Exploring the Utility of Sequential Analysis in Studying Informal Formative Assessment Practices
ERIC Educational Resources Information Center
Furtak, Erin Marie; Ruiz-Primo, Maria Araceli; Bakeman, Roger
2017-01-01
Formative assessment is a classroom practice that has received much attention in recent years for its established potential at increasing student learning. A frequent analytic approach for determining the quality of formative assessment practices is to develop a coding scheme and determine frequencies with which the codes are observed; however,…
Yuan, Chengzhi; Licht, Stephen; He, Haibo
2017-09-26
In this paper, a new concept of formation learning control is introduced to the field of formation control of multiple autonomous underwater vehicles (AUVs), which specifies a joint objective of distributed formation tracking control and learning/identification of nonlinear uncertain AUV dynamics. A novel two-layer distributed formation learning control scheme is proposed, which consists of an upper-layer distributed adaptive observer and a lower-layer decentralized deterministic learning controller. This new formation learning control scheme advances existing techniques in three important ways: 1) the multi-AUV system under consideration has heterogeneous nonlinear uncertain dynamics; 2) the formation learning control protocol can be designed and implemented by each local AUV agent in a fully distributed fashion without using any global information; and 3) in addition to the formation control performance, the distributed control protocol is also capable of accurately identifying the AUVs' heterogeneous nonlinear uncertain dynamics and utilizing experiences to improve formation control performance. Extensive simulations have been conducted to demonstrate the effectiveness of the proposed results.
NASA Technical Reports Server (NTRS)
Warming, R. F.; Beam, R. M.
1978-01-01
Efficient, noniterative, implicit finite difference algorithms are systematically developed for nonlinear conservation laws including purely hyperbolic systems and mixed hyperbolic parabolic systems. Utilization of a rational fraction or Pade time differencing formulas, yields a direct and natural derivation of an implicit scheme in a delta form. Attention is given to advantages of the delta formation and to various properties of one- and two-dimensional algorithms.
An Overview of Recent Advances in Event-Triggered Consensus of Multiagent Systems.
Ding, Lei; Han, Qing-Long; Ge, Xiaohua; Zhang, Xian-Ming
2018-04-01
Event-triggered consensus of multiagent systems (MASs) has attracted tremendous attention from both theoretical and practical perspectives due to the fact that it enables all agents eventually to reach an agreement upon a common quantity of interest while significantly alleviating utilization of communication and computation resources. This paper aims to provide an overview of recent advances in event-triggered consensus of MASs. First, a basic framework of multiagent event-triggered operational mechanisms is established. Second, representative results and methodologies reported in the literature are reviewed and some in-depth analysis is made on several event-triggered schemes, including event-based sampling schemes, model-based event-triggered schemes, sampled-data-based event-triggered schemes, and self-triggered sampling schemes. Third, two examples are outlined to show applicability of event-triggered consensus in power sharing of microgrids and formation control of multirobot systems, respectively. Finally, some challenging issues on event-triggered consensus are proposed for future research.
Tan, Chun Kiat; Ng, Jason Changwei; Xu, Xiaotian; Poh, Chueh Loo; Guan, Yong Liang; Sheah, Kenneth
2011-06-01
Teleradiology applications and universal availability of patient records using web-based technology are rapidly gaining importance. Consequently, digital medical image security has become an important issue when images and their pertinent patient information are transmitted across public networks, such as the Internet. Health mandates such as the Health Insurance Portability and Accountability Act require healthcare providers to adhere to security measures in order to protect sensitive patient information. This paper presents a fully reversible, dual-layer watermarking scheme with tamper detection capability for medical images. The scheme utilizes concepts of public-key cryptography and reversible data-hiding technique. The scheme was tested using medical images in DICOM format. The results show that the scheme is able to ensure image authenticity and integrity, and to locate tampered regions in the images.
Energy Efficient Cluster Based Scheduling Scheme for Wireless Sensor Networks
Srie Vidhya Janani, E.; Ganesh Kumar, P.
2015-01-01
The energy utilization of sensor nodes in large scale wireless sensor network points out the crucial need for scalable and energy efficient clustering protocols. Since sensor nodes usually operate on batteries, the maximum utility of network is greatly dependent on ideal usage of energy leftover in these sensor nodes. In this paper, we propose an Energy Efficient Cluster Based Scheduling Scheme for wireless sensor networks that balances the sensor network lifetime and energy efficiency. In the first phase of our proposed scheme, cluster topology is discovered and cluster head is chosen based on remaining energy level. The cluster head monitors the network energy threshold value to identify the energy drain rate of all its cluster members. In the second phase, scheduling algorithm is presented to allocate time slots to cluster member data packets. Here congestion occurrence is totally avoided. In the third phase, energy consumption model is proposed to maintain maximum residual energy level across the network. Moreover, we also propose a new packet format which is given to all cluster member nodes. The simulation results prove that the proposed scheme greatly contributes to maximum network lifetime, high energy, reduced overhead, and maximum delivery ratio. PMID:26495417
Bit-rate transparent DPSK demodulation scheme based on injection locking FP-LD
NASA Astrophysics Data System (ADS)
Feng, Hanlin; Xiao, Shilin; Yi, Lilin; Zhou, Zhao; Yang, Pei; Shi, Jie
2013-05-01
We propose and demonstrate a bit-rate transparent differential phase shift-keying (DPSK) demodulation scheme based on injection locking multiple-quantum-well (MQW) strained InGaAsP FP-LD. By utilizing frequency deviation generated by phase modulation and unstable injection locking state with Fabry-Perot laser diode (FP-LD), DPSK to polarization shift-keying (PolSK) and PolSK to intensity modulation (IM) format conversions are realized. We analyze bit error rate (BER) performance of this demodulation scheme. Experimental results show that different longitude modes, bit rates and seeding power have influences on demodulation performance. We achieve error free DPSK signal demodulation under various bit rates of 10 Gbit/s, 5 Gbit/s, 2.5 Gbit/s and 1.25 Gbit/s with the same demodulation setting.
Efficient Storage Scheme of Covariance Matrix during Inverse Modeling
NASA Astrophysics Data System (ADS)
Mao, D.; Yeh, T. J.
2013-12-01
During stochastic inverse modeling, the covariance matrix of geostatistical based methods carries the information about the geologic structure. Its update during iterations reflects the decrease of uncertainty with the incorporation of observed data. For large scale problem, its storage and update cost too much memory and computational resources. In this study, we propose a new efficient storage scheme for storage and update. Compressed Sparse Column (CSC) format is utilized to storage the covariance matrix, and users can assign how many data they prefer to store based on correlation scales since the data beyond several correlation scales are usually not very informative for inverse modeling. After every iteration, only the diagonal terms of the covariance matrix are updated. The off diagonal terms are calculated and updated based on shortened correlation scales with a pre-assigned exponential model. The correlation scales are shortened by a coefficient, i.e. 0.95, every iteration to show the decrease of uncertainty. There is no universal coefficient for all the problems and users are encouraged to try several times. This new scheme is tested with 1D examples first. The estimated results and uncertainty are compared with the traditional full storage method. In the end, a large scale numerical model is utilized to validate this new scheme.
NASA Astrophysics Data System (ADS)
Sheshukov, O. Yu.; Lobanov, D. A.; Mikheenkov, M. A.; Nekrasov, I. V.; Egiazaryan, D. K.
2017-09-01
There are two main kinds of slag in modern steelmaking industry: the electric arc furnace slag (EAF slag) and ladle furnace slag (LF slag). The all known slag processing schemes provide the iron-containing component reduction while silicate component stays unprocessed. On the contrary, the silicate processing schemes doesn't provide the utilization of the iron-containing component. The present-day situation doesn't solve the problem of total slag utilization. The aim of this work is to investigate the opportunity of silicate product obtaining with simultaneous pig iron reduction from EAF and LF slags. The tests are conducted by the method of simplex-lattice design. The test samples are heated and melted under reductive conditions, slowly cooled and then analyzed by XRD methods. The experiment results prove the opportunity: the Portland clinker and pig iron can be simultaneously produced on the basis of these slags with a limestone addition.
High-performance equation solvers and their impact on finite element analysis
NASA Technical Reports Server (NTRS)
Poole, Eugene L.; Knight, Norman F., Jr.; Davis, D. Dale, Jr.
1990-01-01
The role of equation solvers in modern structural analysis software is described. Direct and iterative equation solvers which exploit vectorization on modern high-performance computer systems are described and compared. The direct solvers are two Cholesky factorization methods. The first method utilizes a novel variable-band data storage format to achieve very high computation rates and the second method uses a sparse data storage format designed to reduce the number of operations. The iterative solvers are preconditioned conjugate gradient methods. Two different preconditioners are included; the first uses a diagonal matrix storage scheme to achieve high computation rates and the second requires a sparse data storage scheme and converges to the solution in fewer iterations that the first. The impact of using all of the equation solvers in a common structural analysis software system is demonstrated by solving several representative structural analysis problems.
High-performance equation solvers and their impact on finite element analysis
NASA Technical Reports Server (NTRS)
Poole, Eugene L.; Knight, Norman F., Jr.; Davis, D. D., Jr.
1992-01-01
The role of equation solvers in modern structural analysis software is described. Direct and iterative equation solvers which exploit vectorization on modern high-performance computer systems are described and compared. The direct solvers are two Cholesky factorization methods. The first method utilizes a novel variable-band data storage format to achieve very high computation rates and the second method uses a sparse data storage format designed to reduce the number od operations. The iterative solvers are preconditioned conjugate gradient methods. Two different preconditioners are included; the first uses a diagonal matrix storage scheme to achieve high computation rates and the second requires a sparse data storage scheme and converges to the solution in fewer iterations that the first. The impact of using all of the equation solvers in a common structural analysis software system is demonstrated by solving several representative structural analysis problems.
Automated storage and retrieval of data obtained in the Interkosmos project
NASA Technical Reports Server (NTRS)
Ziolkovski, K.; Pakholski, V.
1975-01-01
The formation of a data bank and information retrieval system for scientific data is described. The stored data can be digital or documentation data. Data classification methods are discussed along with definition and compilation of the dictionary utilized, definition of the indexing scheme, and definition of the principles used in constructing a file for documents, data blocks, and tapes. Operating principles are also presented.
DOE Office of Scientific and Technical Information (OSTI.GOV)
He, Fulin; Cao, Yang; Zhang, Jun Jason
Ensuring flexible and reliable data routing is indispensable for the integration of Advanced Metering Infrastructure (AMI) networks, we propose a secure-oriented and load-balancing wireless data routing scheme. A novel utility function is designed based on security routing scheme. Then, we model the interactive security-oriented routing strategy among meter data concentrators or smart grid meters as a mixed-strategy network formation game. Finally, such problem results in a stable probabilistic routing scheme with proposed distributed learning algorithm. One contributions is that we studied that different types of applications affect the routing selection strategy and the strategy tendency. Another contributions is that themore » chosen strategy of our mixed routing can adaptively to converge to a new mixed strategy Nash equilibrium (MSNE) during the learning process in the smart grid.« less
NASA Astrophysics Data System (ADS)
Yang, Tao; Chen, Xue; Shi, Sheping; Sun, Erkun; Shi, Chen
2018-03-01
We propose a low-complexity and modulation-format-independent carrier phase estimation (CPE) scheme based on two-stage modified blind phase search (MBPS) with linear approximation to compensate the phase noise of arbitrary m-ary quadrature amplitude modulation (m-QAM) signals in elastic optical networks (EONs). Comprehensive numerical simulations are carried out in the case that the highest possible modulation format in EONs is 256-QAM. The simulation results not only verify its advantages of higher estimation accuracy and modulation-format independence, i.e., universality, but also demonstrate that the implementation complexity is significantly reduced by at least one-fourth in comparison with the traditional BPS scheme. In addition, the proposed scheme shows similar laser linewidth tolerance with the traditional BPS scheme. The slightly better OSNR performance of the scheme is also experimentally validated for PM-QPSK and PM-16QAM systems, respectively. The coexistent advantages of low-complexity and modulation-format-independence could make the proposed scheme an attractive candidate for flexible receiver-side DSP unit in EONs.
Sato, Shunsuke; Arai, Takeo; Morikawa, Takeshi; Uemura, Keiko; Suzuki, Tomiko M; Tanaka, Hiromitsu; Kajino, Tsutomu
2011-10-05
Photoelectrochemical reduction of CO(2) to HCOO(-) (formate) over p-type InP/Ru complex polymer hybrid photocatalyst was highly enhanced by introducing an anchoring complex into the polymer. By functionally combining the hybrid photocatalyst with TiO(2) for water oxidation, selective photoreduction of CO(2) to HCOO(-) was achieved in aqueous media, in which H(2)O was used as both an electron donor and a proton source. The so-called Z-scheme (or two-step photoexcitation) system operated with no external electrical bias. The selectivity for HCOO(-) production was >70%, and the conversion efficiency of solar energy to chemical energy was 0.03-0.04%.
Dynamic Bandwidth Allocation with Effective Utilization of Polling Interval over WDM/TDM PON
NASA Astrophysics Data System (ADS)
Ni, Cuiping; Gan, Chaoqin; Gao, Ziyue
2014-12-01
WDM/TDM (wavelength-division multiplexing/time-division multiplexing) PON (passive optical network) appears to be an attractive solution for the next generation optical access networks. Dynamic bandwidth allocation (DBA) plays a crucial role in efficiently and fairly allocating the bandwidth among all users in WDM/TDM PON. In this paper, two dynamic bandwidth allocation schemes (DBA1 and DBA2) are proposed to eliminate the idle time of polling cycles (i.e. polling interval), improve bandwidth utilization and make full use of bandwidth resources. The two DBA schemes adjust the time slot of sending request information and make fair scheduling among users to achieve the effective utilization of polling interval in WDM/TDM PON. The simulation and theoretical analyses verify that the proposed schemes outperform the conventional DBA scheme. We also make comparisons between the two schemes in terms of bandwidth utilization and average packet delay to further demonstrate the effectiveness of the scheme of DBA2.
Resilient Distribution System by Microgrids Formation After Natural Disasters
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Chen; Wang, Jianhui; Qiu, Feng
2016-03-01
Microgrids with distributed generation provide a resilient solution in the case of major faults in a distribution system due to natural disasters. This paper proposes a novel distribution system operational approach by forming multiple microgrids energized by distributed generation from the radial distribution system in real-time operations, to restore critical loads from the power outage. Specifically, a mixed-integer linear program (MILP) is formulated to maximize the critical loads to be picked up while satisfying the self-adequacy and operation constraints for the microgrids formation problem, by controlling the ON/OFF status of the remotely controlled switch devices and distributed generation. A distributedmore » multi-agent coordination scheme is designed via local communications for the global information discovery as inputs of the optimization, which is suitable for autonomous communication requirements after the disastrous event. The formed microgrids can be further utilized for power quality control and can be connected to a larger microgrid before the restoration of the main grids is complete. Numerical results based on modified IEEE distribution test systems validate the effectiveness of our proposed scheme.« less
Joint Real-Time Energy and Demand-Response Management using a Hybrid Coalitional-Noncooperative Game
DOE Office of Scientific and Technical Information (OSTI.GOV)
He, Fulin; Gu, Yi; Hao, Jun
In order to model the interactions among utility companies, building demands and renewable energy generators (REGs), a hybrid coalitional-noncooperative game framework has been proposed. We formulate a dynamic non-cooperative game to study the energy dispatch within multiple utility companies, while we take a coalitional perspective on REGs and buildings demands through a hedonic coalition formation game approach. In this case, building demands request different power supply from REGs, then the building demands can be organized into an ultimate coalition structure through a distributed hedonic shift algorithm. At the same time, utility companies can also obtain a stable power generation profile.more » In addition, the interactive progress among the utility companies and building demands which cannot be supplied by REGs is implemented by distributed game theoretic algorithms. Numerical results illustrate that the proposed hybrid coalitional-noncooperative game scheme reduces the cost of both building demands and utility companies compared with the initial scene.« less
An auto-bias control scheme for IQ-modulator with various modulation formats
NASA Astrophysics Data System (ADS)
Zhang, Wenqi; Yuan, Xueguang; Zhang, Yang'an
2016-10-01
We propose and demonstrate an auto-bias control scheme for the IQ-modulator of a flexible optical PSK or QAM or other modulation formats transmitter in this paper. Due to IQ-modulators usually producing higher-order modulation format, these modulation formats involve phase mostly. It is based on that the bias drift will change the operating point and result in varying the output optical phase. This technology has no restrictions on modulation formats, so it has good flexibility. The experimental result show the three biases can be stabilized when the proposed scheme is implemented.
Kohli, Charu; Gupta, Kalika; Banerjee, Bratati; Ingle, Gopal Krishna
2017-05-01
World population of elderly is increasing at a fast pace. The number of elderly in India has increased by 54.77% in the last 15 years. A number of social security measures have been taken by Indian government. To assess awareness, utilization and barriers faced while utilizing social security schemes by elderly in a secondary care hospital situated in a rural area in Delhi, India. A cross-sectional study was conducted among 360 individuals aged 60 years and above in a secondary care hospital situated in a rural area in Delhi. A pre-tested, semi-structured schedule prepared in local language was used. Data was analysed using SPSS software (version 17.0). Chi-square test was used to observe any statistical association between categorical variables. The results were considered statistically significant if p-value was less than 0.05. A majority of study subjects were females (54.2%), Hindu (89.7%), married (60.3%) and were not engaged in any occupation (82.8%). Awareness about Indira Gandhi National Old Age Pension Scheme (IGNOAPS) was present among 286 (79.4%) and Annapurna scheme in 193 (53.6%) subjects. Among 223 subjects who were below poverty line, 179 (80.3%) were aware of IGNOAPS; while, 112 (50.2%) were utilizing the scheme. There was no association of awareness with education status, occupation, religion, family type, marital status and caste (p>0.05). Corruption and tedious administrative formalities were major barriers reported. Awareness generation, provision of information on how to approach the concerned authority for utilizing the scheme and ease of administrative procedures should be an integral part of any social security scheme or measure. In the present study, about 79.4% of elderly were aware and 45% of the eligible subjects were utilizing pension scheme. Major barriers reported in utilization of schemes were corruption and tedious administrative procedures.
Social Security Measures for Elderly Population in Delhi, India: Awareness, Utilization and Barriers
Kohli, Charu; Banerjee, Bratati; Ingle, Gopal Krishna
2017-01-01
Introduction World population of elderly is increasing at a fast pace. The number of elderly in India has increased by 54.77% in the last 15 years. A number of social security measures have been taken by Indian government. Aim To assess awareness, utilization and barriers faced while utilizing social security schemes by elderly in a secondary care hospital situated in a rural area in Delhi, India. Materials and Methods A cross-sectional study was conducted among 360 individuals aged 60 years and above in a secondary care hospital situated in a rural area in Delhi. A pre-tested, semi-structured schedule prepared in local language was used. Data was analysed using SPSS software (version 17.0). Chi-square test was used to observe any statistical association between categorical variables. The results were considered statistically significant if p-value was less than 0.05. Results A majority of study subjects were females (54.2%), Hindu (89.7%), married (60.3%) and were not engaged in any occupation (82.8%). Awareness about Indira Gandhi National Old Age Pension Scheme (IGNOAPS) was present among 286 (79.4%) and Annapurna scheme in 193 (53.6%) subjects. Among 223 subjects who were below poverty line, 179 (80.3%) were aware of IGNOAPS; while, 112 (50.2%) were utilizing the scheme. There was no association of awareness with education status, occupation, religion, family type, marital status and caste (p>0.05). Corruption and tedious administrative formalities were major barriers reported. Conclusion Awareness generation, provision of information on how to approach the concerned authority for utilizing the scheme and ease of administrative procedures should be an integral part of any social security scheme or measure. In the present study, about 79.4% of elderly were aware and 45% of the eligible subjects were utilizing pension scheme. Major barriers reported in utilization of schemes were corruption and tedious administrative procedures. PMID:28658811
Dailey, James M; Power, Mark J; Webb, Roderick P; Manning, Robert J
2011-12-19
We report on the novel all-optical generation of duobinary (DB) and alternate-mark-inversion (AMI) modulation formats at 42.6 Gb/s from an input on-off keyed signal. The modulation converter consists of two semiconductor optical amplifier (SOA)-based Mach-Zehnder interferometer gates. A detailed SOA model numerically confirms the operational principles and experimental data shows successful AMI and DB conversion at 42.6 Gb/s. We also predict that the operational bandwidth can be extended beyond 40 Gb/s by utilizing a new pattern-effect suppression scheme, and demonstrate dramatic reductions in patterning up to 160 Gb/s. We show an increasing trade-off between pattern-effect reduction and mean output power with increasing bitrate.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-14
... repeatedly utilized a `bait and switch' scheme * * * in misleading the shipping public, including DRAFT, * * * by utilizing DAMCO US, DAMCO A/S, and MAERSK as interchangeable parts'' and that the scheme is a ``practice.'' Complainant asserted that by using this scheme Respondents ``knowingly disclosed, offered...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-16
... repeatedly utilized a `bait and switch' scheme * * * in misleading the shipping public, including DRAFT, * * * by utilizing DAMCO US, DAMCO A/S, and MAERSK as interchangeable parts'' and that the scheme is a ``practice.'' Complainants assert that by using this scheme Respondents ``knowingly disclosed, offered...
A Scheme To Improve the Utilization on Vocational Qualifications in the Labor Market.
ERIC Educational Resources Information Center
Lee, Dong-Im; Kim, Deog-Ki
Korea's labor market was analyzed to inform efforts to develop a scheme to improve the utilization of vocational qualifications. The study examined the different meanings of qualifications in South Korea's labor market and how utilization of qualifications is influenced by factors such as types of human resource management, vocational training…
NASA Astrophysics Data System (ADS)
Li, Ze; Zhang, Min; Wang, Danshi; Cui, Yue
2017-09-01
We propose a flexible and reconfigurable wavelength-division multiplexing (WDM) multicast scheme supporting downstream emergency multicast communication for WDM optical access network (WDM-OAN) via a multicast module (MM) based on four-wave mixing (FWM) in a semiconductor optical amplifier. It serves as an emergency measure to dispose of the burst, large bandwidth, and real-time multicast service with fast service provisioning and high resource efficiency. It also plays the role of physical backup in cases of big data migration or network disaster caused by invalid lasers or modulator failures. It provides convenient and reliable multicast service and emergency protection for WDM-OAN without modifying WDM-OAN structure. The strategies of an MM setting at the optical line terminal and remote node are discussed to apply this scheme to passive optical networks and active optical networks, respectively. Utilizing the proposed scheme, we demonstrate a proof-of-concept experiment in which one-to-six/eight 10-Gbps nonreturn-to-zero-differential phase-shift keying WDM multicasts in both strategies are successfully transmitted over single-mode fiber of 20.2 km. One-to-many reconfigurable WDM multicasts dealing with higher data rate and other modulation formats of multicast service are possible through the proposed scheme. It can be applied to different WDM access technologies, e.g., time-wavelength-division multiplexing-OAN and coherent WDM-OAN, and upgraded smoothly.
NASA Astrophysics Data System (ADS)
Agrawal, Anuj; Bhatia, Vimal; Prakash, Shashi
2018-01-01
Efficient utilization of spectrum is a key concern in the soon to be deployed elastic optical networks (EONs). To perform routing in EONs, various fixed routing (FR), and fixed-alternate routing (FAR) schemes are ubiquitously used. FR, and FAR schemes calculate a fixed route, and a prioritized list of a number of alternate routes, respectively, between different pairs of origin o and target t nodes in the network. The route calculation performed using FR and FAR schemes is predominantly based on either the physical distance, known as k -shortest paths (KSP), or on the hop count (HC). For survivable optical networks, FAR usually calculates link-disjoint (LD) paths. These conventional routing schemes have been efficiently used for decades in communication networks. However, in this paper, it has been demonstrated that these commonly used routing schemes cannot utilize the network spectral resources optimally in the newly introduced EONs. Thus, we propose a new routing scheme for EON, namely, k -distance adaptive paths (KDAP) that efficiently utilizes the benefit of distance-adaptive modulation, and bit rate-adaptive superchannel capability inherited by EON to improve spectrum utilization. In the proposed KDAP, routes are found and prioritized on the basis of bit rate, distance, spectrum granularity, and the number of links used for a particular route. To evaluate the performance of KSP, HC, LD, and the proposed KDAP, simulations have been performed for three different sized networks, namely, 7-node test network (TEST7), NSFNET, and 24-node US backbone network (UBN24). We comprehensively assess the performance of various conventional, and the proposed routing schemes by solving both the RSA and the dual RSA problems under homogeneous and heterogeneous traffic requirements. Simulation results demonstrate that there is a variation amongst the performance of KSP, HC, and LD, depending on the o - t pair, and the network topology and its connectivity. However, the proposed KDAP always performs better for all the considered networks and traffic scenarios, as compared to the conventional routing schemes, namely, KSP, HC, and LD. The proposed KDAP achieves up to 60 % , and 10.46 % improvement in terms of spectrum utilization, and resource utilization ratio, respectively, over the conventional routing schemes.
Improving the power efficiency of SOA-based UWB over fiber systems via pulse shape randomization
NASA Astrophysics Data System (ADS)
Taki, H.; Azou, S.; Hamie, A.; Al Housseini, A.; Alaeddine, A.; Sharaiha, A.
2016-09-01
A simple pulse shape randomization scheme is considered in this paper for improving the performance of ultra wide band (UWB) communication systems using On Off Keying (OOK) or pulse position modulation (PPM) formats. The advantage of the proposed scheme, which can be either employed for impulse radio (IR) or for carrier-based systems, is first theoretically studied based on closed-form derivations of power spectral densities. Then, we investigate an application to an IR-UWB over optical fiber system, by utilizing the 4th and 5th orders of Gaussian derivatives. Our approach proves to be effective for 1 Gbps-PPM and 2 Gbps-OOK transmissions, with an advantage in terms of power efficiency for short distances. We also examine the performance for a system employing an in-line Semiconductor Optical Amplifier (SOA) with the view to achieve a reach extension, while limiting the cost and system complexity.
NASA Technical Reports Server (NTRS)
Miller, Timothy M.; Costen, Nick; Allen, Christine
2007-01-01
The advance of new detector technologies combined with enhanced fabrication methods has resulted in an increase in development of large format arrays. The next generation of scientific instruments will utilize detectors containing hundreds to thousands of elements providing a more efficient means to conduct large area sky surveys. Some notable detectors include a 32x32 x-ray microcalorimeter for Constellation-X, an infrared bolometer called SAFIRE to fly on the airborne observatory SOFIA, and the sub-millimeter bolometer SCUBA-2 to be deployed at the JCMT which will use more than 10,000 elements for two colors, each color using four 32x40 arrays. Of these detectors, SCUBA-2 is farthest along in development and uses indium hybridization to multiplexers for readout of the large number of elements, a technology that will be required to enable the next generation of large format arrays. Our current efforts in working toward large format arrays have produced GISMO, the Goddard IRAM Superconducting 2-Millimeter observer. GISMO is a far infrared instrument to be field tested later this year at the IRAM 30 meter telescope in Spain. GISMO utilizes transition edge sensor (TES) technology in an 8x16 filled array format that allows for typical fan-out wiring and wire-bonding to four 1x32 NIST multiplexers. GISMO'S electrical wiring is routed along the tops of 30 micron walls which also serve as the mechanical framework for the array. This architecture works well for the 128 element array, but is approaching the limit for routing the necessary wires along the surface while maintaining a high fill factor. Larger format arrays will benefit greatly from making electrical connections through the wafer to the backside, where they can be hybridized to a read-out substrate tailored to handling the wiring scheme. The next generation array we are developing is a 32x40 element array on a pitch of 1135 microns that conforms to the NIST multiplexer, already developed for the SCUBA-2 instrument This architecture will utilize electrical connections that route from the TES to the support frame and through the wafer. The detector chip will then be hybridized to the NIST multiplexer via indium bump bonding. In our development scheme we are using substrates that allow for diagnostic testing of electrical continuity across the entire array and we are testing our process to minimize or eliminate any contact resistance at metal interfaces. Our goal is hybridizing a fully functional 32x40 array of TES bolometers to a NIST multiplexer. The following work presents our current progress toward enabling this technology.
Spurious sea ice formation caused by oscillatory ocean tracer advection schemes
NASA Astrophysics Data System (ADS)
Naughten, Kaitlin A.; Galton-Fenzi, Benjamin K.; Meissner, Katrin J.; England, Matthew H.; Brassington, Gary B.; Colberg, Frank; Hattermann, Tore; Debernard, Jens B.
2017-08-01
Tracer advection schemes used by ocean models are susceptible to artificial oscillations: a form of numerical error whereby the advected field alternates between overshooting and undershooting the exact solution, producing false extrema. Here we show that these oscillations have undesirable interactions with a coupled sea ice model. When oscillations cause the near-surface ocean temperature to fall below the freezing point, sea ice forms for no reason other than numerical error. This spurious sea ice formation has significant and wide-ranging impacts on Southern Ocean simulations, including the disappearance of coastal polynyas, stratification of the water column, erosion of Winter Water, and upwelling of warm Circumpolar Deep Water. This significantly limits the model's suitability for coupled ocean-ice and climate studies. Using the terrain-following-coordinate ocean model ROMS (Regional Ocean Modelling System) coupled to the sea ice model CICE (Community Ice CodE) on a circumpolar Antarctic domain, we compare the performance of three different tracer advection schemes, as well as two levels of parameterised diffusion and the addition of flux limiters to prevent numerical oscillations. The upwind third-order advection scheme performs better than the centered fourth-order and Akima fourth-order advection schemes, with far fewer incidents of spurious sea ice formation. The latter two schemes are less problematic with higher parameterised diffusion, although some supercooling artifacts persist. Spurious supercooling was eliminated by adding flux limiters to the upwind third-order scheme. We present this comparison as evidence of the problematic nature of oscillatory advection schemes in sea ice formation regions, and urge other ocean/sea-ice modellers to exercise caution when using such schemes.
Continuous-variable quantum network coding for coherent states
NASA Astrophysics Data System (ADS)
Shang, Tao; Li, Ke; Liu, Jian-wei
2017-04-01
As far as the spectral characteristic of quantum information is concerned, the existing quantum network coding schemes can be looked on as the discrete-variable quantum network coding schemes. Considering the practical advantage of continuous variables, in this paper, we explore two feasible continuous-variable quantum network coding (CVQNC) schemes. Basic operations and CVQNC schemes are both provided. The first scheme is based on Gaussian cloning and ADD/SUB operators and can transmit two coherent states across with a fidelity of 1/2, while the second scheme utilizes continuous-variable quantum teleportation and can transmit two coherent states perfectly. By encoding classical information on quantum states, quantum network coding schemes can be utilized to transmit classical information. Scheme analysis shows that compared with the discrete-variable paradigms, the proposed CVQNC schemes provide better network throughput from the viewpoint of classical information transmission. By modulating the amplitude and phase quadratures of coherent states with classical characters, the first scheme and the second scheme can transmit 4{log _2}N and 2{log _2}N bits of information by a single network use, respectively.
Time integration algorithms for the two-dimensional Euler equations on unstructured meshes
NASA Technical Reports Server (NTRS)
Slack, David C.; Whitaker, D. L.; Walters, Robert W.
1994-01-01
Explicit and implicit time integration algorithms for the two-dimensional Euler equations on unstructured grids are presented. Both cell-centered and cell-vertex finite volume upwind schemes utilizing Roe's approximate Riemann solver are developed. For the cell-vertex scheme, a four-stage Runge-Kutta time integration, a fourstage Runge-Kutta time integration with implicit residual averaging, a point Jacobi method, a symmetric point Gauss-Seidel method and two methods utilizing preconditioned sparse matrix solvers are presented. For the cell-centered scheme, a Runge-Kutta scheme, an implicit tridiagonal relaxation scheme modeled after line Gauss-Seidel, a fully implicit lower-upper (LU) decomposition, and a hybrid scheme utilizing both Runge-Kutta and LU methods are presented. A reverse Cuthill-McKee renumbering scheme is employed for the direct solver to decrease CPU time by reducing the fill of the Jacobian matrix. A comparison of the various time integration schemes is made for both first-order and higher order accurate solutions using several mesh sizes, higher order accuracy is achieved by using multidimensional monotone linear reconstruction procedures. The results obtained for a transonic flow over a circular arc suggest that the preconditioned sparse matrix solvers perform better than the other methods as the number of elements in the mesh increases.
NASA Astrophysics Data System (ADS)
Johnson, Stanley
An increasing adoption of digital signal processing (DSP) in optical fiber telecommunication has brought to the fore several interesting DSP enabled modulation formats. One such format is orthogonal frequency division multiplexing (OFDM), which has seen great success in wireless and wired RF applications, and is being actively investigated by several research groups for use in optical fiber telecom. In this dissertation, I present three implementations of OFDM for elastic optical networking and distributed network control. The first is a field programmable gate array (FPGA) based real-time implementation of a version of OFDM conventionally known as intensity modulation and direct detection (IMDD) OFDM. I experimentally demonstrate the ability of this transmission system to dynamically adjust bandwidth and modulation format to meet networking constraints in an automated manner. To the best of my knowledge, this is the first real-time software defined networking (SDN) based control of an OFDM system. In the second OFDM implementation, I experimentally demonstrate a novel OFDM transmission scheme that supports both direct detection and coherent detection receivers simultaneously using the same OFDM transmitter. This interchangeable receiver solution enables a trade-off between bit rate and equipment cost in network deployment and upgrades. I show that the proposed transmission scheme can provide a receiver sensitivity improvement of up to 1.73 dB as compared to IMDD OFDM. I also present two novel polarization analyzer based detection schemes, and study their performance using experiment and simulation. In the third implementation, I present an OFDM pilot-tone based scheme for distributed network control. The first instance of an SDN-based OFDM elastic optical network with pilot-tone assisted distributed control is demonstrated. An improvement in spectral efficiency and a fast reconfiguration time of 30 ms have been achieved in this experiment. Finally, I experimentally demonstrate optical re-timing of a 10.7 Gb/s data stream utilizing the property of bound soliton pairs (or "soliton molecules") to relax to an equilibrium temporal separation after propagation through a nonlinear dispersion alternating fiber span. Pulses offset up to 16 ps from bit center are successfully re-timed. The optical re-timing scheme studied here is a good example of signal processing in the optical domain and such a technique can overcome the bandwidth bottleneck present in DSP. An enhanced version of this re-timing scheme is analyzed using numerical simulations.
A comparative study of advanced shock-capturing schemes applied to Burgers' equation
NASA Technical Reports Server (NTRS)
Yang, H. Q.; Przekwas, A. J.
1990-01-01
Several variations of the TVD scheme, ENO scheme, FCT scheme, and geometrical schemes, such as MUSCL and PPM, are considered. A comparative study of these schemes as applied to the Burgers' equation is presented. The objective is to assess their performance for problems involving formation and propagation of shocks, shock collisions, and expansion of discontinuities.
NASA Astrophysics Data System (ADS)
Lins, T. F.; Azaiez, J.
2018-03-01
Interfacial instabilities of immiscible two-phase radial flow displacements in homogeneous porous media are analyzed for constant and time-dependent sinusoidal cyclic injection schemes. The analysis is carried out through numerical simulations based on the immersed interface and level set methods. The effects of the fluid properties and the injection flow parameters, namely, the period and the amplitude, on the formation of droplets and pockets are analyzed. It was found that larger capillary numbers or smaller viscosity ratios lead to more droplets/pockets that tend to appear earlier in time. Furthermore, the period and amplitude of the cyclic schemes were found to have a strong effect on droplets/pockets formations, and depending on their values, these can be enhanced or attenuated. In particular, the results revealed that there is a critical amplitude above which droplets and pockets formation is suppressed up to a specified time. This critical amplitude depends on the fluid properties, namely, the viscosity ratio and surface tension as well as on the period of the time-dependent scheme. The results of this study indicate that it is possible to use time-dependent cyclic schemes to control the formation and development of droplets/pockets in the flow and in particular to delay their appearance through an appropriate combination of the displacement scheme's amplitude and period.
Duku, Stephen Kwasi Opoku; Asenso-Boadi, Francis; Nketiah-Amponsah, Edward; Arhinful, Daniel Kojo
2016-12-01
Utilization of healthcare in Ghana's novel National Health Insurance Scheme (NHIS) has been increasing since inception with associated high claims bill which threatens the scheme's financial sustainability. This paper investigates the presence of adverse selection by assessing the effect of healthcare utilization and frequency of use on NHIS renewal. Routine enrolment and utilization data from 2008 to 2013 in two regions in Ghana was analyzed. Pearson Chi-square test was performed to test if the proportion of insured who utilize healthcare in a particular year and renew membership the following year is significantly different from those who utilize healthcare and drop-out. Logistic regressions were estimated to examine the relationship between healthcare utilization and frequency of use in previous year and NHIS renewal in current year. We found evidence suggestive of the presence of adverse selection in the NHIS. Majority of insured who utilized healthcare renewed their membership whiles most of those who did not utilize healthcare dropped out. The likelihood of renewal was significantly higher for those who utilize healthcare than those who did not and also higher for those who make more health facility visits. The NHIS claims bill is high because high risk individuals who self-select into the scheme makes more health facility visits and creates financial sustainability problems. Policy makers should adopt pragmatic ways of enforcing mandatory enrolment so that low risk individuals remain enrolled; and sustainable ways of increasing revenue whiles ensuring that the societal objectives of the scheme are not compromised.
Establishing rational networking using the DL04 quantum secure direct communication protocol
NASA Astrophysics Data System (ADS)
Qin, Huawang; Tang, Wallace K. S.; Tso, Raylin
2018-06-01
The first rational quantum secure direct communication scheme is proposed, in which we use the game theory with incomplete information to model the rational behavior of the participant, and give the strategy space and utility function. The rational participant can get his maximal utility when he performs the protocol faithfully, and then the Nash equilibrium of the protocol can be achieved. Compared to the traditional schemes, our scheme will be more practical in the presence of rational participant.
Simulating Freak Waves in the Ocean with CFD Modeling
NASA Astrophysics Data System (ADS)
Manolidis, M.; Orzech, M.; Simeonov, J.
2017-12-01
Rogue, or freak, waves constitute an active topic of research within the world scientific community, as various maritime authorities around the globe seek to better understand and more accurately assess the risks that the occurrence of such phenomena entail. Several experimental studies have shed some light on the mechanics of rogue wave formation. In our work we numerically simulate the formation of such waves in oceanic conditions by means of Computational Fluid Dynamics (CFD) software. For this purpose we implement the NHWAVE and OpenFOAM software packages. Both are non-hydrostatic, turbulent flow solvers, but NHWAVE implements a shock-capturing scheme at the free surface-interface, while OpenFOAM utilizes the Volume Of Fluid (VOF) method. NHWAVE has been shown to accurately reproduce highly nonlinear surface wave phenomena, such as soliton propagation and wave shoaling. We conducted a range of tests simulating rogue wave formation and horizontally varying currents to evaluate and compare the capabilities of the two software packages. Then we used each model to investigate the effect of ocean currents and current gradients on the formation of rogue waves. We present preliminary results.
[Degradation of fluorene and fluoranthene by the basidiomycete Pleurotus ostreatus].
Pozdnyakova, N N; Chernyshova, M P; Grinev, V S; Landesman, E O; Koroleva, O V; Turkovskaya, O V
2016-01-01
The dependence of the degree of fluorene and fluoranthene degradation by the fungus Pleurotus ostreatus D1 on the culture medium composition has been studied. Polycyclic aromatic hydrocarbons (PAHs) have been transformed in Kirk’s medium (under conditions of laccase production) with the formation of a quinone metabolite and 9-fluorenone upon the use of fluoranthene and fluorene as substrates, respectively. More complete degradation with the formation of an intermediate metabolite, phthalic acid that has undergone subsequent utilization, has occurred in basidiomycete-rich medium (under the production of both laccase and versatile peroxidase). The formation of phthalic acid as a metabolite of fluoranthene degradation by lignolytic fungi has been revealed for the first time. The data allow the supposition that both extracellular laccase and laccase on the mycelium surface can participate in the initial stages of PAH metabolism, while versatile peroxidase is necessary for the oxidation of the formed metabolites. A scheme of fluorene metabolism by Pleurotus ostreatus D1 is suggested.
Tethered satellite system control using electromagnetic forces and reaction wheels
NASA Astrophysics Data System (ADS)
Alandi Hallaj, Mohammad Amin; Assadian, Nima
2015-12-01
In this paper a novel non-rotating space tethered configuration is introduced which its relative positions controlled using electromagnetic forces. The attitude dynamics is controlled by three reaction wheels in the body axes. The nonlinear coupled orbital dynamics of a dumbbell tethered satellite formation flight are derived through a constrained Lagrangian approach. These equations are presented in the leader satellite orbital frame. The tether is assumed to be mass-less and straight, and the J2 perturbation is included to the analysis. The forces and the moments of the electromagnetic coils are modeled based on the far-filed model of the magnetic dipoles. A guidance scheme for generating the desired positions as a function of time in Cartesian form is presented. The satellite tethered formation with variable length is controlled utilizing a linear controller. This approach is applied to a specified scenario and it is shown that the nonlinear guidance method and the linear controller can control the nonlinear system of the tethered formation and the results are compared with optimal control approach.
Random access to mobile networks with advanced error correction
NASA Technical Reports Server (NTRS)
Dippold, Michael
1990-01-01
A random access scheme for unreliable data channels is investigated in conjunction with an adaptive Hybrid-II Automatic Repeat Request (ARQ) scheme using Rate Compatible Punctured Codes (RCPC) Forward Error Correction (FEC). A simple scheme with fixed frame length and equal slot sizes is chosen and reservation is implicit by the first packet transmitted randomly in a free slot, similar to Reservation Aloha. This allows the further transmission of redundancy if the last decoding attempt failed. Results show that a high channel utilization and superior throughput can be achieved with this scheme that shows a quite low implementation complexity. For the example of an interleaved Rayleigh channel and soft decision utilization and mean delay are calculated. A utilization of 40 percent may be achieved for a frame with the number of slots being equal to half the station number under high traffic load. The effects of feedback channel errors and some countermeasures are discussed.
