu, Chang-hua; Pei, Chang-xing
2016-09-01
A scheme of an optical quantum Fredkin gate is presented based on weak cross-Kerr nonlinearity. By an auxiliary coherent state with the cross-Kerr nonlinearity effect, photons can interact with each other indirectly, and a non-demolition measurement for photons can be implemented. Combined with the homodyne detection, classical feedforward, polarization beam splitters and Pauli-X operations, a controlled-path gate is constructed. Furthermore, a quantum Fredkin gate is built based on the controlled-path gate. The proposed Fredkin gate is simple in structure and feasible by current experimental technology.
NASA Technical Reports Server (NTRS)
Zuraski, G. D.
1972-01-01
The functions of a laser rangefinder on board an autonomous Martian roving vehicle are discussed. The functions are: (1) navigation by means of a passive satellite and (2) mid-range path selection and obstacle avoidance. The feasibility of using a laser to make the necessary range measurements is explored and a preliminary design is presented. The two uses of the rangefinder dictate widely different operating parameters making it impossible to use the same system for both functions.
Cubature on Wiener Space: Pathwise Convergence
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bayer, Christian, E-mail: christian.bayer@wias-berlin.de; Friz, Peter K., E-mail: friz@math.tu-berlin.de
2013-04-15
Cubature on Wiener space (Lyons and Victoir in Proc. R. Soc. Lond. A 460(2041):169-198, 2004) provides a powerful alternative to Monte Carlo simulation for the integration of certain functionals on Wiener space. More specifically, and in the language of mathematical finance, cubature allows for fast computation of European option prices in generic diffusion models.We give a random walk interpretation of cubature and similar (e.g. the Ninomiya-Victoir) weak approximation schemes. By using rough path analysis, we are able to establish weak convergence for general path-dependent option prices.
2015-11-11
reliable data message delivery. The basic mechanism of link-based routing schemes is the broadcasting of a control message (called a “ hello ”) to all of its...short- est path route to a destination by using the set of ex- changed hello messages between users of the network. With sufficiently high frequency... hello messages are suc- cessfully exchanged across a high error link, and since this link is of longer distance, it gets used to build a shortest path
2015-09-07
reliable data message delivery. The basic mechanism of link-based routing schemes is the broadcasting of a control message (called a “ hello ”) to all of its...short- est path route to a destination by using the set of ex- changed hello messages between users of the network. With sufficiently high frequency... hello messages are suc- cessfully exchanged across a high error link, and since this link is of longer distance, it gets used to build a shortest path
Collinear interferometer with variable delay for carrier-envelope offset frequency measurement
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pawlowska, Monika; Ozimek, Filip; Fita, Piotr
2009-08-15
We demonstrate a novel scheme for measuring the carrier-envelope offset frequency in a femtosecond optical frequency comb. Our method is based on a common-path interferometer with a calcite Babinet-Soleil compensator employed to control the delay between the two interfering beams of pulses. The large delay range (up to 8 ps) of our device is sufficient for systems that rely on spectral broadening in microstructured fibers. We show an experimental proof that the stability of a common-path arrangement is superior to that of the standard interferometers.
Collinear interferometer with variable delay for carrier-envelope offset frequency measurement
NASA Astrophysics Data System (ADS)
Pawłowska, Monika; Ozimek, Filip; Fita, Piotr; Radzewicz, Czesław
2009-08-01
We demonstrate a novel scheme for measuring the carrier-envelope offset frequency in a femtosecond optical frequency comb. Our method is based on a common-path interferometer with a calcite Babinet-Soleil compensator employed to control the delay between the two interfering beams of pulses. The large delay range (up to 8 ps) of our device is sufficient for systems that rely on spectral broadening in microstructured fibers. We show an experimental proof that the stability of a common-path arrangement is superior to that of the standard interferometers.
Twu, Ruey-Ching; Wang, Jhao-Sheng
2016-04-01
An optical phase interrogation is proposed to study reflection-induced linear polarization rotation in a common-path homodyne interferometer. This optical methodology can also be applied to the measurement of the refractive index variation of a liquid solution. The performance of the refractive index sensing structure is discussed theoretically, and the experimental results demonstrated a very good ability based on the proposed schemes. Compared with a conventional common-path heterodyne interferometer, the proposed homodyne interferometer with only a single channel reduced the usage of optic elements.
Wu, Shaobo; Chou, Wusheng; Niu, Jianwei; Guizani, Mohsen
2018-03-18
Wireless sensor networks (WSNs) involve more mobile elements with their widespread development in industries. Exploiting mobility present in WSNs for data collection can effectively improve the network performance. However, when the sink (i.e., data collector) path is fixed and the movement is uncontrollable, existing schemes fail to guarantee delay requirements while achieving high energy efficiency. This paper proposes a delay-aware energy-efficient routing algorithm for WSNs with a path-fixed mobile sink, named DERM, which can strike a desirable balance between the delivery latency and energy conservation. We characterize the object of DERM as realizing the energy-optimal anycast to time-varying destination regions, and introduce a location-based forwarding technique tailored for this problem. To reduce the control overhead, a lightweight sink location calibration method is devised, which cooperates with the rough estimation based on the mobility pattern to determine the sink location. We also design a fault-tolerant mechanism called track routing to tackle location errors for ensuring reliable and on-time data delivery. We comprehensively evaluate DERM by comparing it with two canonical routing schemes and a baseline solution presented in this work. Extensive evaluation results demonstrate that DERM can provide considerable energy savings while meeting the delay constraint and maintaining a high delivery ratio.