Bolea, Mario; Mora, José; Ortega, Beatriz; Capmany, José
2013-11-18
We present a high-order UWB pulses generator based on a microwave photonic filter which provides a set of positive and negative samples by using the slicing of an incoherent optical source and the phase inversion in a Mach-Zehnder modulator. The simple scalability and high reconfigurability of the system permit a better accomplishment of the FCC requirements. Moreover, the proposed scheme permits an easy adaptation to pulse amplitude modulation, bi phase modulation, pulse shape modulation and pulse position modulation. The flexibility of the scheme for being adaptable to multilevel modulation formats permits to increase the transmission bit rate by using hybrid modulation formats.
Supernova feedback in numerical simulations of galaxy formation: separating physics from numerics
NASA Astrophysics Data System (ADS)
Smith, Matthew C.; Sijacki, Debora; Shen, Sijing
2018-07-01
While feedback from massive stars exploding as supernovae (SNe) is thought to be one of the key ingredients regulating galaxy formation, theoretically it is still unclear how the available energy couples to the interstellar medium and how galactic scale outflows are launched. We present a novel implementation of six sub-grid SN feedback schemes in the moving-mesh code AREPO, including injections of thermal and/or kinetic energy, two parametrizations of delayed cooling feedback and a `mechanical' feedback scheme that injects the correct amount of momentum depending on the relevant scale of the SN remnant resolved. All schemes make use of individually time-resolved SN events. Adopting isolated disc galaxy set-ups at different resolutions, with the highest resolution runs reasonably resolving the Sedov-Taylor phase of the SN, we aim to find a physically motivated scheme with as few tunable parameters as possible. As expected, simple injections of energy overcool at all but the highest resolution. Our delayed cooling schemes result in overstrong feedback, destroying the disc. The mechanical feedback scheme is efficient at suppressing star formation, agrees well with the Kennicutt-Schmidt relation, and leads to converged star formation rates and galaxy morphologies with increasing resolution without fine-tuning any parameters. However, we find it difficult to produce outflows with high enough mass loading factors at all but the highest resolution, indicating either that we have oversimplified the evolution of unresolved SN remnants, require other stellar feedback processes to be included, and require a better star formation prescription or most likely some combination of these issues.
Supernova feedback in numerical simulations of galaxy formation: separating physics from numerics
NASA Astrophysics Data System (ADS)
Smith, Matthew C.; Sijacki, Debora; Shen, Sijing
2018-04-01
While feedback from massive stars exploding as supernovae (SNe) is thought to be one of the key ingredients regulating galaxy formation, theoretically it is still unclear how the available energy couples to the interstellar medium and how galactic scale outflows are launched. We present a novel implementation of six sub-grid SN feedback schemes in the moving-mesh code AREPO, including injections of thermal and/or kinetic energy, two parametrizations of delayed cooling feedback and a `mechanical' feedback scheme that injects the correct amount of momentum depending on the relevant scale of the SN remnant resolved. All schemes make use of individually time-resolved SN events. Adopting isolated disk galaxy setups at different resolutions, with the highest resolution runs reasonably resolving the Sedov-Taylor phase of the SN, we aim to find a physically motivated scheme with as few tunable parameters as possible. As expected, simple injections of energy overcool at all but the highest resolution. Our delayed cooling schemes result in overstrong feedback, destroying the disk. The mechanical feedback scheme is efficient at suppressing star formation, agrees well with the Kennicutt-Schmidt relation and leads to converged star formation rates and galaxy morphologies with increasing resolution without fine tuning any parameters. However, we find it difficult to produce outflows with high enough mass loading factors at all but the highest resolution, indicating either that we have oversimplified the evolution of unresolved SN remnants, require other stellar feedback processes to be included, require a better star formation prescription or most likely some combination of these issues.
Oxidation of monohydric phenol substrates by tyrosinase: effect of dithiothreitol on kinetics.
Naish-Byfield, S; Cooksey, C J; Riley, P A
1994-11-15
The effect of thiol compounds on the monophenolase activity of tyrosinase was investigated using 4-hydroxyanisole as the substrate and dithiothreitol (DTT) as the model thiol compound. We have demonstrated three actions of DTT on tyrosinase-catalysed reactions: (1) direct reduction of the copper at the active site of the enzyme; (2) generation of secondary, oxidizable species by adduct formation with the o-quinone reaction product, 4-MOB, which leads to an increase in the total oxygen utilization by the reaction system; and (3) reversible inhibition of the enzyme. We confirm our previous observation that, at approx. 10 mol of DTT/mol of enzyme, the lag phase associated with monohydric phenol oxidation by tyrosinase is abolished. We suggest that this is due to reduction of the copper at the active site of the enzyme by DTT, since (a) reduction of active-site copper in situ by DTT was demonstrated by [Cu(I)]2-carbon monoxide complex formation and (b) abolition of the lag at low DTT concentration occurs without effect on the maximum rate of reaction or on the total amount of oxygen utilized. At concentrations of DTT above that required to abolish the lag, we found that the initial velocity of the reaction increased with increasing DTT, with a concomitant increase in the total oxygen utilization. This is due to the formation of DTT-4-methoxy-o-benzoquinone (4-MOB) adducts which provide additional dihydric phenol substrate either directly or by reducing nascent 4-MOB. We present n.m.r. evidence for the formation of mono- and di-aromatic DTT adducts with 4-MOB, consistent with a suggested reoxidation scheme in the presence of tyrosinase. Inhibition of the enzyme at concentrations of DTT above 300 pmol/unit of enzyme was released on exhaustion of DTT by adduct formation with 4-MOB as it was generated.
A Two-Timescale Discretization Scheme for Collocation
NASA Technical Reports Server (NTRS)
Desai, Prasun; Conway, Bruce A.
2004-01-01
The development of a two-timescale discretization scheme for collocation is presented. This scheme allows a larger discretization to be utilized for smoothly varying state variables and a second finer discretization to be utilized for state variables having higher frequency dynamics. As such. the discretization scheme can be tailored to the dynamics of the particular state variables. In so doing. the size of the overall Nonlinear Programming (NLP) problem can be reduced significantly. Two two-timescale discretization architecture schemes are described. Comparison of results between the two-timescale method and conventional collocation show very good agreement. Differences of less than 0.5 percent are observed. Consequently. a significant reduction (by two-thirds) in the number of NLP parameters and iterations required for convergence can be achieved without sacrificing solution accuracy.
Wang, Yujuan; Song, Yongduan; Ren, Wei
2017-07-06
This paper presents a distributed adaptive finite-time control solution to the formation-containment problem for multiple networked systems with uncertain nonlinear dynamics and directed communication constraints. By integrating the special topology feature of the new constructed symmetrical matrix, the technical difficulty in finite-time formation-containment control arising from the asymmetrical Laplacian matrix under single-way directed communication is circumvented. Based upon fractional power feedback of the local error, an adaptive distributed control scheme is established to drive the leaders into the prespecified formation configuration in finite time. Meanwhile, a distributed adaptive control scheme, independent of the unavailable inputs of the leaders, is designed to keep the followers within a bounded distance from the moving leaders and then to make the followers enter the convex hull shaped by the formation of the leaders in finite time. The effectiveness of the proposed control scheme is confirmed by the simulation.
Prinja, Shankar; Chauhan, Akashdeep Singh; Karan, Anup; Kaur, Gunjeet; Kumar, Rajesh
2017-01-01
Several publicly financed health insurance schemes have been launched in India with the aim of providing universalizing health coverage (UHC). In this paper, we report the impact of publicly financed health insurance schemes on health service utilization, out-of-pocket (OOP) expenditure, financial risk protection and health status. Empirical research studies focussing on the impact or evaluation of publicly financed health insurance schemes in India were searched on PubMed, Google scholar, Ovid, Scopus, Embase and relevant websites. The studies were selected based on two stage screening PRISMA guidelines in which two researchers independently assessed the suitability and quality of the studies. The studies included in the review were divided into two groups i.e., with and without a comparison group. To assess the impact on utilization, OOP expenditure and health indicators, only the studies with a comparison group were reviewed. Out of 1265 articles screened after initial search, 43 studies were found eligible and reviewed in full text, finally yielding 14 studies which had a comparator group in their evaluation design. All the studies (n-7) focussing on utilization showed a positive effect in terms of increase in the consumption of health services with introduction of health insurance. About 70% studies (n-5) studies with a strong design and assessing financial risk protection showed no impact in reduction of OOP expenditures, while remaining 30% of evaluations (n-2), which particularly evaluated state sponsored health insurance schemes, reported a decline in OOP expenditure among the enrolled households. One study which evaluated impact on health outcome showed reduction in mortality among enrolled as compared to non-enrolled households, from conditions covered by the insurance scheme. While utilization of healthcare did improve among those enrolled in the scheme, there is no clear evidence yet to suggest that these have resulted in reduced OOP expenditures or higher financial risk protection.
Chauhan, Akashdeep Singh; Karan, Anup; Kaur, Gunjeet; Kumar, Rajesh
2017-01-01
Several publicly financed health insurance schemes have been launched in India with the aim of providing universalizing health coverage (UHC). In this paper, we report the impact of publicly financed health insurance schemes on health service utilization, out-of-pocket (OOP) expenditure, financial risk protection and health status. Empirical research studies focussing on the impact or evaluation of publicly financed health insurance schemes in India were searched on PubMed, Google scholar, Ovid, Scopus, Embase and relevant websites. The studies were selected based on two stage screening PRISMA guidelines in which two researchers independently assessed the suitability and quality of the studies. The studies included in the review were divided into two groups i.e., with and without a comparison group. To assess the impact on utilization, OOP expenditure and health indicators, only the studies with a comparison group were reviewed. Out of 1265 articles screened after initial search, 43 studies were found eligible and reviewed in full text, finally yielding 14 studies which had a comparator group in their evaluation design. All the studies (n-7) focussing on utilization showed a positive effect in terms of increase in the consumption of health services with introduction of health insurance. About 70% studies (n-5) studies with a strong design and assessing financial risk protection showed no impact in reduction of OOP expenditures, while remaining 30% of evaluations (n-2), which particularly evaluated state sponsored health insurance schemes, reported a decline in OOP expenditure among the enrolled households. One study which evaluated impact on health outcome showed reduction in mortality among enrolled as compared to non-enrolled households, from conditions covered by the insurance scheme. While utilization of healthcare did improve among those enrolled in the scheme, there is no clear evidence yet to suggest that these have resulted in reduced OOP expenditures or higher financial risk protection. PMID:28151946
Self-replication with magnetic dipolar colloids
NASA Astrophysics Data System (ADS)
Dempster, Joshua M.; Zhang, Rui; Olvera de la Cruz, Monica
2015-10-01
Colloidal self-replication represents an exciting research frontier in soft matter physics. Currently, all reported self-replication schemes involve coating colloidal particles with stimuli-responsive molecules to allow switchable interactions. In this paper, we introduce a scheme using ferromagnetic dipolar colloids and preprogrammed external magnetic fields to create an autonomous self-replication system. Interparticle dipole-dipole forces and periodically varying weak-strong magnetic fields cooperate to drive colloid monomers from the solute onto templates, bind them into replicas, and dissolve template complexes. We present three general design principles for autonomous linear replicators, derived from a focused study of a minimalist sphere-dimer magnetic system in which single binding sites allow formation of dimeric templates. We show via statistical models and computer simulations that our system exhibits nonlinear growth of templates and produces nearly exponential growth (low error rate) upon adding an optimized competing electrostatic potential. We devise experimental strategies for constructing the required magnetic colloids based on documented laboratory techniques. We also present qualitative ideas about building more complex self-replicating structures utilizing magnetic colloids.
Defining Clonal Color in Fluorescent Multi-Clonal Tracking
Wu, Juwell W.; Turcotte, Raphaël; Alt, Clemens; Runnels, Judith M.; Tsao, Hensin; Lin, Charles P.
2016-01-01
Clonal heterogeneity and selection underpin many biological processes including development and tumor progression. Combinatorial fluorescent protein expression in germline cells has proven its utility for tracking the formation and regeneration of different organ systems. Such cell populations encoded by combinatorial fluorescent proteins are also attractive tools for understanding clonal expansion and clonal competition in cancer. However, the assignment of clonal identity requires an analytical framework in which clonal markings can be parameterized and validated. Here we present a systematic and quantitative method for RGB analysis of fluorescent melanoma cancer clones. We then demonstrate refined clonal trackability of melanoma cells using this scheme. PMID:27073117
Novel MDM-PON scheme utilizing self-homodyne detection for high-speed/capacity access networks.
Chen, Yuanxiang; Li, Juhao; Zhu, Paikun; Wu, Zhongying; Zhou, Peng; Tian, Yu; Ren, Fang; Yu, Jinyi; Ge, Dawei; Chen, Jingbiao; He, Yongqi; Chen, Zhangyuan
2015-12-14
In this paper, we propose a cost-effective, energy-saving mode-division-multiplexing passive optical network (MDM-PON) scheme utilizing self-homodyne detection for high-speed/capacity access network based on low modal-crosstalk few-mode fiber (FMF) and all-fiber mode multiplexer/demultiplexer (MUX/DEMUX). In the proposed scheme, one of the spatial modes is used to transmit a portion of signal carrier (namely pilot-tone) as the local oscillator (LO), while the others are used for signal-bearing channels. At the receiver, the pilot-tone and the signal can be separated without strong crosstalk and sent to the receiver for coherent detection. The spectral efficiency (SE) is significantly enhanced when multiple spatial channels are used. Meanwhile, the self-homodyne detection scheme can effectively suppress laser phase noise, which relaxes the requirement for the lasers line-width at the optical line terminal or optical network units (OLT/ONUs). The digital signal processing (DSP) at the receiver is also simplified since it removes the need for frequency offset compensation and complex phase correction, which reduces the computational complexity and energy consumption. Polarization division multiplexing (PDM) that offers doubled SE is also supported by the scheme. The proposed scheme is scalable to multi-wavelength application when wavelength MUX/DEMUX is utilized. Utilizing the proposed scheme, we demonstrate a proof of concept 4 × 40-Gb/s orthogonal frequency division multiplexing (OFDM) transmission over 55-km FMF using low modal-crosstalk two-mode FMF and MUX/DEMUX with error free operation. Compared with back to back case, less than 1-dB Q-factor penalty is observed after 55-km FMF of the four channels. Signal power and pilot-tone power are also optimized to achieve the optimal transmission performance.
Case studies in configuration control for redundant robots
NASA Technical Reports Server (NTRS)
Seraji, H.; Lee, T.; Colbaugh, R.; Glass, K.
1989-01-01
A simple approach to configuration control of redundant robots is presented. The redundancy is utilized to control the robot configuration directly in task space, where the task will be performed. A number of task-related kinematic functions are defined and combined with the end-effector coordinates to form a set of configuration variables. An adaptive control scheme is then utilized to ensure that the configuration variables track the desired reference trajectories as closely as possible. Simulation results are presented to illustrate the control scheme. The scheme has also been implemented for direct online control of a PUMA industrial robot, and experimental results are presented. The simulation and experimental results validate the configuration control scheme for performing various realistic tasks.
A discrete-time adaptive control scheme for robot manipulators
NASA Technical Reports Server (NTRS)
Tarokh, M.
1990-01-01
A discrete-time model reference adaptive control scheme is developed for trajectory tracking of robot manipulators. The scheme utilizes feedback, feedforward, and auxiliary signals, obtained from joint angle measurement through simple expressions. Hyperstability theory is utilized to derive the adaptation laws for the controller gain matrices. It is shown that trajectory tracking is achieved despite gross robot parameter variation and uncertainties. The method offers considerable design flexibility and enables the designer to improve the performance of the control system by adjusting free design parameters. The discrete-time adaptation algorithm is extremely simple and is therefore suitable for real-time implementation. Simulations and experimental results are given to demonstrate the performance of the scheme.
Kesuma, Zurnila Marli; Chongsuvivatwong, Virasakdi
2015-04-01
Aceh province of Indonesia created its own health coverage scheme called Jaminan Kesehatan Aceh (JKA) to cover Aceh's populations who were not registered under insurance for the poor (Jamkesmas). This study aims to compare the utilization rate of maternal health care (MHC) services and contraceptive prevalence rate (CPR) before JKA, during the transition period, and after JKA had been established. A cross-sectional household survey was conducted from June 2011 to July 2012. Utilization of MHC services and CPR during the 3 periods was assessed using a questionnaire. The Mantel-Haenszel χ(2) test was used to examine the association between period and coverage. Generalized estimating equations (GEEs) were used to examine utilization and type of service, period of service, and type of scheme. Coverage of utilization of skilled birth attendants significantly improved among the JKA holders (odds ratio = 1.84; 95% confidence interval = 1.18-2.89). JKA, thus, has shown its positive impact. © 2014 APJPH.
Quantum games of opinion formation based on the Marinatto-Weber quantum game scheme
NASA Astrophysics Data System (ADS)
Deng, Xinyang; Deng, Yong; Liu, Qi; Shi, Lei; Wang, Zhen
2016-06-01
Quantization has become a new way to investigate classical game theory since quantum strategies and quantum games were proposed. In the existing studies, many typical game models, such as the prisoner's dilemma, battle of the sexes, Hawk-Dove game, have been extensively explored by using quantization approach. Along a similar method, here several game models of opinion formations will be quantized on the basis of the Marinatto-Weber quantum game scheme, a frequently used scheme of converting classical games to quantum versions. Our results show that the quantization can fascinatingly change the properties of some classical opinion formation game models so as to generate win-win outcomes.
Peer-supported review of teaching: an evaluation.
Thampy, Harish; Bourke, Michael; Naran, Prasheena
2015-09-01
Peer-supported review (also called peer observation) of teaching is a commonly implemented method of ascertaining teaching quality that supplements student feedback. A large variety of scheme formats with rather differing purposes are described in the literature. They range from purely formative, developmental formats that facilitate a tutor's reflection of their own teaching to reaffirm strengths and identify potential areas for development through to faculty- or institution-driven summative quality assurance-based schemes. Much of the current literature in this field focuses within general higher education and on the development of rating scales, checklists or observation tools to help guide the process. This study reports findings from a qualitative evaluation of a purely formative peer-supported review of teaching scheme that was implemented for general practice clinical tutors at our medical school and describes tutors' attitudes and perceived benefits and challenges when undergoing observation.
NASA Technical Reports Server (NTRS)
Sears, Derek W. G.; Shaoxiong, Huang; Benoit, Paul H.
1995-01-01
The recently proposed compositional classification scheme for meteoritic chondrules divides the chondrules into groups depending on the composition of their two major phases, olivine (or pyroxene) and the mesostasis, both of which are genetically important. The scheme is here applied to discussions of three topics: the petrographic classification of Roosevelt County 075 (the least-metamorphosed H chondrite known), brecciation (an extremely important and ubiquitous process probably experienced by greater than 40% of all unequilibrated ordinary chondrites), and the group A5 chondrules in the least metamorphosed ordinary chondrites which have many similarities to chondrules in the highly metamorphosed 'equilibrated' chondrites. Since composition provides insights into both primary formation properties of the chondruies and the effects of metamorphism on the entire assemblage it is possible to determine the petrographic type of RC075 as 3.1 with unique certainty. Similarly, the near scheme can be applied to individual chondrules without knowledge of the petrographic type of the host chondrite, which makes it especially suitable for studying breccias. Finally, the new scheme has revealed the existence of chondrules not identified by previous techniques and which appear to be extremely important. Like group A1 and A2 chondrules (but unlike group B1 chondrules) the primitive group A5 chondruies did not supercool during formation, but unlike group A1 and A2 chondrules (and like group B1 chondrules) they did not suffer volatile loss and reduction during formation. It is concluded that the compositional classification scheme provides important new insights into the formation and history of chondrules and chondrites which would be overlooked by previous schemes.
Condensed tannins: A proposed route to 2R,3R-(2,3-cis)-proanthocyanidins
Richard W. Hemingway; Peter E. Laks
1985-01-01
Roux,1 Haslam,2-4 and Stafford5-8 have proposed differing biogenetic schemes for the formation of proanthocyanidins (condensed tannins) in plants. All three schemes suffer from difficulties in explaining the formation of the 2R,3R-(2,3-cis)-proanthocyanidins that predominate in...
A novel 2.5D finite difference scheme for simulations of resistivity logging in anisotropic media
NASA Astrophysics Data System (ADS)
Zeng, Shubin; Chen, Fangzhou; Li, Dawei; Chen, Ji; Chen, Jiefu
2018-03-01
The objective of this study is to develop a method to model 3D resistivity well logging problems in 2D formation with anisotropy, known as 2.5D modeling. The traditional 1D forward modeling extensively used in practice lacks the capability of modeling 2D formation. A 2.5D finite difference method (FDM) solving all the electric and magnetic field components simultaneously is proposed. Compared to other previous 2.5D FDM schemes, this method is more straightforward in modeling fully anisotropic media and easy to be implemented. Fourier transform is essential to this FDM scheme, and by employing Gauss-Legendre (GL) quadrature rule the computational time of this step can be greatly reduced. In the numerical examples, we first demonstrate the validity of the FDM scheme with GL rule by comparing with 1D forward modeling for layered anisotropic problems, and then we model a complicated 2D formation case and find that the proposed 2.5D FD scheme is much more efficient than 3D numerical methods.
This paper utilizes a two-stage clustering approach as part of an objective classification scheme designed to elucidate 03's dependence on meteorology. hen applied to ten years (1981-1990) of meteorological data for Birmingham, Alabama, the classification scheme identified seven ...
ERIC Educational Resources Information Center
De Lisle, Jerome
2015-01-01
Continuous Assessment (CA) systems are externally directed, curriculum-based assessment schemes used for both summative and formative purposes within classrooms. CA has been implemented as national policy in several postcolonial developing countries and is believed to hold great promise for improving education outcomes. This theory-driven…
NASA Technical Reports Server (NTRS)
Brooner, W. G.; Nichols, D. A.
1972-01-01
Development of a scheme for utilizing remote sensing technology in an operational program for regional land use planning and land resource management program applications. The scheme utilizes remote sensing imagery as one of several potential inputs to derive desired and necessary data, and considers several alternative approaches to the expansion and/or reduction and analysis of data, using automated data handling techniques. Within this scheme is a five-stage program development which includes: (1) preliminary coordination, (2) interpretation and encoding, (3) creation of data base files, (4) data analysis and generation of desired products, and (5) applications.
Dwumoh, Duah; Essuman, Edward Eyipe; Afagbedzi, Seth Kwaku
2014-01-01
The effects of National Health Insurance Scheme in Ghana and its impact on child health outcome and service utilization cannot be underestimated. Despite the tremendous improvement in child health care in Ghana, there are still some challenges in relation to how National health insurance membership, socioeconomic status and other demographic factors impacts on child health outcomes. The study seeks to determine the association between NHIS membership, socio-economic status, geographic location and other relevant background factors, on child health service utilization and outcomes. Secondary data from the Multiple Indicator Cluster Survey conducted in 2011 was used. Multivariate analysis based on Binary Logistic Regression Models and Multiple linear regression techniques was applied to determine factors associated with child health outcomes and service utilization. Collection of best models was based on Hosmer-Lemeshow Goodness-Of-Fit as one criterion of fit and the Akaike Information Criterion. Controlling for confounding effect of socioeconomic status, age of the child, mothers education level and geographic location, the odds of a child developing anemia for children with National Health Insurance Scheme Membership is 65.2% [95% CI: 52.9-80.2] times less than children without National Health Insurance Scheme Membership. The odds of being fully immunized against common childhood illnesses for children with NHIS membership is 2.3[95% CI: 1.4-3.7] times higher than children without National Health Insurance Scheme Membership. There was no association between National Health Insurance Scheme Membership and stunted growth in children. National Health Insurance Scheme Membership was found to be related to child health service utilization (full immunization) of children under five a child's anemia status. Children with NHIS are more likely to be fully immunized against common childhood diseases and are less likely to develop anemia. Stunted growth of children was not associated with National Health Insurance Scheme Membership. Health Education on the registration and the use of the National Health Insurance should be made a national priority to enable the Ministry of Health achieve routine Immunization targets and to reduce to the bearers minimum prevalence of anemia.
A Combined Eulerian-Lagrangian Data Representation for Large-Scale Applications.
Sauer, Franz; Xie, Jinrong; Ma, Kwan-Liu
2017-10-01
The Eulerian and Lagrangian reference frames each provide a unique perspective when studying and visualizing results from scientific systems. As a result, many large-scale simulations produce data in both formats, and analysis tasks that simultaneously utilize information from both representations are becoming increasingly popular. However, due to their fundamentally different nature, drawing correlations between these data formats is a computationally difficult task, especially in a large-scale setting. In this work, we present a new data representation which combines both reference frames into a joint Eulerian-Lagrangian format. By reorganizing Lagrangian information according to the Eulerian simulation grid into a "unit cell" based approach, we can provide an efficient out-of-core means of sampling, querying, and operating with both representations simultaneously. We also extend this design to generate multi-resolution subsets of the full data to suit the viewer's needs and provide a fast flow-aware trajectory construction scheme. We demonstrate the effectiveness of our method using three large-scale real world scientific datasets and provide insight into the types of performance gains that can be achieved.
Jeong, K; Choo, Y S; Hong, H J; Yoon, Y S; Song, M H
2015-03-01
Vast size hydrate formation reactors with fast conversion rate are required for the economic implementation of seawater desalination utilizing gas hydrate technology. The commercial target production rate is order of thousand tons of potable water per day per train. Various heat and mass transfer enhancement schemes including agitation, spraying, and bubbling have been examined to maximize the production capacities in scaled up design of hydrate formation reactors. The present experimental study focused on acquiring basic knowledge needed to design variable volume reactors to produce tetrafluoroethane hydrate slurry. Test vessel was composed of main cavity with fixed volume of 140 ml and auxiliary cavity with variable volume of 0 ∼ 64 ml. Temperatures at multiple locations within vessel and pressure were monitored while visual access was made through front window. Alternating evaporation and condensation induced by cyclic volume change provided agitation due to density differences among water and vapor, liquid and hydrate R134a as well as extended interface area, which improved hydrate formation kinetics coupled with latent heat release and absorption. Influences of coolant temperature, piston stroke/speed, and volume change period on hydrate formation kinetics were investigated. Suggestions of reactor design improvement for future experimental study are also made.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jeong, K.; Choo, Y. S.; Hong, H. J.
Vast size hydrate formation reactors with fast conversion rate are required for the economic implementation of seawater desalination utilizing gas hydrate technology. The commercial target production rate is order of thousand tons of potable water per day per train. Various heat and mass transfer enhancement schemes including agitation, spraying, and bubbling have been examined to maximize the production capacities in scaled up design of hydrate formation reactors. The present experimental study focused on acquiring basic knowledge needed to design variable volume reactors to produce tetrafluoroethane hydrate slurry. Test vessel was composed of main cavity with fixed volume of 140 mlmore » and auxiliary cavity with variable volume of 0 ∼ 64 ml. Temperatures at multiple locations within vessel and pressure were monitored while visual access was made through front window. Alternating evaporation and condensation induced by cyclic volume change provided agitation due to density differences among water and vapor, liquid and hydrate R134a as well as extended interface area, which improved hydrate formation kinetics coupled with latent heat release and absorption. Influences of coolant temperature, piston stroke/speed, and volume change period on hydrate formation kinetics were investigated. Suggestions of reactor design improvement for future experimental study are also made.« less
Optimization study on multiple train formation scheme of urban rail transit
NASA Astrophysics Data System (ADS)
Xia, Xiaomei; Ding, Yong; Wen, Xin
2018-05-01
The new organization method, represented by the mixed operation of multi-marshalling trains, can adapt to the characteristics of the uneven distribution of passenger flow, but the research on this aspect is still not perfect enough. This paper introduced the passenger sharing rate and congestion penalty coefficient with different train formations. On this basis, this paper established an optimization model with the minimum passenger cost and operation cost as objective, and operation frequency and passenger demand as constraint. The ideal point method is used to solve this model. Compared with the fixed marshalling operation model, the overall cost of this scheme saves 9.24% and 4.43% respectively. This result not only validates the validity of the model, but also illustrate the advantages of the multiple train formations scheme.
An efficient (t,n) threshold quantum secret sharing without entanglement
NASA Astrophysics Data System (ADS)
Qin, Huawang; Dai, Yuewei
2016-04-01
An efficient (t,n) threshold quantum secret sharing (QSS) scheme is proposed. In our scheme, the Hash function is used to check the eavesdropping, and no particles need to be published. So the utilization efficiency of the particles is real 100%. No entanglement is used in our scheme. The dealer uses the single particles to encode the secret information, and the participants get the secret through measuring the single particles. Compared to the existing schemes, our scheme is simpler and more efficient.
Watson, Wendy L; Kelly, Bridget; Hector, Debra; Hughes, Clare; King, Lesley; Crawford, Jennifer; Sergeant, John; Chapman, Kathy
2014-01-01
There is evidence that easily accessible, comprehensible and consistent nutrient information on the front of packaged foods could assist shoppers to make healthier food choices. This study used an online questionnaire of 4357 grocery shoppers to examine Australian shoppers' ability to use a range of front-of-pack labels to identify healthier food products. Seven different front-of-pack labelling schemes comprising variants of the Traffic Light labelling scheme and the Percentage Daily Intake scheme, and a star rating scheme, were applied to nine pairs of commonly purchased food products. Participants could also access a nutrition information panel for each product. Participants were able to identify the healthier product in each comparison over 80% of the time using any of the five schemes that provided information on multiple nutrients. No individual scheme performed significantly better in terms of shoppers' ability to determine the healthier product, shopper reliance on the 'back-of-pack' nutrition information panel, and speed of use. The scheme that provided information about energy only and a scheme with limited numerical information of nutrient type or content performed poorly, as did the nutrition information panel alone (control). Further consumer testing is necessary to determine the optimal format and content of an interpretive front-of-pack nutrition labelling scheme. Copyright © 2013 Elsevier Ltd. All rights reserved.
Yin, Jun; Yang, Yuwang; Wang, Lei
2016-04-01
Joint design of compressed sensing (CS) and network coding (NC) has been demonstrated to provide a new data gathering paradigm for multi-hop wireless sensor networks (WSNs). By exploiting the correlation of the network sensed data, a variety of data gathering schemes based on NC and CS (Compressed Data Gathering--CDG) have been proposed. However, these schemes assume that the sparsity of the network sensed data is constant and the value of the sparsity is known before starting each data gathering epoch, thus they ignore the variation of the data observed by the WSNs which are deployed in practical circumstances. In this paper, we present a complete design of the feedback CDG scheme where the sink node adaptively queries those interested nodes to acquire an appropriate number of measurements. The adaptive measurement-formation procedure and its termination rules are proposed and analyzed in detail. Moreover, in order to minimize the number of overall transmissions in the formation procedure of each measurement, we have developed a NP-complete model (Maximum Leaf Nodes Minimum Steiner Nodes--MLMS) and realized a scalable greedy algorithm to solve the problem. Experimental results show that the proposed measurement-formation method outperforms previous schemes, and experiments on both datasets from ocean temperature and practical network deployment also prove the effectiveness of our proposed feedback CDG scheme.
Quadrature-quadrature phase-shift keying
NASA Astrophysics Data System (ADS)
Saha, Debabrata; Birdsall, Theodore G.
1989-05-01
Quadrature-quadrature phase-shift keying (Q2PSK) is a spectrally efficient modulation scheme which utilizes available signal space dimensions in a more efficient way than two-dimensional schemes such as QPSK and MSK (minimum-shift keying). It uses two data shaping pulses and two carriers, which are pairwise quadrature in phase, to create a four-dimensional signal space and increases the transmission rate by a factor of two over QPSK and MSK. However, the bit error rate performance depends on the choice of pulse pair. With simple sinusoidal and cosinusoidal data pulses, the Eb/N0 requirement for Pb(E) = 10 to the -5 is approximately 1.6 dB higher than that of MSK. Without additional constraints, Q2PSK does not maintain constant envelope. However, a simple block coding provides a constant envelope. This coded signal substantially outperforms MSKS and TFM (time-frequency multiplexing) in bandwidth efficiency. Like MSK, Q2PSK also has self-clocking and self-synchronizing ability. An optimum class of pulse shapes for use in Q2PSK-format is presented. One suboptimum realization achieves the Nyquist rate of 2 bits/s/Hz using binary detection.
Chemostratigraphy of glaciomarine sediments in the Sarah Formation, northwest Saudi Arabia
NASA Astrophysics Data System (ADS)
Craigie, Neil W.; Rees, Andrew J.
2016-05-01
The Sarah Formation of northern Saudi Arabia mainly consists of glacial 'outwash' sediments deposited by turbidite channels and fans. Prior to undertaking chemostratigraphy, the results of seismic interpretation revealed the Sarah Formation to be mainly deposited in a NW-SE trending turbidite system in the study area, comprising channels with associated fans. These are succeeded by fluvio marine sediments at the top of the Sarah Formation. In the absence of good biostratigraphic control, chemostratigraphy was found to be one of the few techniques that could be employed to produce a high resolution correlation scheme for four study wells. Geochemical data were acquired for 50 elements in 550 core samples by ICP-OES (Inductively Coupled Plasma - Optical Emission Spectrometry) and ICP-MS (Inductively Coupled Plasma - Mass Spectrometry) but only the 'key' ratios Zr/Nb, Nb/Ti, Nb/Cr, Rb/K and Th/Cr were employed for chemostratigraphic purposes as they show significant trends that enable correlative boundaries to be identified and a hierarchical scheme to be proposed. Variations in these parameters are largely related to changes in source/provenance. In order to avoid geochemical variations relating to changes in grain size/lithology, separate schemes were proposed for the sandstone and mudrock samples. The sandstone scheme consists of a hierarchical order of three zones, seven subzones and five divisions, while the mudrock scheme is less detailed, comprising three zones and seven subzones. A 'finalised' scheme, based on a combination of the two aforementioned ones, was found to be more useful than employing the correlation proposed for individual lithologies. One of the main conclusions of the study was that the basal chemozones (general term used to describe any chemostratigraphic zone, subzone or division) were identified in wells B and C but were missing from A and D. It is thought that the areas around the two latter wells represented topographically 'high' areas during the deposition of the lowermost part of the Sarah Formation, hence the reason that these chemozones may be missing as a result of erosion/non-deposition. Conversely, chemozone C3-2a, occurring towards the top of the Sarah Formation turbidites, is correlative between all four wells. The turbidites are succeeded by the marginal marine sediments of chemozones M3-1 and C3-2bb at the top of the Sarah Formation.
Sundareshan, Malur K; Bhattacharjee, Supratik; Inampudi, Radhika; Pang, Ho-Yuen
2002-12-10
Computational complexity is a major impediment to the real-time implementation of image restoration and superresolution algorithms in many applications. Although powerful restoration algorithms have been developed within the past few years utilizing sophisticated mathematical machinery (based on statistical optimization and convex set theory), these algorithms are typically iterative in nature and require a sufficient number of iterations to be executed to achieve the desired resolution improvement that may be needed to meaningfully perform postprocessing image exploitation tasks in practice. Additionally, recent technological breakthroughs have facilitated novel sensor designs (focal plane arrays, for instance) that make it possible to capture megapixel imagery data at video frame rates. A major challenge in the processing of these large-format images is to complete the execution of the image processing steps within the frame capture times and to keep up with the output rate of the sensor so that all data captured by the sensor can be efficiently utilized. Consequently, development of novel methods that facilitate real-time implementation of image restoration and superresolution algorithms is of significant practical interest and is the primary focus of this study. The key to designing computationally efficient processing schemes lies in strategically introducing appropriate preprocessing steps together with the superresolution iterations to tailor optimized overall processing sequences for imagery data of specific formats. For substantiating this assertion, three distinct methods for tailoring a preprocessing filter and integrating it with the superresolution processing steps are outlined. These methods consist of a region-of-interest extraction scheme, a background-detail separation procedure, and a scene-derived information extraction step for implementing a set-theoretic restoration of the image that is less demanding in computation compared with the superresolution iterations. A quantitative evaluation of the performance of these algorithms for restoring and superresolving various imagery data captured by diffraction-limited sensing operations are also presented.
Novel Design of Type I High Power Mid-IR Diode Lasers for Spectral Region 3 - 4.2 Microns
2014-09-25
multifold improvement of the device characteristics. Cascade pumping was achieved utilizing efficient interband tunneling through "leaky" window in band...Initially cascade pumping scheme was applied to laser heterostructures utilizing gain sections based on either intersubband [1] or type-II interband ...active regions, metamorphic virtual substrate and cascade pumping scheme. Cascade pumping of type-I quantum well gain section opened the whole new
The AGORA High-resolution Galaxy Simulations Comparison Project II: Isolated disk test
Kim, Ji-hoon; Agertz, Oscar; Teyssier, Romain; ...
2016-12-20
Using an isolated Milky Way-mass galaxy simulation, we compare results from 9 state-of-the-art gravito-hydrodynamics codes widely used in the numerical community. We utilize the infrastructure we have built for the AGORA High-resolution Galaxy Simulations Comparison Project. This includes the common disk initial conditions, common physics models (e.g., radiative cooling and UV background by the standardized package Grackle) and common analysis toolkit yt, all of which are publicly available. Subgrid physics models such as Jeans pressure floor, star formation, supernova feedback energy, and metal production are carefully constrained across code platforms. With numerical accuracy that resolves the disk scale height, wemore » find that the codes overall agree well with one another in many dimensions including: gas and stellar surface densities, rotation curves, velocity dispersions, density and temperature distribution functions, disk vertical heights, stellar clumps, star formation rates, and Kennicutt-Schmidt relations. Quantities such as velocity dispersions are very robust (agreement within a few tens of percent at all radii) while measures like newly-formed stellar clump mass functions show more significant variation (difference by up to a factor of ~3). Systematic differences exist, for example, between mesh-based and particle-based codes in the low density region, and between more diffusive and less diffusive schemes in the high density tail of the density distribution. Yet intrinsic code differences are generally small compared to the variations in numerical implementations of the common subgrid physics such as supernova feedback. Lastly, our experiment reassures that, if adequately designed in accordance with our proposed common parameters, results of a modern high-resolution galaxy formation simulation are more sensitive to input physics than to intrinsic differences in numerical schemes.« less
The AGORA High-resolution Galaxy Simulations Comparison Project II: Isolated disk test
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kim, Ji-hoon; Agertz, Oscar; Teyssier, Romain
Using an isolated Milky Way-mass galaxy simulation, we compare results from 9 state-of-the-art gravito-hydrodynamics codes widely used in the numerical community. We utilize the infrastructure we have built for the AGORA High-resolution Galaxy Simulations Comparison Project. This includes the common disk initial conditions, common physics models (e.g., radiative cooling and UV background by the standardized package Grackle) and common analysis toolkit yt, all of which are publicly available. Subgrid physics models such as Jeans pressure floor, star formation, supernova feedback energy, and metal production are carefully constrained across code platforms. With numerical accuracy that resolves the disk scale height, wemore » find that the codes overall agree well with one another in many dimensions including: gas and stellar surface densities, rotation curves, velocity dispersions, density and temperature distribution functions, disk vertical heights, stellar clumps, star formation rates, and Kennicutt-Schmidt relations. Quantities such as velocity dispersions are very robust (agreement within a few tens of percent at all radii) while measures like newly-formed stellar clump mass functions show more significant variation (difference by up to a factor of ~3). Systematic differences exist, for example, between mesh-based and particle-based codes in the low density region, and between more diffusive and less diffusive schemes in the high density tail of the density distribution. Yet intrinsic code differences are generally small compared to the variations in numerical implementations of the common subgrid physics such as supernova feedback. Lastly, our experiment reassures that, if adequately designed in accordance with our proposed common parameters, results of a modern high-resolution galaxy formation simulation are more sensitive to input physics than to intrinsic differences in numerical schemes.« less
THE AGORA HIGH-RESOLUTION GALAXY SIMULATIONS COMPARISON PROJECT. II. ISOLATED DISK TEST
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kim, Ji-hoon; Agertz, Oscar; Teyssier, Romain
Using an isolated Milky Way-mass galaxy simulation, we compare results from nine state-of-the-art gravito-hydrodynamics codes widely used in the numerical community. We utilize the infrastructure we have built for the AGORA High-resolution Galaxy Simulations Comparison Project. This includes the common disk initial conditions, common physics models (e.g., radiative cooling and UV background by the standardized package Grackle) and common analysis toolkit yt, all of which are publicly available. Subgrid physics models such as Jeans pressure floor, star formation, supernova feedback energy, and metal production are carefully constrained across code platforms. With numerical accuracy that resolves the disk scale height, wemore » find that the codes overall agree well with one another in many dimensions including: gas and stellar surface densities, rotation curves, velocity dispersions, density and temperature distribution functions, disk vertical heights, stellar clumps, star formation rates, and Kennicutt–Schmidt relations. Quantities such as velocity dispersions are very robust (agreement within a few tens of percent at all radii) while measures like newly formed stellar clump mass functions show more significant variation (difference by up to a factor of ∼3). Systematic differences exist, for example, between mesh-based and particle-based codes in the low-density region, and between more diffusive and less diffusive schemes in the high-density tail of the density distribution. Yet intrinsic code differences are generally small compared to the variations in numerical implementations of the common subgrid physics such as supernova feedback. Our experiment reassures that, if adequately designed in accordance with our proposed common parameters, results of a modern high-resolution galaxy formation simulation are more sensitive to input physics than to intrinsic differences in numerical schemes.« less
Dynamic downscaling over western Himalayas: Impact of cloud microphysics schemes
NASA Astrophysics Data System (ADS)
Tiwari, Sarita; Kar, Sarat C.; Bhatla, R.
2018-03-01
Due to lack of observation data in the region of inhomogeneous terrain of the Himalayas, detailed climate of Himalayas is still unknown. Global reanalysis data are too coarse to represent the hydroclimate over the region with sharp orography gradient in the western Himalayas. In the present study, dynamic downscaling of the European Centre for Medium-Range Weather Forecast (ECMWF) Reanalysis-Interim (ERA-I) dataset over the western Himalayas using high-resolution Weather Research and Forecast (WRF) model has been carried out. Sensitivity studies have also been carried out using convection and microphysics parameterization schemes. The WRF model simulations have been compared against ERA-I and available station observations. Analysis of the results suggests that the WRF model has simulated the hydroclimate of the region well. It is found that in the simulations that the impact of convection scheme is more during summer months than in winter. Examination of simulated results using various microphysics schemes reveal that the WRF single-moment class-6 (WSM6) scheme simulates more precipitation on the upwind region of the high mountain than that in the Morrison and Thompson schemes during the winter period. Vertical distribution of various hydrometeors shows that there are large differences in mixing ratios of ice, snow and graupel in the simulations with different microphysics schemes. The ice mixing ratio in Morrison scheme is more than WSM6 above 400 hPa. The Thompson scheme favors formation of more snow than WSM6 or Morrison schemes while the Morrison scheme has more graupel formation than other schemes.