Wu, Shaobo; Chou, Wusheng; Niu, Jianwei; Guizani, Mohsen
2018-01-01
Wireless sensor networks (WSNs) involve more mobile elements with their widespread development in industries. Exploiting mobility present in WSNs for data collection can effectively improve the network performance. However, when the sink (i.e., data collector) path is fixed and the movement is uncontrollable, existing schemes fail to guarantee delay requirements while achieving high energy efficiency. This paper proposes a delay-aware energy-efficient routing algorithm for WSNs with a path-fixed mobile sink, named DERM, which can strike a desirable balance between the delivery latency and energy conservation. We characterize the object of DERM as realizing the energy-optimal anycast to time-varying destination regions, and introduce a location-based forwarding technique tailored for this problem. To reduce the control overhead, a lightweight sink location calibration method is devised, which cooperates with the rough estimation based on the mobility pattern to determine the sink location. We also design a fault-tolerant mechanism called track routing to tackle location errors for ensuring reliable and on-time data delivery. We comprehensively evaluate DERM by comparing it with two canonical routing schemes and a baseline solution presented in this work. Extensive evaluation results demonstrate that DERM can provide considerable energy savings while meeting the delay constraint and maintaining a high delivery ratio. PMID:29562628
The inner formal structure of the H-T-P drawings: an exploratory study.
Vass, Z
1998-08-01
The study describes some interrelated patterns of traits of the House-Tree-Person (H-T-P) drawings with the instruments of hierarchical cluster analysis. First, according to the literature 1 7 formal or structural aspects of the projective drawings were collected, after which a detailed manual for coding was compiled. Second, the interrater reliability and the consistency of this manual was tested. Third, the hierarchical cluster structure of the reliable and consistent formal aspects was analysed. Results are: (a) a psychometrically tested coding manual of the investigated formal-structural aspects, each of them illustrated with drawings that showed the highest interrater agreement; and (b) the hierarchic cluster structure of the formal aspects of the H-T-P drawings of "normal" adults.
Pan, Feng; Tao, Guohua
2013-03-07
Full semiclassical (SC) initial value representation (IVR) for time correlation functions involves a double phase space average over a set of two phase points, each of which evolves along a classical path. Conventionally, the two initial phase points are sampled independently for all degrees of freedom (DOF) in the Monte Carlo procedure. Here, we present an efficient importance sampling scheme by including the path correlation between the two initial phase points for the bath DOF, which greatly improves the performance of the SC-IVR calculations for large molecular systems. Satisfactory convergence in the study of quantum coherence in vibrational relaxation has been achieved for a benchmark system-bath model with up to 21 DOF.
NASA Astrophysics Data System (ADS)
Luo, X. W.; Xu, P.; Sun, C. W.; Jin, H.; Hou, R. J.; Leng, H. Y.; Zhu, S. N.
2017-06-01
Concurrent spontaneous parametric down-conversion (SPDC) processes have proved to be an appealing approach for engineering the path-entangled photonic state with designable and tunable spatial modes. In this work, we propose a general scheme to construct high-dimensional path entanglement and demonstrate the basic properties of concurrent SPDC processes from domain-engineered quadratic nonlinear photonic crystals, including the spatial modes and the photon flux, as well as the anisotropy of spatial correlation under noncollinear quasi-phase-matching geometry. The overall understanding about the performance of concurrent SPDC processes will give valuable references to the construction of compact path entanglement and the development of new types of photonic quantum technologies.
NASA Technical Reports Server (NTRS)
Hayden, R. E.; Wilby, J. F.
1984-01-01
NASA is investigating the feasibility of modifying the 4x7m Wind Tunnel at the Langley Research Center to make it suitable for a variety of aeroacoustic testing applications, most notably model helicopter rotors. The amount of noise reduction required to meet NASA's goal for test section background noise was determined, the predominant sources and paths causing the background noise were quantified, and trade-off studies between schemes to reduce fan noise at the source and those to attenuate the sound generated in the circuit between the sources and the test section were carried out. An extensive data base is also presented on circuit sources and paths.
Complete description of the optical path difference of a novel spectral zooming imaging spectrometer
NASA Astrophysics Data System (ADS)
Li, Jie; Wu, Haiying; Qi, Chun
2018-03-01
A complete description of the optical path difference of a novel spectral zooming imaging spectrometer (SZIS) is presented. SZIS is designed based on two identical Wollaston prisms with an adjustable air gap. Thus, interferogram with arbitrary spectral resolution and great reduction of spectral image size can be conveniently formed to adapt to different application requirements. Ray tracing modeling in arbitrary incidence with a quasi-parallel-plate approximation scheme is proposed to analyze the optical path difference of SZIS. In order to know the characteristics of the apparatus, exact calculations of the corresponding spectral resolution and field of view are both derived and analyzed in detail. We also present a comparison of calculation and experiment to prove the validity of the theory.
NASA Astrophysics Data System (ADS)
Wang, Zhizhang; Pei, Chunying; Xia, Meng; Yin, Yaling; Xia, Yong; Yin, Jianping
2018-01-01
We present an experimental approach to convert linearly polarized Gaussian beams into elliptical and circular vector hollow beams (VHBs) with different polarization states. The scheme employed is based on a Mach-Zehnder-type optical path combined with a reflective spatial light modulator (SLM) in each path. The resulting VHBs have radial, azimuthal, and other polarization states. Our studies also show that the size of the generated VHBs remains constant during the propagation in free space over a certain distance, and can be controlled by the axial ratio of the SLM’s binary phase plate. These studies deliver great optical parameters and hold promising applications in the fields of optical trapping and manipulation of particles.
An effective and secure key-management scheme for hierarchical access control in E-medicine system.
Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit
2013-04-01
Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.
Peer-mentoring junior surgical trainees in the United Kingdom: a pilot program
Vulliamy, Paul; Junaid, Islam
2013-01-01
Background Peer-mentoring has attracted substantial interest in various healthcare professions, but has not been formally integrated into postgraduate surgical training. This study aimed to assess the feasibility and acceptability of a peer-mentor scheme among junior surgical trainees in the United Kingdom. Method Trainees entering the first year of core surgical training (CST) in a single postgraduate school of surgery were allocated a mentor in the second year of CST. Allocation was based on location of the initial clinical placement. An anonymised questionnaire regarding the mentorship scheme was sent to all participants in the third month following its introduction. Results 18 trainees participated in the scheme, of whom 12 (67%) responded to the questionnaire. All respondents had made contact with their allocated mentor or mentee, and no trainees had opted out of the scheme. Areas in which the mentees received guidance included examinations (83%), CV development (67%), and workplace-based assessments (67%). All respondents felt that the mentor scheme was a good addition to CST. Suggestions for improvement of the scheme included introduction of structured meetings and greater engagement with allocated mentors. Conclusions A pilot peer-mentoring scheme was well received by junior surgical trainees. Consideration should be given to expansion of this scheme and more rigorous assessment of its value. PMID:23594462
Peer-mentoring junior surgical trainees in the United Kingdom: a pilot program.
Vulliamy, Paul; Junaid, Islam
2012-04-16
Peer-mentoring has attracted substantial interest in various healthcare professions, but has not been formally integrated into postgraduate surgical training. This study aimed to assess the feasibility and acceptability of a peer-mentor scheme among junior surgical trainees in the United Kingdom. Trainees entering the first year of core surgical training (CST) in a single postgraduate school of surgery were allocated a mentor in the second year of CST. Allocation was based on location of the initial clinical placement. An anonymised questionnaire regarding the mentorship scheme was sent to all participants in the third month following its introduction. 18 trainees participated in the scheme, of whom 12 (67%) responded to the questionnaire. All respondents had made contact with their allocated mentor or mentee, and no trainees had opted out of the scheme. Areas in which the mentees received guidance included examinations (83%), CV development (67%), and workplace-based assessments (67%). All respondents felt that the mentor scheme was a good addition to CST. Suggestions for improvement of the scheme included introduction of structured meetings and greater engagement with allocated mentors. A pilot peer-mentoring scheme was well received by junior surgical trainees. Consideration should be given to expansion of this scheme and more rigorous assessment of its value.
NASA Astrophysics Data System (ADS)
Yang, Hui; Zhang, Jie; Ji, Yuefeng; He, Yongqi; Lee, Young
2016-07-01
Cloud radio access network (C-RAN) becomes a promising scenario to accommodate high-performance services with ubiquitous user coverage and real-time cloud computing in 5G area. However, the radio network, optical network and processing unit cloud have been decoupled from each other, so that their resources are controlled independently. Traditional architecture cannot implement the resource optimization and scheduling for the high-level service guarantee due to the communication obstacle among them with the growing number of mobile internet users. In this paper, we report a study on multi-dimensional resources integration (MDRI) for service provisioning in cloud radio over fiber network (C-RoFN). A resources integrated provisioning (RIP) scheme using an auxiliary graph is introduced based on the proposed architecture. The MDRI can enhance the responsiveness to dynamic end-to-end user demands and globally optimize radio frequency, optical network and processing resources effectively to maximize radio coverage. The feasibility of the proposed architecture is experimentally verified on OpenFlow-based enhanced SDN testbed. The performance of RIP scheme under heavy traffic load scenario is also quantitatively evaluated to demonstrate the efficiency of the proposal based on MDRI architecture in terms of resource utilization, path blocking probability, network cost and path provisioning latency, compared with other provisioning schemes.
Yang, Hui; Zhang, Jie; Ji, Yuefeng; He, Yongqi; Lee, Young
2016-07-28
Cloud radio access network (C-RAN) becomes a promising scenario to accommodate high-performance services with ubiquitous user coverage and real-time cloud computing in 5G area. However, the radio network, optical network and processing unit cloud have been decoupled from each other, so that their resources are controlled independently. Traditional architecture cannot implement the resource optimization and scheduling for the high-level service guarantee due to the communication obstacle among them with the growing number of mobile internet users. In this paper, we report a study on multi-dimensional resources integration (MDRI) for service provisioning in cloud radio over fiber network (C-RoFN). A resources integrated provisioning (RIP) scheme using an auxiliary graph is introduced based on the proposed architecture. The MDRI can enhance the responsiveness to dynamic end-to-end user demands and globally optimize radio frequency, optical network and processing resources effectively to maximize radio coverage. The feasibility of the proposed architecture is experimentally verified on OpenFlow-based enhanced SDN testbed. The performance of RIP scheme under heavy traffic load scenario is also quantitatively evaluated to demonstrate the efficiency of the proposal based on MDRI architecture in terms of resource utilization, path blocking probability, network cost and path provisioning latency, compared with other provisioning schemes.
Yang, Hui; Zhang, Jie; Ji, Yuefeng; He, Yongqi; Lee, Young
2016-01-01
Cloud radio access network (C-RAN) becomes a promising scenario to accommodate high-performance services with ubiquitous user coverage and real-time cloud computing in 5G area. However, the radio network, optical network and processing unit cloud have been decoupled from each other, so that their resources are controlled independently. Traditional architecture cannot implement the resource optimization and scheduling for the high-level service guarantee due to the communication obstacle among them with the growing number of mobile internet users. In this paper, we report a study on multi-dimensional resources integration (MDRI) for service provisioning in cloud radio over fiber network (C-RoFN). A resources integrated provisioning (RIP) scheme using an auxiliary graph is introduced based on the proposed architecture. The MDRI can enhance the responsiveness to dynamic end-to-end user demands and globally optimize radio frequency, optical network and processing resources effectively to maximize radio coverage. The feasibility of the proposed architecture is experimentally verified on OpenFlow-based enhanced SDN testbed. The performance of RIP scheme under heavy traffic load scenario is also quantitatively evaluated to demonstrate the efficiency of the proposal based on MDRI architecture in terms of resource utilization, path blocking probability, network cost and path provisioning latency, compared with other provisioning schemes. PMID:27465296
Gao, Jianmin; Yang, Xiaowei; Yan, Ju'e; Xue, Qinxiang; Chen, Gang
2014-01-01
Background Urban population in China is mainly covered by two medical insurance schemes: the Urban Employee Basic Medical Insurance (UEBMI) for urban employees in formal sector and the Urban Resident Basic Medical Insurance (URBMI) for the left urban residents, mainly the unemployed, the elderly and children. This paper studies the effects of UEBMI and URBMI on health services utilisation in Shaanxi Province, Western China. Methods Cross-sectional data from the 4th National Health Services Survey - Shaanxi Province was studied. The propensity score matching and the coarsened exact matching methods have been used to estimate the average medical insurance effect on the insured. Results Compared to the uninsured, robust results suggest that UEBMI had significantly increased the outpatient health services utilisation in the last two weeks (p<0.10), whilst the significant effect on hospitalisation was evident in the CEM method (p<0.10). The effect of URBMI was limited in that although being insured was associated with higher health services utilisation, compared with the uninsured, none of the improvement was statistically significant (p>0.10). It was also found that compared with the uninsured, basic medical insurance enrollees were more likely to purchase inpatient treatments in lower levels of hospitals, consistent with the incentive of the benefit package design. Conclusion Basic Medical insurance schemes have shown a positive but limited effect on increasing health services utilisation in Shaanxi Province. The benefit package design of higher reimbursement rates for lower level hospitals has induced the insured to use medical services in lower level hospitals for inpatient services. PMID:24740282