Multistatic Array Sampling Scheme for Fast Near-Field Image Reconstruction
2016-01-01
1 Multistatic Array Sampling Scheme for Fast Near-Field Image Reconstruction William F. Moulder, James D. Krieger, Denise T. Maurais-Galejs, Huy...described and validated experimentally with the formation of high quality microwave images. It is further shown that the scheme is more than two orders of... scheme (wherein transmitters and receivers are co-located) which require NTNR transmit-receive elements to achieve the same sampling. The second
NASA Astrophysics Data System (ADS)
Zeng, Zhi
2018-05-01
An efficient scheme for the discrimination of 16 hyperentangled Bell states of a two-photon system that is entangled in both polarization and spatial-mode degrees of freedom is presented in this paper. Using the interaction between the photons and quantum-dot spins in cavities, the spatial-mode Bell states can be distinguished completely and nondestructively in the first step. Subsequently, the preserved spatial-mode entanglement is utilized as an auxiliary to analyze the polarization Bell states. Compared with a previous scheme (Ren et al 2012 Opt. Express 20 24664-77), our scheme reduces the requirement for nonlinear interaction substantially by utilizing the intrinsic degrees of freedom in hyperentanglement.
A data seamless interaction scheme between electric power secondary business systems
NASA Astrophysics Data System (ADS)
Ai, Wenkai; Qian, Feng
2018-03-01
At present, the data interaction of electric power secondary business systems is very high, and it is not universal to develop programs when data interaction is carried out by different manufacturers' electric power secondary business systems. There are different interaction schemes for electric power secondary business systems with different manufacturers, which lead to high development cost, low reusability and high maintenance difficulty. This paper introduces a new data seamless interaction scheme between electric power secondary business systems. The scheme adopts the international common Java message service protocol as the transmission protocol, adopts the common JavaScript object symbol format as the data interactive format, unified electric power secondary business systems data interactive way, improve reusability, reduce complexity, monitor the operation of the electric power secondary business systems construction has laid a solid foundation.
A Suboptimal Power-Saving Transmission Scheme in Multiple Component Carrier Networks
NASA Astrophysics Data System (ADS)
Chung, Yao-Liang; Tsai, Zsehong
Power consumption due to transmissions in base stations (BSs) has been a major contributor to communication-related CO2 emissions. A power optimization model is developed in this study with respect to radio resource allocation and activation in a multiple Component Carrier (CC) environment. We formulate and solve the power-minimization problem of the BS transceivers for multiple-CC networks with carrier aggregation, while maintaining the overall system and respective users' utilities above minimum levels. The optimized power consumption based on this model can be viewed as a lower bound of that of other algorithms employed in practice. A suboptimal scheme with low computation complexity is proposed. Numerical results show that the power consumption of our scheme is much better than that of the conventional one in which all CCs are always active, if both schemes maintain the same required utilities.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Milani, Gabriele, E-mail: milani@stru.polimi.it, E-mail: gabriele.milani@polimi.it; Hanel, Thomas; Donetti, Raffaella
2015-03-10
The basic reaction scheme due to Han and co-workers for NR vulcanized with sulphur is adopted and modified taking into account the single contributions of the different accelerators, focusing in particular on some experimental data ad hoc obtained at Pirelli’s laboratories, where NR was vulcanized at different temperatures (from 150 to 180 °C) and concentrations of sulphur, using TBBS and DPG in the mixture as co-agents. Typically, the chain reactions are initiated by the formation of macro-compounds that are responsible of the formation of the unmatured crosslinked polymer. This first reaction depends on the reciprocal concentrations of all components andmore » their chemical nature. In presence of two accelerators, it was considered that the reactions between each single accelerator and the NR raw material occur in parallel, making the reasonable assumption that there are no mutual reactions between the two accelerators. From the kinetic scheme adopted, a closed form solution was found for the crosslink density, with the only limitation that the induction period is excluded from computations. Even kinetic constants are evaluated in closed form, avoiding a numerically demanding least-squares best fitting on rheometer experimental data. Two series of experiments available, relying into rheometer curves at different temperatures and different concentrations of sulphur and accelerator, are utilized to evaluate the fitting capabilities of the mathematical model. Very good agreement between numerical output and experimental data is experienced in all cases analysed.« less
On the dynamics of a shock-bubble interaction
NASA Technical Reports Server (NTRS)
Quirk, James J.; Karni, Smadar
1994-01-01
We present a detailed numerical study of the interaction of a weak shock wave with an isolated cylindrical gas inhomogenity. Such interactions have been studied experimentally in an attempt to elucidate the mechanisms whereby shock waves propagating through random media enhance mixing. Our study concentrates on the early phases of the interaction process which are dominated by repeated refractions of acoustic fronts at the bubble interface. Specifically, we have reproduced two of the experiments performed by Haas and Sturtevant : M(sub s) = 1.22 planar shock wave, moving through air, impinges on a cylindrical bubble which contains either helium or Refrigerant 22. These flows are modelled using the two-dimensional, compressible Euler equations for a two component fluid (air-helium or air-Refrigerant 22). Although simulations of shock wave phenomena are now fairly commonplace, they are mostly restricted to single component flows. Unfortunately, multi-component extensions of successful single component schemes often suffer from spurious oscillations which are generated at material interfaces. Here we avoid such problems by employing a novel, nonconservative shock-capturing scheme. In addition, we have utilized a sophisticated adaptive mesh refinement algorithm which enables extremely high resolution simulations to be performed relatively cheaply. Thus we have been able to reproduce numerically all the intricate mechanisms that were observed experimentally (e.g., transitions from regular to irregular refraction, cusp formation and shock wave focusing, multi-shock and Mach shock structures, jet formation, etc.), and we can now present an updated description for the dynamics of a shock-bubble interaction.
2015-03-01
2.5.5 Availability Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 2.6 Simulation Environments...routing scheme can prove problematic. Two prominent proactive protocols, 7 Destination-Sequenced Distance-Vector (DSDV) and Optimized Link State...distributed file management systems such as Tahoe- LAFS as part of its replication scheme . Altman and De Pellegrini [4] examine the impact of FEC and
Yu, Huapeng; Zhu, Hai; Gao, Dayuan; Yu, Meng; Wu, Wenqi
2015-01-01
The Kalman filter (KF) has always been used to improve north-finding performance under practical conditions. By analyzing the characteristics of the azimuth rotational inertial measurement unit (ARIMU) on a stationary base, a linear state equality constraint for the conventional KF used in the fine north-finding filtering phase is derived. Then, a constrained KF using the state equality constraint is proposed and studied in depth. Estimation behaviors of the concerned navigation errors when implementing the conventional KF scheme and the constrained KF scheme during stationary north-finding are investigated analytically by the stochastic observability approach, which can provide explicit formulations of the navigation errors with influencing variables. Finally, multiple practical experimental tests at a fixed position are done on a postulate system to compare the stationary north-finding performance of the two filtering schemes. In conclusion, this study has successfully extended the utilization of the stochastic observability approach for analytic descriptions of estimation behaviors of the concerned navigation errors, and the constrained KF scheme has demonstrated its superiority over the conventional KF scheme for ARIMU stationary north-finding both theoretically and practically. PMID:25688588
Decentralized method for utility regulation: a comment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sharkey, W.W.
The author comments on the article by Loeb and Magat in this journal issue (P 399); he feels their idea is worthy of more-detailed examination on an industry-specific level. He confines his comments, however, to a more-general comparison of the Loeb-Magat (L-M) scheme, traditional rate-of-return regulation, and pure franchise bidding. The basic L-M proposal consists of two parts. First it is shown that if a utility is subsidized by an amount corresponding to total consumer surplus, then it will have the incentive to pursue cost-minimizing behavior and to set its price equal to the marginal cost of production. Mr. Sharkeymore » believes that this pure subsidy scheme would be wholly unworkable in practice. The second part of the L-M proposal consists of the subsidy scheme combined with either franchise bidding or a lump-sum tax. Mr. Sharkey feels that this proposal has considerable merit if conditions exist such that the net subsidy paid to the utility is sufficiently small; net subsidy is defined as the excess of the actual subsidy plus revenues of the firm over the total cost of production. Thus, the net subsidy is the excess profit the utility receives compared to a utility perfectly regulated by traditional means. Mr. Sharkey elaborates on some of his objections to the L-M proposal for cases in which the net subsidy is large. Then, he briefly considers the characteristics of a natural monopoly market which could potentially be regulated by a combined subsidy-franchise-tax scheme.« less
Relative position coordinated control for spacecraft formation flying with communication delays
NASA Astrophysics Data System (ADS)
Ran, Dechao; Chen, Xiaoqian; Misra, Arun K.; Xiao, Bing
2017-08-01
This study addresses a relative position coordinated control problem for spacecraft formation flying subject to directed communication topology. Two different kinds of communication delay cases, including time-varying delays and arbitrarily bounded delays are investigated. Using the backstepping control technique, two virtual velocity control inputs are firstly designed to achieve coordinated position tracking for the kinematic subsystem. Furthermore, a hyperbolic tangent function is introduced to guarantee the boundedness of the virtual controller. Then, a finite-time control algorithm is designed for the dynamic subsystem. It can guarantee that the virtual velocity can be followed by the real velocity after finite time. It is theoretically proved that the proposed control scheme can asymptotically stabilize the closed-loop system. Numerical simulations are further presented that not only highlight closed-loop performance benefiting from the proposed control scheme, but also illustrate its superiority in comparison with conventional formation control schemes.
Internet SCADA Utilizing API's as Data Source
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Haeng-Kon; Kim, Tai-Hoon
An Application programming interface or API is an interface implemented by a software program that enables it to interact with other software. Many companies provide free API services which can be utilized in Control Systems. SCADA is an example of a control system and it is a system that collects data from various sensors at a factory, plant or in other remote locations and then sends this data to a central computer which then manages and controls the data. In this paper, we designed a scheme for Weather Condition in Internet SCADA Environment utilizing data from external API services. The scheme was designed to double check the weather information in SCADA.
A continually online-trained neural network controller for brushless DC motor drives
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rubaai, A.; Kotaru, R.; Kankam, M.D.
2000-04-01
In this paper, a high-performance controller with simultaneous online identification and control is designed for brushless dc motor drives. The dynamics of the motor/load are modeled online, and controlled using two different neural network based identification and control schemes, as the system is in operation. In the first scheme, an attempt is made to control the rotor angular speed, utilizing a single three-hidden-layer network. The second scheme attempts to control the stator currents, using a predetermined control law as a function of the estimated states. This schemes incorporates three multilayered feedforward neural networks that are online trained, using the Levenburg-Marquadtmore » training algorithm. The control of the direct and quadrature components of the stator current successfully tracked a wide variety of trajectories after relatively short online training periods. The control strategy adapts to the uncertainties of the motor/load dynamics and, in addition, learns their inherent nonlinearities. Simulation results illustrated that a neurocontroller used in conjunction with adaptive control schemes can result in a flexible control device which may be utilized in a wide range of environments.« less
An MBO Scheme for Minimizing the Graph Ohta-Kawasaki Functional
NASA Astrophysics Data System (ADS)
van Gennip, Yves
2018-06-01
We study a graph-based version of the Ohta-Kawasaki functional, which was originally introduced in a continuum setting to model pattern formation in diblock copolymer melts and has been studied extensively as a paradigmatic example of a variational model for pattern formation. Graph-based problems inspired by partial differential equations (PDEs) and variational methods have been the subject of many recent papers in the mathematical literature, because of their applications in areas such as image processing and data classification. This paper extends the area of PDE inspired graph-based problems to pattern-forming models, while continuing in the tradition of recent papers in the field. We introduce a mass conserving Merriman-Bence-Osher (MBO) scheme for minimizing the graph Ohta-Kawasaki functional with a mass constraint. We present three main results: (1) the Lyapunov functionals associated with this MBO scheme Γ -converge to the Ohta-Kawasaki functional (which includes the standard graph-based MBO scheme and total variation as a special case); (2) there is a class of graphs on which the Ohta-Kawasaki MBO scheme corresponds to a standard MBO scheme on a transformed graph and for which generalized comparison principles hold; (3) this MBO scheme allows for the numerical computation of (approximate) minimizers of the graph Ohta-Kawasaki functional with a mass constraint.
A Coffee Ring Aptasensor for Rapid Protein Detection
Wen, Jessica T.; Ho, Chih-Ming; Lillehoj, Peter B.
2013-01-01
We introduce a new biosensing platform for rapid protein detection that combines one of the simplest methods for biomolecular concentration, coffee ring formation, with a sensitive aptamer-based optical detection scheme. In this approach, aptamer beacons are utilized for signal transduction where a fluorescence signal is emitted in the presence of the target molecule. Signal amplification is achieved by concentrating aptamer-target complexes within liquid droplets, resulting in the formation of coffee ring “spots”. Surfaces with various chemical coatings were utilized to investigate the correlation between surface hydrophobicity, concentration efficiency and signal amplification. Based on our results, we found that the increase in coffee ring diameter with larger droplet volumes is independent of surface hydrophobicity. Furthermore, we show that highly hydrophobic surfaces produce enhanced particle concentration, via coffee ring formation, resulting in signal intensities 6-fold greater than those on hydrophilic surfaces. To validate this biosensing platform for the detection of clinical samples, we detected α-thrombin in human serum and 4x diluted whole blood. Based on our results, coffee ring spots produced detection signals 40x larger than samples in liquid droplets. Additionally, this biosensor exhibits a lower limit of detection of 2 ng/mL (54 pM) in serum, and 4 ng/mL (105 pM) in blood. Based on its simplicity and high performance, this platform demonstrates immense potential as an inexpensive diagnostic tool for the detection of disease biomarkers, particularly for use in developing countries that lack the resources and facilities required for conventional biodetection practices. PMID:23540796
Assessment of the GECKO-A modeling tool using chamber observations for C12 alkanes
NASA Astrophysics Data System (ADS)
Aumont, B.; La, S.; Ouzebidour, F.; Valorso, R.; Mouchel-Vallon, C.; Camredon, M.; Lee-Taylor, J. M.; Hodzic, A.; Madronich, S.; Yee, L. D.; Loza, C. L.; Craven, J. S.; Zhang, X.; Seinfeld, J.
2013-12-01
Secondary Organic Aerosol (SOA) production and ageing is the result of atmospheric oxidation processes leading to the progressive formation of organic species with higher oxidation state and lower volatility. Explicit chemical mechanisms reflect our understanding of these multigenerational oxidation steps. Major uncertainties remain concerning the processes leading to SOA formation and the development, assessment and improvement of such explicit schemes is therefore a key issue. The development of explicit mechanism to describe the oxidation of long chain hydrocarbons is however a challenge. Indeed, explicit oxidation schemes involve a large number of reactions and secondary organic species, far exceeding the size of chemical schemes that can be written manually. The chemical mechanism generator GECKO-A (Generator for Explicit Chemistry and Kinetics of Organics in the Atmosphere) is a computer program designed to overcome this difficulty. GECKO-A generates gas phase oxidation schemes according to a prescribed protocol assigning reaction pathways and kinetics data on the basis of experimental data and structure-activity relationships. In this study, we examine the ability of the generated schemes to explain SOA formation observed in the Caltech Environmental Chambers from various C12 alkane isomers and under high NOx and low NOx conditions. First results show that the model overestimates both the SOA yields and the O/C ratios. Various sensitivity tests are performed to explore processes that might be responsible for these disagreements.
Lahariya, Chandrakant; Mishra, Ashok; Nandan, Deoki; Gautam, Praveen; Gupta, Sanjay
2011-01-01
Conditional Cash Transfer (CCT) schemes have shown largely favorable changes in the health seeking behavior. This evaluation study assesses the process and performance of an Additional Cash Incentive (ACI) scheme within an ongoing CCT scheme in India, and document lessons. A controlled before and during design study was conducted in Madhya Pradesh state of India, from August 2007 to March 2008, with increased in institutional deliveries as a primary outcome. In depth interviews, focus group discussions and household surveys were done for data collection. Lack of awareness about ACI scheme amongst general population and beneficiaries, cumbersome cash disbursement procedure, intricate eligibility criteria, extensive paper work, and insufficient focus on community involvement were the major implementation challenges. There were anecdotal reports of political interference and possible scope for corruption. At the end of implementation period, overall rate of institutional deliveries had increased in both target and control populations; however, the differences were not statistically significant. No cause and effect association could be proven by this study. Poor planning and coordination, and lack of public awareness about the scheme resulted in low utilization. Thus, proper IEC and training, detailed implementation plan, orientation training for implementer, sufficient budgetary allocation, and community participation should be an integral part for successful implementation of any such scheme. The lesson learned this evaluation study may be useful in any developing country setting and may be utilized for planning and implementation of any ACI scheme in future.
Salim, Shelly; Moh, Sangman; Choi, Dongmin; Chung, Ilyong
2014-08-11
A cognitive radio sensor network (CRSN) is a wireless sensor network whose sensor nodes are equipped with cognitive radio capability. Clustering is one of the most challenging issues in CRSNs, as all sensor nodes, including the cluster head, have to use the same frequency band in order to form a cluster. However, due to the nature of heterogeneous channels in cognitive radio, it is difficult for sensor nodes to find a cluster head. This paper proposes a novel energy-efficient and compact clustering scheme named clustering with temporary support nodes (CENTRE). CENTRE efficiently achieves a compact cluster formation by adopting two-phase cluster formation with fixed duration. By introducing a novel concept of temporary support nodes to improve the cluster formation, the proposed scheme enables sensor nodes in a network to find a cluster head efficiently. The performance study shows that not only is the clustering process efficient and compact but it also results in remarkable energy savings that prolong the overall network lifetime. In addition, the proposed scheme decreases both the clustering overhead and the average distance between cluster heads and their members.
Salim, Shelly; Moh, Sangman; Choi, Dongmin; Chung, Ilyong
2014-01-01
A cognitive radio sensor network (CRSN) is a wireless sensor network whose sensor nodes are equipped with cognitive radio capability. Clustering is one of the most challenging issues in CRSNs, as all sensor nodes, including the cluster head, have to use the same frequency band in order to form a cluster. However, due to the nature of heterogeneous channels in cognitive radio, it is difficult for sensor nodes to find a cluster head. This paper proposes a novel energy-efficient and compact clustering scheme named clustering with temporary support nodes (CENTRE). CENTRE efficiently achieves a compact cluster formation by adopting two-phase cluster formation with fixed duration. By introducing a novel concept of temporary support nodes to improve the cluster formation, the proposed scheme enables sensor nodes in a network to find a cluster head efficiently. The performance study shows that not only is the clustering process efficient and compact but it also results in remarkable energy savings that prolong the overall network lifetime. In addition, the proposed scheme decreases both the clustering overhead and the average distance between cluster heads and their members. PMID:25116905
Raul, Pramod R; Pagilla, Prabhakar R
2015-05-01
In this paper, two adaptive Proportional-Integral (PI) control schemes are designed and discussed for control of web tension in Roll-to-Roll (R2R) manufacturing systems. R2R systems are used to transport continuous materials (called webs) on rollers from the unwind roll to the rewind roll. Maintaining web tension at the desired value is critical to many R2R processes such as printing, coating, lamination, etc. Existing fixed gain PI tension control schemes currently used in industrial practice require extensive tuning and do not provide the desired performance for changing operating conditions and material properties. The first adaptive PI scheme utilizes the model reference approach where the controller gains are estimated based on matching of the actual closed-loop tension control systems with an appropriately chosen reference model. The second adaptive PI scheme utilizes the indirect adaptive control approach together with relay feedback technique to automatically initialize the adaptive PI gains. These adaptive tension control schemes can be implemented on any R2R manufacturing system. The key features of the two adaptive schemes is that their designs are simple for practicing engineers, easy to implement in real-time, and automate the tuning process. Extensive experiments are conducted on a large experimental R2R machine which mimics many features of an industrial R2R machine. These experiments include trials with two different polymer webs and a variety of operating conditions. Implementation guidelines are provided for both adaptive schemes. Experimental results comparing the two adaptive schemes and a fixed gain PI tension control scheme used in industrial practice are provided and discussed. Copyright © 2014 ISA. Published by Elsevier Ltd. All rights reserved.
Zhou, Jian; Wang, Lusheng; Wang, Weidong; Zhou, Qingfeng
2017-01-01
In future scenarios of heterogeneous and dense networks, randomly-deployed small star networks (SSNs) become a key paradigm, whose system performance is restricted to inter-SSN interference and requires an efficient resource allocation scheme for interference coordination. Traditional resource allocation schemes do not specifically focus on this paradigm and are usually too time consuming in dense networks. In this article, a very efficient graph-based scheme is proposed, which applies the maximal independent set (MIS) concept in graph theory to help divide SSNs into almost interference-free groups. We first construct an interference graph for the system based on a derived distance threshold indicating for any pair of SSNs whether there is intolerable inter-SSN interference or not. Then, SSNs are divided into MISs, and the same resource can be repetitively used by all the SSNs in each MIS. Empirical parameters and equations are set in the scheme to guarantee high performance. Finally, extensive scenarios both dense and nondense are randomly generated and simulated to demonstrate the performance of our scheme, indicating that it outperforms the classical max K-cut-based scheme in terms of system capacity, utility and especially time cost. Its achieved system capacity, utility and fairness can be close to the near-optimal strategy obtained by a time-consuming simulated annealing search. PMID:29113109
Rahman, Md Mostafizur; Fattah, Shaikh Anowarul
2017-01-01
In view of recent increase of brain computer interface (BCI) based applications, the importance of efficient classification of various mental tasks has increased prodigiously nowadays. In order to obtain effective classification, efficient feature extraction scheme is necessary, for which, in the proposed method, the interchannel relationship among electroencephalogram (EEG) data is utilized. It is expected that the correlation obtained from different combination of channels will be different for different mental tasks, which can be exploited to extract distinctive feature. The empirical mode decomposition (EMD) technique is employed on a test EEG signal obtained from a channel, which provides a number of intrinsic mode functions (IMFs), and correlation coefficient is extracted from interchannel IMF data. Simultaneously, different statistical features are also obtained from each IMF. Finally, the feature matrix is formed utilizing interchannel correlation features and intrachannel statistical features of the selected IMFs of EEG signal. Different kernels of the support vector machine (SVM) classifier are used to carry out the classification task. An EEG dataset containing ten different combinations of five different mental tasks is utilized to demonstrate the classification performance and a very high level of accuracy is achieved by the proposed scheme compared to existing methods.
A cache-aided multiprocessor rollback recovery scheme
NASA Technical Reports Server (NTRS)
Wu, Kun-Lung; Fuchs, W. Kent
1989-01-01
This paper demonstrates how previous uniprocessor cache-aided recovery schemes can be applied to multiprocessor architectures, for recovering from transient processor failures, utilizing private caches and a global shared memory. As with cache-aided uniprocessor recovery, the multiprocessor cache-aided recovery scheme of this paper can be easily integrated into standard bus-based snoopy cache coherence protocols. A consistent shared memory state is maintained without the necessity of global check-pointing.
LoWMob: Intra-PAN Mobility Support Schemes for 6LoWPAN
Bag, Gargi; Raza, Muhammad Taqi; Kim, Ki-Hyung; Yoo, Seung-Wha
2009-01-01
Mobility in 6LoWPAN (IPv6 over Low Power Personal Area Networks) is being utilized in realizing many applications where sensor nodes, while moving, sense and transmit the gathered data to a monitoring server. By employing IEEE802.15.4 as a baseline for the link layer technology, 6LoWPAN implies low data rate and low power consumption with periodic sleep and wakeups for sensor nodes, without requiring them to incorporate complex hardware. Also enabling sensor nodes with IPv6 ensures that the sensor data can be accessed anytime and anywhere from the world. Several existing mobility-related schemes like HMIPv6, MIPv6, HAWAII, and Cellular IP require active participation of mobile nodes in the mobility signaling, thus leading to the mobility-related changes in the protocol stack of mobile nodes. In this paper, we present LoWMob, which is a network-based mobility scheme for mobile 6LoWPAN nodes in which the mobility of 6LoWPAN nodes is handled at the network-side. LoWMob ensures multi-hop communication between gateways and mobile nodes with the help of the static nodes within a 6LoWPAN. In order to reduce the signaling overhead of static nodes for supporting mobile nodes, LoWMob proposes a mobility support packet format at the adaptation layer of 6LoWPAN. Also we present a distributed version of LoWMob, named as DLoWMob (or Distributed LoWMob), which employs Mobility Support Points (MSPs) to distribute the traffic concentration at the gateways and to optimize the multi-hop routing path between source and destination nodes in a 6LoWPAN. Moreover, we have also discussed the security considerations for our proposed mobility schemes. The performance of our proposed schemes is evaluated in terms of mobility signaling costs, end-to-end delay, and packet success ratio. PMID:22346730
LoWMob: Intra-PAN Mobility Support Schemes for 6LoWPAN.
Bag, Gargi; Raza, Muhammad Taqi; Kim, Ki-Hyung; Yoo, Seung-Wha
2009-01-01
Mobility in 6LoWPAN (IPv6 over Low Power Personal Area Networks) is being utilized in realizing many applications where sensor nodes, while moving, sense and transmit the gathered data to a monitoring server. By employing IEEE802.15.4 as a baseline for the link layer technology, 6LoWPAN implies low data rate and low power consumption with periodic sleep and wakeups for sensor nodes, without requiring them to incorporate complex hardware. Also enabling sensor nodes with IPv6 ensures that the sensor data can be accessed anytime and anywhere from the world. Several existing mobility-related schemes like HMIPv6, MIPv6, HAWAII, and Cellular IP require active participation of mobile nodes in the mobility signaling, thus leading to the mobility-related changes in the protocol stack of mobile nodes. In this paper, we present LoWMob, which is a network-based mobility scheme for mobile 6LoWPAN nodes in which the mobility of 6LoWPAN nodes is handled at the network-side. LoWMob ensures multi-hop communication between gateways and mobile nodes with the help of the static nodes within a 6LoWPAN. In order to reduce the signaling overhead of static nodes for supporting mobile nodes, LoWMob proposes a mobility support packet format at the adaptation layer of 6LoWPAN. Also we present a distributed version of LoWMob, named as DLoWMob (or Distributed LoWMob), which employs Mobility Support Points (MSPs) to distribute the traffic concentration at the gateways and to optimize the multi-hop routing path between source and destination nodes in a 6LoWPAN. Moreover, we have also discussed the security considerations for our proposed mobility schemes. The performance of our proposed schemes is evaluated in terms of mobility signaling costs, end-to-end delay, and packet success ratio.
Newly-Developed 3D GRMHD Code and its Application to Jet Formation
NASA Technical Reports Server (NTRS)
Mizuno, Y.; Nishikawa, K.-I.; Koide, S.; Hardee, P.; Fishman, G. J.
2006-01-01
We have developed a new three-dimensional general relativistic magnetohydrodynamic code by using a conservative, high-resolution shock-capturing scheme. The numerical fluxes are calculated using the HLL approximate Riemann solver scheme. The flux-interpolated constrained transport scheme is used to maintain a divergence-free magnetic field. We have performed various 1-dimensional test problems in both special and general relativity by using several reconstruction methods and found that the new 3D GRMHD code shows substantial improvements over our previous model. The . preliminary results show the jet formations from a geometrically thin accretion disk near a non-rotating and a rotating black hole. We will discuss the jet properties depended on the rotation of a black hole and the magnetic field strength.
Authentication Binding between SSL/TLS and HTTP
NASA Astrophysics Data System (ADS)
Saito, Takamichi; Sekiguchi, Kiyomi; Hatsugai, Ryosuke
While the Secure Socket Layer or Transport Layer Security (SSL/TLS) is assumed to provide secure communications over the Internet, many web applications utilize basic or digest authentication of Hyper Text Transport Protocol (HTTP) over SSL/TLS. Namely, in the scheme, there are two different authentication schemes in a session. Since they are separated by a layer, these are not convenient for a web application. Moreover, the scheme may also cause problems in establishing secure communication. Then we provide a scheme of authentication binding between SSL/TLS and HTTP without modifying SSL/TLS protocols and its implementation, and we show the effectiveness of our proposed scheme.
Development of an Automatic Grid Generator for Multi-Element High-Lift Wings
NASA Technical Reports Server (NTRS)
Eberhardt, Scott; Wibowo, Pratomo; Tu, Eugene
1996-01-01
The procedure to generate the grid around a complex wing configuration is presented in this report. The automatic grid generation utilizes the Modified Advancing Front Method as a predictor and an elliptic scheme as a corrector. The scheme will advance the surface grid one cell outward and the newly obtained grid is corrected using the Laplace equation. The predictor-corrector step ensures that the grid produced will be smooth for every configuration. The predictor-corrector scheme is extended for a complex wing configuration. A new technique is developed to deal with the grid generation in the wing-gaps and on the flaps. It will create the grids that fill the gap on the wing surface and the gap created by the flaps. The scheme recognizes these configurations automatically so that minimal user input is required. By utilizing an appropriate sequence in advancing the grid points on a wing surface, the automatic grid generation for complex wing configurations is achieved.
Optical Stabilization of a Microwave Oscillator for Fountain Clock Interrogation.
Lipphardt, Burghard; Gerginov, Vladislav; Weyers, Stefan
2017-04-01
We describe an optical frequency stabilization scheme of a microwave oscillator that is used for the interrogation of primary cesium fountain clocks. Because of its superior phase noise properties, this scheme, which is based on an ultrastable laser and a femtosecond laser frequency comb, overcomes the frequency instability limitations of fountain clocks given by the previously utilized quartz-oscillator-based frequency synthesis. The presented scheme combines the transfer of the short-term frequency instability of an optical cavity and the long-term frequency instability of a hydrogen maser to the microwave oscillator and is designed to provide continuous long-term operation for extended measurement periods of several weeks. The utilization of the twofold stabilization scheme on the one hand ensures the referencing of the fountain frequency to the hydrogen maser frequency and on the other hand results in a phase noise level of the fountain interrogation signal, which enables fountain frequency instabilities at the 2.5 ×10 -14 (τ/s) -1/2 level that are quantum projection noise limited.
Pan, Yan; Yan, Lianshan; Yi, Anlin; Jiang, Lin; Pan, Wei; Luo, Bin; Zou, Xihua
2017-10-15
We propose a four-linear state of polarization multiplexed intensity modulation and direct detection (IM/DD) scheme based on two orthogonal polarization division multiplexing (PDM) on-off keying systems. We also experimentally demonstrate a simple demultiplexing algorithm for this scheme by utilizing only a single Stokes analyzer. At the rate of 4×10 Gbit/s, the experimental results show that the power penalty of the proposed scheme is about 1.5 dB, compared to the single PDM-IM/DD for back-to-back (B2B) transmission. Compared to B2B, just about 1.7 dB power penalty is required after 25 km Corning LEAF optical fiber transmission. Meanwhile, the performance of the polarization tracking is evaluated, and the results show that the BER fluctuation is less than 0.5 dB with a polarization scrambling rate up to 708.75 deg/s.
Using an interference spectrum as a short-range absolute rangefinder with fiber and wideband source
NASA Astrophysics Data System (ADS)
Hsieh, Tsung-Han; Han, Pin
2018-06-01
Recently, a new type of displacement instrument using spectral-interference has been found, which utilizes fiber and a wideband light source to produce an interference spectrum. In this work, we develop a method that measures the absolute air-gap distance by taking wavelengths at two interference spectra minima. The experimental results agree with the theoretical calculations. It is also utilized to produce and control the spectral switch, which is much easier than other previous methods using other control mechanisms. A scanning mode of this scheme for stepped surface measurement is suggested, which is verified by a standard thickness gauge test. Our scheme is different to one available on the market that may use a curve-fitting method, and some comparisons are made between our scheme and that one.
NASA Astrophysics Data System (ADS)
Song, Xiaoliang; Zhang, Guang J.
2018-03-01
Several improvements are implemented in the Zhang-McFarlane (ZM) convection scheme to investigate the roles of convection parameterization in the formation of double intertropical convergence zone (ITCZ) bias in the NCAR CESM1.2.1. It is shown that the prominent double ITCZ biases of precipitation, sea surface temperature (SST), and wind stress in the standard CESM1.2.1 are largely eliminated in all seasons with the use of these improvements in convection scheme. This study for the first time demonstrates that the modifications of convection scheme can eliminate the double ITCZ biases in all seasons, including boreal winter and spring. Further analysis shows that the elimination of the double ITCZ bias is achieved not by improving other possible contributors, such as stratus cloud bias off the west coast of South America and cloud/radiation biases over the Southern Ocean, but by modifying the convection scheme itself. This study demonstrates that convection scheme is the primary contributor to the double ITCZ bias in the CESM1.2.1, and provides a possible solution to the long-standing double ITCZ problem. The atmospheric model simulations forced by observed SST show that the original ZM convection scheme tends to produce double ITCZ bias in high SST scenario, while the modified convection scheme does not. The impact of changes in each core component of convection scheme on the double ITCZ bias in atmospheric model is identified and further investigated.
SPMHD simulations of structure formation
NASA Astrophysics Data System (ADS)
Barnes, David J.; On, Alvina Y. L.; Wu, Kinwah; Kawata, Daisuke
2018-05-01
The intracluster medium of galaxy clusters is permeated by μ {G} magnetic fields. Observations with current and future facilities have the potential to illuminate the role of these magnetic fields play in the astrophysical processes of galaxy clusters. To obtain a greater understanding of how the initial seed fields evolve to the magnetic fields in the intracluster medium requires magnetohydrodynamic simulations. We critically assess the current smoothed particle magnetohydrodynamic (SPMHD) schemes, especially highlighting the impact of a hyperbolic divergence cleaning scheme and artificial resistivity switch on the magnetic field evolution in cosmological simulations of the formation of a galaxy cluster using the N-body/SPMHD code GCMHD++. The impact and performance of the cleaning scheme and two different schemes for the artificial resistivity switch is demonstrated via idealized test cases and cosmological simulations. We demonstrate that the hyperbolic divergence cleaning scheme is effective at suppressing the growth of the numerical divergence error of the magnetic field and should be applied to any SPMHD simulation. Although the artificial resistivity is important in the strong field regime, it can suppress the growth of the magnetic field in the weak field regime, such as galaxy clusters. With sufficient resolution, simulations with divergence cleaning can reproduce observed magnetic fields. We conclude that the cleaning scheme alone is sufficient for galaxy cluster simulations, but our results indicate that the SPMHD scheme must be carefully chosen depending on the regime of the magnetic field.
NASA Astrophysics Data System (ADS)
Chao, Luo
2015-11-01
In this paper, a novel digital secure communication scheme is firstly proposed. Different from the usual secure communication schemes based on chaotic synchronization, the proposed scheme employs asynchronous communication which avoids the weakness of synchronous systems and is susceptible to environmental interference. Moreover, as to the transmission errors and data loss in the process of communication, the proposed scheme has the ability to be error-checking and error-correcting in real time. In order to guarantee security, the fractional-order complex chaotic system with the shifting of order is utilized to modulate the transmitted signal, which has high nonlinearity and complexity in both frequency and time domains. The corresponding numerical simulations demonstrate the effectiveness and feasibility of the scheme.
Quantum cryptography using single-particle entanglement
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Jae-Weon; Lee, Eok Kyun; Chung, Yong Wook
2003-07-01
A quantum cryptography scheme based on entanglement between a single-particle state and a vacuum state is proposed. The scheme utilizes linear optics devices to detect the superposition of the vacuum and single-particle states. Existence of an eavesdropper can be detected by using a variant of Bell's inequality.
Pettersson, Billie; Hoffmann, Mikael; Andersson, David; Wändell, Per; Levin, Lars-Åke
2012-12-01
A new reimbursement scheme (RS) for glucose lowering therapies (GLT) was implemented in Sweden on March 1, 2010. Products on the market were retained, restricted, excluded or excluded for new courses in the new RS. The aim of this study was to compare utilization and costs of GLT for type 2 diabetes Mellitus (T2DM) before and after the implementation of the changed RS. This was a quasi-experimental study using data on dispensed GLT and costs from a database on dispensed individual based prescriptions in Sweden. Segmented regression analyses were used to assess utilization and costs. Following the changed reimbursement status, there was an accelerated increasing trend in number of patients treated with restricted (P=0.0007) or retained (P=0.0021) insulins, as well as in costs for insulin based GLT (P=0.0014). No impact was detected in the total number of patients treated with oral GLT, but a slightly negative trend in total costs for oral GLT was detected following the intervention (P=0.0177). The new reimbursement scheme had a minor impact on utilization and costs of oral GLT. Despite restricted reimbursement for patients with T2DM, the utilization of insulin based GLT and related costs increased faster following the intervention. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
Liu, Yang; Han, Guangjie; Shi, Sulong; Li, Zhengquan
2018-06-20
This study investigates the superiority of cooperative broadcast transmission over traditional orthogonal schemes when applied in a downlink relaying broadcast channel (RBC). Two proposed cooperative broadcast transmission protocols, one with an amplify-and-forward (AF) relay, and the other with a repetition-based decode-and-forward (DF) relay, are investigated. By utilizing superposition coding (SupC), the source and the relay transmit the private user messages simultaneously instead of sequentially as in traditional orthogonal schemes, which means the channel resources are reused and an increased channel degree of freedom is available to each user, hence the half-duplex penalty of relaying is alleviated. To facilitate a performance evaluation, theoretical outage probability expressions of the two broadcast transmission schemes are developed, based on which, we investigate the minimum total power consumption of each scheme for a given traffic requirement by numerical simulation. The results provide details on the overall system performance and fruitful insights on the essential characteristics of cooperative broadcast transmission in RBCs. It is observed that better overall outage performances and considerable power gains can be obtained by utilizing cooperative broadcast transmissions compared to traditional orthogonal schemes.
Asynchronous Communication Scheme For Hypercube Computer
NASA Technical Reports Server (NTRS)
Madan, Herb S.
1988-01-01
Scheme devised for asynchronous-message communication system for Mark III hypercube concurrent-processor network. Network consists of up to 1,024 processing elements connected electrically as though were at corners of 10-dimensional cube. Each node contains two Motorola 68020 processors along with Motorola 68881 floating-point processor utilizing up to 4 megabytes of shared dynamic random-access memory. Scheme intended to support applications requiring passage of both polled or solicited and unsolicited messages.
Spring and summer contrast in new particle formation over nine forest areas in North America
Yu, F.; Luo, G.; Pryor, S. C.; ...
2015-12-18
Recent laboratory chamber studies indicate a significant role for highly oxidized low-volatility organics in new particle formation (NPF), but the actual role of these highly oxidized low-volatility organics in atmospheric NPF remains uncertain. Here, particle size distributions (PSDs) measured in nine forest areas in North America are used to characterize the occurrence and intensity of NPF and to evaluate model simulations using an empirical formulation in which formation rate is a function of the concentrations of sulfuric acid and low-volatility organics from alpha-pinene oxidation (Nucl-Org), and using an ion-mediated nucleation mechanism (excluding organics) (Nucl-IMN). On average, NPF occurred on ~more » 70 % of days during March for the four forest sites with springtime PSD measurements, while NPF occurred on only ~ 10 % of days in July for all nine forest sites. Both Nucl-Org and Nucl-IMN schemes capture the observed high frequency of NPF in spring, but the Nucl-Org scheme significantly overpredicts while the Nucl-IMN scheme slightly underpredicts NPF and particle number concentrations in summer. Statistical analyses of observed and simulated ultrafine particle number concentrations and frequency of NPF events indicate that the scheme without organics agrees better overall with observations. The two schemes predict quite different nucleation rates (including their spatial patterns), concentrations of cloud condensation nuclei, and aerosol first indirect radiative forcing in North America, highlighting the need to reduce NPF uncertainties in regional and global earth system models.« less
Thakur, Harshad
2015-01-01
Government of India launched a social health protection program called Rashtriya Swasthya Bima Yojana (RSBY) in the year 2008 to provide financial protection from catastrophic health expenses to below poverty line households (HHs). The objectives of the current paper are to assess the current status of RSBY in Maharashtra at each step of awareness, enrollment, and utilization. In addition, urban and rural areas were compared, and social, political, economic, and cultural (SPEC) factors responsible for the better or poor proportions, especially for the awareness of the scheme, were identified. The study followed mixed methods approach. For quantitative data, a systematic multistage sampling design was adopted in both rural and urban areas covering 6000 HHs across 22 districts. For qualitative data, five districts were selected to conduct Stakeholder Analysis, Focused Group Discussions, and In-Depth Interviews with key informants to supplement the findings. The data were analyzed using innovative SPEC-by-steps tool developed by Health Inc. It is seen that that the RSBY had a very limited success in Maharashtra. Out of 6000 HHs, only 29.7% were aware about the scheme and 21.6% were enrolled during the period of 2010-2012. Only 11.3% HHs reported that they were currently enrolled for RSBY. Although 1886 (33.1%) HHs reported at least one case of hospitalization in the last 1 year, only 16 (0.3%) HHs could actually utilize the benefits during hospitalization. It is seen that at each step, there is an increase in the exclusion of eligible HHs from the scheme. The participants felt that such schemes did not reach their intended beneficiaries due to various SPEC factors. The results of this study were quite similar to other studies done in the recent past. RSBY might still be continued in Maharashtra with modified focus along with good and improved strategy. Various other similar schemes in India can definitely learn few important lessons such as the need to improve awareness, issuing prompt enrollment cards with proper details, achieving universal enrollment, ongoing and prompt renewal, and ensuring proper utilization by proactively educating the vulnerable sections.
An Architecture for Enabling Migration of Tactical Networks to Future Flexible Ad Hoc WBWF
2010-09-01
Requirements Several multiple access schemes TDMA OFDMA SC-OFDMA, FH- CDMA , DS - CDMA , hybrid access schemes, transitions between them Dynamic...parameters algorithms depend on the multiple access scheme If DS - CDMA : handling of macro-diversity (linked to cooperative routing) TDMA and/of OFDMA...Transport format Ciphering @MAC/RLC level : SCM Physical layer (PHY) : signal processing (mod, FEC, etc) CDMA : macro-diversity CDMA , OFDMA
Welfare Reform when Recipients Are Forward-Looking
ERIC Educational Resources Information Center
Swann, Christopher A.