Zhou, Zhongliang; Zhou, Zhiying; Gao, Jianmin; Yang, Xiaowei; Yan, Ju'e; Xue, Qinxiang; Chen, Gang
2014-01-01
Urban population in China is mainly covered by two medical insurance schemes: the Urban Employee Basic Medical Insurance (UEBMI) for urban employees in formal sector and the Urban Resident Basic Medical Insurance (URBMI) for the left urban residents, mainly the unemployed, the elderly and children. This paper studies the effects of UEBMI and URBMI on health services utilisation in Shaanxi Province, Western China. Cross-sectional data from the 4th National Health Services Survey - Shaanxi Province was studied. The propensity score matching and the coarsened exact matching methods have been used to estimate the average medical insurance effect on the insured. Compared to the uninsured, robust results suggest that UEBMI had significantly increased the outpatient health services utilisation in the last two weeks (p<0.10), whilst the significant effect on hospitalisation was evident in the CEM method (p<0.10). The effect of URBMI was limited in that although being insured was associated with higher health services utilisation, compared with the uninsured, none of the improvement was statistically significant (p>0.10). It was also found that compared with the uninsured, basic medical insurance enrollees were more likely to purchase inpatient treatments in lower levels of hospitals, consistent with the incentive of the benefit package design. Basic Medical insurance schemes have shown a positive but limited effect on increasing health services utilisation in Shaanxi Province. The benefit package design of higher reimbursement rates for lower level hospitals has induced the insured to use medical services in lower level hospitals for inpatient services.
Robust interferometry against imperfections based on weak value amplification
NASA Astrophysics Data System (ADS)
Fang, Chen; Huang, Jing-Zheng; Zeng, Guihua
2018-06-01
Optical interferometry has been widely used in various high-precision applications. Usually, the minimum precision of an interferometry is limited by various technical noises in practice. To suppress such kinds of noises, we propose a scheme which combines the weak measurement with the standard interferometry. The proposed scheme dramatically outperforms the standard interferometry in the signal-to-noise ratio and the robustness against noises caused by the optical elements' reflections and the offset fluctuation between two paths. A proof-of-principle experiment is demonstrated to validate the amplification theory.
A User-Centric Adaptive Learning System for E-Learning 2.0
ERIC Educational Resources Information Center
Huang, Shiu-Li; Shiu, Jung-Hung
2012-01-01
The success of Web 2.0 inspires e-learning to evolve into e-learning 2.0, which exploits collective intelligence to achieve user-centric learning. However, searching for suitable learning paths and content for achieving a learning goal is time consuming and troublesome on e-learning 2.0 platforms. Therefore, introducing formal learning in these…
Targeting and Structuring Information Resource Use: A Path toward Informed Clinical Decisions
ERIC Educational Resources Information Center
Mangrulkar, Rajesh S.
2004-01-01
A core skill for all physicians to master is that of information manager. Despite a rapidly expanding set of electronic and print-based information resources, clinicians continue to answer their clinical queries predominantly through informal or formal consultation. Even as new tools are brought to market, the majority of them present information…
Opening up the Decision-Making Process through Shared Governance.
ERIC Educational Resources Information Center
Messina, Robert C., Jr.; And Others
A formal governance system was adopted by the Board of Trustees in April 1991 at Burlington County College in New Jersey after the Commission on Higher Education and the Middle States Association of Colleges and Schools observed that it was lacking. The policy defines the path for maintaining a governance structure which fosters clear and timely…
Universe creation from the third-quantized vacuum
DOE Office of Scientific and Technical Information (OSTI.GOV)
McGuigan, M.
1989-04-15
Third quantization leads to a Hilbert space containing a third-quantized vacuum in which no universes are present as well as multiuniverse states. We consider the possibility of universe creation for the special case where the universe emerges in a no-particle state. The probability of such a creation is computed from both the path-integral and operator formalisms.
Universe creation from the third-quantized vacuum
NASA Astrophysics Data System (ADS)
McGuigan, Michael
1989-04-01
Third quantization leads to a Hilbert space containing a third-quantized vacuum in which no universes are present as well as multiuniverse states. We consider the possibility of universe creation for the special case where the universe emerges in a no-particle state. The probability of such a creation is computed from both the path-integral and operator formalisms.
Anakuran: A Proposed Path to Education for Children of Migrant Construction Workers in India
ERIC Educational Resources Information Center
Pal, Satarupa Dutta
2014-01-01
"If you cannot go to school, the school comes to you." Project Anakuran (the Hindi word for germination) is an innovative design which seeks to provide formal education through Information and Communication Technology (ICT) to the children of migrant construction labourers based at medium and large construction sites in urban locales.…
Onboarding Experiences: An Examination of Early Institutional Advancement Professionals' Decisions
ERIC Educational Resources Information Center
Radosh, Meghan E.
2013-01-01
Onboarding is a new employee orientation process that is designed to formalize and socialize new hires to an organization, or in this case higher education institutions. The onboarding experience that many new employees have can shape employee views and first impressions of their new employer, and shape their early career path to stay or leave…
Formally verifying Ada programs which use real number types
NASA Technical Reports Server (NTRS)
Sutherland, David
1986-01-01
Formal verification is applied to programs which use real number arithmetic operations (mathematical programs). Formal verification of a program P consists of creating a mathematical model of F, stating the desired properties of P in a formal logical language, and proving that the mathematical model has the desired properties using a formal proof calculus. The development and verification of the mathematical model are discussed.
DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System
Kim, Mihui; Chae, Kijoon
2010-01-01
To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute. PMID:22319316
DMP: detouring using multiple paths against jamming attack for ubiquitous networking system.
Kim, Mihui; Chae, Kijoon
2010-01-01
To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute.
Legalizing a market for cannabis for pleasure: Colorado, Washington, Uruguay and beyond.
Room, Robin
2014-03-01
Colorado, Washington state and Uruguay are currently designing legal non-medical markets for cannabis. These clearly contravene the 1961 and 1988 drug conventions; options for what may happen next are discussed. The current provisions in the three regulatory schemes are summarized. From a public health perspective, the emphasis should be on holding down consumption with regulatory measures, but the public health agenda does not seem to be a strong consideration in the implementation of the US schemes, and they are paying little attention to what can be learned from the history of alcohol and tobacco regulation. While alternative paths to a cannabis market under the conventions are noted, the legalization initiatives underline the need to revise the drug conventions, making prohibition of domestic markets an optional matter. Such changes would also ease the path for including alcohol under the conventions, which would be an important step forward in global health. © 2013 Society for the Study of Addiction.
NASA Astrophysics Data System (ADS)
Lin, Yi-Kuei; Huang, Cheng-Fu
2015-04-01
From a quality of service viewpoint, the transmission packet unreliability and transmission time are both critical performance indicators in a computer system when assessing the Internet quality for supervisors and customers. A computer system is usually modelled as a network topology where each branch denotes a transmission medium and each vertex represents a station of servers. Almost every branch has multiple capacities/states due to failure, partial failure, maintenance, etc. This type of network is known as a multi-state computer network (MSCN). This paper proposes an efficient algorithm that computes the system reliability, i.e., the probability that a specified amount of data can be sent through k (k ≥ 2) disjoint minimal paths within both the tolerable packet unreliability and time threshold. Furthermore, two routing schemes are established in advance to indicate the main and spare minimal paths to increase the system reliability (referred to as spare reliability). Thus, the spare reliability can be readily computed according to the routing scheme.
Geologic framework for the coal-bearing rocks of the Central Appalachian Basin
Chesnut, D.R.
1996-01-01
Coal production has been an important economic factor in the Central Appalachian Basin. However, regional stratigraphic and structural relationships of the coal-bearing rocks of the basin have been poorly understood due to numerous separate nomenclatural schemes employed by various states. In order to estimate coal resources and understand mechanisms controlling the distribution of coal within the basin, a reliable geologic framework is necessary. Seven detailed cross sections across the Central Appalachian Basin were constructed in order to examine the stratigraphic and structural framework of the coal-bearing rocks in the basin. The cross sections were based on more than 1000 oil and gas well logs, measured sections, and borehole information from Kentucky, Ohio, Tennessee, Virginia and West Virginia. The cross sections revealed three main points discussed here: southeast thickening of the Pennsylvanian strata, unconformable northwestward onlapping relationship of Lower Pennsylvanian strata over underlying Lower Pennsylvanian and Mississippian strata and regional continuity of beds. The cross sections, geologic mapping, coal-resource studies, extensive new highway exposures and the occurrence of tonstein beds indicate that many coal beds and marine strata are laterally extensive, albeit locally variable across the basin. Certain quartzose sandstone bodies are also extensive over large areas of the basin. Existing stratigraphic nomenclature schemes obscured the geologic framework of the basin, so a new unified nomenclature scheme was devised to better describe stratigraphic features of the basin. The new stratigraphic nomenclature, now only formalized for Kentucky, was based on key stratigraphic units that proved to be extensive across the basin. Lower and Middle Pennsylvanian rocks are now recognized as the Breathitt Group (the Breathitt Formation was elevated to group rank). The Breathitt Group was subdivided into eight coal-bearing formations by relatively thick marine strata, and, in the lower part of the Breathitt Group, by quartzose sandstone formations. The new coal-bearing units are formally ranked as formations and, in ascending order, are the Pocahontas, Bottom Creek, Alvy Creek, Grundy, Pikeville, Hyden, Four Corners and Princess Formations. The quartzose sandstone units are also formally ranked as formations and are, in ascending order, the Warren Point, Sewanee, Bee Rock and Corbin Sandstones. The sandstone formations were previously recognized units in some states, but have been extended (formally in Kentucky) across the basin. The key stratigraphic marine units are formally ranked as members, and are, in ascending order, the Betsie Shale Member, the Kendrick Shale Member, Magoffin Member and Stoney Fork Member.
Factors affecting evaluation culture within a non-formal educational organization.
Vengrin, Courtney; Westfall-Rudd, Donna; Archibald, Thomas; Rudd, Rick; Singh, Kusum
2018-08-01
While research has been done on many aspects of evaluation within a variety of contexts and organizations, there is a lack of research surrounding the culture of evaluation. This study set out to examine this evaluative culture in one of the world's largest non-formal educational organizations through the use of an online survey and quantitative methodology. A path model was developed to examine the factors affecting evaluation culture. Results show perception regarding evaluation, program area, college major, location, training in evaluation, degree level, and years of experience explained 28% of the variance within evaluation culture. Results also found that the culture of evaluation is greatly impacted by leadership. By taking a closer look at the evaluation culture of a large non-formal educational organization, much can be learned about how to better develop and support evaluative work in other similar organizations and programs. Copyright © 2018 Elsevier Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Agarwal, Animesh, E-mail: animesh@zedat.fu-berlin.de; Delle Site, Luigi, E-mail: dellesite@fu-berlin.de
Quantum effects due to the spatial delocalization of light atoms are treated in molecular simulation via the path integral technique. Among several methods, Path Integral (PI) Molecular Dynamics (MD) is nowadays a powerful tool to investigate properties induced by spatial delocalization of atoms; however, computationally this technique is very demanding. The above mentioned limitation implies the restriction of PIMD applications to relatively small systems and short time scales. One of the possible solutions to overcome size and time limitation is to introduce PIMD algorithms into the Adaptive Resolution Simulation Scheme (AdResS). AdResS requires a relatively small region treated at pathmore » integral level and embeds it into a large molecular reservoir consisting of generic spherical coarse grained molecules. It was previously shown that the realization of the idea above, at a simple level, produced reasonable results for toy systems or simple/test systems like liquid parahydrogen. Encouraged by previous results, in this paper, we show the simulation of liquid water at room conditions where AdResS, in its latest and more accurate Grand-Canonical-like version (GC-AdResS), is merged with two of the most relevant PIMD techniques available in the literature. The comparison of our results with those reported in the literature and/or with those obtained from full PIMD simulations shows a highly satisfactory agreement.« less
Security enhanced multi-factor biometric authentication scheme using bio-hash function
Lee, Youngsook; Moon, Jongho
2017-01-01
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867
A Distributed Data-Gathering Protocol Using AUV in Underwater Sensor Networks.