2005-01-01
By studying recipients of aid under the Temporary Assistance for Needy Families (TANF) welfare scheme, the effect of time limits of welfare schemes on forward looking recipients is assessed using a discrete-choice dynamic programming framework model. The policy simulations for the preferred specification of utility reveal that two year time limits…
A Simple Qualitative Analysis Scheme for Several Environmentally Important Elements
ERIC Educational Resources Information Center
Lambert, Jack L.; Meloan, Clifton E.
1977-01-01
Describes a scheme that uses precipitation, gas evolution, complex ion formation, and flame tests to analyze for the following ions: Hg(I), Hg(II), Sb(III), Cr(III), Pb(II), Sr(II), Cu(II), Cd(II), As(III), chloride, nitrate, and sulfate. (MLH)
PTBS segmentation scheme for synthetic aperture radar
NASA Astrophysics Data System (ADS)
Friedland, Noah S.; Rothwell, Brian J.
1995-07-01
The Image Understanding Group at Martin Marietta Technologies in Denver, Colorado has developed a model-based synthetic aperture radar (SAR) automatic target recognition (ATR) system using an integrated resource architecture (IRA). IRA, an adaptive Markov random field (MRF) environment, utilizes information from image, model, and neighborhood resources to create a discrete, 2D feature-based world description (FBWD). The IRA FBWD features are peak, target, background and shadow (PTBS). These features have been shown to be very useful for target discrimination. The FBWD is used to accrue evidence over a model hypothesis set. This paper presents the PTBS segmentation process utilizing two IRA resources. The image resource (IR) provides generic (the physics of image formation) and specific (the given image input) information. The neighborhood resource (NR) provides domain knowledge of localized FBWD site behaviors. A simulated annealing optimization algorithm is used to construct a `most likely' PTBS state. Results on simulated imagery illustrate the power of this technique to correctly segment PTBS features, even when vehicle signatures are immersed in heavy background clutter. These segmentations also suppress sidelobe effects and delineate shadows.
Factorizable Schemes for the Equations of Fluid Flow
NASA Technical Reports Server (NTRS)
Sidilkover, David
1999-01-01
We present an upwind high-resolution factorizable (UHF) discrete scheme for the compressible Euler equations that allows to distinguish between full-potential and advection factors at the discrete level. The scheme approximates equations in their general conservative form and is related to the family of genuinely multidimensional upwind schemes developed previously and demonstrated to have good shock-capturing capabilities. A unique property of this scheme is that in addition to the aforementioned features it is also factorizable, i.e., it allows to distinguish between full-potential and advection factors at the discrete level. The latter property facilitates the construction of optimally efficient multigrid solvers. This is done through a relaxation procedure that utilizes the factorizability property.
One-third selection scheme for addressing a ferroelectric matrix arrangement
NASA Technical Reports Server (NTRS)
Tannas, Jr., Lawrence E. (Inventor)
1979-01-01
An improved scheme for selectively addressing a matrix arrangement comprised of ferroelectrics having x and y orthogonally disposed intersecting lines. A one-third selection scheme is utilized that includes normalized selection signals having amplitudes: V.sub.x =0; V.sub.x =2/3; V.sub.y =1/3; and V.sub.y =1, which signals can be applied to the intersection of an x and y-line. The instant selection scheme minimizes both hysteresis creep and the cross-coupling voltage between x and y-lines to prevent undesirable hysteresis switching of the ferroelectric matrix arrangement.
Distributed parametric amplifier for RZ-DPSK signal transmission system.
Xu, Xing; Zhang, Chi; Yuk, T I; Wong, Kenneth K Y
2012-08-13
We have experimentally demonstrated a single pump distributed parametric amplification (DPA) system for differential phase shift keying (DPSK) signal in a spool of dispersion-shifted fiber (DSF). The gain spectrum of single pump DPA is thoroughly investigated by both simulation and experiment, and a possible reference for optimal input pump power and fiber length relationship is provided to DPA based applications. Furthermore, DPSK format is compared with on-off keying (OOK) within DPA scheme. Eight WDM signal channels at 10-Gb/s are utilized, and approximately 0.5-dB power penalties at the bit-error rate (BER) of 10(-9) are achieved for return-to-zero DPSK (RZ-DPSK), comparing to larger than 1.5-dB with OOK format. In order to improve the system power efficiency, at the receiver, the pump is recycled by a photovoltaic cell and the converted energy can be used by potential low-power-consuming devices, i.e sensors or small-scale electronic circuits. Additionally, with suitable components, the whole DPA concept could be directly applied to the 1.3-μm telecommunication window along the most commonly used single-mode fiber (SMF).
Application of a Chimera Full Potential Algorithm for Solving Aerodynamic Problems
NASA Technical Reports Server (NTRS)
Holst, Terry L.; Kwak, Dochan (Technical Monitor)
1997-01-01
A numerical scheme utilizing a chimera zonal grid approach for solving the three dimensional full potential equation is described. Special emphasis is placed on describing the spatial differencing algorithm around the chimera interface. Results from two spatial discretization variations are presented; one using a hybrid first-order/second-order-accurate scheme and the second using a fully second-order-accurate scheme. The presentation is highlighted with a number of transonic wing flow field computations.
NASA Technical Reports Server (NTRS)
Shamanna, M.; Whitaker, S.
1992-01-01
This paper presents an architecture for a high-speed carry select adder with very long bit lengths utilizing a conflict-free bypass scheme. The proposed scheme has almost half the number of transistors and is faster than a conventional carry select adder. A comparative study is also made between the proposed adder and a Manchester carry chain adder which shows that the proposed scheme has the same transistor count, without suffering any performance degradation, compared to the Manchester carry chain adder.
Panuganti, Bharat A; Leach, Matthew; Antisdel, Jastin
2015-01-01
Cerebrospinal fluid (CSF) rhinorrhea and encephaloceles are rare complications of craniofacial advancement procedures performed in patients with craniofacial dysostoses (CD) to address the ramifications of their midface hypoplasia including obstructed nasal airway, exorbitism, and impaired mastication. Surgical repair of this CSF rhinorrhea is complicated by occult elevations in intracranial pressure (ICP), potentially necessitating open, transcranial repair. We report the first case in otolaryngology literature of a patient with Crouzon syndrome with late CSF rhinorrhea and encephalocele formation after previous LeFort III facial advancement surgery. Describe the case of a patient with Crouzon syndrome who presented with CSF rhinorrhea and encephaloceles as complications of Le Fort III facial advancement surgery. Review the literature pertaining to the incidence and management of post-operative CSF rhinorrhea and encephaloceles. Analyze issues related to repair of these complications, including occult elevations in ICP, the utility of perioperative CSF shunts, and the importance of considering alternative repair schemes to the traditional endonasal, endoscopic approach. Review of the literature describing CSF rhinorrhea and encephalocele formation following facial advancement in CD, focusing on management strategies. CSF rhinorrhea and encephalocele formation are rare complications of craniofacial advancement procedures. Occult elevations in ICP complicate the prospect of permanent surgical repair, potentially necessitating transcranial repair and the use of CSF shunts. Though no consensus exists regarding the utility of perioperative CSF drains, strong associations exist between elevated ICP and failed surgical repair. Additionally, the anatomic changes in the frontal and ethmoid sinuses after facial advancement present a challenge to endoscopic repair. Otolaryngologists should be aware of the possibility of occult elevations in ICP and sinonasal anatomic abnormalities when repairing CSF rhinorrhea in patients with CD. Clinicians should consider CSF shunt placement and carefully weigh the advantages of the transcranial approach versus endonasal, endoscopic techniques.
Data Quality Screening Service
NASA Technical Reports Server (NTRS)
Strub, Richard; Lynnes, Christopher; Hearty, Thomas; Won, Young-In; Fox, Peter; Zednik, Stephan
2013-01-01
A report describes the Data Quality Screening Service (DQSS), which is designed to help automate the filtering of remote sensing data on behalf of science users. Whereas this process often involves much research through quality documents followed by laborious coding, the DQSS is a Web Service that provides data users with data pre-filtered to their particular criteria, while at the same time guiding the user with filtering recommendations of the cognizant data experts. The DQSS design is based on a formal semantic Web ontology that describes data fields and the quality fields for applying quality control within a data product. The accompanying code base handles several remote sensing datasets and quality control schemes for data products stored in Hierarchical Data Format (HDF), a common format for NASA remote sensing data. Together, the ontology and code support a variety of quality control schemes through the implementation of the Boolean expression with simple, reusable conditional expressions as operands. Additional datasets are added to the DQSS simply by registering instances in the ontology if they follow a quality scheme that is already modeled in the ontology. New quality schemes are added by extending the ontology and adding code for each new scheme.
Computational methods for vortex dominated compressible flows
NASA Technical Reports Server (NTRS)
Murman, Earll M.
1987-01-01
The principal objectives were to: understand the mechanisms by which Euler equation computations model leading edge vortex flows; understand the vortical and shock wave structures that may exist for different wing shapes, angles of incidence, and Mach numbers; and compare calculations with experiments in order to ascertain the limitations and advantages of Euler equation models. The initial approach utilized the cell centered finite volume Jameson scheme. The final calculation utilized a cell vertex finite volume method on an unstructured grid. Both methods used Runge-Kutta four stage schemes for integrating the equations. The principal findings are briefly summarized.
Islam, Mohammad Touhidul; Igarashi, Isao; Kawabuchi, Koichi
2012-08-01
Low utilization of antenatal care (ANC) by pregnant women, particularly in rural areas, is an obstacle to ensuring safe motherhood in Bangladesh. Currently, Micro Health Insurance (MHI) is being considered in many developing countries as a potential method for assuring greater access to health care, especially for the poor. So far, there is only limited evidence evaluating MHI schemes. This study assesses the impact of MHI administered by Gonoshasthaya Kendra (GK) on ANC utilization by poor women in rural Bangladesh. We conducted a questionnaire survey and collected 321 valid responses from women enrolled in GK's MHI scheme and 271 from women not enrolled in any health insurance plan. We used a two-part model in which dependent variables were whether or not women utilized ANC and the number of times ANC was used. The model consisted of logistic regression analysis and ordinary least squares regression analysis. The main independent variables were dummies for socioeconomic classes according to GK, each of which represented the premiums and co-payments charged by class. The results showed that destitute, ultra-poor, and poor women enrolled in MHI used ANC significantly more than women not enrolled in health insurance. Women enrolled in MHI, except for those who were destitute or ultra-poor, utilized ANC significantly more times than women not enrolled in health insurance. We assume that GK's sliding premium and co-payment scales are key to ANC utilization by women. Expanding the MHI scheme may enhance ANC utilization among poor women in rural Bangladesh.
Formations of Tethered Spacecraft as Stable Platforms for Far IR and Sub-mm Astronomy
NASA Technical Reports Server (NTRS)
Quadrelli, Marco B.; Hadaegh, Fred Y.; Shao, Michael; Lorenzini, Enrico C.
2004-01-01
In this paper we describe current research in tethered formations for interferometry, and a roadmap to demonstrating the required key technologies via on-ground and in-orbit testing. We propose an integrated kilometer-size tethered spacecraft formation flying concept which enables Far IR and Sub-mm astronomy observations from space. A rather general model is used to predict the dynamics, control, and estimation performance of formations of spacecraft connected by tethers in LEO and deep space. These models include the orbital and tethered formation dynamics, environmental models, and models of the formation estimator/controller/commander. Both centralized and decentralized control/sensing/estimation schemes are possible, and dynamic ranges of interest for sensing/control are described. Key component/subsystem technologies are described which need both ground-based and in-orbit demonstration prior to their utilization in precision space interferometry missions using tethered formations. Defining an orbiting formation as an ensemble of orbiting spacecraft performing a cooperative task, recent work has demonstrated the validity of the tethering the spacecraft to provide both the required formation rigidity and satisfy the formation reconfiguration needs such as interferometer baseline control. In our concept, several vehicles are connected and move along the tether, so that to reposition them the connecting tether links must vary in length. This feature enables variable and precise baseline control while the system spins around the boresight. The control architecture features an interferometer configuration composed of one central combiner spacecraft and two aligned collector spacecraft. The combiner spacecraft acts as the formation leader and is also where the centralized sensing and estimation functions reside. Some of the issues analyzed with the model are: dynamic modes of deformation of the distributed structure, architecture of the formation sensor, and sources of dynamical perturbation that need to be mitigated for precision operation in space. Examples from numerical simulation of an envisioned scenario in heliocentric orbit demonstrate the potential of the concept for space interferometry.
a Study of Multiplexing Schemes for Voice and Data.
NASA Astrophysics Data System (ADS)
Sriram, Kotikalapudi
Voice traffic variations are characterized by on/off transitions of voice calls, and talkspurt/silence transitions of speakers in conversations. A speaker is known to be in silence for more than half the time during a telephone conversation. In this dissertation, we study some schemes which exploit speaker silences for an efficient utilization of the transmission capacity in integrated voice/data multiplexing and in digital speech interpolation. We study two voice/data multiplexing schemes. In each scheme, any time slots momentarily unutilized by the voice traffic are made available to data. In the first scheme, the multiplexer does not use speech activity detectors (SAD), and hence the voice traffic variations are due to call on/off only. In the second scheme, the multiplexer detects speaker silences using SAD and transmits voice only during talkspurts. The multiplexer with SAD performs digital speech interpolation (DSI) as well as dynamic channel allocation to voice and data. The performance of the two schemes is evaluated using discrete-time modeling and analysis. The data delay performance for the case of English speech is compared with that for the case of Japanese speech. A closed form expression for the mean data message delay is derived for the single-channel single-talker case. In a DSI system, occasional speech losses occur whenever the number of speakers in simultaneous talkspurt exceeds the number of TDM voice channels. In a buffered DSI system, speech loss is further reduced at the cost of delay. We propose a novel fixed-delay buffered DSI scheme. In this scheme, speech fill-in/hangover is not required because there are no variable delays. Hence, all silences that naturally occur in speech are fully utilized. Consequently, a substantial improvement in the DSI performance is made possible. The scheme is modeled and analyzed in discrete -time. Its performance is evaluated in terms of the probability of speech clipping, packet rejection ratio, DSI advantage, and the delay.
NASA Astrophysics Data System (ADS)
Rehman, Asad; Ali, Ishtiaq; Qamar, Shamsul
An upwind space-time conservation element and solution element (CE/SE) scheme is extended to numerically approximate the dusty gas flow model. Unlike central CE/SE schemes, the current method uses the upwind procedure to derive the numerical fluxes through the inner boundary of conservation elements. These upwind fluxes are utilized to calculate the gradients of flow variables. For comparison and validation, the central upwind scheme is also applied to solve the same dusty gas flow model. The suggested upwind CE/SE scheme resolves the contact discontinuities more effectively and preserves the positivity of flow variables in low density flows. Several case studies are considered and the results of upwind CE/SE are compared with the solutions of central upwind scheme. The numerical results show better performance of the upwind CE/SE method as compared to the central upwind scheme.
Mishra, Dheerendra; Srinivas, Jangirala; Mukhopadhyay, Sourav
2014-10-01
Advancement in network technology provides new ways to utilize telecare medicine information systems (TMIS) for patient care. Although TMIS usually faces various attacks as the services are provided over the public network. Recently, Jiang et al. proposed a chaotic map-based remote user authentication scheme for TMIS. Their scheme has the merits of low cost and session key agreement using Chaos theory. It enhances the security of the system by resisting various attacks. In this paper, we analyze the security of Jiang et al.'s scheme and demonstrate that their scheme is vulnerable to denial of service attack. Moreover, we demonstrate flaws in password change phase of their scheme. Further, our aim is to propose a new chaos map-based anonymous user authentication scheme for TMIS to overcome the weaknesses of Jiang et al.'s scheme, while also retaining the original merits of their scheme. We also show that our scheme is secure against various known attacks including the attacks found in Jiang et al.'s scheme. The proposed scheme is comparable in terms of the communication and computational overheads with Jiang et al.'s scheme and other related existing schemes. Moreover, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.
A Single Multilocus Sequence Typing (MLST) Scheme for Seven Pathogenic Leptospira Species
Amornchai, Premjit; Wuthiekanun, Vanaporn; Bailey, Mark S.; Holden, Matthew T. G.; Zhang, Cuicai; Jiang, Xiugao; Koizumi, Nobuo; Taylor, Kyle; Galloway, Renee; Hoffmaster, Alex R.; Craig, Scott; Smythe, Lee D.; Hartskeerl, Rudy A.; Day, Nicholas P.; Chantratita, Narisara; Feil, Edward J.; Aanensen, David M.; Spratt, Brian G.; Peacock, Sharon J.
2013-01-01
Background The available Leptospira multilocus sequence typing (MLST) scheme supported by a MLST website is limited to L. interrogans and L. kirschneri. Our aim was to broaden the utility of this scheme to incorporate a total of seven pathogenic species. Methodology and Findings We modified the existing scheme by replacing one of the seven MLST loci (fadD was changed to caiB), as the former gene did not appear to be present in some pathogenic species. Comparison of the original and modified schemes using data for L. interrogans and L. kirschneri demonstrated that the discriminatory power of the two schemes was not significantly different. The modified scheme was used to further characterize 325 isolates (L. alexanderi [n = 5], L. borgpetersenii [n = 34], L. interrogans [n = 222], L. kirschneri [n = 29], L. noguchii [n = 9], L. santarosai [n = 10], and L. weilii [n = 16]). Phylogenetic analysis using concatenated sequences of the 7 loci demonstrated that each species corresponded to a discrete clade, and that no strains were misclassified at the species level. Comparison between genotype and serovar was possible for 254 isolates. Of the 31 sequence types (STs) represented by at least two isolates, 18 STs included isolates assigned to two or three different serovars. Conversely, 14 serovars were identified that contained between 2 to 10 different STs. New observations were made on the global phylogeography of Leptospira spp., and the utility of MLST in making associations between human disease and specific maintenance hosts was demonstrated. Conclusion The new MLST scheme, supported by an updated MLST website, allows the characterization and species assignment of isolates of the seven major pathogenic species associated with leptospirosis. PMID:23359622
Kingkaew, Pritaporn; Werayingyong, Pitsaphun; Aye, San San; Tin, Nilar; Singh, Alaka; Myint, Phone; Teerawattananon, Yot
2016-01-01
Reducing child and maternal mortality in order to meet the health-related Millennium Development Goals (MDGs) 4 and 5 remains a major challenge in Myanmar. Inadequate care during pregnancy and labour plays an important role in the maternal mortality rate in Myanmar. A Maternal and Child Health (MCH) Voucher Scheme comprising a subsidization for pregnant women to receive four antenatal care (ANC), delivery and postnatal care (PNC) free-of-charge was planned to help women overcome financial barriers in addition to raising awareness of ANC and delivery with skilled birth attendants (SBA), which can reduce the rate of maternal and neonatal death. This study is part of an ex-ante evaluation of a feasibility study of the MCH Voucher Scheme. A cost-utility analysis was conducted using a decision tree model to assess the cost per disability-adjusted life years (DALYs) averted from the MCH Voucher Scheme compared with the current situation. Most input parameters were obtained from Myanmar context. From the base-case analysis, where the financial burden on households was fully subsidized, the MCH Voucher Scheme increased utilization for ANC from 73% up to 93% and for delivery from SBAs from 51% up to and 71%, respectively; hence, it is considered to be very cost-effective with an incremental cost-effectiveness ratio of 381 027 kyats per DALY averted (2010, price year). From the probabilistic sensitivity analysis, the MCH Voucher Scheme had a 52% chance of being a cost-effective option at 1 GDP per capita threshold compared to the current situation. Given that the Voucher Scheme is currently being implemented in one township in Myanmar as a result of this study, ongoing evaluation of the effectiveness and cost-effectiveness of this scheme is warranted. PMID:26412858
Simulation of hot spots formation and evolution in HMX
NASA Astrophysics Data System (ADS)
Wang, Cheng; Yang, Tonghui
2017-06-01
In order to study the formation and evolution of hot spots under shock loading, HMX explosives were selected as the object of study for the two-dimensional finite difference numerical simulation. A fifth order finite difference weighted essentially non-oscillatory (WENO) scheme and a third order TVD Runge-Kutta method are utilized for the spatial discretization and the time advance, respectively. The governing equations are based on the fluid elasto-plastic control equations. The Mie-Gruneisen equation of state and the ideal gas equation of state are selected to use in the state equation of the solid explosives and gas material. In order to simplify the calculation of the model, the reaction can be considered to complete in one step. The calculated area is [ 3.0 ×10-5 m ] × [ 3.0 ×10-5 m ] . The radius is 0.6 ×10-5 m, and the internal gas is not involved in the reaction. The calculation area is divided into 300×300 grids and 10 grids are selected from the bottom of each column to give the particle velocity u as the initial condition. In the selected grid, different initial velocity 100m/s and 200m/s are loaded respectively to study the influence of hot spot formation and evolution in different impact intensity.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sharon, Y.Y.
1988-04-01
The P scheme of Casten, Brenner, and Haustein is used to suggest that nuclei will always become deformed when there are more than 10 valence nucleons of each type (protons and neutrons). Utilizing this scheme, necessary and sufficient conditions are also suggested for the onset of nuclear collectivity.
Content Analysis Coding Schemes for Online Asynchronous Discussion
ERIC Educational Resources Information Center
Weltzer-Ward, Lisa
2011-01-01
Purpose: Researchers commonly utilize coding-based analysis of classroom asynchronous discussion contributions as part of studies of online learning and instruction. However, this analysis is inconsistent from study to study with over 50 coding schemes and procedures applied in the last eight years. The aim of this article is to provide a basis…
A special protection scheme utilizing trajectory sensitivity analysis in power transmission
NASA Astrophysics Data System (ADS)
Suriyamongkol, Dan
In recent years, new measurement techniques have provided opportunities to improve the North American Power System observability, control and protection. This dissertation discusses the formulation and design of a special protection scheme based on a novel utilization of trajectory sensitivity techniques with inputs consisting of system state variables and parameters. Trajectory sensitivity analysis (TSA) has been used in previous publications as a method for power system security and stability assessment, and the mathematical formulation of TSA lends itself well to some of the time domain power system simulation techniques. Existing special protection schemes often have limited sets of goals and control actions. The proposed scheme aims to maintain stability while using as many control actions as possible. The approach here will use the TSA in a novel way by using the sensitivities of system state variables with respect to state parameter variations to determine the state parameter controls required to achieve the desired state variable movements. The initial application will operate based on the assumption that the modeled power system has full system observability, and practical considerations will be discussed.
The Joint CCSDS-SFCG Modulation Study--A Comparison of Modulation Schemes
NASA Technical Reports Server (NTRS)
Martin, W. L.; Nguyen, T. M.
1994-01-01
This paper compares the various modulation schemes, namely, PCM/PSK/PM, PCM/PM and BPSK. The subcarrier wave form for PCM/PSK/PM can be either square wave or sine wave, and the data format for PCM/PM and BPSK can be wither NRZ or Bi-phase.
Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks
NASA Astrophysics Data System (ADS)
Fu, Minglei; Chai, Zhicheng; Le, Zichun
2016-03-01
With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.
An interactive adaptive remeshing algorithm for the two-dimensional Euler equations
NASA Technical Reports Server (NTRS)
Slack, David C.; Walters, Robert W.; Lohner, R.
1990-01-01
An interactive adaptive remeshing algorithm utilizing a frontal grid generator and a variety of time integration schemes for the two-dimensional Euler equations on unstructured meshes is presented. Several device dependent interactive graphics interfaces have been developed along with a device independent DI-3000 interface which can be employed on any computer that has the supporting software including the Cray-2 supercomputers Voyager and Navier. The time integration methods available include: an explicit four stage Runge-Kutta and a fully implicit LU decomposition. A cell-centered finite volume upwind scheme utilizing Roe's approximate Riemann solver is developed. To obtain higher order accurate results a monotone linear reconstruction procedure proposed by Barth is utilized. Results for flow over a transonic circular arc and flow through a supersonic nozzle are examined.
A Classification Scheme for Smart Manufacturing Systems’ Performance Metrics
Lee, Y. Tina; Kumaraguru, Senthilkumaran; Jain, Sanjay; Robinson, Stefanie; Helu, Moneer; Hatim, Qais Y.; Rachuri, Sudarsan; Dornfeld, David; Saldana, Christopher J.; Kumara, Soundar
2017-01-01
This paper proposes a classification scheme for performance metrics for smart manufacturing systems. The discussion focuses on three such metrics: agility, asset utilization, and sustainability. For each of these metrics, we discuss classification themes, which we then use to develop a generalized classification scheme. In addition to the themes, we discuss a conceptual model that may form the basis for the information necessary for performance evaluations. Finally, we present future challenges in developing robust, performance-measurement systems for real-time, data-intensive enterprises. PMID:28785744
Pulse design for multilevel systems by utilizing Lie transforms
NASA Astrophysics Data System (ADS)
Kang, Yi-Hao; Chen, Ye-Hong; Shi, Zhi-Cheng; Huang, Bi-Hua; Song, Jie; Xia, Yan
2018-03-01
We put forward a scheme to design pulses to manipulate multilevel systems with Lie transforms. A formula to reverse construct a control Hamiltonian is given and is applied in pulse design in the three- and four-level systems as examples. To demonstrate the validity of the scheme, we perform numerical simulations, which show the population transfers for cascaded three-level and N -type four-level Rydberg atoms can be completed successfully with high fidelities. Therefore, the scheme may benefit quantum information tasks based on multilevel systems.
Improved Group Signature Scheme Based on Quantum Teleportation
NASA Astrophysics Data System (ADS)
Su, Qi; Li, Wen-Min
2014-04-01
Recently, Wen et al. proposed a group signature scheme based on quantum teleportation (Wen et al. 81(5):055001, 2010). In this paper, we find that it is vulnerable to the inside attack, by which all other legal members of the group can forge the signature utilizing the anti-commutative relationship between the Pauli operation Y and the encryption operation H, and the public board. Then we present an improved scheme where the eavesdropping process after the transmission is involved to increase the security.
Niemi, Jarkko K; Heikkilä, Jaakko
2011-06-01
The participation of agricultural producers in financing losses caused by livestock epidemics has been debated in many countries. One of the issues raised is how reluctant producers are to participate voluntarily in the financing of disease losses before an outbreak occurs. This study contributes to the literature by examining whether disease losses should be financed through pre- or post-outbreak premiums or their combination. A Monte Carlo simulation was employed to illustrate the costs of financing two diseases of different profiles. The profiles differed in the probability in which the damage occurs and in the average damage per event. Three hypothetical financing schemes were compared based on their ability to reduce utility losses in the case of risk-neutral and risk-averse producer groups. The schemes were examined in a dynamic setting where premiums depended on the compensation history of the sector. If producers choose the preferred financing scheme based on utility losses, results suggest that the timing of the premiums, the transaction costs of the scheme, the degree of risk aversion of the producer, and the level and the volatility of premiums affect the choice of the financing scheme. Copyright © 2011 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Wang, Dong; Hu, You-Di; Wang, Zhe-Qiang; Ye, Liu
2015-06-01
We develop two efficient measurement-based schemes for remotely preparing arbitrary three- and four-particle W-class entangled states by utilizing genuine tripartite Greenberg-Horn-Zeilinger-type states as quantum channels, respectively. Through appropriate local operations and classical communication, the desired states can be faithfully retrieved at the receiver's place with certain probability. Compared with the previously existing schemes, the success probability in current schemes is greatly increased. Moreover, the required classical communication cost is calculated as well. Further, several attractive discussions on the properties of the presented schemes, including the success probability and reducibility, are made. Remarkably, the proposed schemes can be faithfully achieved with unity total success probability when the employed channels are reduced into maximally entangled ones.
A joint tracking method for NSCC based on WLS algorithm
NASA Astrophysics Data System (ADS)
Luo, Ruidan; Xu, Ying; Yuan, Hong
2017-12-01
Navigation signal based on compound carrier (NSCC), has the flexible multi-carrier scheme and various scheme parameters configuration, which enables it to possess significant efficiency of navigation augmentation in terms of spectral efficiency, tracking accuracy, multipath mitigation capability and anti-jamming reduction compared with legacy navigation signals. Meanwhile, the typical scheme characteristics can provide auxiliary information for signal synchronism algorithm design. This paper, based on the characteristics of NSCC, proposed a kind of joint tracking method utilizing Weighted Least Square (WLS) algorithm. In this method, the LS algorithm is employed to jointly estimate each sub-carrier frequency shift with the frequency-Doppler linear relationship, by utilizing the known sub-carrier frequency. Besides, the weighting matrix is set adaptively according to the sub-carrier power to ensure the estimation accuracy. Both the theory analysis and simulation results illustrate that the tracking accuracy and sensitivity of this method outperforms the single-carrier algorithm with lower SNR.
Manganello, Jennifer A; Henderson, Vani R; Jordan, Amy; Trentacoste, Nicole; Martin, Suzanne; Hennessy, Michael; Fishbein, Martin
2010-07-01
Many studies of sexual messages in media utilize content analysis methods. At times, this research assumes that researchers and trained coders using content analysis methods and the intended audience view and interpret media content similarly. This article compares adolescents' perceptions of the presence or absence of sexual content on television to those of researchers using three different coding schemes. Results from this formative research study suggest that participants and researchers are most likely to agree with content categories assessing manifest content, and that differences exist among adolescents who view sexual messages on television. Researchers using content analysis methods to examine sexual content in media and media effects on sexual behavior should consider identifying how audience characteristics may affect interpretation of content and account for audience perspectives in content analysis study protocols when appropriate for study goals.
NASA Astrophysics Data System (ADS)
Yuan, Hao; Zhang, Qin; Hong, Liang; Yin, Wen-jie; Xu, Dong
2014-08-01
We present a novel scheme for deterministic secure quantum communication (DSQC) over collective rotating noisy channel. Four special two-qubit states are found can constitute a noise-free subspaces, and so are utilized as quantum information carriers. In this scheme, the information carriers transmite over the quantum channel only one time, which can effectively reduce the influence of other noise existing in quantum channel. The information receiver need only perform two single-photon collective measurements to decode the secret messages, which can make the present scheme more convenient in practical application. It will be showed that our scheme has a relatively high information capacity and intrisic efficiency. Foremostly, the decoy photon pair checking technique and the order rearrangement of photon pairs technique guarantee that the present scheme is unconditionally secure.
Jordan, Alan; Rees, Tony; Gowlett-Holmes, Karen
2015-01-01
Imagery collected by still and video cameras is an increasingly important tool for minimal impact, repeatable observations in the marine environment. Data generated from imagery includes identification, annotation and quantification of biological subjects and environmental features within an image. To be long-lived and useful beyond their project-specific initial purpose, and to maximize their utility across studies and disciplines, marine imagery data should use a standardised vocabulary of defined terms. This would enable the compilation of regional, national and/or global data sets from multiple sources, contributing to broad-scale management studies and development of automated annotation algorithms. The classification scheme developed under the Collaborative and Automated Tools for Analysis of Marine Imagery (CATAMI) project provides such a vocabulary. The CATAMI classification scheme introduces Australian-wide acknowledged, standardised terminology for annotating benthic substrates and biota in marine imagery. It combines coarse-level taxonomy and morphology, and is a flexible, hierarchical classification that bridges the gap between habitat/biotope characterisation and taxonomy, acknowledging limitations when describing biological taxa through imagery. It is fully described, documented, and maintained through curated online databases, and can be applied across benthic image collection methods, annotation platforms and scoring methods. Following release in 2013, the CATAMI classification scheme was taken up by a wide variety of users, including government, academia and industry. This rapid acceptance highlights the scheme’s utility and the potential to facilitate broad-scale multidisciplinary studies of marine ecosystems when applied globally. Here we present the CATAMI classification scheme, describe its conception and features, and discuss its utility and the opportunities as well as challenges arising from its use. PMID:26509918
Zhuge, Qunbi; Morsy-Osman, Mohamed; Chagnon, Mathieu; Xu, Xian; Qiu, Meng; Plant, David V
2014-02-10
In this paper, we propose a low-complexity format-transparent digital signal processing (DSP) scheme for next generation flexible and energy-efficient transceiver. It employs QPSK symbols as the training and pilot symbols for the initialization and tracking stage of the receiver-side DSP, respectively, for various modulation formats. The performance is numerically and experimentally evaluated in a dual polarization (DP) 11 Gbaud 64QAM system. Employing the proposed DSP scheme, we conduct a system-level study of Tb/s bandwidth-adaptive superchannel transmissions with flexible modulation formats including QPSK, 8QAM and 16QAM. The spectrum bandwidth allocation is realized in the digital domain instead of turning on/off sub-channels, which improves the performance of higher order QAM. Various transmission distances ranging from 240 km to 6240 km are demonstrated with a colorless detection for hardware complexity reduction.
Improved Boundary Conditions for Cell-centered Difference Schemes
NASA Technical Reports Server (NTRS)
VanderWijngaart, Rob F.; Klopfer, Goetz H.; Chancellor, Marisa K. (Technical Monitor)
1997-01-01
Cell-centered finite-volume (CCFV) schemes have certain attractive properties for the solution of the equations governing compressible fluid flow. Among others, they provide a natural vehicle for specifying flux conditions at the boundaries of the physical domain. Unfortunately, they lead to slow convergence for numerical programs utilizing them. In this report a method for investigating and improving the convergence of CCFV schemes is presented, which focuses on the effect of the numerical boundary conditions. The key to the method is the computation of the spectral radius of the iteration matrix of the entire demoralized system of equations, not just of the interior point scheme or the boundary conditions.
On the number of entangled qubits in quantum wireless sensor networks
NASA Astrophysics Data System (ADS)
Mohapatra, Amit Kumar; Balakrishnan, S.
2016-08-01
Wireless sensor networks (WSNs) can take the advantages by utilizing the security schemes based on the concepts of quantum computation and cryptography. However, quantum wireless sensor networks (QWSNs) are shown to have many practical constraints. One of the constraints is the number of entangled qubits which is very high in the quantum security scheme proposed by [Nagy et al., Nat. Comput. 9 (2010) 819]. In this work, we propose a modification of the security scheme introduced by Nagy et al. and hence the reduction in the number of entangled qubits is shown. Further, the modified scheme can overcome some of the constraints in the QWSNs.
Rapid Parameterization Schemes for Aircraft Shape Optimization
NASA Technical Reports Server (NTRS)
Li, Wu
2012-01-01
A rapid shape parameterization tool called PROTEUS is developed for aircraft shape optimization. This tool can be applied directly to any aircraft geometry that has been defined in PLOT3D format, with the restriction that each aircraft component must be defined by only one data block. PROTEUS has eight types of parameterization schemes: planform, wing surface, twist, body surface, body scaling, body camber line, shifting/scaling, and linear morphing. These parametric schemes can be applied to two types of components: wing-type surfaces (e.g., wing, canard, horizontal tail, vertical tail, and pylon) and body-type surfaces (e.g., fuselage, pod, and nacelle). These schemes permit the easy setup of commonly used shape modification methods, and each customized parametric scheme can be applied to the same type of component for any configuration. This paper explains the mathematics for these parametric schemes and uses two supersonic configurations to demonstrate the application of these schemes.
Mishra, Raghavendra; Barnwal, Amit Kumar
2015-05-01
The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.
A soft-hard combination-based cooperative spectrum sensing scheme for cognitive radio networks.
Do, Nhu Tri; An, Beongku
2015-02-13
In this paper we propose a soft-hard combination scheme, called SHC scheme, for cooperative spectrum sensing in cognitive radio networks. The SHC scheme deploys a cluster based network in which Likelihood Ratio Test (LRT)-based soft combination is applied at each cluster, and weighted decision fusion rule-based hard combination is utilized at the fusion center. The novelties of the SHC scheme are as follows: the structure of the SHC scheme reduces the complexity of cooperative detection which is an inherent limitation of soft combination schemes. By using the LRT, we can detect primary signals in a low signal-to-noise ratio regime (around an average of -15 dB). In addition, the computational complexity of the LRT is reduced since we derive the closed-form expression of the probability density function of LRT value. The SHC scheme also takes into account the different effects of large scale fading on different users in the wide area network. The simulation results show that the SHC scheme not only provides the better sensing performance compared to the conventional hard combination schemes, but also reduces sensing overhead in terms of reporting time compared to the conventional soft combination scheme using the LRT.
NASA Technical Reports Server (NTRS)
Betancourt, R. Morales; Lee, D.; Oreopoulos, L.; Sud, Y. C.; Barahona, D.; Nenes, A.
2012-01-01
The salient features of mixed-phase and ice clouds in a GCM cloud scheme are examined using the ice formation parameterizations of Liu and Penner (LP) and Barahona and Nenes (BN). The performance of LP and BN ice nucleation parameterizations were assessed in the GEOS-5 AGCM using the McRAS-AC cloud microphysics framework in single column mode. Four dimensional assimilated data from the intensive observation period of ARM TWP-ICE campaign was used to drive the fluxes and lateral forcing. Simulation experiments where established to test the impact of each parameterization in the resulting cloud fields. Three commonly used IN spectra were utilized in the BN parameterization to described the availability of IN for heterogeneous ice nucleation. The results show large similarities in the cirrus cloud regime between all the schemes tested, in which ice crystal concentrations were within a factor of 10 regardless of the parameterization used. In mixed-phase clouds there are some persistent differences in cloud particle number concentration and size, as well as in cloud fraction, ice water mixing ratio, and ice water path. Contact freezing in the simulated mixed-phase clouds contributed to transfer liquid to ice efficiently, so that on average, the clouds were fully glaciated at T approximately 260K, irrespective of the ice nucleation parameterization used. Comparison of simulated ice water path to available satellite derived observations were also performed, finding that all the schemes tested with the BN parameterization predicted 20 average values of IWP within plus or minus 15% of the observations.
Autonomous Guidance Strategy for Spacecraft Formations and Reconfiguration Maneuvers
NASA Astrophysics Data System (ADS)
Wahl, Theodore P.
A guidance strategy for autonomous spacecraft formation reconfiguration maneuvers is presented. The guidance strategy is presented as an algorithm that solves the linked assignment and delivery problems. The assignment problem is the task of assigning the member spacecraft of the formation to their new positions in the desired formation geometry. The guidance algorithm uses an auction process (also called an "auction algorithm''), presented in the dissertation, to solve the assignment problem. The auction uses the estimated maneuver and time of flight costs between the spacecraft and targets to create assignments which minimize a specific "expense'' function for the formation. The delivery problem is the task of delivering the spacecraft to their assigned positions, and it is addressed through one of two guidance schemes described in this work. The first is a delivery scheme based on artificial potential function (APF) guidance. APF guidance uses the relative distances between the spacecraft, targets, and any obstacles to design maneuvers based on gradients of potential fields. The second delivery scheme is based on model predictive control (MPC); this method uses a model of the system dynamics to plan a series of maneuvers designed to minimize a unique cost function. The guidance algorithm uses an analytic linearized approximation of the relative orbital dynamics, the Yamanaka-Ankersen state transition matrix, in the auction process and in both delivery methods. The proposed guidance strategy is successful, in simulations, in autonomously assigning the members of the formation to new positions and in delivering the spacecraft to these new positions safely using both delivery methods. This guidance algorithm can serve as the basis for future autonomous guidance strategies for spacecraft formation missions.
NASA Astrophysics Data System (ADS)
Li, Will X. Y.; Cui, Ke; Zhang, Wei
2017-04-01
Cognitive neural prosthesis is a manmade device which can be used to restore or compensate for lost human cognitive modalities. The generalized Laguerre-Volterra (GLV) network serves as a robust mathematical underpinning for the development of such prosthetic instrument. In this paper, a hardware implementation scheme of Gauss error function for the GLV network targeting reconfigurable platforms is reported. Numerical approximations are formulated which transform the computation of nonelementary function into combinational operations of elementary functions, and memory-intensive look-up table (LUT) based approaches can therefore be circumvented. The computational precision can be made adjustable with the utilization of an error compensation scheme, which is proposed based on the experimental observation of the mathematical characteristics of the error trajectory. The precision can be further customizable by exploiting the run-time characteristics of the reconfigurable system. Compared to the polynomial expansion based implementation scheme, the utilization of slice LUTs, occupied slices, and DSP48E1s on a Xilinx XC6VLX240T field-programmable gate array has decreased by 94.2%, 94.1%, and 90.0%, respectively. While compared to the look-up table based scheme, 1.0 ×1017 bits of storage can be spared under the maximum allowable error of 1.0 ×10-3 . The proposed implementation scheme can be employed in the study of large-scale neural ensemble activity and in the design and development of neural prosthetic device.
Teaching Science to Gifted Children: The Model and the Message.
ERIC Educational Resources Information Center
Wolfe, Lila F.
This paper is concerned with the kind of messages about science conveyed to 23 young gifted children enrolled at the McGill Summer School for Gifted and Talented Children in Montreal while utilizing a particular teaching model. Five science lessons were analyzed by applying a newly developed scheme to classroom interactions. The scheme helps to…
Properties of the Narrative Scoring Scheme Using Narrative Retells in Young School-Age Children
ERIC Educational Resources Information Center
Heilmann, John; Miller, Jon F.; Nockerts, Ann; Dunaway, Claudia
2010-01-01
Purpose: To evaluate the clinical utility of the narrative scoring scheme (NSS) as an index of narrative macrostructure for young school-age children. Method: Oral retells of a wordless picture book were elicited from 129 typically developing children, ages 5-7. A series of correlations and hierarchical regression equations were completed using…
Geographic Information Systems: A Primer
1990-10-01
AVAILABILITY OF REPORT Approved for public release; distribution 2b DECLASSjFICATION/ DOWNGRADING SCHEDULE unlimited. 4 PERFORMING ORGANIZATION REPORT...utilizing sophisticated integrated databases (usually vector-based), avoid the indirect value coding scheme by recognizing names or direct magnitudes...intricate involvement required by the operator in order to establish a functional coding scheme . A simple raster system, in which cell values indicate
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dietz, M. L.
1998-11-30
The determination of low levels of radionuclides in environmental and biological samples is often hampered by the complex and variable nature of the samples. One approach to circumventing this problem is to incorporate into the analytical scheme a separation and preconcentration step by which the species of interest can be isolated from the major constituents of the sample. Extraction chromatography (EXC), a form of liquid chromatography in which the stationary phase comprises an extractant or a solution of an extractant in an appropriate diluent coated onto an inert support, provides a simple and efficient means of performing a wide varietymore » of metal ion separations. Recent advances in extractant design, in particular the development of extractants capable of metal ion recognition or of strong complex formation even in acidic media, have substantially improved the utility of the method. For the preconcentration of actinides, for example, an EXC resin consisting of a liquid diphosphonic acid supported on a polymeric substrate has been shown to exhibit extraordinarily strong retention of these elements from acidic chloride media. This resin, together with other related materials, can provide the basis of a number of efficient and flexible schemes for the separation and preconcentration of radionuclides form a variety of samples for subsequent determination.« less
A Long-Term Study of the Microbial Community Structure in a ...