Khan, Jawaad Ullah; Cho, Ho-Shin
2015-08-06
In this paper, we propose a distributed data-gathering scheme using an autonomous underwater vehicle (AUV) working as a mobile sink to gather data from a randomly distributed underwater sensor network where sensor nodes are clustered around several cluster headers. Unlike conventional data-gathering schemes where the AUV visits either every node or every cluster header, the proposed scheme allows the AUV to visit some selected nodes named path-nodes in a way that reduces the overall transmission power of the sensor nodes. Monte Carlo simulations are performed to investigate the performance of the proposed scheme compared with several preexisting techniques employing the AUV in terms of total amount of energy consumption, standard deviation of each node's energy consumption, latency to gather data at a sink, and controlling overhead. Simulation results show that the proposed scheme not only reduces the total energy consumption but also distributes the energy consumption more uniformly over the network, thereby increasing the lifetime of the network.
A Distributed Data-Gathering Protocol Using AUV in Underwater Sensor Networks
Khan, Jawaad Ullah; Cho, Ho-Shin
2015-01-01
In this paper, we propose a distributed data-gathering scheme using an autonomous underwater vehicle (AUV) working as a mobile sink to gather data from a randomly distributed underwater sensor network where sensor nodes are clustered around several cluster headers. Unlike conventional data-gathering schemes where the AUV visits either every node or every cluster header, the proposed scheme allows the AUV to visit some selected nodes named path-nodes in a way that reduces the overall transmission power of the sensor nodes. Monte Carlo simulations are performed to investigate the performance of the proposed scheme compared with several preexisting techniques employing the AUV in terms of total amount of energy consumption, standard deviation of each node’s energy consumption, latency to gather data at a sink, and controlling overhead. Simulation results show that the proposed scheme not only reduces the total energy consumption but also distributes the energy consumption more uniformly over the network, thereby increasing the lifetime of the network. PMID:26287189
Studies in integrated line-and packet-switched computer communication systems
NASA Astrophysics Data System (ADS)
Maglaris, B. S.
1980-06-01
The problem of efficiently allocating the bandwidth of a trunk to both types of traffic is handled for various system and traffic models. A performance analysis is carried out both for variable and fixed frame schemes. It is shown that variable frame schemes, adjusting the frame length according to the traffic variations, offer better trunk utilization at the cost of the additional hardware and software complexity needed because of the lack of synchronization. An optimization study on the fixed frame schemes follows. The problem of dynamically allocating the fixed frame to both types of traffic is formulated as a Markovian Decision process. It is shown that the movable boundary scheme, suggested for commercial implementations of integrated multiplexors, offers optimal or near optimal performance and simplicity of implementation. Finally, the behavior of the movable boundary integrated scheme is studied for tandem link connections. Under the assumptions made for the line-switched traffic, the forward allocation technique is found to offer the best alternative among different path set-up strategies.
On the Study of a Quadrature DCSK Modulation Scheme for Cognitive Radio
NASA Astrophysics Data System (ADS)
Quyen, Nguyen Xuan
The past decade has witnessed a boom of wireless communications which necessitate an increasing improvement of data rate, error-rate performance, bandwidth efficiency, and information security. In this work, we propose a quadrature (IQ) differential chaos-shift keying (DCSK) modulation scheme for the application in cognitive radio (CR), named CR-IQ-DCSK, which offers the above improvement. Chaotic signal is generated in frequency domain and then converted into time domain via an inverse Fourier transform. The real and imaginary components of the frequency-based chaotic signal are simultaneously used in in-phase and quadrature branches of an IQ modulator, where each branch conveys two bits by means of a DCSK-based modulation. Schemes and operating principle of the modulator and demodulator are proposed and described. Analytical BER performance for the proposed schemes over a typical multipath Rayleigh fading channel is derived and verified by numerical simulations. Results show that the proposed scheme outperforms DCSK, CDSK and performs better with the increment of the number of channel paths.
Generalized contexts and consistent histories in quantum mechanics
NASA Astrophysics Data System (ADS)
Losada, Marcelo; Laura, Roberto
2014-05-01
We analyze a restriction of the theory of consistent histories by imposing that a valid description of a physical system must include quantum histories which satisfy the consistency conditions for all states. We prove that these conditions are equivalent to imposing the compatibility conditions of our formalism of generalized contexts. Moreover, we show that the theory of consistent histories with the consistency conditions for all states and the formalism of generalized context are equally useful representing expressions which involve properties at different times.
Drug Discovery Algorithm for Cutaneous Leishmaniasis
Grogl, Max; Hickman, Mark; Ellis, William; Hudson, Thomas; Lazo, John S.; Sharlow, Elizabeth R.; Johnson, Jacob; Berman, Jonathan; Sciotti, Richard J.
2013-01-01
Cutaneous leishmaniasis is clinically widespread but lacks treatments that are effective and well tolerated. Because all present drugs have been grandfathered into clinical use, there are no examples of a pre-clinical product evaluation scheme that lead to new candidates for formal development. To provide oral agents for development targeting cutaneous leishmaniasis, we have implemented a discovery scheme that incorporates in vitro and in vivo testing of efficacy, toxicity, and pharmacokinetics/metabolism. Particular emphasis is placed on in vivo testing, progression from higher-throughput models to those with most clinical relevance, and efficient use of resources. PMID:23390221
JPEG XS call for proposals subjective evaluations
NASA Astrophysics Data System (ADS)
McNally, David; Bruylants, Tim; Willème, Alexandre; Ebrahimi, Touradj; Schelkens, Peter; Macq, Benoit
2017-09-01
In March 2016 the Joint Photographic Experts Group (JPEG), formally known as ISO/IEC SC29 WG1, issued a call for proposals soliciting compression technologies for a low-latency, lightweight and visually transparent video compression scheme. Within the JPEG family of standards, this scheme was denominated JPEG XS. The subjective evaluation of visually lossless compressed video sequences at high resolutions and bit depths poses particular challenges. This paper describes the adopted procedures, the subjective evaluation setup, the evaluation process and summarizes the obtained results which were achieved in the context of the JPEG XS standardization process.
QCD Resummation for Single Spin Asymmetries
NASA Astrophysics Data System (ADS)
Kang, Zhong-Bo; Xiao, Bo-Wen; Yuan, Feng
2011-10-01
We study the transverse momentum dependent factorization for single spin asymmetries in Drell-Yan and semi-inclusive deep inelastic scattering processes at one-loop order. The next-to-leading order hard factors are calculated in the Ji-Ma-Yuan factorization scheme. We further derive the QCD resummation formalisms for these observables following the Collins-Soper-Sterman method. The results are expressed in terms of the collinear correlation functions from initial and/or final state hadrons coupled with the Sudakov form factor containing all order soft-gluon resummation effects. The scheme-independent coefficients are calculated up to one-loop order.
QCD Resummation for Single Spin Asymmetries
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kang Z.; Xiao, Bo-Wen; Yuan, Feng
We study the transverse momentum dependent factorization for single spin asymmetries in Drell-Yan and semi-inclusive deep inelastic scattering processes at one-loop order. The next-to-leading order hard factors are calculated in the Ji-Ma-Yuan factorization scheme. We further derive the QCD resummation formalisms for these observables following the Collins-Soper-Sterman method. The results are expressed in terms of the collinear correlation functions from initial and/or final state hadrons coupled with the Sudakov form factor containing all order soft-gluon resummation effects. The scheme-independent coefficients are calculated up to one-loop order.
Vervet monkeys use paths consistent with context-specific spatial movement heuristics.
Teichroeb, Julie A
2015-10-01
Animal foraging routes are analogous to the computationally demanding "traveling salesman problem" (TSP), where individuals must find the shortest path among several locations before returning to the start. Humans approximate solutions to TSPs using simple heuristics or "rules of thumb," but our knowledge of how other animals solve multidestination routing problems is incomplete. Most nonhuman primate species have shown limited ability to route plan. However, captive vervets were shown to solve a TSP for six sites. These results were consistent with either planning three steps ahead or a risk-avoidance strategy. I investigated how wild vervet monkeys (Chlorocebus pygerythrus) solved a path problem with six, equally rewarding food sites; where site arrangement allowed assessment of whether vervets found the shortest route and/or used paths consistent with one of three simple heuristics to navigate. Single vervets took the shortest possible path in fewer than half of the trials, usually in ways consistent with the most efficient heuristic (the convex hull). When in competition, vervets' paths were consistent with different, more efficient heuristics dependent on their dominance rank (a cluster strategy for dominants and the nearest neighbor rule for subordinates). These results suggest that, like humans, vervets may solve multidestination routing problems by applying simple, adaptive, context-specific "rules of thumb." The heuristics that were consistent with vervet paths in this study are the same as some of those asserted to be used by humans. These spatial movement strategies may have common evolutionary roots and be part of a universal mental navigational toolkit. Alternatively, they may have emerged through convergent evolution as the optimal way to solve multidestination routing problems.
Pilot-multiplexed continuous-variable quantum key distribution with a real local oscillator
NASA Astrophysics Data System (ADS)
Wang, Tao; Huang, Peng; Zhou, Yingming; Liu, Weiqi; Zeng, Guihua
2018-01-01
We propose a pilot-multiplexed continuous-variable quantum key distribution (CVQKD) scheme based on a local local oscillator (LLO). Our scheme utilizes time-multiplexing and polarization-multiplexing techniques to dramatically isolate the quantum signal from the pilot, employs two heterodyne detectors to separately detect the signal and the pilot, and adopts a phase compensation method to almost eliminate the multifrequency phase jitter. In order to analyze the performance of our scheme, a general LLO noise model is constructed. Besides the phase noise and the modulation noise, the photon-leakage noise from the reference path and the quantization noise due to the analog-to-digital converter (ADC) are also considered, which are first analyzed in the LLO regime. Under such general noise model, our scheme has a higher key rate and longer secure distance compared with the preexisting LLO schemes. Moreover, we also conduct an experiment to verify our pilot-multiplexed scheme. Results show that it maintains a low level of the phase noise and is expected to obtain a 554-Kbps secure key rate within a 15-km distance under the finite-size effect.
Consistent forcing scheme in the cascaded lattice Boltzmann method
NASA Astrophysics Data System (ADS)
Fei, Linlin; Luo, Kai Hong
2017-11-01
In this paper, we give an alternative derivation for the cascaded lattice Boltzmann method (CLBM) within a general multiple-relaxation-time (MRT) framework by introducing a shift matrix. When the shift matrix is a unit matrix, the CLBM degrades into an MRT LBM. Based on this, a consistent forcing scheme is developed for the CLBM. The consistency of the nonslip rule, the second-order convergence rate in space, and the property of isotropy for the consistent forcing scheme is demonstrated through numerical simulations of several canonical problems. Several existing forcing schemes previously used in the CLBM are also examined. The study clarifies the relation between MRT LBM and CLBM under a general framework.
Formalization of the Access Control on ARM-Android Platform with the B Method
NASA Astrophysics Data System (ADS)
Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing
2018-01-01
ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.