Many US water treatment facilities use chloramination to limit regulated disinfectant by-product formation. However, chloramination has been shown to promote nitrifying bacteria, and 30 to 63% of water utilities using secondary chloramine disinfection experience nitrification episodes. In this study, we examined the Bacterial population in a simulated chloraminated drinking water distribution system (DWDS). After six months of continuous operation, coupons were incubated in CDC reactors receiving water from the simulated DWDS to study biofilm development. The DWDS was then subjected to episodes of nitrification, followed by a ‘chlorine burn’ by switching disinfectant from chloramine to chlorine, a common nitrification control strategy. The study was organized into five distinct operational schemes: (1) PRE-MODIFIED; system stabilization, (2) STANDARD I; stable chloramine residual, (3) FAILURE; complete nitrification and minimal chloramine residual, (4) RESTORE; chlorine burn, and (5) STANDARD II; stable chloramine residual. Bulk water and biofilm samples were collected and analyzed for water quality parameters and microbial composition. No change in microbial biomass (ATP) in bulk water and biofilm samples was detected during the STANDARD I scheme, while an increase in biofilms was detected after 80 days (FAILURE, i.e. nitrification) followed by a decrease after a chlorine burn with a final increase to previous values (STANDARD I) during the STANDARD I
Demonstration of flexible multicasting and aggregation functionality for TWDM-PON
NASA Astrophysics Data System (ADS)
Chen, Yuanxiang; Li, Juhao; Zhu, Paikun; Zhu, Jinglong; Tian, Yu; Wu, Zhongying; Peng, Huangfa; Xu, Yongchi; Chen, Jingbiao; He, Yongqi; Chen, Zhangyuan
2017-06-01
The time- and wavelength-division multiplexed passive optical network (TWDM-PON) has been recognized as an attractive solution to provide broadband access for the next-generation networks. In this paper, we propose flexible service multicasting and aggregation functionality for TWDM-PON utilizing multiple-pump four-wave-mixing (FWM) and cyclic arrayed waveguide grating (AWG). With the proposed scheme, multiple TWDM-PON links share a single optical line terminal (OLT), which can greatly reduce the network deployment expense and achieve efficient network resource utilization by load balancing among different optical distribution networks (ODNs). The proposed scheme is compatible with existing TDM-PON infrastructure with fixed-wavelength OLT transmitter, thus smooth service upgrade can be achieved. Utilizing the proposed scheme, we demonstrate a proof-of-concept experiment with 10-Gb/s OOK and 10-Gb/s QPSK orthogonal frequency division multiplexing (OFDM) signal multicasting and aggregating to seven PON links. Compared with back-to-back (BTB) channel, the newly generated multicasting OOK signal and OFDM signal have power penalty of 1.6 dB and 2 dB at the BER of 10-3, respectively. For the aggregation of multiple channels, no obvious power penalty is observed. What is more, to verify the flexibility of the proposed scheme, we reconfigure the wavelength selective switch (WSS) and adjust the number of pumps to realize flexible multicasting functionality. One to three, one to seven, one to thirteen and one to twenty-one multicasting are achieved without modifying OLT structure.
Biological competition: Decision rules, pattern formation, and oscillations
Grossberg, Stephen
1980-01-01
Competition solves a universal problem about pattern processing by cellular systems. Competition allows cells to automatically retune their sensitivity to avoid noise and saturation effects. All competitive systems induce decision schemes that permit them to be classified. Systems are identified that achieve global pattern formation, or decision-making, no matter how their parameters are chosen. Oscillations can occur due to contradictions in a system's decision scheme. The pattern formation and oscillation results are extreme examples of a complementarity principle that seems to hold for competitive systems. Nonlinear competitive systems can sometimes appear, to a macroscopic observer, to have linear and cooperative properties, although the two types of systems are not equivalent. This observation is relevant to theories about the evolutionary transition from competitive to cooperative behavior. PMID:16592807
Fault diagnosis for analog circuits utilizing time-frequency features and improved VVRKFA
NASA Astrophysics Data System (ADS)
He, Wei; He, Yigang; Luo, Qiwu; Zhang, Chaolong
2018-04-01
This paper proposes a novel scheme for analog circuit fault diagnosis utilizing features extracted from the time-frequency representations of signals and an improved vector-valued regularized kernel function approximation (VVRKFA). First, the cross-wavelet transform is employed to yield the energy-phase distribution of the fault signals over the time and frequency domain. Since the distribution is high-dimensional, a supervised dimensionality reduction technique—the bilateral 2D linear discriminant analysis—is applied to build a concise feature set from the distributions. Finally, VVRKFA is utilized to locate the fault. In order to improve the classification performance, the quantum-behaved particle swarm optimization technique is employed to gradually tune the learning parameter of the VVRKFA classifier. The experimental results for the analog circuit faults classification have demonstrated that the proposed diagnosis scheme has an advantage over other approaches.
Metropolitan Washington Area Water Supply Study. Appendix F. Structural Alternatives.
1983-09-01
Geology F-132 Description of Aquifers F-137 Patuxent Formation F-137 Patapsco Formation F-137 Magothy Formation F-138 Aquia Formation F-138 Aquifer...Distribution in the Patuxent Aquifer F-146 F-32 Transmissivity Distribution in the Patapsco Aquifer F-i46 F-33 Transmissivity Distribution in the Magothy ...wellfield scheme was planned to tap the region’s deep * - aquifers, particularly the Magothy and Patapsco formations. To fully penetrate these aquifers
Sengupta, Arkajyoti; Ramabhadran, Raghunath O; Raghavachari, Krishnan
2014-08-14
In this study we have used the connectivity-based hierarchy (CBH) method to derive accurate heats of formation of a range of biomolecules, 18 amino acids and 10 barbituric acid/uracil derivatives. The hierarchy is based on the connectivity of the different atoms in a large molecule. It results in error-cancellation reaction schemes that are automated, general, and can be readily used for a broad range of organic molecules and biomolecules. Herein, we first locate stable conformational and tautomeric forms of these biomolecules using an accurate level of theory (viz. CCSD(T)/6-311++G(3df,2p)). Subsequently, the heats of formation of the amino acids are evaluated using the CBH-1 and CBH-2 schemes and routinely employed density functionals or wave function-based methods. The calculated heats of formation obtained herein using modest levels of theory and are in very good agreement with those obtained using more expensive W1-F12 and W2-F12 methods on amino acids and G3 results on barbituric acid derivatives. Overall, the present study (a) highlights the small effect of including multiple conformers in determining the heats of formation of biomolecules and (b) in concurrence with previous CBH studies, proves that use of the more effective error-cancelling isoatomic scheme (CBH-2) results in more accurate heats of formation with modestly sized basis sets along with common density functionals or wave function-based methods.
Shawky, S
2010-06-01
The current health insurance system in Egypt targets the productive population through an employment-based scheme bounded by a cost ceiling and focusing on curative care. Egypt Social Contract Survey data from 2005 were used to evaluate the impact of the employment-based scheme on health system accessibility and financing. Only 22.8% of the population in the productive age range (19-59 years) benefited from any health insurance scheme. The employment-based scheme covered 39.3% of the working population and was skewed towards urban areas, older people, females and the wealthier. It did not increase service utilization, but reduced out-of-pocket expenditure. Egypt should blend all health insurance schemes and adopt an innovative approach to reach universal coverage.
NASA Astrophysics Data System (ADS)
Wang, Jinhong; Guan, Liang; Chapman, J.; Zhou, Bing; Zhu, Junjie
2017-11-01
We present a programmable time alignment scheme used in an ASIC for the ATLAS forward muon trigger development. The scheme utilizes regenerated clocks with programmable phases to compensate for the timing offsets introduced by different detector trace lengths. Each ASIC used in the design has 104 input channels with delay compensation circuitry providing steps of ∼3 ns and a full range of 25 ns for each channel. Detailed implementation of the scheme including majority logic to suppress single-event effects is presented. The scheme is flexible and fully synthesizable. The approach is adaptable to other applications with similar phase shifting requirements. In addition, the design is resource efficient and is suitable for cost-effective digital implementation with a large number of channels.
Mai, Xiaofeng; Liu, Jie; Wu, Xiong; Zhang, Qun; Guo, Changjian; Yang, Yanfu; Li, Zhaohui
2017-02-06
A Stokes-space modulation format classification (MFC) technique is proposed for coherent optical receivers by using a non-iterative clustering algorithm. In the clustering algorithm, two simple parameters are calculated to help find the density peaks of the data points in Stokes space and no iteration is required. Correct MFC can be realized in numerical simulations among PM-QPSK, PM-8QAM, PM-16QAM, PM-32QAM and PM-64QAM signals within practical optical signal-to-noise ratio (OSNR) ranges. The performance of the proposed MFC algorithm is also compared with those of other schemes based on clustering algorithms. The simulation results show that good classification performance can be achieved using the proposed MFC scheme with moderate time complexity. Proof-of-concept experiments are finally implemented to demonstrate MFC among PM-QPSK/16QAM/64QAM signals, which confirm the feasibility of our proposed MFC scheme.
Floquet-Network Theory of Nonreciprocal Transport
NASA Astrophysics Data System (ADS)
Li, Huanan; Kottos, Tsampikos; Shapiro, Boris
2018-04-01
We develop a theoretical framework that lays out the fundamental rules under which a periodic (Floquet) driving scheme can induce nonreciprocal transport. Our approach utilizes an extended Hilbert space where a Floquet network with an extra (frequency) dimension naturally arises. The properties of this network (its on-site potential and the intersite couplings) are in one-to-one correspondence with the initial driving scheme. Its proper design allows for a control of the multipath scattering processes and the associated interferences. We harness this degree of freedom to realize driving schemes with narrow-band or broadband nonreciprocal transport.
Cavity BPM with Dipole-Mode-Selective Coupler
DOE Office of Scientific and Technical Information (OSTI.GOV)
Li, Zenghai; Johnson, Ronald; Smith, Stephen R.
2006-06-21
In this paper, we present a novel position sensitive signal pickup scheme for a cavity BPM. The scheme utilizes the H-plane of the waveguide to couple magnetically to the side of the cavity, which results in a selective coupling to the dipole mode and a total rejection of the monopole mode. This scheme greatly simplifies the BPM geometry and relaxes machining tolerances. We will present detailed numerical studies on such a cavity BPM, analyze its resolution limit and tolerance requirements for a nanometer resolution. Finally present the measurement results of a X-band prototype.
Perfect joint remote state preparation of arbitrary six-qubit cluster-type states
NASA Astrophysics Data System (ADS)
Choudhury, Binayak S.; Samanta, Soumen
2018-07-01
In this paper, a joint remote state preparation protocol, which is applicable to six-qubit cluster states, is presented. The scheme is performed with the help of three quantum channels constituted by eight qubits. A new index of efficiency for JRSP protocols is defined. A comparison is made with the existing similar schemes from which it is concluded that the present scheme utilizes its resources more efficiently. The work is a part of the line of research on transfer and remote preparation of entanglement.
Computation of turbulent pipe and duct flow using third order upwind scheme
NASA Technical Reports Server (NTRS)
Kawamura, T.
1986-01-01
The fully developed turbulence in a circular pipe and in a square duct is simulated directly without using turbulence models in the Navier-Stokes equations. The utilized method employs a third-order upwind scheme for the approximation to the nonlinear term and the second-order Adams-Bashforth method for the time derivative in the Navier-Stokes equation. The computational results appear to capture the large-scale turbulent structures at least qualitatively. The significance of the artificial viscosity inherent in the present scheme is discussed.
Blind Quantum Signature with Controlled Four-Particle Cluster States
NASA Astrophysics Data System (ADS)
Li, Wei; Shi, Jinjing; Shi, Ronghua; Guo, Ying
2017-08-01
A novel blind quantum signature scheme based on cluster states is introduced. Cluster states are a type of multi-qubit entangled states and it is more immune to decoherence than other entangled states. The controlled four-particle cluster states are created by acting controlled-Z gate on particles of four-particle cluster states. The presented scheme utilizes the above entangled states and simplifies the measurement basis to generate and verify the signature. Security analysis demonstrates that the scheme is unconditional secure. It can be employed to E-commerce systems in quantum scenario.
NASA Technical Reports Server (NTRS)
Molthan, Andrew L.
2011-01-01
Increases in computing resources have allowed for the utilization of high-resolution weather forecast models capable of resolving cloud microphysical and precipitation processes among varying numbers of hydrometeor categories. Several microphysics schemes are currently available within the Weather Research and Forecasting (WRF) model, ranging from single-moment predictions of precipitation content to double-moment predictions that include a prediction of particle number concentrations. Each scheme incorporates several assumptions related to the size distribution, shape, and fall speed relationships of ice crystals in order to simulate cold-cloud processes and resulting precipitation. Field campaign data offer a means of evaluating the assumptions present within each scheme. The Canadian CloudSat/CALIPSO Validation Project (C3VP) represented collaboration among the CloudSat, CALIPSO, and NASA Global Precipitation Measurement mission communities, to observe cold season precipitation processes relevant to forecast model evaluation and the eventual development of satellite retrievals of cloud properties and precipitation rates. During the C3VP campaign, widespread snowfall occurred on 22 January 2007, sampled by aircraft and surface instrumentation that provided particle size distributions, ice water content, and fall speed estimations along with traditional surface measurements of temperature and precipitation. In this study, four single-moment and two double-moment microphysics schemes were utilized to generate hypothetical WRF forecasts of the event, with C3VP data used in evaluation of their varying assumptions. Schemes that incorporate flexibility in size distribution parameters and density assumptions are shown to be preferable to fixed constants, and that a double-moment representation of the snow category may be beneficial when representing the effects of aggregation. These results may guide forecast centers in optimal configurations of their forecast models for winter weather and identify best practices present within these various schemes.
Suphanchaimat, Rapeepong; Prakongsai, Phusit; Limwattananon, Supon; Mills, Anne
2016-01-01
Objectives This study sought to investigate the impact of the Thai “Health Insurance for People with Citizenship Problems” (HI-PCP) on access to care for stateless patients, compared to Universal Coverage Scheme patients and the uninsured, using inpatient utilization as a proxy for impact. Methods Secondary data analysis of inpatient records of Kraburi Hospital, Ranong province, between 2009 (pre-policy) and 2012 (post-policy) was employed. Descriptive statistics and multivariate analysis by difference-in-difference model were performed. Results The volume of inpatient service utilization by stateless patients expanded after the introduction of the HI-PCP. However, this increase did not appear to stem from the HI-PCP per se. After controlling for key covariates, including patients’ characteristics, disease condition, and domicile, there was only a weak positive association between the HI-PCP and utilization. Critical factors contributing significantly to increased utilization were older age, proximity to the hospital, and presence of catastrophic illness. Conclusion A potential explanation for the insignificant impact of the HI-PCP on access to inpatient care of stateless patients is likely to be a lack of awareness of the existence of the scheme among the stateless population and local health staff. This problem is likely to have been accentuated by operational constraints in policy implementation, including the poor performance of local offices in registering stateless people. A key limitation of this study is a lack of data on patients who did not visit the health facility at the first opportunity. Further study of health-seeking behavior of stateless people at the household level is recommended. PMID:27942240
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Haixia; Zhang, Jing
We propose a scheme for continuous-variable quantum cloning of coherent states with phase-conjugate input modes using linear optics. The quantum cloning machine yields M identical optimal clones from N replicas of a coherent state and N replicas of its phase conjugate. This scheme can be straightforwardly implemented with the setups accessible at present since its optical implementation only employs simple linear optical elements and homodyne detection. Compared with the original scheme for continuous-variable quantum cloning with phase-conjugate input modes proposed by Cerf and Iblisdir [Phys. Rev. Lett. 87, 247903 (2001)], which utilized a nondegenerate optical parametric amplifier, our scheme losesmore » the output of phase-conjugate clones and is regarded as irreversible quantum cloning.« less
Floquet protocols of adiabatic state flips and reallocation of exceptional points
NASA Astrophysics Data System (ADS)
Halpern, Dashiell; Li, Huanan; Kottos, Tsampikos
2018-04-01
We introduce the notion of adiabatic state flip of a Floquet Hamiltonian associated with a non-Hermitian system that it is subjected to two driving schemes with clear separation of time scales. The fast (Floquet) modulation scheme is utilized to reallocate the exceptional points in the parameter space of the system and redefine the topological features of an adiabatic cyclic modulation associated with the slow driving scheme. Such topological reorganization can be used in order to control the adiabatic transport between two eigenmodes of the Floquet Hamiltonian. The proposed scheme provides a degree of reconfigurability of adiabatic state transfer which can find applications in system control in photonics and microwave domains.
Perfect quantum multiple-unicast network coding protocol
NASA Astrophysics Data System (ADS)
Li, Dan-Dan; Gao, Fei; Qin, Su-Juan; Wen, Qiao-Yan
2018-01-01
In order to realize long-distance and large-scale quantum communication, it is natural to utilize quantum repeater. For a general quantum multiple-unicast network, it is still puzzling how to complete communication tasks perfectly with less resources such as registers. In this paper, we solve this problem. By applying quantum repeaters to multiple-unicast communication problem, we give encoding-decoding schemes for source nodes, internal ones and target ones, respectively. Source-target nodes share EPR pairs by using our encoding-decoding schemes over quantum multiple-unicast network. Furthermore, quantum communication can be accomplished perfectly via teleportation. Compared with existed schemes, our schemes can reduce resource consumption and realize long-distance transmission of quantum information.
Multi-level optimization of a beam-like space truss utilizing a continuum model
NASA Technical Reports Server (NTRS)
Yates, K.; Gurdal, Z.; Thangjitham, S.
1992-01-01
A continuous beam model is developed for approximate analysis of a large, slender, beam-like truss. The model is incorporated in a multi-level optimization scheme for the weight minimization of such trusses. This scheme is tested against traditional optimization procedures for savings in computational cost. Results from both optimization methods are presented for comparison.
A Negative Selection Immune System Inspired Methodology for Fault Diagnosis of Wind Turbines.
Alizadeh, Esmaeil; Meskin, Nader; Khorasani, Khashayar
2017-11-01
High operational and maintenance costs represent as major economic constraints in the wind turbine (WT) industry. These concerns have made investigation into fault diagnosis of WT systems an extremely important and active area of research. In this paper, an immune system (IS) inspired methodology for performing fault detection and isolation (FDI) of a WT system is proposed and developed. The proposed scheme is based on a self nonself discrimination paradigm of a biological IS. Specifically, the negative selection mechanism [negative selection algorithm (NSA)] of the human body is utilized. In this paper, a hierarchical bank of NSAs are designed to detect and isolate both individual as well as simultaneously occurring faults common to the WTs. A smoothing moving window filter is then utilized to further improve the reliability and performance of the FDI scheme. Moreover, the performance of our proposed scheme is compared with another state-of-the-art data-driven technique, namely the support vector machines (SVMs) to demonstrate and illustrate the superiority and advantages of our proposed NSA-based FDI scheme. Finally, a nonparametric statistical comparison test is implemented to evaluate our proposed methodology with that of the SVM under various fault severities.
Scheme for Terminal Guidance Utilizing Acousto-Optic Correlator.
longitudinally extending acousto - optic device as index of refraction variation pattern signals. Real time signals corresponding to the scene actually being viewed...by the vehicle are propagated across the stored signals, and the results of an acousto - optic correlation are utilized to determine X and Y error
Evaluation of multicast schemes in optical burst-switched networks: the case with dynamic sessions
NASA Astrophysics Data System (ADS)
Jeong, Myoungki; Qiao, Chunming; Xiong, Yijun; Vandenhoute, Marc
2000-10-01
In this paper, we evaluate the performance of several multicast schemes in optical burst-switched WDM networks taking into accounts the overheads due to control packets and guard bands (Gbs) of bursts on separate channels (wavelengths). A straightforward scheme is called Separate Multicasting (S-MCAST) where each source node constructs separate bursts for its multicast (per each multicast session) and unicast traffic. To reduce the overhead due to Gbs (and control packets), one may piggyback the multicast traffic in bursts containing unicast traffic using a scheme called Multiple Unicasting (M-UCAST). The third scheme is called Tree-Shared Multicasting (TS-MCAST) wehreby multicast traffic belonging to multiple multicast sesions can be mixed together in a burst, which is delivered via a shared multicast tree. In [1], we have evaluated several multicast schemes with static sessions at the flow level. In this paper, we perform a simple analysis for the multicast schemes and evaluate the performance of three multicast schemes, focusing on the case with dynamic sessions in terms of the link utilization, bandwidth consumption, blocking (loss) probability, goodput and the processing loads.
Implementation of a Cross-Layer Sensing Medium-Access Control Scheme.
Su, Yishan; Fu, Xiaomei; Han, Guangyao; Xu, Naishen; Jin, Zhigang
2017-04-10
In this paper, compressed sensing (CS) theory is utilized in a medium-access control (MAC) scheme for wireless sensor networks (WSNs). We propose a new, cross-layer compressed sensing medium-access control (CL CS-MAC) scheme, combining the physical layer and data link layer, where the wireless transmission in physical layer is considered as a compress process of requested packets in a data link layer according to compressed sensing (CS) theory. We first introduced using compressive complex requests to identify the exact active sensor nodes, which makes the scheme more efficient. Moreover, because the reconstruction process is executed in a complex field of a physical layer, where no bit and frame synchronizations are needed, the asynchronous and random requests scheme can be implemented without synchronization payload. We set up a testbed based on software-defined radio (SDR) to implement the proposed CL CS-MAC scheme practically and to demonstrate the validation. For large-scale WSNs, the simulation results show that the proposed CL CS-MAC scheme provides higher throughput and robustness than the carrier sense multiple access (CSMA) and compressed sensing medium-access control (CS-MAC) schemes.
Odéen, Henrik; Todd, Nick; Diakite, Mahamadou; Minalga, Emilee; Payne, Allison; Parker, Dennis L.
2014-01-01
Purpose: To investigate k-space subsampling strategies to achieve fast, large field-of-view (FOV) temperature monitoring using segmented echo planar imaging (EPI) proton resonance frequency shift thermometry for MR guided high intensity focused ultrasound (MRgHIFU) applications. Methods: Five different k-space sampling approaches were investigated, varying sample spacing (equally vs nonequally spaced within the echo train), sampling density (variable sampling density in zero, one, and two dimensions), and utilizing sequential or centric sampling. Three of the schemes utilized sequential sampling with the sampling density varied in zero, one, and two dimensions, to investigate sampling the k-space center more frequently. Two of the schemes utilized centric sampling to acquire the k-space center with a longer echo time for improved phase measurements, and vary the sampling density in zero and two dimensions, respectively. Phantom experiments and a theoretical point spread function analysis were performed to investigate their performance. Variable density sampling in zero and two dimensions was also implemented in a non-EPI GRE pulse sequence for comparison. All subsampled data were reconstructed with a previously described temporally constrained reconstruction (TCR) algorithm. Results: The accuracy of each sampling strategy in measuring the temperature rise in the HIFU focal spot was measured in terms of the root-mean-square-error (RMSE) compared to fully sampled “truth.” For the schemes utilizing sequential sampling, the accuracy was found to improve with the dimensionality of the variable density sampling, giving values of 0.65 °C, 0.49 °C, and 0.35 °C for density variation in zero, one, and two dimensions, respectively. The schemes utilizing centric sampling were found to underestimate the temperature rise, with RMSE values of 1.05 °C and 1.31 °C, for variable density sampling in zero and two dimensions, respectively. Similar subsampling schemes with variable density sampling implemented in zero and two dimensions in a non-EPI GRE pulse sequence both resulted in accurate temperature measurements (RMSE of 0.70 °C and 0.63 °C, respectively). With sequential sampling in the described EPI implementation, temperature monitoring over a 192 × 144 × 135 mm3 FOV with a temporal resolution of 3.6 s was achieved, while keeping the RMSE compared to fully sampled “truth” below 0.35 °C. Conclusions: When segmented EPI readouts are used in conjunction with k-space subsampling for MR thermometry applications, sampling schemes with sequential sampling, with or without variable density sampling, obtain accurate phase and temperature measurements when using a TCR reconstruction algorithm. Improved temperature measurement accuracy can be achieved with variable density sampling. Centric sampling leads to phase bias, resulting in temperature underestimations. PMID:25186406
Race, Alan M; Bunch, Josephine
2015-03-01
The choice of colour scheme used to present data can have a dramatic effect on the perceived structure present within the data. This is of particular significance in mass spectrometry imaging (MSI), where ion images that provide 2D distributions of a wide range of analytes are used to draw conclusions about the observed system. Commonly employed colour schemes are generally suboptimal for providing an accurate representation of the maximum amount of data. Rainbow-based colour schemes are extremely popular within the community, but they introduce well-documented artefacts which can be actively misleading in the interpretation of the data. In this article, we consider the suitability of colour schemes and composite image formation found in MSI literature in the context of human colour perception. We also discuss recommendations of rules for colour scheme selection for ion composites and multivariate analysis techniques such as principal component analysis (PCA).
On digital cinema and watermarking
NASA Astrophysics Data System (ADS)
van Leest, Arno; Haitsma, Jaap; Kalker, Ton
2003-06-01
The illegal copying of movies in the cinema is now common practice. Although the quality is fairly low, the economic impact of these illegal copies can be enormous. Philips' digital cinema watermarking scheme is designed for the upcoming digital cinema format and will assist content owners and distributors with tracing the origin of illegal copies. In this paper we consider this watermarking scheme in more detail. A characteristic of this watermarking scheme is that it only exploits the temporal axis to insert a watermark. It is therefore inherently robust to geometrical distortions, a necessity for surviving illegal copying by camcorder recording. Moreover, the scheme resists frame rate conversions resulting from a frame rate mismatch between the camcorder and the projector. The watermarking scheme has been tested in a 'real' digital cinema environment with good results.
Aerial cooperative transporting and assembling control using multiple quadrotor-manipulator systems
NASA Astrophysics Data System (ADS)
Qi, Yuhua; Wang, Jianan; Shan, Jiayuan
2018-02-01
In this paper, a fully distributed control scheme for aerial cooperative transporting and assembling is proposed using multiple quadrotor-manipulator systems with each quadrotor equipped with a robotic manipulator. First, the kinematic and dynamic models of a quadrotor with multi-Degree of Freedom (DOF) robotic manipulator are established together using Euler-Lagrange equations. Based on the aggregated dynamic model, the control scheme consisting of position controller, attitude controller and manipulator controller is presented. Regarding cooperative transporting and assembling, multiple quadrotor-manipulator systems should be able to form a desired formation without collision among quadrotors from any initial position. The desired formation is achieved by the distributed position controller and attitude controller, while the collision avoidance is guaranteed by an artificial potential function method. Then, the transporting and assembling tasks request the manipulators to reach the desired angles cooperatively, which is achieved by the distributed manipulator controller. The overall stability of the closed-loop system is proven by a Lyapunov method and Matrosov's theorem. In the end, the proposed control scheme is simplified for the real application and then validated by two formation flying missions of four quadrotors with 2-DOF manipulators.
A Systematic Survey of Star Formation with the ORION MIDEX Mission
NASA Astrophysics Data System (ADS)
Scowen, P.; Morse, J.; Beasley, M.; Hester, J.; Windhorst, R.; Desch, S.; Jansen, R.; Calzetti, D.; Padgett, D.; Hartigan, P.; Oey, S.; Bally, J.; Gallagher, J.; O'Connell, R.; Kennicutt, R.; Lauer, T.
2004-05-01
The ORION MIDEX mission is a 1.2m UV-visual observatory orbiting at L2 that will conduct the first-ever high spatial resolution survey of a statistically significant sample of visible star-forming environments in the Solar neighborhood in emission lines and continuum. This survey will be used to characterize the star and planet forming environments within 2.5 kpc of the Sun, infer global properties and star formation history in these regions, understand how the environment influences the process of star and planet formation, and develop a classification scheme for star forming regions incorporating the earlier results. Based on these findings we will then conduct a similar high spatial resolution survey of large portions of the Magellanic Clouds, applying the classification scheme from local star forming environments to analogous regions in nearby galaxies, extending the classification scheme to regions that do not have nearby analogs but are common in external galaxies. The results from the local survey will allow us to infer characteristics of low mass star forming environments in the Magellanic Clouds, study the spatial distribution of star forming environments and analyze stellar population photometry to trace star formation history. Finally we will image a representative sample of external galaxies using the same filters used to characterize nearby star formation regions. We will map the distribution of star forming region type as a function of galactic environment for galaxies out to 5 Mpc to infer the distribution and history of low-mass star formation over galactic scales, characterize the stellar content and star formation history of galaxies, and relate these results to the current star forming environments in these galaxies. Ultimately we intend to use these diagnostics to extrapolate to star formation environments in the higher redshift Universe. We will also present an update on the technology development, project planning and operations for the proposed mission.
Space-based Observations of Star Formation using ORION: THE MIDEX
NASA Astrophysics Data System (ADS)
Scowen, P.; Morse, J.; Beasley, M.; Hester, J.; Windhorst, R.; Jansen, R.; Lauer, T.; Danielson, E.; Sepulveda, C.; Olarte, G.; ORION MIDEX Science Team
2003-12-01
The ORION MIDEX mission is a 1.2m UV-visual observatory orbiting at L2 that will conduct the first-ever high spatial resolution survey of a statistically significant sample of visible star-forming environments in the Solar neighborhood in emission lines and continuum. This survey will be used to characterize the star and planet forming environments within 2.5 kpc of the Sun, infer global properties and star formation history in these regions, understand how the environment influences the process of star and planet formation, and develop a classification scheme for star forming regions incorporating the earlier results. Based on these findings we will then conduct a similar high spatial resolution survey of large portions of the Magellanic Clouds, applying the classification scheme from local star forming environments to analogous regions in nearby galaxies, extending the classification scheme to regions that do not have nearby analogs but are common in external galaxies. The results from the local survey will allow us to infer characteristics of low mass star forming environments in the Magellanic Clouds, study the spatial distribution of star forming environments and analyze stellar population photometry to trace star formation history. Finally we will image a representative sample of external galaxies using the same filters used to characterize nearby star formation regions. We will map the distribution of star forming region type as a function of galactic environment for galaxies out to 5 Mpc to infer the distribution and history of low-mass star formation over galactic scales, characterize the stellar content and star formation history of galaxies, and relate these results to the current star forming environments in these galaxies. Ultimately we intend to use these diagnostics to extrapolate to star formation environments in the higher redshift Universe. We will also present details on technology development, project planning and operations for the proposed mission.
ORION: Hierarchical Space-based Observations of Star Formation, From Near to Far
NASA Astrophysics Data System (ADS)
Scowen, P. A.; Morse, J. A.; Beasley, M.; Veach, T.; ORION Science Team
2005-12-01
The ORION MIDEX mission is a 1.2m UV-visual observatory orbiting at L2 that will conduct the first-ever high spatial resolution survey of a statistically significant sample of visible star-forming environments in the Solar neighborhood in emission lines and continuum. This survey will be used to characterize the star and planet forming environments within 2.5 kpc of the Sun, infer global properties and star formation history in these regions, understand how the environment influences the process of star and planet formation, and develop a classification scheme for star forming regions incorporating the earlier results. Based on these findings we will then conduct a similar high spatial resolution survey of large portions of the Magellanic Clouds, applying the classification scheme from local star forming environments to analogous regions in nearby galaxies, extending the classification scheme to regions that do not have nearby analogs but are common in external galaxies. The results from the local survey will allow us to infer characteristics of low mass star forming environments in the Magellanic Clouds, study the spatial distribution of star forming environments and analyze stellar population photometry to trace star formation history. Finally we will image a representative sample of external galaxies using the same filters used to characterize nearby star formation regions. We will map the distribution of star forming region type as a function of galactic environment for galaxies out to 5 Mpc to infer the distribution and history of low-mass star formation over galactic scales, characterize the stellar content and star formation history of galaxies, and relate these results to the current star forming environments in these galaxies. Ultimately we intend to use these diagnostics to extrapolate to star formation environments in the higher redshift Universe. We will also present details on technology development, project planning and operations for the proposed mission.
A Systematic Survey of Star Formation with the ORION MIDEX Mission
NASA Astrophysics Data System (ADS)
Scowen, P.; Morse, J.; Beasley, M.; Hester, J.; Windhorst, R.; Desch, S.; Jansen, R.; Calzetti, D.; Padgett, D.; Hartigan, P.; Oey, S.; Bally, J.; Gallagher, J.; O'Connell, R.; Kennicutt, R.; Lauer, T.; McCaughrean, M.
2004-12-01
The ORION MIDEX mission is a 1.2m UV-visual observatory orbiting at L2 that will conduct the first-ever high spatial resolution survey of a statistically significant sample of visible star-forming environments in the Solar neighborhood in emission lines and continuum. This survey will be used to characterize the star and planet forming environments within 2.5 kpc of the Sun, infer global properties and star formation history in these regions, understand how the environment influences the process of star and planet formation, and develop a classification scheme for star forming regions incorporating the earlier results. Based on these findings we will then conduct a similar high spatial resolution survey of large portions of the Magellanic Clouds, applying the classification scheme from local star forming environments to analogous regions in nearby galaxies, extending the classification scheme to regions that do not have nearby analogs but are common in external galaxies. The results from the local survey will allow us to infer characteristics of low mass star forming environments in the Magellanic Clouds, study the spatial distribution of star forming environments and analyze stellar population photometry to trace star formation history. Finally we will image a representative sample of external galaxies using the same filters used to characterize nearby star formation regions. We will map the distribution of star forming region type as a function of galactic environment for galaxies out to 5 Mpc to infer the distribution and history of low-mass star formation over galactic scales, characterize the stellar content and star formation history of galaxies, and relate these results to the current star forming environments in these galaxies. Ultimately we intend to use these diagnostics to extrapolate to star formation environments in the higher redshift Universe. We will also present an update on the technology development, project planning and operations for the proposed mission.
Performance Analysis of Cluster Formation in Wireless Sensor Networks.
Montiel, Edgar Romo; Rivero-Angeles, Mario E; Rubino, Gerardo; Molina-Lozano, Heron; Menchaca-Mendez, Rolando; Menchaca-Mendez, Ricardo
2017-12-13
Clustered-based wireless sensor networks have been extensively used in the literature in order to achieve considerable energy consumption reductions. However, two aspects of such systems have been largely overlooked. Namely, the transmission probability used during the cluster formation phase and the way in which cluster heads are selected. Both of these issues have an important impact on the performance of the system. For the former, it is common to consider that sensor nodes in a clustered-based Wireless Sensor Network (WSN) use a fixed transmission probability to send control data in order to build the clusters. However, due to the highly variable conditions experienced by these networks, a fixed transmission probability may lead to extra energy consumption. In view of this, three different transmission probability strategies are studied: optimal, fixed and adaptive. In this context, we also investigate cluster head selection schemes, specifically, we consider two intelligent schemes based on the fuzzy C-means and k-medoids algorithms and a random selection with no intelligence. We show that the use of intelligent schemes greatly improves the performance of the system, but their use entails higher complexity and selection delay. The main performance metrics considered in this work are energy consumption, successful transmission probability and cluster formation latency. As an additional feature of this work, we study the effect of errors in the wireless channel and the impact on the performance of the system under the different transmission probability schemes.
Performance Analysis of Cluster Formation in Wireless Sensor Networks
Montiel, Edgar Romo; Rivero-Angeles, Mario E.; Rubino, Gerardo; Molina-Lozano, Heron; Menchaca-Mendez, Rolando; Menchaca-Mendez, Ricardo
2017-01-01
Clustered-based wireless sensor networks have been extensively used in the literature in order to achieve considerable energy consumption reductions. However, two aspects of such systems have been largely overlooked. Namely, the transmission probability used during the cluster formation phase and the way in which cluster heads are selected. Both of these issues have an important impact on the performance of the system. For the former, it is common to consider that sensor nodes in a clustered-based Wireless Sensor Network (WSN) use a fixed transmission probability to send control data in order to build the clusters. However, due to the highly variable conditions experienced by these networks, a fixed transmission probability may lead to extra energy consumption. In view of this, three different transmission probability strategies are studied: optimal, fixed and adaptive. In this context, we also investigate cluster head selection schemes, specifically, we consider two intelligent schemes based on the fuzzy C-means and k-medoids algorithms and a random selection with no intelligence. We show that the use of intelligent schemes greatly improves the performance of the system, but their use entails higher complexity and selection delay. The main performance metrics considered in this work are energy consumption, successful transmission probability and cluster formation latency. As an additional feature of this work, we study the effect of errors in the wireless channel and the impact on the performance of the system under the different transmission probability schemes. PMID:29236065
Alkyl amine and vegetable oil mixture-a viable candidate for CO2 capture and utilization.
Uma Maheswari, A; Palanivelu, K
2017-02-01
In this present work, the absorption of CO 2 in alkyl amines and vegetable oil mixture has been evaluated. The results showed that the absorption is higher in alkyl amines and vegetable oil mixture compared with the aqueous alkyl amines. In addition to that, by employing the greener and non-toxic vegetable oil media, the CO 2 gas has been captured as well as converted into value-added products, such as carbamates of ethylenediamine, diethylenetriamine, and triethylenetetramine. The carbamates have been isolated and characterized by Fourier transform infrared and 1 H and 13 C nuclear magnetic resonance spectroscopic techniques. The formation of these products in precipitate form has not been observed in the case of aqueous medium. Among the various alkyl amine and vegetable oil combinations, triethylenetetramine in coconut oil medium showed the maximum CO 2 capture capacity of 72%. The coconut oil used for the process has been recovered, recycled, and reused for 3 cycles. Thus, this novel scheme seems to be a better alternative to conquer the drawback of aqueous amine-based CO 2 capture as well as for the capture and utilization of the CO 2 gas to gain the value-added products.
Utilizing Weak Indicators to Detect Anomalous Behaviors in Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Egid, Adin Ezra
We consider the use of a novel weak in- dicator alongside more commonly used weak indicators to help detect anomalous behavior in a large computer network. The data of the network which we are studying in this research paper concerns remote log-in information (Virtual Private Network, or VPN sessions) from the internal network of Los Alamos National Laboratory (LANL). The novel indicator we are utilizing is some- thing which, while novel in its application to data science/cyber security research, is a concept borrowed from the business world. The Her ndahl-Hirschman Index (HHI) is a computationally trivial index which provides amore » useful heuristic for regulatory agencies to ascertain the relative competitiveness of a particular industry. Using this index as a lagging indicator in the monthly format we have studied could help to detect anomalous behavior by a particular or small set of users on the network. Additionally, we study indicators related to the speed of movement of a user based on the physical location of their current and previous logins. This data can be ascertained from the IP addresses of the users, and is likely very similar to the fraud detection schemes regularly utilized by credit card networks to detect anomalous activity. In future work we would look to nd a way to combine these indicators for use as an internal fraud detection system.« less
Formation of water-in-oil emulsions and application to oil spill modelling.
Fingas, Merv; Fieldhouse, Ben
2004-02-27
Water-in-oil mixtures were grouped into four states or classes: stable, mesostable, unstable, and entrained water. Of these, only stable and mesostable states can be characterized as emulsions. These states were established according to lifetime, visual appearance, complex modulus, and differences in viscosity. Water content at formation was not an important factor. Water-in-oil emulsions made from crude oils have different classes of stability as a result of the asphaltene and resin contents, as well as differences in the viscosity of the starting oil. The different types of water-in-oil classes are readily distinguished simply by appearance, as well as by rheological properties. A review of past modelling efforts to predict emulsion formation showed that these older schemes were based on first-order rate equations that were developed before extensive work on emulsion physics took place. These results do not correspond to either laboratory or field results. The present authors suggest that both the formation and characteristics of emulsions could be predicted using empirical data. If the same oil type as already studied is to be modelled, the laboratory data on the state and properties can be used directly. In this paper, a new numerical modelling scheme is proposed and is based on empirical data and the corresponding physical knowledge of emulsion formation. The density, viscosity, saturate, asphaltene and resin contents are used to compute a class index which yields either an unstable or entrained water-in-oil state or a mesostable or stable emulsion. A prediction scheme is given to estimate the water content and viscosity of the resulting water-in-oil state and the time to formation with input of wave height.
Kingkaew, Pritaporn; Werayingyong, Pitsaphun; Aye, San San; Tin, Nilar; Singh, Alaka; Myint, Phone; Teerawattananon, Yot
2016-05-01
Reducing child and maternal mortality in order to meet the health-related Millennium Development Goals (MDGs) 4 and 5 remains a major challenge in Myanmar. Inadequate care during pregnancy and labour plays an important role in the maternal mortality rate in Myanmar. A Maternal and Child Health (MCH) Voucher Scheme comprising a subsidization for pregnant women to receive four antenatal care (ANC), delivery and postnatal care (PNC) free-of-charge was planned to help women overcome financial barriers in addition to raising awareness of ANC and delivery with skilled birth attendants (SBA), which can reduce the rate of maternal and neonatal death. This study is part of an ex-ante evaluation of a feasibility study of the MCH Voucher Scheme. A cost-utility analysis was conducted using a decision tree model to assess the cost per disability-adjusted life years (DALYs) averted from the MCH Voucher Scheme compared with the current situation. Most input parameters were obtained from Myanmar context. From the base-case analysis, where the financial burden on households was fully subsidized, the MCH Voucher Scheme increased utilization for ANC from 73% up to 93% and for delivery from SBAs from 51% up to and 71%, respectively; hence, it is considered to be very cost-effective with an incremental cost-effectiveness ratio of 381 027 kyats per DALY averted (2010, price year). From the probabilistic sensitivity analysis, the MCH Voucher Scheme had a 52% chance of being a cost-effective option at 1 GDP per capita threshold compared to the current situation. Given that the Voucher Scheme is currently being implemented in one township in Myanmar as a result of this study, ongoing evaluation of the effectiveness and cost-effectiveness of this scheme is warranted. © The Author 2015. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine.
Using Facet Clusters to Map Learner Modes of Reasoning
NASA Astrophysics Data System (ADS)
Vokos, Stamatis; DeWater, L. S.; Seeley, L.; Kraus, P.