Life-space foam: A medium for motivational and cognitive dynamics
NASA Astrophysics Data System (ADS)
Ivancevic, Vladimir; Aidman, Eugene
2007-08-01
General stochastic dynamics, developed in a framework of Feynman path integrals, have been applied to Lewinian field-theoretic psychodynamics [K. Lewin, Field Theory in Social Science, University of Chicago Press, Chicago, 1951; K. Lewin, Resolving Social Conflicts, and, Field Theory in Social Science, American Psychological Association, Washington, 1997; M. Gold, A Kurt Lewin Reader, the Complete Social Scientist, American Psychological Association, Washington, 1999], resulting in the development of a new concept of life-space foam (LSF) as a natural medium for motivational and cognitive psychodynamics. According to LSF formalisms, the classic Lewinian life space can be macroscopically represented as a smooth manifold with steady force fields and behavioral paths, while at the microscopic level it is more realistically represented as a collection of wildly fluctuating force fields, (loco)motion paths and local geometries (and topologies with holes). A set of least-action principles is used to model the smoothness of global, macro-level LSF paths, fields and geometry. To model the corresponding local, micro-level LSF structures, an adaptive path integral is used, defining a multi-phase and multi-path (multi-field and multi-geometry) transition process from intention to goal-driven action. Application examples of this new approach include (but are not limited to) information processing, motivational fatigue, learning, memory and decision making.
Joint-space adaptive control of a 6 DOF end-effector with closed-kinematic chain mechanism
NASA Technical Reports Server (NTRS)
Nguyen, Charles C.; Zhou, Zhen-Lei
1989-01-01
The development is presented for a joint-space adaptive scheme that controls the joint position of a six-degree-of-freedom (DOF) robot end-effector performing fine and precise motion within a very limited workspace. The end-effector was built to study autonomous assembly of NASA hardware in space. The design of the adaptive controller is based on the concept of model reference adaptive control (MRAC) and Lyapunov direct method. In the development, it is assumed that the end-effector performs slowly varying motion. Computer simulation is performed to investigate the performance of the developed control scheme on position control of the end-effector. Simulation results manifest that the adaptive control scheme provides excellent tracking of several test paths.
A Tale of Two Trails: Exploring Different Paths to Success
Walker, Jennifer G.; Evenson, Kelly R.; Davis, William J.; Bors, Philip; Rodríguez, Daniel A.
2016-01-01
Background This comparative case study investigates 2 successful community trail initiatives, using the Active Living By Design (ALBD) Community Action Model as an analytical framework. The model includes 5 strategies: preparation, promotion, programs, policy, and physical projects. Methods Key stakeholders at 2 sites participated in in-depth interviews (N = 14). Data were analyzed for content using Atlas Ti and grouped according to the 5 strategies. Results Preparation Securing trail resources was challenging, but shared responsibilities facilitated trail development. Promotions The initiatives demonstrated minimal physical activity encouragement strategies. Programs Community stakeholders did not coordinate programmatic opportunities for routine physical activity. Policy Trails’ inclusion in regional greenway master plans contributed to trail funding and development. Policies that were formally institutionalized and enforced led to more consistent trail construction and safer conditions for users. Physical Projects Consistent standards for way finding signage and design safety features enhanced trail usability and safety. Conclusions Communities with different levels of government support contributed unique lessons to inform best practices of trail initiatives. This study revealed a disparity between trail development and use-encouragement strategies, which may limit trails’ impact on physical activity. The ALBD Community Action Model provided a viable framework to structure cross-disciplinary community trail initiatives. PMID:21597125
Modgil, Dimple; Rigie, David S.; Wang, Yuxin; Xiao, Xianghui; Vargas, Phillip A.; La Rivière, Patrick J.
2015-01-01
We demonstrate that a dual-layer, dual-color scintillator construct for microscopic CT, originally proposed to increase sensitivity in synchrotron imaging, can also be used to perform material quantification and classification when coupled with polychromatic illumination. We consider two different approaches to data handling: (1) a data-domain material decomposition whose estimation performance can be characterized by the Cramer-Rao Lower Bound formalism but which requires careful calibration and (2) an image-domain material classification approach that is more robust to calibration errors. The data-domain analysis indicates that useful levels of SNR (>5) could be achieved in one second or less at typical bending magnet fluxes for relatively large amounts of contrast (several mm path length, such as in a fluid flow experiment) and at typical undulator fluxes for small amount of contrast (tens of microns path length, such as an angiography experiment). The tools introduced could of course be used to study and optimize parameters for a wider range of potential applications. The image domain approach was analyzed in terms of its ability to distinguish different elemental stains by characterizing the angle between the lines traced out in a two-dimensional space of effective attenuation coefficient in the front and back layer images. This approach was implemented at a synchrotron and the results were consistent with simulation predictions. PMID:26422059
DOE Office of Scientific and Technical Information (OSTI.GOV)
Modgil, Dimple; Rigie, David S.; Wang, Yuxin
We demonstrate that a dual-layer, dual-color scintillator construct for microscopic CT, originally proposed to increase sensitivity in synchrotron imaging, can also be used to perform material quantification and classification when coupled with polychromatic illumination. We consider two different approaches to data handling: (1) a data-domain material decomposition whose estimation performance can be characterized by the Cramer-Rao lower bound formalism but which requires careful calibration and (2) an image-domain material classification approach that is more robust to calibration errors. The data-domain analysis indicates that useful levels of SNR (>5) could be achieved in one second or less at typical bending magnetmore » fluxes for relatively large amounts of contrast (several mm path length, such as in a fluid flow experiment) and at typical undulator fluxes for small amount of contrast (tens of microns path length, such as an angiography experiment). The tools introduced could of course be used to study and optimize parameters for a wider range of potential applications. The image domain approach was analyzed in terms of its ability to distinguish different elemental stains by characterizing the angle between the lines traced out in a two-dimensional space of effective attenuation coefficient in the front and back layer images. As a result, this approach was implemented at a synchrotron and the results were consistent with simulation predictions.« less