2006-12-01
The Department of Physics and the School of Education at Seattle Pacific University, together with FACET Innovations, LLC, are beginning the second year of a five-year NSF TPC project, Improving the Effectiveness of Teacher Diagnostic Skills and Tools. We are working in partnership with school districts in Washington State to use formative assessment as a means to helping teachers and precollege students deepen their understanding of foundational topics in physical science. We utilize a theoretical framework of knowledge-in-pieces to identify and categorize widespread productive and unproductive modes of reasoning in the topical areas of Properties of Matter, Heat and Temperature, and Physical and Chemical Changes. In this talk, we describe the development and iterative refinement of certain facet clusters of student ideas, as well as the usefulness and limitations of such a mapping scheme. * Supported in part by NSF grant #ESI-0455796, The Boeing Corporation, and the SPU Science Initiative.
Fast Ordered Sampling of DNA Sequence Variants.
Greenberg, Anthony J
2018-05-04
Explosive growth in the amount of genomic data is matched by increasing power of consumer-grade computers. Even applications that require powerful servers can be quickly tested on desktop or laptop machines if we can generate representative samples from large data sets. I describe a fast and memory-efficient implementation of an on-line sampling method developed for tape drives 30 years ago. Focusing on genotype files, I test the performance of this technique on modern solid-state and spinning hard drives, and show that it performs well compared to a simple sampling scheme. I illustrate its utility by developing a method to quickly estimate genome-wide patterns of linkage disequilibrium (LD) decay with distance. I provide open-source software that samples loci from several variant format files, a separate program that performs LD decay estimates, and a C++ library that lets developers incorporate these methods into their own projects. Copyright © 2018 Greenberg.
Computations of spray, fuel-air mixing, and combustion in a lean-premixed-prevaporized combustor
NASA Technical Reports Server (NTRS)
Dasgupta, A.; Li, Z.; Shih, T. I.-P.; Kundu, K.; Deur, J. M.
1993-01-01
A code was developed for computing the multidimensional flow, spray, combustion, and pollutant formation inside gas turbine combustors. The code developed is based on a Lagrangian-Eulerian formulation and utilizes an implicit finite-volume method. The focus of this paper is on the spray part of the code (both formulation and algorithm), and a number of issues related to the computation of sprays and fuel-air mixing in a lean-premixed-prevaporized combustor. The issues addressed include: (1) how grid spacings affect the diffusion of evaporated fuel, and (2) how spurious modes can arise through modelling of the spray in the Lagrangian computations. An upwind interpolation scheme is proposed to account for some effects of grid spacing on the artificial diffusion of the evaporated fuel. Also, some guidelines are presented to minimize errors associated with the spurious modes.
NASA Technical Reports Server (NTRS)
Chen, H. C.; Yu, N. Y.
1991-01-01
An Euler flow solver was developed for predicting the airframe/propulsion integration effects for an aft-mounted turboprop transport. This solver employs a highly efficient multigrid scheme, with a successive mesh-refinement procedure to accelerate the convergence of the solution. A new dissipation model was also implemented to render solutions that are grid insensitive. The propeller power effects are simulated by the actuator disk concept. An embedded flow solution method was developed for predicting the detailed flow characteristics in the local vicinity of an aft-mounted propfan engine in the presence of a flow field induced by a complete aircraft. Results from test case analysis are presented. A user's guide for execution of computer programs, including format of various input files, sample job decks, and sample input files, is provided in an accompanying volume.
The Effects of Stellar Irradiation on Gravitational Instabilities in Protoplanetary Disks
NASA Astrophysics Data System (ADS)
Cai, Kai; Durisen, R. H.; Zhu, Z.
2009-01-01
It has been suggested that giant protoplanets form in protoplanetary disks when the disks undergo rapid cooling and fragment into dense Jupiter-mass clumps under the disks' own self-gravity. Previous three-dimensional simulations of protoplanetary disks investigated the effects of envelope irradiation on the development of gravitational instabilities (GIs) in such disks. We found that the irradiation tends to suppress the nonlinear amplitude of GIs and no dense clumps form, arguing against direct formation of giant planets by disk instability in irradiated disks (Cai et al. 2008). In this work, by utilizing an improved radiative cooling scheme in the optically thin regions, we present some preliminary results from simulations with a variable irradiation temperature that mimics the effects of stellar irradiation. Comparisons with results from an envelope-irradiated disk suggest that stellar irradiation may be more effective in suppressing GIs than envelope irradiation.
Fully Implict Magneto-hydrodynamics Simulations of Coaxial Plasma Accelerators
Subramaniam, Vivek; Raja, Laxminarayan L.
2017-01-05
The resistive Magneto-Hydrodynamic (MHD) model describes the behavior of a strongly ionized plasma in the presence of external electric and magnetic fields. We developed a fully implicit MHD simulation tool to solve the resistive MHD governing equations in the context of a cell-centered finite-volume scheme. The primary objective of this study is to use the fully-implicit algorithm to obtain insights into the plasma acceleration and jet formation processes in Coaxial Plasma accelerators; electromagnetic acceleration devices that utilize self-induced magnetic fields to accelerate thermal plasmas to large velocities. We also carry out plasma-surface simulations in order to study the impact interactionsmore » when these high velocity plasma jets impinge on target material surfaces. Scaling studies are carried out to establish some basic functional relationships between the target-stagnation conditions and the current discharged between the coaxial electrodes.« less
A cognitive gateway-based spectrum sharing method in downlink round robin scheduling of LTE system
NASA Astrophysics Data System (ADS)
Deng, Hongyu; Wu, Cheng; Wang, Yiming
2017-07-01
A key technique of LTE is how to allocate efficiently the resource of radio spectrum. Traditional Round Robin (RR) scheduling scheme may lead to too many resource residues when allocating resources. When the number of users in the current transmission time interval (TTI) is not the greatest common divisor of resource block groups (RBGs), and such a phenomenon lasts for a long time, the spectrum utilization would be greatly decreased. In this paper, a novel spectrum allocation scheme of cognitive gateway (CG) was proposed, in which the LTE spectrum utilization and CG’s throughput were greatly increased by allocating idle resource blocks in the shared TTI in LTE system to CG. Our simulation results show that the spectrum resource sharing method can improve LTE spectral utilization and increase the CG’s throughput as well as network use time.
SEMPATH Ontology: modeling multidisciplinary treatment schemes utilizing semantics.
Alexandrou, Dimitrios Al; Pardalis, Konstantinos V; Bouras, Thanassis D; Karakitsos, Petros; Mentzas, Gregoris N
2012-03-01
A dramatic increase of demand for provided treatment quality has occurred during last decades. The main challenge to be confronted, so as to increase treatment quality, is the personalization of treatment, since each patient constitutes a unique case. Healthcare provision encloses a complex environment since healthcare provision organizations are highly multidisciplinary. In this paper, we present the conceptualization of the domain of clinical pathways (CP). The SEMPATH (SEMantic PATHways) Oontology comprises three main parts: 1) the CP part; 2) the business and finance part; and 3) the quality assurance part. Our implementation achieves the conceptualization of the multidisciplinary domain of healthcare provision, in order to be further utilized for the implementation of a Semantic Web Rules (SWRL rules) repository. Finally, SEMPATH Ontology is utilized for the definition of a set of SWRL rules for the human papillomavirus) disease and its treatment scheme. © 2012 IEEE
Paternity testing a non-linkage based marker assisted selection scheme for outbred forage species
USDA-ARS?s Scientific Manuscript database
In many major perennial forage species, genomic tools and infrastructure development has advanced enough that their utilization in marker assisted selection (MAS) can be cheaply explored. This paper presents a paternity testing MAS in diploid red clover (Trifolium pratense L.). Utilizing individual ...
Seasonal forecasts of groundwater levels in Lanyang Plain in Taiwan
NASA Astrophysics Data System (ADS)
Chang, Ya-Chi; Lin, Yi-Chiu
2017-04-01
Groundwater plays a critical and important role in world's freshwater resources and it is also an important part of Taiwan's water supply for domestic, agricultural and industrial use. Prolonged dry climatic conditions can induce groundwater drought and may have huge impact on water resources. Therefore, this study utilizes seasonal rainfall forecasts from the Model for Prediction Across Scales (MPAS) to simulate groundwater levels in Lanyang Plain in Taiwan up to three months into future. The MPAS is setup with 120 km uniform grid and the physics schemes including WSM6 micorphysics scheme, Kain-Fritsch cumulus scheme, RRTMG radiation scheme, and YSU planetary boundary layer scheme are used to provide the rainfall forecasts. Results of this study can provide a reference for water resources management to ensure the sustainability of groundwater resources in Lanyang Plain.
Opportunistic quantum network coding based on quantum teleportation
NASA Astrophysics Data System (ADS)
Shang, Tao; Du, Gang; Liu, Jian-wei
2016-04-01
It seems impossible to endow opportunistic characteristic to quantum network on the basis that quantum channel cannot be overheard without disturbance. In this paper, we propose an opportunistic quantum network coding scheme by taking full advantage of channel characteristic of quantum teleportation. Concretely, it utilizes quantum channel for secure transmission of quantum states and can detect eavesdroppers by means of quantum channel verification. What is more, it utilizes classical channel for both opportunistic listening to neighbor states and opportunistic coding by broadcasting measurement outcome. Analysis results show that our scheme can reduce the times of transmissions over classical channels for relay nodes and can effectively defend against classical passive attack and quantum active attack.
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps.
Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han; Lin, Tsung-Hung
2017-01-01
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes.
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps
Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han
2017-01-01
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes. PMID:28759615
Khan, Anwar; Ahmedy, Ismail; Anisi, Mohammad Hossein; Javaid, Nadeem; Ali, Ihsan; Khan, Nawsher; Alsaqer, Mohammed; Mahmood, Hasan
2018-01-09
Interference and energy holes formation in underwater wireless sensor networks (UWSNs) threaten the reliable delivery of data packets from a source to a destination. Interference also causes inefficient utilization of the limited battery power of the sensor nodes in that more power is consumed in the retransmission of the lost packets. Energy holes are dead nodes close to the surface of water, and their early death interrupts data delivery even when the network has live nodes. This paper proposes a localization-free interference and energy holes minimization (LF-IEHM) routing protocol for UWSNs. The proposed algorithm overcomes interference during data packet forwarding by defining a unique packet holding time for every sensor node. The energy holes formation is mitigated by a variable transmission range of the sensor nodes. As compared to the conventional routing protocols, the proposed protocol does not require the localization information of the sensor nodes, which is cumbersome and difficult to obtain, as nodes change their positions with water currents. Simulation results show superior performance of the proposed scheme in terms of packets received at the final destination and end-to-end delay.
Klimyuk, Victor; Pogue, Gregory; Herz, Stefan; Butler, John; Haydon, Hugh
2014-01-01
This review describes the adaptation of the plant virus-based transient expression system, magnICON(®) for the at-scale manufacturing of pharmaceutical proteins. The system utilizes so-called "deconstructed" viral vectors that rely on Agrobacterium-mediated systemic delivery into the plant cells for recombinant protein production. The system is also suitable for production of hetero-oligomeric proteins like immunoglobulins. By taking advantage of well established R&D tools for optimizing the expression of protein of interest using this system, product concepts can reach the manufacturing stage in highly competitive time periods. At the manufacturing stage, the system offers many remarkable features including rapid production cycles, high product yield, virtually unlimited scale-up potential, and flexibility for different manufacturing schemes. The magnICON system has been successfully adaptated to very different logistical manufacturing formats: (1) speedy production of multiple small batches of individualized pharmaceuticals proteins (e.g. antigens comprising individualized vaccines to treat NonHodgkin's Lymphoma patients) and (2) large-scale production of other pharmaceutical proteins such as therapeutic antibodies. General descriptions of the prototype GMP-compliant manufacturing processes and facilities for the product formats that are in preclinical and clinical testing are provided.
Khan, Anwar; Anisi, Mohammad Hossein; Javaid, Nadeem; Khan, Nawsher; Alsaqer, Mohammed; Mahmood, Hasan
2018-01-01
Interference and energy holes formation in underwater wireless sensor networks (UWSNs) threaten the reliable delivery of data packets from a source to a destination. Interference also causes inefficient utilization of the limited battery power of the sensor nodes in that more power is consumed in the retransmission of the lost packets. Energy holes are dead nodes close to the surface of water, and their early death interrupts data delivery even when the network has live nodes. This paper proposes a localization-free interference and energy holes minimization (LF-IEHM) routing protocol for UWSNs. The proposed algorithm overcomes interference during data packet forwarding by defining a unique packet holding time for every sensor node. The energy holes formation is mitigated by a variable transmission range of the sensor nodes. As compared to the conventional routing protocols, the proposed protocol does not require the localization information of the sensor nodes, which is cumbersome and difficult to obtain, as nodes change their positions with water currents. Simulation results show superior performance of the proposed scheme in terms of packets received at the final destination and end-to-end delay. PMID:29315247
An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks
Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.
2011-01-01
The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826
Dual watermarking scheme for secure buyer-seller watermarking protocol
NASA Astrophysics Data System (ADS)
Mehra, Neelesh; Shandilya, Madhu
2012-04-01
A buyer-seller watermarking protocol utilize watermarking along with cryptography for copyright and copy protection for the seller and meanwhile it also preserve buyers rights for privacy. It enables a seller to successfully identify a malicious seller from a pirated copy, while preventing the seller from framing an innocent buyer and provide anonymity to buyer. Up to now many buyer-seller watermarking protocols have been proposed which utilize more and more cryptographic scheme to solve many common problems such as customer's rights, unbinding problem, buyer's anonymity problem and buyer's participation in the dispute resolution. But most of them are infeasible since the buyer may not have knowledge of cryptography. Another issue is the number of steps to complete the protocols are large, a buyer needs to interact with different parties many times in these protocols, which is very inconvenient for buyer. To overcome these drawbacks, in this paper we proposed dual watermarking scheme in encrypted domain. Since neither of watermark has been generated by buyer so a general layman buyer can use the protocol.
Higley, Jeremy; Kim, Jong-Yea; Huber, Kerry C; Smith, Gordon
2012-09-05
Added (glucose addition) versus accumulated (in situ sugar development via cold-temperature storage) sugar treatments were investigated in relation to acrylamide formation within fried potato strips at standardized levels of finish-fried color (Agtron color scores ranged from 36 to 84). The added sugar treatment exhibited a relatively reduced rate of acrylamide formation and generally possessed a lower and less variable acrylamide content (61-1290 ng/g) than the accumulated sugar scheme (61-2191 ng/g). In a subsequent experiment, added fructose applied to strip surfaces via dipping prior to frying favored acrylamide formation over color development relative to added glucose, for which the reverse trend was observed. Thus, where acrylamide differences were noted between added and accumulated sugar treatments (given equivalent Agtron color scores), this result was likely aided by the relative higher fructose content in strips of the accumulated sugar scheme rather than simply a greater relative concentration of total reducing sugars.
A malware detection scheme based on mining format information.
Bai, Jinrong; Wang, Junfeng; Zou, Guozhong
2014-01-01
Malware has become one of the most serious threats to computer information system and the current malware detection technology still has very significant limitations. In this paper, we proposed a malware detection approach by mining format information of PE (portable executable) files. Based on in-depth analysis of the static format information of the PE files, we extracted 197 features from format information of PE files and applied feature selection methods to reduce the dimensionality of the features and achieve acceptable high performance. When the selected features were trained using classification algorithms, the results of our experiments indicate that the accuracy of the top classification algorithm is 99.1% and the value of the AUC is 0.998. We designed three experiments to evaluate the performance of our detection scheme and the ability of detecting unknown and new malware. Although the experimental results of identifying new malware are not perfect, our method is still able to identify 97.6% of new malware with 1.3% false positive rates.
A Malware Detection Scheme Based on Mining Format Information
Bai, Jinrong; Wang, Junfeng; Zou, Guozhong
2014-01-01
Malware has become one of the most serious threats to computer information system and the current malware detection technology still has very significant limitations. In this paper, we proposed a malware detection approach by mining format information of PE (portable executable) files. Based on in-depth analysis of the static format information of the PE files, we extracted 197 features from format information of PE files and applied feature selection methods to reduce the dimensionality of the features and achieve acceptable high performance. When the selected features were trained using classification algorithms, the results of our experiments indicate that the accuracy of the top classification algorithm is 99.1% and the value of the AUC is 0.998. We designed three experiments to evaluate the performance of our detection scheme and the ability of detecting unknown and new malware. Although the experimental results of identifying new malware are not perfect, our method is still able to identify 97.6% of new malware with 1.3% false positive rates. PMID:24991639
Vikram, K; Sharma, A K; Kannan, A T
2013-09-01
Janani Suraksha Yojana (JSY), a conditional cash transfer scheme introduced to improve the institutional delivery rates and thereby reduce the maternal and infant mortality was implemented in all States and Union Territories of India from 2007. The present study was carried out to identify the beneficiary level factors of utilization of JSY scheme in urban slums and resettlement colonies of trans-Yamuna area of Delhi. A cross-sectional community based survey was done of mothers of infants in the selected areas of the two districts by stratified random sampling on a population proportionate basis. Socio-demographic factors, antenatal services availed and distance of nearest health facility were studied. Outcome variable, a beneficiary, was a woman who had ever interacted with the ASHA of her area during the antenatal period of previous pregnancy and had child birth in an institution. Descriptive tables were drawn; univariate analysis followed by multiple logistic regression was applied for identifying the predictors for availing the benefits. Of the 469 mothers interviewed, 333 (71%) had institutional delivery, 128 (27.3%) had benefited from JSY scheme and 68 (14.5%) had received cash benefits of JSY. Belonging to Hindu religion and having had more than 6 antenatal check ups were the significant predictors of availing the benefits of JSY. There is a need to improve the awareness among urban slum population about the utilization of JSY scheme. Targeting difficult to access areas with special measures and encouraging more antenatal visits were essential, prerequisites to improve the impact of JSY.
Control scheme for power modulation of a free piston Stirling engine
Dhar, Manmohan
1989-01-01
The present invention relates to a control scheme for power modulation of a free-piston Stirling engine-linear alternator power generator system. The present invention includes connecting an autotransformer in series with a tuning capacitance between a linear alternator and a utility grid to maintain a constant displacement to piston stroke ratio and their relative phase angle over a wide range of operating conditions.
Adaptively loaded SP-offset-QAM OFDM for IM/DD communication systems.
Zhao, Jian; Chan, Chun-Kit
2017-09-04
In this paper, we propose adaptively loaded set-partitioned offset quadrature amplitude modulation (SP-offset-QAM) orthogonal frequency division multiplexing (OFDM) for low-cost intensity-modulation direct-detection (IM/DD) communication systems. We compare this scheme with multi-band carrier-less amplitude phase modulation (CAP) and conventional OFDM, and demonstrate >40 Gbit/s transmission over 50-km single-mode fiber. It is shown that the use of SP-QAM formats, together with the adaptive loading algorithm specifically designed to this group of formats, results in significant performance improvement for all these three schemes. SP-offset-QAM OFDM exhibits greatly reduced complexity compared to SP-QAM based multi-band CAP, via parallelized implementation and minimized memory length for spectral shaping. On the other hand, this scheme shows better performance than SP-QAM based conventional OFDM at both back-to-back and after transmission. We also characterize the proposed scheme in terms of enhanced tolerance to fiber intra-channel nonlinearity and the potential to increase the communication security. The studies show that adaptive SP-offset-QAM OFDM is a promising IM/DD solution for medium- and long-reach optical access networks and data center connections.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yu, F.; Luo, G.; Pryor, S. C.
Recent laboratory chamber studies indicate a significant role for highly oxidized low-volatility organics in new particle formation (NPF), but the actual role of these highly oxidized low-volatility organics in atmospheric NPF remains uncertain. Here, particle size distributions (PSDs) measured in nine forest areas in North America are used to characterize the occurrence and intensity of NPF and to evaluate model simulations using an empirical formulation in which formation rate is a function of the concentrations of sulfuric acid and low-volatility organics from alpha-pinene oxidation (Nucl-Org), and using an ion-mediated nucleation mechanism (excluding organics) (Nucl-IMN). On average, NPF occurred on ~more » 70 % of days during March for the four forest sites with springtime PSD measurements, while NPF occurred on only ~ 10 % of days in July for all nine forest sites. Both Nucl-Org and Nucl-IMN schemes capture the observed high frequency of NPF in spring, but the Nucl-Org scheme significantly overpredicts while the Nucl-IMN scheme slightly underpredicts NPF and particle number concentrations in summer. Statistical analyses of observed and simulated ultrafine particle number concentrations and frequency of NPF events indicate that the scheme without organics agrees better overall with observations. The two schemes predict quite different nucleation rates (including their spatial patterns), concentrations of cloud condensation nuclei, and aerosol first indirect radiative forcing in North America, highlighting the need to reduce NPF uncertainties in regional and global earth system models.« less
Combining Digital Watermarking and Fingerprinting Techniques to Identify Copyrights for Color Images
Hsieh, Shang-Lin; Chen, Chun-Che; Shen, Wen-Shan
2014-01-01
This paper presents a copyright identification scheme for color images that takes advantage of the complementary nature of watermarking and fingerprinting. It utilizes an authentication logo and the extracted features of the host image to generate a fingerprint, which is then stored in a database and also embedded in the host image to produce a watermarked image. When a dispute over the copyright of a suspect image occurs, the image is first processed by watermarking. If the watermark can be retrieved from the suspect image, the copyright can then be confirmed; otherwise, the watermark then serves as the fingerprint and is processed by fingerprinting. If a match in the fingerprint database is found, then the suspect image will be considered a duplicated one. Because the proposed scheme utilizes both watermarking and fingerprinting, it is more robust than those that only adopt watermarking, and it can also obtain the preliminary result more quickly than those that only utilize fingerprinting. The experimental results show that when the watermarked image suffers slight attacks, watermarking alone is enough to identify the copyright. The results also show that when the watermarked image suffers heavy attacks that render watermarking incompetent, fingerprinting can successfully identify the copyright, hence demonstrating the effectiveness of the proposed scheme. PMID:25114966
NASA Astrophysics Data System (ADS)
Li, Wei; Huang, Zhitong; Li, Haoyue; Ji, Yuefeng
2018-04-01
Visible light communication (VLC) is a promising candidate for short-range broadband access due to its integration of advantages for both optical communication and wireless communication, whereas multi-user access is a key problem because of the intra-cell and inter-cell interferences. In addition, the non-flat channel effect results in higher losses for users in high frequency bands, which leads to unfair qualities. To solve those issues, we propose a power adaptive multi-filter carrierless amplitude and phase access (PA-MF-CAPA) scheme, and in the first step of this scheme, the MF-CAPA scheme utilizing multiple filters as different CAP dimensions is used to realize multi-user access. The character of orthogonality among the filters in different dimensions can mitigate the effect of intra-cell and inter-cell interferences. Moreover, the MF-CAPA scheme provides different channels modulated on the same frequency bands, which further increases the transmission rate. Then, the power adaptive procedure based on MF-CAPA scheme is presented to realize quality fairness. As demonstrated in our experiments, the MF-CAPA scheme yields an improved throughput compared with multi-band CAP access scheme, and the PA-MF-CAPA scheme enhances the quality fairness and further improves the throughput compared with the MF-CAPA scheme.
An Improved Arbitrated Quantum Scheme with Bell States
NASA Astrophysics Data System (ADS)
Zhang, Yingying; Zeng, Jiwen
2018-04-01
In 2014, Liu et al. (In. J. Thero. phys. 53(5); 1569-1579. 2014) proposed an arbitrated quantum signature scheme (Liu'14) with Bell states by utilizing a new quantum one-time pad algorithm. It claimed that it can resist the receiver's existential forgery attack and no party has chances to change the message and its signature without being discovered. Recently, Xu and Zou (In. J. Thero. phys. 55; 4142-4156. 2016) analyzed above scheme and demonstrated that it can't resist the signer's disavowal and the receiver's existential forgery. But, the authors didn't give a method to solve it. In this paper, we will give an improved arbitrated quantum signature scheme to make up the loopholes in Liu'14.
Force sharing in high-power parallel servo-actuators
NASA Technical Reports Server (NTRS)
Neal, T. P.
1974-01-01
The various existing force sharing schemes were examined by conducting a literature survey. A list of potentially applicable concepts was compiled from this survey, and a brief analysis was then made of each concept, which resulted in two competing schemes being selected for in-depth evaluation. A functional design of the equalization logic for the two schemes was undertaken and specific space shuttle application was chosen for experimental evaluation. The application was scaled down so that existing hardware could be utilized. Next, an analog computer study was conducted to evaluate the more important characteristics of the two competing force sharing schemes. On the basis of the computers study, a final configuration was selected. A load simulator was then designed to evaluate this configuration on actual hardware.
Negative refraction using Raman transitions and chirality
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sikes, D. E.; Yavuz, D. D.
2011-11-15
We present a scheme that achieves negative refraction with low absorption in far-off resonant atomic systems. The scheme utilizes Raman resonances and does not require the simultaneous presence of an electric-dipole transition and a magnetic-dipole transition near the same wavelength. We show that two interfering Raman tran-sitions coupled to a magnetic-dipole transition can achieve a negative index of refraction with low absorption through magnetoelectric cross-coupling. We confirm the validity of the analytical results with exact numerical simulations of the density matrix. We also discuss possible experimental implementations of the scheme in rare-earth metal atomic systems.
Scalable quantum computation scheme based on quantum-actuated nuclear-spin decoherence-free qubits
NASA Astrophysics Data System (ADS)
Dong, Lihong; Rong, Xing; Geng, Jianpei; Shi, Fazhan; Li, Zhaokai; Duan, Changkui; Du, Jiangfeng
2017-11-01
We propose a novel theoretical scheme of quantum computation. Nuclear spin pairs are utilized to encode decoherence-free (DF) qubits. A nitrogen-vacancy center serves as a quantum actuator to initialize, readout, and quantum control the DF qubits. The realization of CNOT gates between two DF qubits are also presented. Numerical simulations show high fidelities of all these processes. Additionally, we discuss the potential of scalability. Our scheme reduces the challenge of classical interfaces from controlling and observing complex quantum systems down to a simple quantum actuator. It also provides a novel way to handle complex quantum systems.
Finite-time stabilization of chaotic gyros based on a homogeneous supertwisting-like algorithm
NASA Astrophysics Data System (ADS)
Khamsuwan, Pitcha; Sangpet, Teerawat; Kuntanapreeda, Suwat
2018-01-01
This paper presents a finite-time stabilization scheme for nonlinear chaotic gyros. The scheme utilizes a supertwisting-like continuous control algorithm for the systems of dimension more than one with a Lipschitz disturbance. The algorithm yields finite-time convergence similar to that produces by discontinuous sliding mode control algorithms. To design the controller, the nonlinearities in the gyro are treated as a disturbance in the system. Thanks to the dissipativeness of chaotic systems, the nonlinearities also possess the Lipschitz property. Numerical results are provided to illustrate the effectiveness of the scheme.
Chanel, Olivier; Makhloufi, Khaled; Abu-Zaineh, Mohammad
2017-06-01
The choice of elicitation format is a crucial but tricky aspect of stated preferences surveys. It affects not only the quantity and quality of the information collected on respondents' willingness to pay (WTP) but also the potential errors/biases that prevent their true WTP from being observed. We propose a new elicitation mechanism, the circular payment card (CPC), and show that it helps overcome the drawbacks of the standard payment card (PC) format. It uses a visual pie chart representation without start or end points: respondents spin the circular card in any direction until they find the section that best matches their true WTP. We performed a contingent valuation survey regarding a mandatory health insurance scheme in Tunisia, a middle-income country. Respondents were randomly allocated into one of three subgroups and their WTP was elicited using one of three formats: open-ended (OE), standard PC and the new CPC. We compared the elicited WTP. We found significant differences in unconditional and conditional analyses. Our empirical results consistently indicated that the OE and standard PC formats led to significantly lower WTP than the CPC format. Overall, our results are encouraging and suggest CPC could be an effective alternative format to elicit 'true' WTP.
Revised Cretaceous and Tertiary stratigraphic nomenclature in the Colville Basin, Northern Alaska
Mull, Charles G.; Houseknecht, David W.; Bird, Kenneth J.
2003-01-01
A revised stratigraphic nomenclature is proposed for Cretaceous and Tertiary geologic units of the central and western North Slope of Alaska. This revised nomenclature is a simplified and broadly applicable scheme suitable for a suite of digital geologic quadrangle maps being prepared jointly by the U.S. Geological Survey and the Alaska Department of Natural Resources, Division of Geological and Geophysical Surveys and Division of Oil and Gas. This revised nomenclature scheme is a simplification of a complex stratigraphic terminology that developed piecemeal during five decades of geologic investigations of the North Slope. It is based on helicopter-supported geologic field investigations incorporating information from high-resolution aerial photography, satellite imagery, paleontology, reflection seismic records, and sequence stratigraphic concepts. This revised nomenclature proposes the abandonment of the Colville Group; demotion of the Nanushuk Group to formation status; abandonment of six formations (Kukpowruk, Tuktu, Grandstand, Corwin, Chandler, and Ninuluk); revision of four formations (Sagavanirktok, Prince Creek, Schrader Bluff, and Seabee); elevation of the Tuluvak Tongue of the Prince Creek Formation to formation status; revision of two members (Franklin Bluffs Member and Sagwon Member of the Sagavanirktok Formation); abandonment of eight members or tongues (Kogosukruk, Rogers Creek, Barrow Trail, Sentinel Hill, Ayiyak, Shale Wall, Niakogon, and Killik); and definition of one new member (White Hills Member of the Sagavanirktok Formation).
NASA Technical Reports Server (NTRS)
Noble, Viveca K.
1994-01-01
When data is transmitted through a noisy channel, errors are produced within the data rendering it indecipherable. Through the use of error control coding techniques, the bit error rate can be reduced to any desired level without sacrificing the transmission data rate. The Astrionics Laboratory at Marshall Space Flight Center has decided to use a modular, end-to-end telemetry data simulator to simulate the transmission of data from flight to ground and various methods of error control. The simulator includes modules for random data generation, data compression, Consultative Committee for Space Data Systems (CCSDS) transfer frame formation, error correction/detection, error generation and error statistics. The simulator utilizes a concatenated coding scheme which includes CCSDS standard (255,223) Reed-Solomon (RS) code over GF(2(exp 8)) with interleave depth of 5 as the outermost code, (7, 1/2) convolutional code as an inner code and CCSDS recommended (n, n-16) cyclic redundancy check (CRC) code as the innermost code, where n is the number of information bits plus 16 parity bits. The received signal-to-noise for a desired bit error rate is greatly reduced through the use of forward error correction techniques. Even greater coding gain is provided through the use of a concatenated coding scheme. Interleaving/deinterleaving is necessary to randomize burst errors which may appear at the input of the RS decoder. The burst correction capability length is increased in proportion to the interleave depth. The modular nature of the simulator allows for inclusion or exclusion of modules as needed. This paper describes the development and operation of the simulator, the verification of a C-language Reed-Solomon code, and the possibility of using Comdisco SPW(tm) as a tool for determining optimal error control schemes.
Birch, G F; Gunns, T J; Chapman, D; Harrison, D
2016-05-01
As coastal populations increase, considerable pressures are exerted on estuarine environments. Recently, there has been a trend towards the development and use of estuarine assessment schemes as a decision support tool in the management of these environments. These schemes offer a method by which complex environmental data is converted into a readily understandable and communicable format for informed decision making and effective distribution of limited management resources. Reliability and effectiveness of these schemes are often limited due to a complex assessment framework, poor data management and use of ineffective environmental indicators. The current scheme aims to improve reliability in the reporting of estuarine condition by including a concise assessment framework, employing high-value indicators and, in a unique approach, employing fuzzy logic in indicator evaluation. Using Sydney estuary as a case study, each of the 15 sub-catchment/sub-estuary systems were assessed using the current scheme. Results identified that poor sediment quality was a significant issue in Blackwattle/Rozelle Bay, Iron Cove and Hen and Chicken Bay while poor water quality was of particular concern in Duck River, Homebush Bay and the Parramatta River. Overall results of the assessment scheme were used to prioritise the management of each sub-catchment/sub-estuary assessed with Blackwattle/Rozelle Bay, Homebush Bay, Iron Cove and Duck River considered to be in need of a high priority management response. A report card format, using letter grades, was employed to convey the results of the assessment in a readily understood manner to estuarine managers and members of the public. Letter grades also provide benchmarking and performance monitoring ability, allowing estuarine managers to set improvement targets and assesses the effectiveness of management strategies. The current assessment scheme provides an effective, integrated and consistent assessment of estuarine health and provides an effective decision support tool to maximise the efficient distribution of limited management resources.
NASA Astrophysics Data System (ADS)
Xia, Weiwei; Shen, Lianfeng
We propose two vertical handoff schemes for cellular network and wireless local area network (WLAN) integration: integrated service-based handoff (ISH) and integrated service-based handoff with queue capabilities (ISHQ). Compared with existing handoff schemes in integrated cellular/WLAN networks, the proposed schemes consider a more comprehensive set of system characteristics such as different features of voice and data services, dynamic information about the admitted calls, user mobility and vertical handoffs in two directions. The code division multiple access (CDMA) cellular network and IEEE 802.11e WLAN are taken into account in the proposed schemes. We model the integrated networks by using multi-dimensional Markov chains and the major performance measures are derived for voice and data services. The important system parameters such as thresholds to prioritize handoff voice calls and queue sizes are optimized. Numerical results demonstrate that the proposed ISHQ scheme can maximize the utilization of overall bandwidth resources with the best quality of service (QoS) provisioning for voice and data services.
NASA Astrophysics Data System (ADS)
Heo, Jino; Kang, Min-Sung; Hong, Chang-Ho; Yang, Hyeon; Choi, Seong-Gon
2017-01-01
We propose quantum information processing schemes based on cavity quantum electrodynamics (QED) for quantum communication. First, to generate entangled states (Bell and Greenberger-Horne-Zeilinger [GHZ] states) between flying photons and three-level atoms inside optical cavities, we utilize a controlled phase flip (CPF) gate that can be implemented via cavity QED). Subsequently, we present an entanglement swapping scheme that can be realized using single-qubit measurements and CPF gates via optical cavities. These schemes can be directly applied to construct an entanglement channel for a communication system between two users. Consequently, it is possible for the trust center, having quantum nodes, to accomplish the linked channel (entanglement channel) between the two separate long-distance users via the distribution of Bell states and entanglement swapping. Furthermore, in our schemes, the main physical component is the CPF gate between the photons and the three-level atoms in cavity QED, which is feasible in practice. Thus, our schemes can be experimentally realized with current technology.
NASA Astrophysics Data System (ADS)
Lin, Zhuosheng; Yu, Simin; Li, Chengqing; Lü, Jinhu; Wang, Qianxue
This paper proposes a chaotic secure video remote communication scheme that can perform on real WAN networks, and implements it on a smartphone hardware platform. First, a joint encryption and compression scheme is designed by embedding a chaotic encryption scheme into the MJPG-Streamer source codes. Then, multiuser smartphone communications between the sender and the receiver are implemented via WAN remote transmission. Finally, the transmitted video data are received with the given IP address and port in an Android smartphone. It should be noted that, this is the first time that chaotic video encryption schemes are implemented on such a hardware platform. The experimental results demonstrate that the technical challenges on hardware implementation of secure video communication are successfully solved, reaching a balance amongst sufficient security level, real-time processing of massive video data, and utilization of available resources in the hardware environment. The proposed scheme can serve as a good application example of chaotic secure communications for smartphone and other mobile facilities in the future.
Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes
Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C.-W.
2014-01-01
Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions. PMID:25207333
Efficient and provable secure pairing-free security-mediated identity-based identification schemes.
Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W
2014-01-01
Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zheng, Weixiong; Wang, Yaqi; DeHart, Mark D.
2016-09-01
In this report, we present a new upwinding scheme for the multiscale capability in Rattlesnake, the MOOSE based radiation transport application. Comparing with the initial implementation of multiscale utilizing Lagrange multipliers to impose strong continuity of angular flux on interface of in-between subdomains, this scheme does not require the particular domain partitioning. This upwinding scheme introduces discontinuity of angular flux and resembles the classic upwinding technique developed for solving first order transport equation using discontinuous finite element method (DFEM) on the subdomain interfaces. Because this scheme restores the causality of radiation streaming on the interfaces, significant accuracy improvement can bemore » observed with moderate increase of the degrees of freedom comparing with the continuous method over the entire solution domain. Hybrid SN-PN is implemented and tested with this upwinding scheme. Numerical results show that the angular smoothing required by Lagrange multiplier method is not necessary for the upwinding scheme.« less
Gilmore-Bykovskyi, Andrea L
2015-01-01
Mealtime behavioral symptoms are distressing and frequently interrupt eating for the individual experiencing them and others in the environment. A computer-assisted coding scheme was developed to measure caregiver person-centeredness and behavioral symptoms for nursing home residents with dementia during mealtime interactions. The purpose of this pilot study was to determine the feasibility, ease of use, and inter-observer reliability of the coding scheme, and to explore the clinical utility of the coding scheme. Trained observers coded 22 observations. Data collection procedures were acceptable to participants. Overall, the coding scheme proved to be feasible, easy to execute and yielded good to very good inter-observer agreement following observer re-training. The coding scheme captured clinically relevant, modifiable antecedents to mealtime behavioral symptoms, but would be enhanced by the inclusion of measures for resident engagement and consolidation of items for measuring caregiver person-centeredness that co-occurred and were difficult for observers to distinguish. Published by Elsevier Inc.
Spray algorithm without interface construction
NASA Astrophysics Data System (ADS)
Al-Kadhem Majhool, Ahmed Abed; Watkins, A. P.
2012-05-01
This research is aimed to create a new and robust family of convective schemes to capture the interface between the dispersed and the carrier phases in a spray without the need to build up the interface boundary. The selection of the Weighted Average Flux (WAF) scheme is due to this scheme being designed to deal with random flux scheme which is second-order accurate in space and time. The convective flux in each cell face utilizes the WAF scheme blended with Switching Technique for Advection and Capturing of Surfaces (STACS) scheme for high resolution flux limiters. In the next step, the high resolution scheme is blended with the WAF scheme to provide the sharpness and boundedness of the interface by using switching strategy. In this work, the Eulerian-Eulerian framework of non-reactive turbulent spray is set in terms of theoretical proposed methodology namely spray moments of drop size distribution, presented by Beck and Watkins [1]. The computational spray model avoids the need to segregate the local droplet number distribution into parcels of identical droplets. The proposed scheme is tested on capturing the spray edges in modelling hollow cone sprays without need to reconstruct two-phase interface. A test is made on simple comparison between TVD scheme and WAF scheme using the same flux limiter on convective flow hollow cone spray. Results show the WAF scheme gives a better prediction than TVD scheme. The only way to check the accuracy of the presented models is by evaluating the spray sheet thickness.
Park, YoHan; Park, YoungHo
2016-12-14
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.'s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.
A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.
Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne
2017-05-01
Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons.
Wu, Yilun; Lu, Xicheng; Su, Jinshu; Chen, Peixin
2016-12-01
Preserving the privacy of electronic medical records (EMRs) is extremely important especially when medical systems adopt cloud services to store patients' electronic medical records. Considering both the privacy and the utilization of EMRs, some medical systems apply searchable encryption to encrypt EMRs and enable authorized users to search over these encrypted records. Since individuals would like to share their EMRs with multiple persons, how to design an efficient searchable encryption for sharable EMRs is still a very challenge work. In this paper, we propose a cost-efficient secure channel free searchable encryption (SCF-PEKS) scheme for sharable EMRs. Comparing with existing SCF-PEKS solutions, our scheme reduces the storage overhead and achieves better computation performance. Moreover, our scheme can guard against keyword guessing attack, which is neglected by most of the existing schemes. Finally, we implement both our scheme and a latest medical-based scheme to evaluate the performance. The evaluation results show that our scheme performs much better performance than the latest one for sharable EMRs.
Park, YoHan; Park, YoungHo
2016-01-01
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.’s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment. PMID:27983616
A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things
Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne
2017-01-01
Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons. PMID:28468313
An Efficient Offloading Scheme For MEC System Considering Delay and Energy Consumption
NASA Astrophysics Data System (ADS)
Sun, Yanhua; Hao, Zhe; Zhang, Yanhua
2018-01-01
With the increasing numbers of mobile devices, mobile edge computing (MEC) which provides cloud computing capabilities proximate to mobile devices in 5G networks has been envisioned as a promising paradigm to enhance users experience. In this paper, we investigate a joint consideration of delay and energy consumption offloading scheme (JCDE) for MEC system in 5G heterogeneous networks. An optimization is formulated to minimize the delay as well as energy consumption of the offloading system, which the delay and energy consumption of transmitting and calculating tasks are taken into account. We adopt an iterative greedy algorithm to solve the optimization problem. Furthermore, simulations were carried out to validate the utility and effectiveness of our proposed scheme. The effect of parameter variations on the system is analysed as well. Numerical results demonstrate delay and energy efficiency promotion of our proposed scheme compared with another paper’s scheme.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Habib, Hany F; El Hariri, Mohamad; Elsayed, Ahmed
Microgrids’ adaptive protection techniques rely on communication signals from the point of common coupling to ad- just the corresponding relays’ settings for either grid-connected or islanded modes of operation. However, during communication out- ages or in the event of a cyberattack, relays settings are not changed. Thus adaptive protection schemes are rendered unsuc- cessful. Due to their fast response, supercapacitors, which are pre- sent in the microgrid to feed pulse loads, could also be utilized to enhance the resiliency of adaptive protection schemes to communi- cation outages. Proper sizing of the supercapacitors is therefore im- portant in order to maintainmore » a stable system operation and also reg- ulate the protection scheme’s cost. This paper presents a two-level optimization scheme for minimizing the supercapacitor size along with optimizing its controllers’ parameters. The latter will lead to a reduction of the supercapacitor fault current contribution and an increase in that of other AC resources in the microgrid in the ex- treme case of having a fault occurring simultaneously with a pulse load. It was also shown that the size of the supercapacitor can be reduced if the pulse load is temporary disconnected during the transient fault period. Simulations showed that the resulting super- capacitor size and the optimized controller parameters from the proposed two-level optimization scheme were feeding enough fault currents for different types of faults and minimizing the cost of the protection scheme.« less
ExoCross: Spectra from molecular line lists
NASA Astrophysics Data System (ADS)
Yurchenko, Sergei N.; Al-Refaie, Ahmed; Tennyson, Jonathan
2018-03-01
ExoCross generates spectra and thermodynamic properties from molecular line lists in ExoMol, HITRAN, or several other formats. The code is parallelized and also shows a high degree of vectorization; it works with line profiles such as Doppler, Lorentzian and Voigt and supports several broadening schemes. ExoCross is also capable of working with the recently proposed method of super-lines. It supports calculations of lifetimes, cooling functions, specific heats and other properties. ExoCross converts between different formats, such as HITRAN, ExoMol and Phoenix, and simulates non-LTE spectra using a simple two-temperature approach. Different electronic, vibronic or vibrational bands can be simulated separately using an efficient filtering scheme based on the quantum numbers.
Model compound study of the pathways for aromatic hydrocarbon formation in soot.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tomczyk, N. A.; Hunt, J. E.; Winans, R. E.
2002-04-29
To explore the mechanisms for formation of aromatic hydrocarbons as precursors to soot, a model system using combustion of biphenyl in a fuel rich flame is studied. The soots acquired at three different temperatures are solvent extracted and the extract characterized by both GCMS and high resolution mass spectrometry. A description of the NMR results for the whole soots has been published (1). The production of most products could be rationalized from the coupling of biphenyls and subsequent aromatic species and the addition of acetylenes to existing aromatic molecules. Early work by Badger on pyrolysis of hydrocarbons is used inmore » developing these schemes (2). The reaction schemes to produce larger aromatic hydrocarbons will be discussed. Richter and Howard have discussed in detail potential reaction mechanisms in the formation of aromatics as precursors to soot (3).« less
NASA Astrophysics Data System (ADS)
Kabiri, Meisam; Atrianfar, Hajar; Menhaj, Mohammad B.
2018-01-01
This paper addresses the adaptive formation control of a group of vertical take-off and landing (VTOL) unmanned aerial vehicles (UAV) with switching-directed interaction topologies. In addition, to tackle the adverse effect of disturbances, a couple of smooth bounded estimators are involved in the procedure design. Exploiting an extraction algorithm, we take advantage of the fully actuated rotational dynamics, to control the translational dynamics of each vehicle. We propose a distributed control scheme such that all vehicles track a desired reference velocity signal while keeping a desired prespecified formation. In this framework, the underlying topology of the agents may switch among several directed graphs, each having a spanning tree. The stability of the overall closed-loop system is proved through Lyapunov function. Finally, simulation results are given to better highlight the effectiveness of the proposed control scheme.
Chung, Youngseok; Choi, Seokjin; Lee, Youngsook; Park, Namje; Won, Dongho
2016-10-07
More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.'s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes.
An upwind, kinetic flux-vector splitting method for flows in chemical and thermal non-equilibrium
NASA Technical Reports Server (NTRS)
Eppard, W. M.; Grossman, B.
1993-01-01
We have developed new upwind kinetic difference schemes for flows with non-equilibrium thermodynamics and chemistry. These schemes are derived from the Boltzmann equation with the resulting Euler schemes developed as moments of the discretized Boltzmann scheme with a locally Maxwellian velocity distribution. Splitting the velocity distribution at the Boltzmann level is seen to result in a flux-split Euler scheme and is called Kinetic Flux Vector Splitting (KFVS). Extensions to flows with finite-rate chemistry and vibrational relaxation is accomplished utilizing nonequilibrium kinetic theory. Computational examples are presented comparing KFVS with the schemes of Van Leer and Roe for a quasi-one-dimensional flow through a supersonic diffuser, inviscid flow through two-dimensional inlet, and viscous flow over a cone at zero angle-of-attack. Calculations are also shown for the transonic flow over a bump in a channel and the transonic flow over an NACA 0012 airfoil. The results show that even though the KFVS scheme is a Riemann solver at the kinetic level, its behavior at the Euler level is more similar to the existing flux-vector splitting algorithms than to the flux-difference splitting scheme of Roe.
Chung, Youngseok; Choi, Seokjin; Lee, Youngsook; Park, Namje; Won, Dongho
2016-01-01
More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.’s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes. PMID:27739417
NASA Astrophysics Data System (ADS)
Popescu, Mihaela; Shyy, Wei; Garbey, Marc
2005-12-01
In developing suitable numerical techniques for computational aero-acoustics, the dispersion-relation-preserving (DRP) scheme by Tam and co-workers and the optimized prefactored compact (OPC) scheme by Ashcroft and Zhang have shown desirable properties of reducing both dissipative and dispersive errors. These schemes, originally based on the finite difference, attempt to optimize the coefficients for better resolution of short waves with respect to the computational grid while maintaining pre-determined formal orders of accuracy. In the present study, finite volume formulations of both schemes are presented to better handle the nonlinearity and complex geometry encountered in many engineering applications. Linear and nonlinear wave equations, with and without viscous dissipation, have been adopted as the test problems. Highlighting the principal characteristics of the schemes and utilizing linear and nonlinear wave equations with different wavelengths as the test cases, the performance of these approaches is documented. For the linear wave equation, there is no major difference between the DRP and OPC schemes. For the nonlinear wave equations, the finite volume version of both DRP and OPC schemes offers substantially better solutions in regions of high gradient or discontinuity.
Performance analysis of multi-primary color display based on OLEDs/PLEDs
NASA Astrophysics Data System (ADS)
Xiong, Yan; Deng, Fei; Xu, Shan; Gao, Shufang
2017-09-01
A multi-primary color display, such as the six-primary color format, is a solution in expanding the color gamut of a full-color flat panel display. The performance of a multi-primary color display based on organic/polymer light-emitting diodes was analyzed in this study using the fitting curves of the characteristics of devices (i.e., current density, voltage, luminance). A white emitter was introduced into a six-primary color format to form a seven-primary color format that contributes to energy saving, and the ratio of power efficiency of a seven-primary color display to that of a six-primary color display would increase from 1.027 to 1.061 by using emitting diodes with different electroluminescent efficiencies. Different color matching schemes of the seven-primary color format display were compared in a uniform color space, and the scheme of the color reproduction did not significantly affect the display performance. Although seven- and six-primary color format displays benefit a full-color display with higher quality, they are less efficient than three-primary (i.e., red (R), green (G), and blue (B), RGB) and four-primary (i.e., RGB+white, RGBW) color format displays. For the seven-primary color formats considered in this study, the advantages of white-primary-added display with efficiently developed light-emitting devices were more evident than the format without a white primary.
Efficient quantum dialogue without information leakage
NASA Astrophysics Data System (ADS)
Yin, Ai-Han; Tang, Zhi-Hui; Chen, Dong
2015-02-01
A two-step quantum dialogue scheme is put forward with a class of three-qubit W state and quantum dense coding. Each W state can carry three bits of secret information and the measurement result is encrypted without information leakage. Furthermore, we utilize the entangle properties of W state and decoy photon checking technique to realize three-time channel detection, which can improve the efficiency and security of the scheme.
Multivariate optimum interpolation of surface pressure and winds over oceans
NASA Technical Reports Server (NTRS)
Bloom, S. C.
1984-01-01
The observations of surface pressure are quite sparse over oceanic areas. An effort to improve the analysis of surface pressure over oceans through the development of a multivariate surface analysis scheme which makes use of surface pressure and wind data is discussed. Although the present research used ship winds, future versions of this analysis scheme could utilize winds from additional sources, such as satellite scatterometer data.
NASA Astrophysics Data System (ADS)
Cholakian, Arineh; Beekmann, Matthias; Colette, Augustin; Coll, Isabelle; Siour, Guillaume; Sciare, Jean; Marchand, Nicolas; Couvidat, Florian; Pey, Jorge; Gros, Valerie; Sauvage, Stéphane; Michoud, Vincent; Sellegri, Karine; Colomb, Aurélie; Sartelet, Karine; Langley DeWitt, Helen; Elser, Miriam; Prévot, André S. H.; Szidat, Sonke; Dulac, François
2018-05-01
The simulation of fine organic aerosols with CTMs (chemistry-transport models) in the western Mediterranean basin has not been studied until recently. The ChArMEx (the Chemistry-Aerosol Mediterranean Experiment) SOP 1b (Special Observation Period 1b) intensive field campaign in summer of 2013 gathered a large and comprehensive data set of observations, allowing the study of different aspects of the Mediterranean atmosphere including the formation of organic aerosols (OAs) in 3-D models. In this study, we used the CHIMERE CTM to perform simulations for the duration of the SAFMED (Secondary Aerosol Formation in the MEDiterranean) period (July to August 2013) of this campaign. In particular, we evaluated four schemes for the simulation of OA, including the CHIMERE standard scheme, the VBS (volatility basis set) standard scheme with two parameterizations including aging of biogenic secondary OA, and a modified version of the VBS scheme which includes fragmentation and formation of nonvolatile OA. The results from these four schemes are compared to observations at two stations in the western Mediterranean basin, located on Ersa, Cap Corse (Corsica, France), and at Cap Es Pinar (Mallorca, Spain). These observations include OA mass concentration, PMF (positive matrix factorization) results of different OA fractions, and 14C observations showing the fossil or nonfossil origins of carbonaceous particles. Because of the complex orography of the Ersa site, an original method for calculating an orographic representativeness error (ORE) has been developed. It is concluded that the modified VBS scheme is close to observations in all three aspects mentioned above; the standard VBS scheme without BSOA (biogenic secondary organic aerosol) aging also has a satisfactory performance in simulating the mass concentration of OA, but not for the source origin analysis comparisons. In addition, the OA sources over the western Mediterranean basin are explored. OA shows a major biogenic origin, especially at several hundred meters height from the surface; however over the Gulf of Genoa near the surface, the anthropogenic origin is of similar importance. A general assessment of other species was performed to evaluate the robustness of the simulations for this particular domain before evaluating OA simulation schemes. It is also shown that the Cap Corse site presents important orographic complexity, which makes comparison between model simulations and observations difficult. A method was designed to estimate an orographic representativeness error for species measured at Ersa and yields an uncertainty of between 50 and 85 % for primary pollutants, and around 2-10 % for secondary species.
Radial gas motions in The H I Nearby Galaxy Survey (THINGS)
NASA Astrophysics Data System (ADS)
Schmidt, Tobias M.; Bigiel, Frank; Klessen, Ralf S.; de Blok, W. J. G.
2016-04-01
The study of 21 cm line observations of atomic hydrogen allows detailed insight into the kinematics of spiral galaxies. We use sensitive high-resolution Very Large Array data from The H I Nearby Galaxy Survey (THINGS) to search for radial gas flows primarily in the outer parts (up to 3 × r25) of 10 nearby spiral galaxies. Inflows are expected to replenish the gas reservoir and fuel star formation under the assumption that galaxies evolve approximately in steady state. We carry out a detailed investigation of existing tilted ring fitting schemes and discover systematics that can hamper their ability to detect signatures of radial flows. We develop a new Fourier decomposition scheme that fits for rotational and radial velocities and simultaneously determines position angle and inclination as a function of radius. Using synthetic velocity fields we show that our novel fitting scheme is less prone to such systematic errors and that it is well suited to detect radial inflows in discs. We apply our fitting scheme to 10 THINGS galaxies and find clear indications of, at least partly previously unidentified, radial gas flows, in particular for NGC 2403 and NGC 3198 and to a lesser degree for NGC 7331, NGC 2903 and NGC 6946. The mass flow rates are of the same order but usually larger than the star formation rates. At least for these galaxies a scenario in which continuous mass accretion feeds star formation seems plausible. The other galaxies show a more complicated picture with either no clear inflow, outward motions or complex kinematic signatures.
Efficient resource allocation scheme for visible-light communication system
NASA Astrophysics Data System (ADS)
Kim, Woo-Chan; Bae, Chi-Sung; Cho, Dong-Ho; Shin, Hong-Seok; Jung, D. K.; Oh, Y. J.
2009-01-01
A visible-light communication utilizing LED has many advantagies such as visibility of information, high SNR (Signal to Noise Ratio), low installation cost, usage of existing illuminators, and high security. Furthermore, exponentially increasing needs and quality of LED have helped the development of visible-light communication. The visibility is the most attractive property in visible-light communication system, but it is difficult to ensure visibility and transmission efficiency simultaneously during initial access because of the small amount of initial access process signals. In this paper, we propose an efficient resource allocation scheme at initial access for ensuring visibility with high resource utilization rate and low data transmission failure rate. The performance has been evaluated through the numerical analysis and simulation results.
NASA Technical Reports Server (NTRS)
Chamberland, Dennis
1992-01-01
The paper describes a higher-plant-based engineering paradigm for advanced life support in a Controlled Ecological Life Support System (CELSS) on the surface of the moon or Mars, called the CELSS Breadboard Project, designed at John F. Kennedy Space Center. Such a higher-plant-based system would use the plants for a direct food source, gas exchange, water reclamation, and plant residuals in a complex biological resource recovery scheme. The CELSS Breadboard Project utilizes a 'breadboard' approach of developing independent systems that are evaluated autonomously and are later interconnected. Such a scheme will enable evaluation of life support system methodologies tested for their efficiency in a life support system for habitats on the moon or Mars.
NASA Astrophysics Data System (ADS)
Wang, Fuyin; Xie, Jiehui; Hu, Zhengliang; Xiong, Shuidong; Luo, Hong; Hu, Yongming
2014-05-01
Study of fiber optic extrinsic Fabry-Pérot sensors utilizing state-of-the-art MEMS technology mostly focus on sensor fabrication for various applications, while the signal interrogation is still insatiable to current application. In this paper, we propose a white light path matched differential interferometer dynamic sensing system utilizing phase generated carrier demodulation scheme. A step motor with a movable mirror and a fiber-wound piezoelectric transducer string are used to act path matching and phase modulation respectively. Experimental results show that the sensing signal could be correctly recovered with low distortion and the phase noise spectrum level is less than -100 dB re. rad/√Hz above 2.5 kHz.
Haynes, Edward; Helgason, Thorunn; Young, J Peter W; Thwaites, Richard; Budge, Giles E
2013-08-01
Melissococcus plutonius is the bacterial pathogen that causes European Foulbrood of honeybees, a globally important honeybee brood disease. We have used next-generation sequencing to identify highly polymorphic regions in an otherwise genetically homogenous organism, and used these loci to create a modified MLST scheme. This synthesis of a proven typing scheme format with next-generation sequencing combines reliability and low costs with insights only available from high-throughput sequencing technologies. Using this scheme we show that the global distribution of M.plutonius variants is not uniform. We use the scheme in epidemiological studies to trace movements of infective material around England, insights that would have been impossible to confirm without the typing scheme. We also demonstrate the persistence of local variants over time. © 2013 Crown copyright. Reproduced with the permission of the Controller of Her Majesty's Stationary Office/Queen’s Printer for Scotland and Food and Environment Research Agency.
NASA Technical Reports Server (NTRS)
Przekwas, A. J.; Yang, H. Q.
1989-01-01
The capability of accurate nonlinear flow analysis of resonance systems is essential in many problems, including combustion instability. Classical numerical schemes are either too diffusive or too dispersive especially for transient problems. In the last few years, significant progress has been made in the numerical methods for flows with shocks. The objective was to assess advanced shock capturing schemes on transient flows. Several numerical schemes were tested including TVD, MUSCL, ENO, FCT, and Riemann Solver Godunov type schemes. A systematic assessment was performed on scalar transport, Burgers' and gas dynamic problems. Several shock capturing schemes are compared on fast transient resonant pipe flow problems. A system of 1-D nonlinear hyperbolic gas dynamics equations is solved to predict propagation of finite amplitude waves, the wave steepening, formation, propagation, and reflection of shocks for several hundred wave cycles. It is shown that high accuracy schemes can be used for direct, exact nonlinear analysis of combustion instability problems, preserving high harmonic energy content for long periods of time.
Effects of color scheme and message lines of variable message signs on driver performance.
Lai, Chien-Jung
2010-07-01
The advancement in variable message signs (VMS) technology has made it possible to display message with various formats. This study presented an ergonomic study on the message design of Chinese variable message signs on urban roads in Taiwan. Effects of color scheme (one, two and three) and number of message lines (single, double and triple) of VMS on participants' response performance were investigated through a laboratory experiment. Results of analysis showed that color scheme and number of message lines are significant factors for participants' response time to VMS. Participants responded faster for two-color than for one- and three-color scheme. Participants also took less response time for double line message than for single and triple line message. Both color scheme and number of message lines had no significant effect on participants' response accuracy. The preference survey after the experiment showed that most participants preferred two-color scheme and double line message to the other combinations. The results can assist in adopting appropriate color scheme and number of message lines of Chinese VMS. Copyright 2009 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Liu, Maw-Yang; Hsu, Yi-Kai
2017-03-01
Three-arm dual-balanced detection scheme is studied in an optical code division multiple access system. As the MAI and beat noise are the main deleterious source of system performance, we utilize optical hard-limiters to alleviate such channel impairment. In addition, once the channel condition is improved effectively, the proposed two-dimensional error correction code can remarkably enhance the system performance. In our proposed scheme, the optimal thresholds of optical hard-limiters and decision circuitry are fixed, and they will not change with other system parameters. Our proposed scheme can accommodate a large number of users simultaneously and is suitable for burst traffic with asynchronous transmission. Therefore, it is highly recommended as the platform for broadband optical access network.
Deterministic Joint Remote Preparation of a Four-Qubit Cluster-Type State via GHZ States
NASA Astrophysics Data System (ADS)
Wang, Hai-bin; Zhou, Xiao-Yan; An, Xing-xing; Cui, Meng-Meng; Fu, De-sheng
2016-08-01
A scheme for the deterministic joint remote preparation of a four-qubit cluster-type state using only two Greenberger-Horne-Zeilinger (GHZ) states as quantum channels is presented. In this scheme, the first sender performs a two-qubit projective measurement according to the real coefficient of the desired state. Then, the other sender utilizes the measurement result and the complex coefficient to perform another projective measurement. To obtain the desired state, the receiver applies appropriate unitary operations to his/her own two qubits and two CNOT operations to the two ancillary ones. Most interestingly, our scheme can achieve unit success probability, i.e., P s u c =1. Furthermore, comparison reveals that the efficiency is higher than that of most other analogous schemes.
An adaptive Cartesian control scheme for manipulators
NASA Technical Reports Server (NTRS)
Seraji, H.
1987-01-01
A adaptive control scheme for direct control of manipulator end-effectors to achieve trajectory tracking in Cartesian space is developed. The control structure is obtained from linear multivariable theory and is composed of simple feedforward and feedback controllers and an auxiliary input. The direct adaptation laws are derived from model reference adaptive control theory and are not based on parameter estimation of the robot model. The utilization of feedforward control and the inclusion of auxiliary input are novel features of the present scheme and result in improved dynamic performance over existing adaptive control schemes. The adaptive controller does not require the complex mathematical model of the robot dynamics or any knowledge of the robot parameters or the payload, and is computationally fast for online implementation with high sampling rates.
Limitations and requirements of content-based multimedia authentication systems
NASA Astrophysics Data System (ADS)
Wu, Chai W.
2001-08-01
Recently, a number of authentication schemes have been proposed for multimedia data such as images and sound data. They include both label based systems and semifragile watermarks. The main requirement for such authentication systems is that minor modifications such as lossy compression which do not alter the content of the data preserve the authenticity of the data, whereas modifications which do modify the content render the data not authentic. These schemes can be classified into two main classes depending on the model of image authentication they are based on. One of the purposes of this paper is to look at some of the advantages and disadvantages of these image authentication schemes and their relationship with fundamental limitations of the underlying model of image authentication. In particular, we study feature-based algorithms which generate an authentication tag based on some inherent features in the image such as the location of edges. The main disadvantage of most proposed feature-based algorithms is that similar images generate similar features, and therefore it is possible for a forger to generate dissimilar images that have the same features. On the other hand, the class of hash-based algorithms utilizes a cryptographic hash function or a digital signature scheme to reduce the data and generate an authentication tag. It inherits the security of digital signatures to thwart forgery attacks. The main disadvantage of hash-based algorithms is that the image needs to be modified in order to be made authenticatable. The amount of modification is on the order of the noise the image can tolerate before it is rendered inauthentic. The other purpose of this paper is to propose a multimedia authentication scheme which combines some of the best features of both classes of algorithms. The proposed scheme utilizes cryptographic hash functions and digital signature schemes and the data does not need to be modified in order to be made authenticatable. Several applications including the authentication of images on CD-ROM and handwritten documents will be discussed.
Photovoltaic utility/customer interface study
NASA Astrophysics Data System (ADS)
Eichler, C. H.; Hayes, T. P.; Matthews, M. M.; Wilraker, V. F.
1980-12-01
The technical, economic, and legal and regulatory issues of interconnecting small, privately-owned, on-site photovoltaic generating systems to an electric utility are addressed. Baseline residential, commercial and industrial class photovoltaic systems were developed. Technical issues of concern affecting this interconnection were identified and included fault protection, undervoltage protection, lamp flicker, revenue metering, loss of synchromism, electrical safety, prevention of backfeeding a de-energized utility feeder, effects of on-site generation on utility relaying schemes, effects of power conditioner harmonic distortion on the electric utility, system isolation, electromagnetic interference and site power factor as seen by the utility. Typical interconnection wiring diagrams were developed for interconnecting each class of baseline photovoltaic generating system.
Consensus-Based Formation Control of a Class of Multi-Agent Systems
NASA Technical Reports Server (NTRS)
Joshi, Suresh; Gonzalez, Oscar R.
2014-01-01
This paper presents a consensus-based formation control scheme for autonomous multi-agent systems represented by double integrator dynamics. Assuming that the information graph topology consists of an undirected connected graph, a leader-based consensus-type control law is presented and shown to provide asymptotic formation stability when subjected to piecewise constant formation velocity commands. It is also shown that global asymptotic stability is preserved in the presence of (0, infinity)- sector monotonic non-decreasing actuator nonlinearities.
NASA Astrophysics Data System (ADS)
Bellazzini, M.; Ferraro, F. R.; Buonanno, R.
1999-08-01
A detailed study of the star formation history of the Sagittarius dwarf spheroidal galaxy is performed through the analysis of data from the Sagittarius Dwarf Galaxy Survey (SDGS). Accurate statistical decontamination of the SDGS colour-magnitude diagrams (CMDs) allows us to obtain many useful constraints on the age and metal content of the Sgr stellar populations in three different regions of the galaxy. A coarse metallicity distribution of Sgr stars is derived, ranging from [Fe/H]~-2.0 to [Fe/H]~-0.7, the upper limit being somewhat higher in the central region of the galaxy. A qualitative global fit to all the observed CMD features is attempted, and a general scheme for the star formation history of the Sgr dSph is derived. According to this scheme, star formation began at a very early time from a low metal content interstellar medium and lasted for severalGyr, coupled with progressive chemical enrichment. The star formation rate (SFR) had a peak from 8 to 10Gyr ago, when the mean metallicity was in the range -1.3<=[Fe/H]<=-0.7. After that maximum, the SFR rapidly decreased and a very low rate of star formation took place until ~1-0.5Gyr ago.
Prediction-based association control scheme in dense femtocell networks.
Sung, Nak Woon; Pham, Ngoc-Thai; Huynh, Thong; Hwang, Won-Joo; You, Ilsun; Choo, Kim-Kwang Raymond
2017-01-01
The deployment of large number of femtocell base stations allows us to extend the coverage and efficiently utilize resources in a low cost manner. However, the small cell size of femtocell networks can result in frequent handovers to the mobile user, and consequently throughput degradation. Thus, in this paper, we propose predictive association control schemes to improve the system's effective throughput. Our design focuses on reducing handover frequency without impacting on throughput. The proposed schemes determine handover decisions that contribute most to the network throughput and are proper for distributed implementations. The simulation results show significant gains compared with existing methods in terms of handover frequency and network throughput perspective.
Bond graph modelling of multibody dynamics and its symbolic scheme
NASA Astrophysics Data System (ADS)
Kawase, Takehiko; Yoshimura, Hiroaki
A bond graph method of modeling multibody dynamics is demonstrated. Specifically, a symbolic generation scheme which fully utilizes the bond graph information is presented. It is also demonstrated that structural understanding and representation in bond graph theory is quite powerful for the modeling of such large scale systems, and that the nonenergic multiport of junction structure, which is a multiport expression of the system structure, plays an important role, as first suggested by Paynter. The principal part of the proposed symbolic scheme, that is, the elimination of excess variables, is done through tearing and interconnection in the sense of Kron using newly defined causal and causal coefficient arrays.
An Efficient Scheme of Quantum Wireless Multi-hop Communication using Coefficient Matrix
NASA Astrophysics Data System (ADS)
Zhao, Bei; Zha, Xin-Wei; Duan, Ya-Jun; Sun, Xin-Mei
2015-08-01
By defining the coefficient matrix, a new quantum teleportation scheme in quantum wireless multi-hop network is proposed. With the help of intermediate nodes, an unknown qubit state can be teleported between two distant nodes which do not share entanglement in advance. Arbitrary Bell pairs and entanglement swapping are utilized for establishing quantum channel among intermediate nodes. Using collapsed matrix, the initial quantum state can be perfectly recovered at the destination.
Fast Initialization of Bubble-Memory Systems
NASA Technical Reports Server (NTRS)
Looney, K. T.; Nichols, C. D.; Hayes, P. J.
1986-01-01
Improved scheme several orders of magnitude faster than normal initialization scheme. State-of-the-art commercial bubble-memory device used. Hardware interface designed connects controlling microprocessor to bubblememory circuitry. System software written to exercise various functions of bubble-memory system in comparison made between normal and fast techniques. Future implementations of approach utilize E2PROM (electrically-erasable programable read-only memory) to provide greater system flexibility. Fastinitialization technique applicable to all bubble-memory devices.
Extraction of Xenon Using Enriching Reflux Pressure Swing Adsorption
2010-09-01
collection scheme aimed at preconcentrating xenon without the use of any form of cooling. The collection scheme utilizes activated charcoal (AC), a... collection efficiency for a given trap size. For a given isothermal system, it can be seen that if adsorption occurs at high pressure, where capacity is... activated charcoal at room temperature. These results are presented below and show that these early tests appear very promising and that useful quantities
LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica
NASA Astrophysics Data System (ADS)
Caprio, M. A.
2005-09-01
LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.
Peculiarities of CO2 sequestration in the Permafrost area
NASA Astrophysics Data System (ADS)
Guryeva, Olga; Chuvilin, Evgeny; Moudrakovski, Igor; Lu, Hailong; Ripmeester, John; Istomin, Vladimir
2010-05-01
Natural gas and gas-condensate accumulations in North of Western Siberia contain an admixture of CO2 (about 0.5-1.0 mol.%). Recently, the development and transportation of natural gas in the Yamal peninsula has become of interest to Russian scientists. They suggest liquifaction of natural gas followed by delivery to consumers using icebreaking tankers. The technique of gas liquefaction requires CO2 to be absent from natural gas, and therefore the liquefaction technology includes the amine treatment of gas. This then leads to a problem with utilization of recovered CO2. It is important to note, that gas reservoirs in the northern part of Russia are situated within the Permafrost zone. The thickness of frozen sediment reaches 500 meters. That is why one of the promising places for CO2 storage can be gas-permeable collectors in under-permafrost horizons. The favorable factors for preserving CO2 in these places are as follows: low permeability of overlying frozen sediments, low temperatures, the existence of a CO2 hydrate stability zone, and the possibility of sequestration at shallow depths (less then 800-1000 meters). When CO2 (in liquid or gas phase) is pumped into the under-permafrost collectors it is possible that some CO2 migrates towards the hydrate stability zone and hydrate-saturated horizons can be formed. This can result on the one hand in the increase of effective capacity of the collector, and on the other hand, in the increase of isolating properties of cap rock. Therefore, CO2 injection sometimes can be performed without a good cap rock. In connection with the abovementioned, to elaborate an effective technology for CO2 injection it is necessary to perform a comprehensive experimental investigation with computer simulation of different utilization schemes, including the process of CO2 hydrate formation in porous media. There are two possible schemes of hydrate formation in pore medium of sediments: from liquid CO2 or the gas. The pore water in the sediment may be either in frozen or liquid states. To study these processes, an experimental investigation of hydrate formation kinetics from liquid and gaseous CO2 has been performed using the method of NMR imaging*. Experiments were made with samples of quartz sand (particles' diameter 0,21-0,297mm) with different water saturation in the range of temperatures between -3 and +8oC and pressures between 3 and 6 MPa. The experiments performed revealed the main regularities of hydrate accumulation from liquid CO2 in sediment. The influence of temperature on the rate of pore hydrate growth was analyzed. For example, the rate of hydrate growth at +7.2oC was 6 times smaller then at -3 оС. Fast hydrate formation from liquid CO2 was observed in sand samples with water saturation below 20-30%. With an increase in water saturation to 50%, the rate of hydrate formation decreased significantly, and when water saturation was 60% or more, nucleation was not observed during the time of the experiment (1-3 days). Experimental results revealed that pressure variation in the range between 4 and 6 MPa does not have any influence on the kinetics of hydrate formation from liquid CO2. Comparison of kinetics of hydrate formation from liquid and gas CO2 showed that hydrate accumulation is faster from gas CO2 then from liquid CO2. Thus, 50% of pore water that reacted with liquid CO2 transformed into hydrate in 0.8 hours after nucleation, and when reacted with CO2-gas, it transformed in 0.3 hours. The completed experiments allowed us to consider the peculiarities of hydrate formation and filtration of liquid and gaseous CO2 towards the hydrate stability zone, which is important to take into account during the elaboration of industrial techniques of CO2 injection in under-permafrost collectors. * Experiments have been made in the laboratory of NRC of Canada.
Cryptography Would Reveal Alterations In Photographs
NASA Technical Reports Server (NTRS)
Friedman, Gary L.
1995-01-01
Public-key decryption method proposed to guarantee authenticity of photographic images represented in form of digital files. In method, digital camera generates original data from image in standard public format; also produces coded signature to verify standard-format image data. Scheme also helps protect against other forms of lying, such as attaching false captions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Varandas, A. J. C., E-mail: varandas@uc.pt; Departamento de Física, Universidade Federal do Espírito Santo, 29075-910 Vitória; Pansini, F. N. N.
2014-12-14
A method previously suggested to calculate the correlation energy at the complete one-electron basis set limit by reassignment of the basis hierarchical numbers and use of the unified singlet- and triplet-pair extrapolation scheme is applied to a test set of 106 systems, some with up to 48 electrons. The approach is utilized to obtain extrapolated correlation energies from raw values calculated with second-order Møller-Plesset perturbation theory and the coupled-cluster singles and doubles excitations method, some of the latter also with the perturbative triples corrections. The calculated correlation energies have also been used to predict atomization energies within an additive scheme.more » Good agreement is obtained with the best available estimates even when the (d, t) pair of hierarchical numbers is utilized to perform the extrapolations. This conceivably justifies that there is no strong reason to exclude double-zeta energies in extrapolations, especially if the basis is calibrated to comply with the theoretical model.« less
An Energy Saving Green Plug Device for Nonlinear Loads
NASA Astrophysics Data System (ADS)
Bloul, Albe; Sharaf, Adel; El-Hawary, Mohamed
2018-03-01
The paper presents a low cost a FACTS Based flexible fuzzy logic based modulated/switched tuned arm filter and Green Plug compensation (SFC-GP) scheme for single-phase nonlinear loads ensuring both voltage stabilization and efficient energy utilization. The new Green Plug-Switched filter compensator SFC modulated LC-Filter PWM Switched Capacitive Compensation Devices is controlled using a fuzzy logic regulator to enhance power quality, improve power factor at the source and reduce switching transients and inrush current conditions as well harmonic contents in source current. The FACTS based SFC-GP Device is a member of family of Green Plug/Filters/Compensation Schemes used for efficient energy utilization, power quality enhancement and voltage/inrush current/soft starting control using a dynamic error driven fuzzy logic controller (FLC). The device with fuzzy logic controller is validated using the Matlab / Simulink Software Environment for enhanced power quality (PQ), improved power factor and reduced inrush currents. This is achieved using modulated PWM Switching of the Filter-Capacitive compensation scheme to cope with dynamic type nonlinear and inrush cyclical loads..
An Object-Oriented Serial DSMC Simulation Package
NASA Astrophysics Data System (ADS)
Liu, Hongli; Cai, Chunpei
2011-05-01
A newly developed three-dimensional direct simulation Monte Carlo (DSMC) simulation package, named GRASP ("Generalized Rarefied gAs Simulation Package"), is reported in this paper. This package utilizes the concept of simulation engine, many C++ features and software design patterns. The package has an open architecture which can benefit further development and maintenance of the code. In order to reduce the engineering time for three-dimensional models, a hybrid grid scheme, combined with a flexible data structure compiled by C++ language, are implemented in this package. This scheme utilizes a local data structure based on the computational cell to achieve high performance on workstation processors. This data structure allows the DSMC algorithm to be very efficiently parallelized with domain decomposition and it provides much flexibility in terms of grid types. This package can utilize traditional structured, unstructured or hybrid grids within the framework of a single code to model arbitrarily complex geometries and to simulate rarefied gas flows. Benchmark test cases indicate that this package has satisfactory accuracy for complex rarefied gas flows.
NASA Technical Reports Server (NTRS)
White, Jeffrey A.; Baurle, Robert A.; Fisher, Travis C.; Quinlan, Jesse R.; Black, William S.
2012-01-01
The 2nd-order upwind inviscid flux scheme implemented in the multi-block, structured grid, cell centered, finite volume, high-speed reacting flow code VULCAN has been modified to reduce numerical dissipation. This modification was motivated by the desire to improve the codes ability to perform large eddy simulations. The reduction in dissipation was accomplished through a hybridization of non-dissipative and dissipative discontinuity-capturing advection schemes that reduces numerical dissipation while maintaining the ability to capture shocks. A methodology for constructing hybrid-advection schemes that blends nondissipative fluxes consisting of linear combinations of divergence and product rule forms discretized using 4th-order symmetric operators, with dissipative, 3rd or 4th-order reconstruction based upwind flux schemes was developed and implemented. A series of benchmark problems with increasing spatial and fluid dynamical complexity were utilized to examine the ability of the candidate schemes to resolve and propagate structures typical of turbulent flow, their discontinuity capturing capability and their robustness. A realistic geometry typical of a high-speed propulsion system flowpath was computed using the most promising of the examined schemes and was compared with available experimental data to demonstrate simulation fidelity.
Zhu, Jane M; Zhu, Yiliang; Liu, Rui
2008-11-03
As China re-establishes its health insurance system through various cooperative schemes, little is known about schoolchildren's health insurance. This paper reports findings from a study that examined schoolchildren's insurance coverage, disparities between farmer and non-farmer households, and effects of low-premium cooperative schemes on healthcare access and utilization. It also discusses barriers to sustainable enrollment and program growth. A survey of elementary school students was conducted in Pinggu, a rural/suburban district of Beijing. Statistical analyses of association and adjusted odds ratio via logistic regression were conducted to examine various aspects of health insurance. Children's health insurance coverage rose to 54% by 2005, the rates are comparable for farmers' and non-farmer's children. However, 76% of insured farmers' children were covered under a low-premium scheme protecting only major medical events, compared to 42% among insured non-farmers' children. The low-premium schemes improved parental perceptions of children's access to and affordability of healthcare, their healthcare-seeking behaviors, and overall satisfaction with healthcare, but had little impact on utilization of outpatient care. Enrolling and retaining schoolchildren in health insurance are threatened by the limited tangible value for routine care and low reimbursement rate for major medical events under the low-premium cooperative schemes. Coverage rates may be improved by offering complimentary and supplementary benefit options with flexible premiums via a multi-tier system consisting of national, regional, and commercial programs. Health insurance education by means of community outreach can reinforce positive parental perceptions, hence promoting and retaining insurance enrollment in short-term.
NASA Astrophysics Data System (ADS)
Wang, Jinlong; Feng, Shuo; Wu, Qihui; Zheng, Xueqiang; Xu, Yuhua; Ding, Guoru
2014-12-01
Cognitive radio (CR) is a promising technology that brings about remarkable improvement in spectrum utilization. To tackle the hidden terminal problem, cooperative spectrum sensing (CSS) which benefits from the spatial diversity has been studied extensively. Since CSS is vulnerable to the attacks initiated by malicious secondary users (SUs), several secure CSS schemes based on Dempster-Shafer theory have been proposed. However, the existing works only utilize the current difference of SUs, such as the difference in SNR or similarity degree, to evaluate the trustworthiness of each SU. As the current difference is only one-sided and sometimes inaccurate, the statistical information contained in each SU's historical behavior should not be overlooked. In this article, we propose a robust CSS scheme based on Dempster-Shafer theory and trustworthiness degree calculation. It is carried out in four successive steps, which are basic probability assignment (BPA), trustworthiness degree calculation, selection and adjustment of BPA, and combination by Dempster-Shafer rule, respectively. Our proposed scheme evaluates the trustworthiness degree of SUs from both current difference aspect and historical behavior aspect and exploits Dempster-Shafer theory's potential to establish a `soft update' approach for the reputation value maintenance. It can not only differentiate malicious SUs from honest ones based on their historical behaviors but also reserve the current difference for each SU to achieve a better real-time performance. Abundant simulation results have validated that the proposed scheme outperforms the existing ones under the impact of different attack patterns and different number of malicious SUs.
A fast CT reconstruction scheme for a general multi-core PC.
Zeng, Kai; Bai, Erwei; Wang, Ge
2007-01-01
Expensive computational cost is a severe limitation in CT reconstruction for clinical applications that need real-time feedback. A primary example is bolus-chasing computed tomography (CT) angiography (BCA) that we have been developing for the past several years. To accelerate the reconstruction process using the filtered backprojection (FBP) method, specialized hardware or graphics cards can be used. However, specialized hardware is expensive and not flexible. The graphics processing unit (GPU) in a current graphic card can only reconstruct images in a reduced precision and is not easy to program. In this paper, an acceleration scheme is proposed based on a multi-core PC. In the proposed scheme, several techniques are integrated, including utilization of geometric symmetry, optimization of data structures, single-instruction multiple-data (SIMD) processing, multithreaded computation, and an Intel C++ compilier. Our scheme maintains the original precision and involves no data exchange between the GPU and CPU. The merits of our scheme are demonstrated in numerical experiments against the traditional implementation. Our scheme achieves a speedup of about 40, which can be further improved by several folds using the latest quad-core processors.
Pilot-multiplexed continuous-variable quantum key distribution with a real local oscillator
NASA Astrophysics Data System (ADS)
Wang, Tao; Huang, Peng; Zhou, Yingming; Liu, Weiqi; Zeng, Guihua
2018-01-01
We propose a pilot-multiplexed continuous-variable quantum key distribution (CVQKD) scheme based on a local local oscillator (LLO). Our scheme utilizes time-multiplexing and polarization-multiplexing techniques to dramatically isolate the quantum signal from the pilot, employs two heterodyne detectors to separately detect the signal and the pilot, and adopts a phase compensation method to almost eliminate the multifrequency phase jitter. In order to analyze the performance of our scheme, a general LLO noise model is constructed. Besides the phase noise and the modulation noise, the photon-leakage noise from the reference path and the quantization noise due to the analog-to-digital converter (ADC) are also considered, which are first analyzed in the LLO regime. Under such general noise model, our scheme has a higher key rate and longer secure distance compared with the preexisting LLO schemes. Moreover, we also conduct an experiment to verify our pilot-multiplexed scheme. Results show that it maintains a low level of the phase noise and is expected to obtain a 554-Kbps secure key rate within a 15-km distance under the finite-size effect.
A Fast CT Reconstruction Scheme for a General Multi-Core PC
Zeng, Kai; Bai, Erwei; Wang, Ge
2007-01-01
Expensive computational cost is a severe limitation in CT reconstruction for clinical applications that need real-time feedback. A primary example is bolus-chasing computed tomography (CT) angiography (BCA) that we have been developing for the past several years. To accelerate the reconstruction process using the filtered backprojection (FBP) method, specialized hardware or graphics cards can be used. However, specialized hardware is expensive and not flexible. The graphics processing unit (GPU) in a current graphic card can only reconstruct images in a reduced precision and is not easy to program. In this paper, an acceleration scheme is proposed based on a multi-core PC. In the proposed scheme, several techniques are integrated, including utilization of geometric symmetry, optimization of data structures, single-instruction multiple-data (SIMD) processing, multithreaded computation, and an Intel C++ compilier. Our scheme maintains the original precision and involves no data exchange between the GPU and CPU. The merits of our scheme are demonstrated in numerical experiments against the traditional implementation. Our scheme achieves a speedup of about 40, which can be further improved by several folds using the latest quad-core processors. PMID:18256731
A voting-based star identification algorithm utilizing local and global distribution
NASA Astrophysics Data System (ADS)
Fan, Qiaoyun; Zhong, Xuyang; Sun, Junhua
2018-03-01
A novel star identification algorithm based on voting scheme is presented in this paper. In the proposed algorithm, the global distribution and local distribution of sensor stars are fully utilized, and the stratified voting scheme is adopted to obtain the candidates for sensor stars. The database optimization is employed to reduce its memory requirement and improve the robustness of the proposed algorithm. The simulation shows that the proposed algorithm exhibits 99.81% identification rate with 2-pixel standard deviations of positional noises and 0.322-Mv magnitude noises. Compared with two similar algorithms, the proposed algorithm is more robust towards noise, and the average identification time and required memory is less. Furthermore, the real sky test shows that the proposed algorithm performs well on the real star images.
Limited effect of anthropogenic nitrogen oxides on secondary organic aerosol formation
NASA Astrophysics Data System (ADS)
Zheng, Y.; Unger, N.; Hodzic, A.; Emmons, L.; Knote, C.; Tilmes, S.; Lamarque, J.-F.; Yu, P.
2015-12-01
Globally, secondary organic aerosol (SOA) is mostly formed from emissions of biogenic volatile organic compounds (VOCs) by vegetation, but it can be modified by human activities as demonstrated in recent research. Specifically, nitrogen oxides (NOx = NO + NO2) have been shown to play a critical role in the chemical formation of low volatility compounds. We have updated the SOA scheme in the global NCAR (National Center for Atmospheric Research) Community Atmospheric Model version 4 with chemistry (CAM4-chem) by implementing a 4-product volatility basis set (VBS) scheme, including NOx-dependent SOA yields and aging parameterizations. Small differences are found for the no-aging VBS and 2-product schemes; large increases in SOA production and the SOA-to-OA ratio are found for the aging scheme. The predicted organic aerosol amounts capture both the magnitude and distribution of US surface annual mean measurements from the Interagency Monitoring of Protected Visual Environments (IMPROVE) network by 50 %, and the simulated vertical profiles are within a factor of 2 compared to aerosol mass spectrometer (AMS) measurements from 13 aircraft-based field campaigns across different regions and seasons. We then perform sensitivity experiments to examine how the SOA loading responds to a 50 % reduction in anthropogenic nitric oxide (NO) emissions in different regions. We find limited SOA reductions of 0.9-5.6, 6.4-12.0 and 0.9-2.8 % for global, southeast US and Amazon NOx perturbations, respectively. The fact that SOA formation is almost unaffected by changes in NOx can be largely attributed to a limited shift in chemical regime, to buffering in chemical pathways (low- and high-NOx pathways, O3 versus NO3-initiated oxidation) and to offsetting tendencies in the biogenic versus anthropogenic SOA responses.
NASA Astrophysics Data System (ADS)
Zhang, Yutao
2017-04-01
The effects of the different planetary boundary layer (PBL) processes on the secondary eyewall formation (SEF) and eyewall replacement cycle (ERC) in Typhoon Sinlaku (2008) are investigated by using the Weather Research and Forecasting Model (WRF) with six different PBL schemes. The SEF and ERC have been successfully simulated with all the six PBL schemes and the mechanism of the SEF and ERC proposed in our previous study has been reconfirmed: It is demonstrated that both the intensification of the storm and the inward-moving outer spiral rainband contribute to the SEF. After the SEF, the associated diabatic heating enhances the secondary eyewall further and transfer of the moist air from outer region to the primary eyewall is cut off by the secondary eyewall. In such a way the primary eyewall dies and an ERC completes. It is found that some simulated features of the SEF and ERC, such as the time and location of the SEF and duration of the ERC, do vary from one simulation to another. In order to describe the feature of the SEF and ERC quantitatively, a concentric eyewall index (CEI) is defined and a threshold of the CEI is suggested to determine the onset of the secondary eyewall. The differences of the simulated SEF and ERC are discussed and some possible causes are suggested. In addition, based on the threshold of the CEI and the conservation law of the angular momentum a formula to predict the location of the SEF is also suggested and applied to all the six simulations. The success and failure of the formula are also discussed. Key words: eye-wall replacement cycle, secondary eye-wall formation, PBL scheme, CEI
NASA Technical Reports Server (NTRS)
Shyy, W.; Thakur, S.; Udaykumar, H. S.
1993-01-01
A high accuracy convection scheme using a sequential solution technique has been developed and applied to simulate the longitudinal combustion instability and its active control. The scheme has been devised in the spirit of the Total Variation Diminishing (TVD) concept with special source term treatment. Due to the substantial heat release effect, a clear delineation of the key elements employed by the scheme, i.e., the adjustable damping factor and the source term treatment has been made. By comparing with the first-order upwind scheme previously utilized, the present results exhibit less damping and are free from spurious oscillations, offering improved quantitative accuracy while confirming the spectral analysis reported earlier. A simple feedback type of active control has been found to be capable of enhancing or attenuating the magnitude of the combustion instability.
Enabling an Integrated Rate-temporal Learning Scheme on Memristor
NASA Astrophysics Data System (ADS)
He, Wei; Huang, Kejie; Ning, Ning; Ramanathan, Kiruthika; Li, Guoqi; Jiang, Yu; Sze, Jiayin; Shi, Luping; Zhao, Rong; Pei, Jing
2014-04-01
Learning scheme is the key to the utilization of spike-based computation and the emulation of neural/synaptic behaviors toward realization of cognition. The biological observations reveal an integrated spike time- and spike rate-dependent plasticity as a function of presynaptic firing frequency. However, this integrated rate-temporal learning scheme has not been realized on any nano devices. In this paper, such scheme is successfully demonstrated on a memristor. Great robustness against the spiking rate fluctuation is achieved by waveform engineering with the aid of good analog properties exhibited by the iron oxide-based memristor. The spike-time-dependence plasticity (STDP) occurs at moderate presynaptic firing frequencies and spike-rate-dependence plasticity (SRDP) dominates other regions. This demonstration provides a novel approach in neural coding implementation, which facilitates the development of bio-inspired computing systems.
Bi-orthogonal Symbol Mapping and Detection in Optical CDMA Communication System
NASA Astrophysics Data System (ADS)
Liu, Maw-Yang
2017-12-01
In this paper, the bi-orthogonal symbol mapping and detection scheme is investigated in time-spreading wavelength-hopping optical CDMA communication system. The carrier-hopping prime code is exploited as signature sequence, whose put-of-phase autocorrelation is zero. Based on the orthogonality of carrier-hopping prime code, the equal weight orthogonal signaling scheme can be constructed, and the proposed scheme using bi-orthogonal symbol mapping and detection can be developed. The transmitted binary data bits are mapped into corresponding bi-orthogonal symbols, where the orthogonal matrix code and its complement are utilized. In the receiver, the received bi-orthogonal data symbol is fed into the maximum likelihood decoder for detection. Under such symbol mapping and detection, the proposed scheme can greatly enlarge the Euclidean distance; hence, the system performance can be drastically improved.
Rate-distortion optimized tree-structured compression algorithms for piecewise polynomial images.
Shukla, Rahul; Dragotti, Pier Luigi; Do, Minh N; Vetterli, Martin
2005-03-01
This paper presents novel coding algorithms based on tree-structured segmentation, which achieve the correct asymptotic rate-distortion (R-D) behavior for a simple class of signals, known as piecewise polynomials, by using an R-D based prune and join scheme. For the one-dimensional case, our scheme is based on binary-tree segmentation of the signal. This scheme approximates the signal segments using polynomial models and utilizes an R-D optimal bit allocation strategy among the different signal segments. The scheme further encodes similar neighbors jointly to achieve the correct exponentially decaying R-D behavior (D(R) - c(o)2(-c1R)), thus improving over classic wavelet schemes. We also prove that the computational complexity of the scheme is of O(N log N). We then show the extension of this scheme to the two-dimensional case using a quadtree. This quadtree-coding scheme also achieves an exponentially decaying R-D behavior, for the polygonal image model composed of a white polygon-shaped object against a uniform black background, with low computational cost of O(N log N). Again, the key is an R-D optimized prune and join strategy. Finally, we conclude with numerical results, which show that the proposed quadtree-coding scheme outperforms JPEG2000 by about 1 dB for real images, like cameraman, at low rates of around 0.15 bpp.
Xu, Yixuan; Chen, Xi; Liu, Anfeng; Hu, Chunhua
2017-01-01
Using mobile vehicles as “data mules” to collect data generated by a huge number of sensing devices that are widely spread across smart city is considered to be an economical and effective way of obtaining data about smart cities. However, currently most research focuses on the feasibility of the proposed methods instead of their final performance. In this paper, a latency and coverage optimized data collection (LCODC) scheme is proposed to collect data on smart cities through opportunistic routing. Compared with other schemes, the efficiency of data collection is improved since the data flow in LCODC scheme consists of not only vehicle to device transmission (V2D), but also vehicle to vehicle transmission (V2V). Besides, through data mining on patterns hidden in the smart city, waste and redundancy in the utilization of public resources are mitigated, leading to the easy implementation of our scheme. In detail, no extra supporting device is needed in the LCODC scheme to facilitate data transmission. A large-scale and real-world dataset on Beijing is used to evaluate the LCODC scheme. Results indicate that with very limited costs, the LCODC scheme enables the average latency to decrease from several hours to around 12 min with respect to schemes where V2V transmission is disabled while the coverage rate is able to reach over 30%. PMID:28420218
Xu, Yixuan; Chen, Xi; Liu, Anfeng; Hu, Chunhua
2017-04-18
Using mobile vehicles as "data mules" to collect data generated by a huge number of sensing devices that are widely spread across smart city is considered to be an economical and effective way of obtaining data about smart cities. However, currently most research focuses on the feasibility of the proposed methods instead of their final performance. In this paper, a latency and coverage optimized data collection (LCODC) scheme is proposed to collect data on smart cities through opportunistic routing. Compared with other schemes, the efficiency of data collection is improved since the data flow in LCODC scheme consists of not only vehicle to device transmission (V2D), but also vehicle to vehicle transmission (V2V). Besides, through data mining on patterns hidden in the smart city, waste and redundancy in the utilization of public resources are mitigated, leading to the easy implementation of our scheme. In detail, no extra supporting device is needed in the LCODC scheme to facilitate data transmission. A large-scale and real-world dataset on Beijing is used to evaluate the LCODC scheme. Results indicate that with very limited costs, the LCODC scheme enables the average latency to decrease from several hours to around 12 min with respect to schemes where V2V transmission is disabled while the coverage rate is able to reach over 30%.
Automatic rendezvous and docking systems functional and performance requirements
NASA Technical Reports Server (NTRS)
1985-01-01
A generalized mission design scheme which utilizes a standard mission profile for all OMV rendezvous operations, recognizes typical operational constraints, and minimizes propellant penalties due to nodal regression effects was developed. This scheme has been used to demonstrate a unified guidance and navigation maneuver processor (the UMP), which supports all mission phases through station-keeping. The initial demonstration version of the Orbital Rendezvous Mission Planner (ORMP) was provided for evaluation purposes, and program operation was discussed.
Biometrics based authentication scheme for session initiation protocol.
Xie, Qi; Tang, Zhixiong
2016-01-01
Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.
Consumer-based technology for distribution of surgical videos for objective evaluation.
Gonzalez, Ray; Martinez, Jose M; Lo Menzo, Emanuele; Iglesias, Alberto R; Ro, Charles Y; Madan, Atul K
2012-08-01
The Global Operative Assessment of Laparoscopic Skill (GOALS) is one validated metric utilized to grade laparoscopic skills and has been utilized to score recorded operative videos. To facilitate easier viewing of these recorded videos, we are developing novel techniques to enable surgeons to view these videos. The objective of this study is to determine the feasibility of utilizing widespread current consumer-based technology to assist in distributing appropriate videos for objective evaluation. Videos from residents were recorded via a direct connection from the camera processor via an S-video output via a cable into a hub to connect to a standard laptop computer via a universal serial bus (USB) port. A standard consumer-based video editing program was utilized to capture the video and record in appropriate format. We utilized mp4 format, and depending on the size of the file, the videos were scaled down (compressed), their format changed (using a standard video editing program), or sliced into multiple videos. Standard available consumer-based programs were utilized to convert the video into a more appropriate format for handheld personal digital assistants. In addition, the videos were uploaded to a social networking website and video sharing websites. Recorded cases of laparoscopic cholecystectomy in a porcine model were utilized. Compression was required for all formats. All formats were accessed from home computers, work computers, and iPhones without difficulty. Qualitative analyses by four surgeons demonstrated appropriate quality to grade for these formats. Our preliminary results show promise that, utilizing consumer-based technology, videos can be easily distributed to surgeons to grade via GOALS via various methods. Easy accessibility may help make evaluation of resident videos less complicated and cumbersome.
Reliable video transmission over fading channels via channel state estimation
NASA Astrophysics Data System (ADS)
Kumwilaisak, Wuttipong; Kim, JongWon; Kuo, C.-C. Jay
2000-04-01
Transmission of continuous media such as video over time- varying wireless communication channels can benefit from the use of adaptation techniques in both source and channel coding. An adaptive feedback-based wireless video transmission scheme is investigated in this research with special emphasis on feedback-based adaptation. To be more specific, an interactive adaptive transmission scheme is developed by letting the receiver estimate the channel state information and send it back to the transmitter. By utilizing the feedback information, the transmitter is capable of adapting the level of protection by changing the flexible RCPC (rate-compatible punctured convolutional) code ratio depending on the instantaneous channel condition. The wireless channel is modeled as a fading channel, where the long-term and short- term fading effects are modeled as the log-normal fading and the Rayleigh flat fading, respectively. Then, its state (mainly the long term fading portion) is tracked and predicted by using an adaptive LMS (least mean squares) algorithm. By utilizing the delayed feedback on the channel condition, the adaptation performance of the proposed scheme is first evaluated in terms of the error probability and the throughput. It is then extended to incorporate variable size packets of ITU-T H.263+ video with the error resilience option. Finally, the end-to-end performance of wireless video transmission is compared against several non-adaptive protection schemes.
NASA Astrophysics Data System (ADS)
Nakamura, Hirotaka; Suzuki, Hiro; Kani, Jun-Ichi; Iwatsuki, Katsumi
2006-05-01
This paper proposes and demonstrates a reliable wide-area wavelength-division-multiplexing passive optical network (WDM-PON) with a wavelength-shifted protection scheme. This protection scheme utilizes the cyclic property of 2 × N athermal arrayed-waveguide grating and two kinds of wavelength allocations, each of which is assigned for working and protection, respectively. Compared with conventional protection schemes, this scheme does not need a 3-dB optical coupler, thus leading to ensure the large loss budget that is suited for wide-area WDM-PONs. It also features a passive access node and does not have a protection function in the optical network unit (ONU). The feasibility of the proposed scheme is experimentally confirmed by the carrier-distributed WDM-PON with gigabit Ethernet interface (GbE-IF) and 10-GbE-IF, in which the ONU does not employ a light source, and all wavelengths for upstream signals are centralized and distributed from the central office.
NASA Astrophysics Data System (ADS)
Liu, Deyang; An, Ping; Ma, Ran; Yang, Chao; Shen, Liquan; Li, Kai
2016-07-01
Three-dimensional (3-D) holoscopic imaging, also known as integral imaging, light field imaging, or plenoptic imaging, can provide natural and fatigue-free 3-D visualization. However, a large amount of data is required to represent the 3-D holoscopic content. Therefore, efficient coding schemes for this particular type of image are needed. A 3-D holoscopic image coding scheme with kernel-based minimum mean square error (MMSE) estimation is proposed. In the proposed scheme, the coding block is predicted by an MMSE estimator under statistical modeling. In order to obtain the signal statistical behavior, kernel density estimation (KDE) is utilized to estimate the probability density function of the statistical modeling. As bandwidth estimation (BE) is a key issue in the KDE problem, we also propose a BE method based on kernel trick. The experimental results demonstrate that the proposed scheme can achieve a better rate-distortion performance and a better visual rendering quality.
OSLG: A new granting scheme in WDM Ethernet passive optical networks
NASA Astrophysics Data System (ADS)
Razmkhah, Ali; Rahbar, Akbar Ghaffarpour
2011-12-01
Several granting schemes have been proposed to grant transmission window and dynamic bandwidth allocation (DBA) in passive optical networks (PON). Generally, granting schemes suffer from bandwidth wastage of granted windows. Here, we propose a new granting scheme for WDM Ethernet PONs, called optical network unit (ONU) Side Limited Granting (OSLG) that conserves upstream bandwidth, thus resulting in decreasing queuing delay and packet drop ratio. In OSLG instead of optical line terminal (OLT), each ONU determines its transmission window. Two OSLG algorithms are proposed in this paper: the OSLG_GA algorithm that determines the size of its transmission window in such a way that the bandwidth wastage problem is relieved, and the OSLG_SC algorithm that saves unused bandwidth for more bandwidth utilization later on. The OSLG can be used as granting scheme of any DBA to provide better performance in the terms of packet drop ratio and queuing delay. Our performance evaluations show the effectiveness of OSLG in reducing packet drop ratio and queuing delay under different DBA techniques.
Studies in integrated line-and packet-switched computer communication systems
NASA Astrophysics Data System (ADS)
Maglaris, B. S.
1980-06-01
The problem of efficiently allocating the bandwidth of a trunk to both types of traffic is handled for various system and traffic models. A performance analysis is carried out both for variable and fixed frame schemes. It is shown that variable frame schemes, adjusting the frame length according to the traffic variations, offer better trunk utilization at the cost of the additional hardware and software complexity needed because of the lack of synchronization. An optimization study on the fixed frame schemes follows. The problem of dynamically allocating the fixed frame to both types of traffic is formulated as a Markovian Decision process. It is shown that the movable boundary scheme, suggested for commercial implementations of integrated multiplexors, offers optimal or near optimal performance and simplicity of implementation. Finally, the behavior of the movable boundary integrated scheme is studied for tandem link connections. Under the assumptions made for the line-switched traffic, the forward allocation technique is found to offer the best alternative among different path set-up strategies.
A Model-Free Scheme for Meme Ranking in Social Media.
He, Saike; Zheng, Xiaolong; Zeng, Daniel
2016-01-01
The prevalence of social media has greatly catalyzed the dissemination and proliferation of online memes (e.g., ideas, topics, melodies, tags, etc.). However, this information abundance is exceeding the capability of online users to consume it. Ranking memes based on their popularities could promote online advertisement and content distribution. Despite such importance, few existing work can solve this problem well. They are either daunted by unpractical assumptions or incapability of characterizing dynamic information. As such, in this paper, we elaborate a model-free scheme to rank online memes in the context of social media. This scheme is capable to characterize the nonlinear interactions of online users, which mark the process of meme diffusion. Empirical studies on two large-scale, real-world datasets (one in English and one in Chinese) demonstrate the effectiveness and robustness of the proposed scheme. In addition, due to its fine-grained modeling of user dynamics, this ranking scheme can also be utilized to explain meme popularity through the lens of social influence.
A Model-Free Scheme for Meme Ranking in Social Media
He, Saike; Zheng, Xiaolong; Zeng, Daniel
2015-01-01
The prevalence of social media has greatly catalyzed the dissemination and proliferation of online memes (e.g., ideas, topics, melodies, tags, etc.). However, this information abundance is exceeding the capability of online users to consume it. Ranking memes based on their popularities could promote online advertisement and content distribution. Despite such importance, few existing work can solve this problem well. They are either daunted by unpractical assumptions or incapability of characterizing dynamic information. As such, in this paper, we elaborate a model-free scheme to rank online memes in the context of social media. This scheme is capable to characterize the nonlinear interactions of online users, which mark the process of meme diffusion. Empirical studies on two large-scale, real-world datasets (one in English and one in Chinese) demonstrate the effectiveness and robustness of the proposed scheme. In addition, due to its fine-grained modeling of user dynamics, this ranking scheme can also be utilized to explain meme popularity through the lens of social influence. PMID:26823638
Weymuller, E A
1997-12-01
A Strategic Planning Conference (jointly supported by NCI and NIDCD) was convened to consider potential improvements in surgical patient data for multi-institutional trials. The thesis underlying this project is that inadequacies in staging, pretreatment patient stratification, and the details of surgical resection may have obscured the detection of treatment effect. The goals of this project were multiple: (1) to consider the utility of new clinical stratification variables, (2) to increase the precision of tumor staging, and (3) to improve operative reporting for multi-institutional trials in head and neck cancer. The conference attendees came to a number of important conclusions: (1) TNM status is inadequate for describing head and neck cancer in a multi-institutional trial setting. A detailed anatomic reporting scheme is proposed; (2) comorbidity measures should be included as patient descriptors, especially those that meet the criteria "definitely important and easy to obtain"; (3) surgical reporting in multi-institutional trials should use a format that is compatible with computer analysis and use the same items as the revised (anatomic) staging system; (4) the surgeon should be personally responsible for data coding and should interact directly with the pathologist in marking the surgical specimen; (5) pathologic reporting should use an anatomic template identical to the staging and operative reporting formats.
Towards a Personal Best: A Case for Introducing Ipsative Assessment in Higher Education
ERIC Educational Resources Information Center
Hughes, Gwyneth
2011-01-01
The central role that assessment plays is recognised in higher education, in particular how formative feedback guides learning. A model for effective feedback practice is used to argue that, in current schemes, formative feedback is often not usable because it is strongly linked to external criteria and standards, rather than to the processes of…
NASA Astrophysics Data System (ADS)
Milani, G.; Hanel, T.; Donetti, R.; Milani, F.
2016-06-01
The paper presents the final results of a comprehensive experimental and numerical analysis aimed at deeply investigating the behavior of Natural Rubber (NR) vulcanized with sulphur in presence of different accelerators during standard rheometer tests. NR in presence of sulphur and two different accelerators (DPG and TBBS) in various concentrations is investigated, changing the curing temperature in the range 150-180°C and obtaining rheometer curves with a step of 10°C. Sulphur-TBBS concentrations considered are 1-1, 1-3, 3-3 and 3-1, with DPG at 1-4 phr respectively. A total of 48 experimental rheometer curves is so obtained. To fit experimental data, the general reaction scheme proposed by Han and co-workers for vulcanized sulphur NR is re-adapted and suitably modified taking into account the single contributions of the different accelerators. Chain reactions initiated by the formation of macro-compounds responsible for the formation of the unmatured crosslinked polymer are accounted for. In presence of two accelerators, reactions are assumed to proceed in parallel, making the practically effective hypothesis that there is no interaction between the two accelerators. From the simplified kinetic scheme adopted, a closed form solution is found for the crosslink density, with the only limitation that the induction period is excluded from computations. For each experimented case on the same blend, reaction kinetic constants provided by the model are utilized to deduce their trend in the Arrhenius space, also outside the temperature range inspected. Rather close linearity is found in the majority of the cases. A comparative analysis is carefully conducted among the constants at the different concentrations of S, TBBS and DPG investigated, allowing a prediction of curing behavior at any vulcanization temperature and with concentrations not experimentally tested, without the need of addition costly experimentation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Milani, G., E-mail: gabriele.milani@polimi.it; Hanel, T.; Donetti, R.
2016-06-08
The paper presents the final results of a comprehensive experimental and numerical analysis aimed at deeply investigating the behavior of Natural Rubber (NR) vulcanized with sulphur in presence of different accelerators during standard rheometer tests. NR in presence of sulphur and two different accelerators (DPG and TBBS) in various concentrations is investigated, changing the curing temperature in the range 150-180°C and obtaining rheometer curves with a step of 10°C. Sulphur-TBBS concentrations considered are 1-1, 1-3, 3-3 and 3-1, with DPG at 1-4 phr respectively. A total of 48 experimental rheometer curves is so obtained. To fit experimental data, the generalmore » reaction scheme proposed by Han and co-workers for vulcanized sulphur NR is re-adapted and suitably modified taking into account the single contributions of the different accelerators. Chain reactions initiated by the formation of macro-compounds responsible for the formation of the unmatured crosslinked polymer are accounted for. In presence of two accelerators, reactions are assumed to proceed in parallel, making the practically effective hypothesis that there is no interaction between the two accelerators. From the simplified kinetic scheme adopted, a closed form solution is found for the crosslink density, with the only limitation that the induction period is excluded from computations. For each experimented case on the same blend, reaction kinetic constants provided by the model are utilized to deduce their trend in the Arrhenius space, also outside the temperature range inspected. Rather close linearity is found in the majority of the cases. A comparative analysis is carefully conducted among the constants at the different concentrations of S, TBBS and DPG investigated, allowing a prediction of curing behavior at any vulcanization temperature and with concentrations not experimentally tested, without the need of addition costly experimentation.« less
Prediction-based association control scheme in dense femtocell networks
Pham, Ngoc-Thai; Huynh, Thong; Hwang, Won-Joo; You, Ilsun; Choo, Kim-Kwang Raymond
2017-01-01
The deployment of large number of femtocell base stations allows us to extend the coverage and efficiently utilize resources in a low cost manner. However, the small cell size of femtocell networks can result in frequent handovers to the mobile user, and consequently throughput degradation. Thus, in this paper, we propose predictive association control schemes to improve the system’s effective throughput. Our design focuses on reducing handover frequency without impacting on throughput. The proposed schemes determine handover decisions that contribute most to the network throughput and are proper for distributed implementations. The simulation results show significant gains compared with existing methods in terms of handover frequency and network throughput perspective. PMID:28328992
Spin-wave utilization in a quantum computer
NASA Astrophysics Data System (ADS)
Khitun, A.; Ostroumov, R.; Wang, K. L.
2001-12-01
We propose a quantum computer scheme using spin waves for quantum-information exchange. We demonstrate that spin waves in the antiferromagnetic layer grown on silicon may be used to perform single-qubit unitary transformations together with two-qubit operations during the cycle of computation. The most attractive feature of the proposed scheme is the possibility of random access to any qubit and, consequently, the ability to recognize two qubit gates between any two distant qubits. Also, spin waves allow us to eliminate the use of a strong external magnetic field and microwave pulses. By estimate, the proposed scheme has as high as 104 ratio between quantum system coherence time and the time of a single computational step.
Sound beam manipulation based on temperature gradients
DOE Office of Scientific and Technical Information (OSTI.GOV)
Qian, Feng; School of Physics & Electronic Engineering, Changshu Institute of Technology, Changshu 215500; Quan, Li
Previous research with temperature gradients has shown the feasibility of controlling airborne sound propagation. Here, we present a temperature gradients based airborne sound manipulation schemes: a cylindrical acoustic omnidirectional absorber (AOA). The proposed AOA has high absorption performance which can almost completely absorb the incident wave. Geometric acoustics is used to obtain the refractive index distributions with different radii, which is then utilized to deduce the desired temperature gradients. Since resonant units are not applied in the scheme, its working bandwidth is expected to be broadband. The scheme is temperature-tuned and easy to realize, which is of potential interest tomore » fields such as noise control or acoustic cloaking.« less
Ethics, law, and commercial surrogacy: a call for uniformity.
Drabiak, Katherine; Wegner, Carole; Fredland, Valita; Helft, Paul R
2007-01-01
In the United States at this time, no uniform federal law exists regarding commercial surrogacy, and state statutory schemes vary vastly, ranging from criminalization to legal recognition with contract enforcement. The authors examine how commercial surrogacy agencies utilize the Internet as a means for attracting parents and surrogates by employing emotional cultural rhetoric. By inducing both parents and surrogates to their jurisdiction, agencies circumvent vast discrepancies in state statutory regulative schemes and create a distinct interstate business, absent an efficient regulatory framework or legal recourse in some circumstances. The authors propose a uniform federal regulatory scheme premised upon regulating interstate business transactions to create accountability and legal remedies for both the parents and the surrogate.
NASA Astrophysics Data System (ADS)
Britt, S.; Tsynkov, S.; Turkel, E.
2018-02-01
We solve the wave equation with variable wave speed on nonconforming domains with fourth order accuracy in both space and time. This is accomplished using an implicit finite difference (FD) scheme for the wave equation and solving an elliptic (modified Helmholtz) equation at each time step with fourth order spatial accuracy by the method of difference potentials (MDP). High-order MDP utilizes compact FD schemes on regular structured grids to efficiently solve problems on nonconforming domains while maintaining the design convergence rate of the underlying FD scheme. Asymptotically, the computational complexity of high-order MDP scales the same as that for FD.
Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Li, Xiong
2015-11-01
The E-health care systems employ IT infrastructure for maximizing health care resources utilization as well as providing flexible opportunities to the remote patient. Therefore, transmission of medical data over any public networks is necessary in health care system. Note that patient authentication including secure data transmission in e-health care system is critical issue. Although several user authentication schemes for accessing remote services are available, their security analysis show that none of them are free from relevant security attacks. We reviewed Das et al.'s scheme and demonstrated their scheme lacks proper protection against several security attacks such as user anonymity, off-line password guessing attack, smart card theft attack, user impersonation attack, server impersonation attack, session key discloser attack. In order to overcome the mentioned security pitfalls, this paper proposes an anonymity preserving remote patient authentication scheme usable in E-health care systems. We then validated the security of the proposed scheme using BAN logic that ensures secure mutual authentication and session key agreement. We also presented the experimental results of the proposed scheme using AVISPA software and the results ensure that our scheme is secure under OFMC and CL-AtSe models. Moreover, resilience of relevant security attacks has been proved through both formal and informal security analysis. The performance analysis and comparison with other schemes are also made, and it has been found that the proposed scheme overcomes the security drawbacks of the Das et al.'s scheme and additionally achieves extra security requirements.
Probabilistic Teleportation of Two-Particle State of General Formation
NASA Astrophysics Data System (ADS)
Yan, Feng-Li; Tan, Hong-Ge; Yang, Lin-Guang
2002-06-01
A scheme for probabilistic teleporting an unknown two-particle state of general formation by partly pure entangled four-particle state is proposed. It is shown that after performing two Bell state measurements, proper unitary transformation and the measurement on an auxiliary qubit, the unknown two-particle state of general formation, which was destroyed at one place, can be reconstructed at another place with certain probability. The project supported by Natural Science Foundation of Hebei Province of China
Gas hydrate suspensions formation and transportation research
NASA Astrophysics Data System (ADS)
Gulkov, A. N.; Gulkova, S.; Zemenkov, Yu D.; Lapshin, V. D.
2018-05-01
An experimental unit for studying the formation of gas hydrate suspensions and their transport properties is considered. The scheme of installation and the basic processes, which can be studied, are described. The results of studies of gas hydrates and a gas hydrate suspension’ formation in an adiabatic process in a stream of seawater are given. The adiabatic method of obtaining gas hydrates and forming gas hydrate suspensions is offered to use. Directions for further research are outlined.
NASA Astrophysics Data System (ADS)
Sharan, Lucky; Agrawal, Vaibhav M.; Chaubey, V. K.
2017-08-01
Higher spectral efficiency and greater data rate per channel are the most cost-effective strategies to meet the exponential demand of data traffic in the optical core network. Multilevel modulation formats being spectrally efficient enhance the transmission capacity by coding information in the amplitude, phase, polarization or a combination of all. This paper presents the design architecture of a 32-channel dense wavelength division multiplexed (DWDM) system, where each channel operates with multi-level phase modulation formats at 40 Gbps. The proposed design has been simulated for 50 GHz channel spacing to numerically compute the performance of both differential phase-shift keying (DPSK) and differential quadrature phase-shift keying (DQPSK) modulation formats in such high-speed DWDM system. The transmission link is analyzed with perfect dispersion compensation and also with under-compensation scheme. The link performance in terms of quality factor (Q) for varying input powers with different dispersion compensation schemes has been evaluated. The simulation study shows significant nonlinear mitigation for both DPSK- and DQPSK-based DWDM systems up to 1,000 km and beyond. It is concluded that at higher power levels DQPSK format having a narrower spectrum shows better tolerance to dispersion and nonlinearities than DPSK format.
Collective phenomena in volume and surface barrier discharges
NASA Astrophysics Data System (ADS)
Kogelschatz, U.
2010-11-01
Barrier discharges are increasingly used as a cost-effective configuration to produce non-equilibrium plasmas at atmospheric pressure. This way, copious amounts of electrons, ions, free radicals and excited species can be generated without significant heating of the background gas. In most applications the barrier is made of dielectric material. Major applications utilizing mainly dielectric barriers include ozone generation, surface cleaning and modification, polymer and textile treatment, sterilization, pollution control, CO2 lasers, excimer lamps, plasma display panels (flat TV screens). More recent research efforts are devoted to biomedical applications and to plasma actuators for flow control. Sinusoidal feeding voltages at various frequencies as well as pulsed excitation schemes are used. Volume as well as surface barrier discharges can exist in the form of filamentary, regularly patterned or diffuse, laterally homogeneous discharges. The physical effects leading to collective phenomena in volume and surface barrier discharges are discussed in detail. Special attention is paid to self-organization of current filaments and pattern formation. Major similarities of the two types of barrier discharges are elaborated.
Kinetics of exciplex formation/dissipation in reaction following Weller Scheme II
NASA Astrophysics Data System (ADS)
Fedorenko, S. G.; Burshtein, A. I.
2014-09-01
Creation of exciplexes from the charged products of photoionization is considered by means of Integral Encounter Theory. The general kinetic equations of such a reaction following the Weller scheme II are developed. The special attention is given to the particular case of irreversible remote ionization of primary excited electron donor. Kinetics of exciplex formation is considered at fast biexponential geminate transformation of exciplexes in cage that gives way to subsequent bulk reaction of equilibrated reaction products controlled by power law recombination of ions. It is shown that the initial geminate stage of exciplex kinetics is observed only in diffusion controlled regime of the reaction and disappears with increasing mobility of ions in passing to kinetic regime. The quantum yield of exciplexes is studied along with their kinetics.
Kinetics of exciplex formation/dissipation in reaction following Weller Scheme II.
Fedorenko, S G; Burshtein, A I
2014-09-21
Creation of exciplexes from the charged products of photoionization is considered by means of Integral Encounter Theory. The general kinetic equations of such a reaction following the Weller scheme II are developed. The special attention is given to the particular case of irreversible remote ionization of primary excited electron donor. Kinetics of exciplex formation is considered at fast biexponential geminate transformation of exciplexes in cage that gives way to subsequent bulk reaction of equilibrated reaction products controlled by power law recombination of ions. It is shown that the initial geminate stage of exciplex kinetics is observed only in diffusion controlled regime of the reaction and disappears with increasing mobility of ions in passing to kinetic regime. The quantum yield of exciplexes is studied along with their kinetics.
Improving transmission efficiency of large sequence alignment/map (SAM) files.
Sakib, Muhammad Nazmus; Tang, Jijun; Zheng, W Jim; Huang, Chin-Tser
2011-01-01
Research in bioinformatics primarily involves collection and analysis of a large volume of genomic data. Naturally, it demands efficient storage and transfer of this huge amount of data. In recent years, some research has been done to find efficient compression algorithms to reduce the size of various sequencing data. One way to improve the transmission time of large files is to apply a maximum lossless compression on them. In this paper, we present SAMZIP, a specialized encoding scheme, for sequence alignment data in SAM (Sequence Alignment/Map) format, which improves the compression ratio of existing compression tools available. In order to achieve this, we exploit the prior knowledge of the file format and specifications. Our experimental results show that our encoding scheme improves compression ratio, thereby reducing overall transmission time significantly.
Reaction schemes visualized in network form: the syntheses of strychnine as an example.
Proudfoot, John R
2013-05-24
Representation of synthesis sequences in a network form provides an effective method for the comparison of multiple reaction schemes and an opportunity to emphasize features such as reaction scale that are often relegated to experimental sections. An example of data formatting that allows construction of network maps in Cytoscape is presented, along with maps that illustrate the comparison of multiple reaction sequences, comparison of scaffold changes within sequences, and consolidation to highlight common key intermediates used across sequences. The 17 different synthetic routes reported for strychnine are used as an example basis set. The reaction maps presented required a significant data extraction and curation, and a standardized tabular format for reporting reaction information, if applied in a consistent way, could allow the automated combination of reaction information across different sources.
High Order Semi-Lagrangian Advection Scheme
NASA Astrophysics Data System (ADS)
Malaga, Carlos; Mandujano, Francisco; Becerra, Julian
2014-11-01
In most fluid phenomena, advection plays an important roll. A numerical scheme capable of making quantitative predictions and simulations must compute correctly the advection terms appearing in the equations governing fluid flow. Here we present a high order forward semi-Lagrangian numerical scheme specifically tailored to compute material derivatives. The scheme relies on the geometrical interpretation of material derivatives to compute the time evolution of fields on grids that deform with the material fluid domain, an interpolating procedure of arbitrary order that preserves the moments of the interpolated distributions, and a nonlinear mapping strategy to perform interpolations between undeformed and deformed grids. Additionally, a discontinuity criterion was implemented to deal with discontinuous fields and shocks. Tests of pure advection, shock formation and nonlinear phenomena are presented to show performance and convergence of the scheme. The high computational cost is considerably reduced when implemented on massively parallel architectures found in graphic cards. The authors acknowledge funding from Fondo Sectorial CONACYT-SENER Grant Number 42536 (DGAJ-SPI-34-170412-217).
NASA Astrophysics Data System (ADS)
Hamedi, H. R.; Ruseckas, J.; Juzeliūnas, G.
2017-09-01
We consider propagation of a probe pulse in an atomic medium characterized by a combined tripod and Lambda (Λ) atom-light coupling scheme. The scheme involves three atomic ground states coupled to two excited states by five light fields. It is demonstrated that dark states can be formed for such an atom-light coupling. This is essential for formation of the electromagnetically induced transparency (EIT) and slow light. In the limiting cases the scheme reduces to conventional Λ- or N-type atom-light couplings providing the EIT or absorption, respectively. Thus, the atomic system can experience a transition from the EIT to the absorption by changing the amplitudes or phases of control lasers. Subsequently the scheme is employed to analyze the nonlinear pulse propagation using the coupled Maxwell-Bloch equations. It is shown that a generation of stable slow light optical solitons is possible in such a five-level combined tripod and Λ atomic system.
Privacy Enhancements for Inexact Biometric Templates
NASA Astrophysics Data System (ADS)
Ratha, Nalini; Chikkerur, Sharat; Connell, Jonathan; Bolle, Ruud
Traditional authentication schemes utilize tokens or depend on some secret knowledge possessed by the user for verifying his or her identity. Although these techniques are widely used, they have several limitations. Both tokenand knowledge-based approaches cannot differentiate between an authorized user and an impersonator having access to the tokens or passwords. Biometrics-based authentication schemes overcome these limitations while offering usability advantages in the area of password management. However, despite its obvious advantages, the use of biometrics raises several security and privacy concerns.
A study of pressure-based methodology for resonant flows in non-linear combustion instabilities
NASA Technical Reports Server (NTRS)
Yang, H. Q.; Pindera, M. Z.; Przekwas, A. J.; Tucker, K.
1992-01-01
This paper presents a systematic assessment of a large variety of spatial and temporal differencing schemes on nonstaggered grids by the pressure-based methods for the problems of fast transient flows. The observation from the present study is that for steady state flow problems, pressure-based methods can be very competitive with the density-based methods. For transient flow problems, pressure-based methods utilizing the same differencing scheme are less accurate, even though the wave speeds are correctly predicted.
2013-10-07
OLEs and Terrain Effects Within the Coastal Zone in the EDMF Parameterization Scheme: An Airborne Doppler Wind Lidar Perspective Annual Report Under...UPP related investigations that will be carried out in Year 3. RELATED PROJECTS ONR contract to study the utilization of Doppler wind lidar (DWL...MATERHORN2012) Paper presented at the Coherent Laser Radar Conference, June 2013 Airborne DWL investigations of flow over complex terrain (MATERHORN
2012-02-29
couples the estimation scheme with the computational scheme, using one to enhance the other. Numerically, this switching changes several of the matrices...2011. 11. M.A. Demetriou, Enforcing and enhancing consensus of spatially distributed filters utilizing mobile sensor networks, Proceedings of the 49th...expected May, 2012. References [1] J. H. Seinfeld and S. N. Pandis, Atmospheric Chemistry and Physics: From Air Pollution to Climate Change. New York
A multidirectional cloak for visible light
NASA Astrophysics Data System (ADS)
Chen, Zhen Sheng; Lei Mei, Zhong; Jiang, Wei Xiang; Cui, Tie Jun
2018-04-01
A new macroscopic multidirectional cloak scheme for extraordinary rays is proposed by controlling the optical axes of uniaxial crystals. It eliminates the complicated material constraints and can also be utilized to design a cloaking device for ordinary rays or isotropic cloaks after simplification. Numerical ray tracing and full-wave simulation results validate our design. Moreover, if the uniaxial crystals are changed into other materials whose optical axes can be modulated, like liquid crystals, this scheme has the potential to fabricate direction-tunable cloaks.
NASA Technical Reports Server (NTRS)
Kanavarioti, A.; Bernasconi, C. F.; Alberas, D. J.; Baird, E. E.
1993-01-01
A kinetic study of oligoguanylate synthesis on a polycytidylate template, poly(C), as a function of the concentration of the activated monomer, guanosine 5'-monophosphate 2-methylimidazolide, 2-MeImpG, is reported. Reactions were run with 0.005-0.045 M 2-MeImpG in the presence of 0.05 M poly(C) at 23 degrees C. The kinetic results are consistent with a reaction scheme (eq 1) that consists of a series of consecutive steps, each step representing the addition of one molecule of 2-MeImpG to the growing oligomer. This scheme allows the calculation of second-order rate constants for every step by analyzing the time-dependent growth of each oligomer. Computer simulations of the course of reaction based on the determined rate constants and eq 1 are in excellent agreement with the product distributions seen in the HPLC profiles. In accord with an earlier study (Fakhrai, H.; Inoue, T.; Orgel, L. E. Tetrahedron 1984, 40, 39), rate constants, ki, for the formation of the tetramer and longer oligomers up to the 16-mer were found to be independent of length and somewhat higher than k3 (formation of trimer), which in turn is much higher than k2 (formation of dimer). The ki (i > or = 4), k3, and k2 values are not true second-order rate constants but vary with monomer concentration. Mechanistic models for the dimerization (Scheme I) and elongation reactions (Scheme II) are proposed that are consistent with our results. These models take into account that the monomer associates with the template in a cooperative manner. Our kinetic analysis allowed the determination of rate constants for the elementary processes of covalent bond formation between two monomers (dimerization) and between an oligomer and a monomer (elongation) on the template. A major conclusion from our study is that bond formation between two monomer units or between a primer and a monomer is assisted by the presence of additional next-neighbor monomer units. This is consistent with recent findings with hairpin oligonucleotides (Wu, T.; Orgel, L. E. J. Am. Chem. Soc. 1992, 114, 317). Our study is the first of its kind that shows the feasibility of a thorough kinetic analysis of a template-directed oligomerization and provides a detailed mechanistic model of these reactions.
ERIC Educational Resources Information Center
Lin, Jin-Ding; Lin, Ya-Wen; Yen, Chia-Feng; Loh, Ching-Hui; Chwo, Miao-Ju
2009-01-01
The purposes of the present study are to provide the first data on utilization, understanding and satisfaction of the National Health Insurance (NHI) premium subsidy for families of children with disabilities in Taipei. Data from the 2001 Taipei Early Intervention Utilization and Evaluation Survey for Aged 0-6 Children with Disabilities were…
Dynamic traffic grooming with Spectrum Engineering (TG-SE) in flexible grid optical networks
NASA Astrophysics Data System (ADS)
Yu, Xiaosong; Zhao, Yongli; Zhang, Jiawei; Wang, Jianping; Zhang, Guoying; Chen, Xue; Zhang, Jie
2015-12-01
Flexible grid has emerged as an evolutionary technology to satisfy the ever increasing demand for higher spectrum efficiency and operational flexibility. To optimize the spectrum resource utilization, this paper introduces the concept of Spectrum Engineering in flex-grid optical networks. The sliceable optical transponder has been proposed to offload IP traffic to the optical layer and reduce the number of IP router ports and transponders. We discuss the impact of sliceable transponder in traffic grooming and propose several traffic-grooming schemes with Spectrum Engineering (TG-SE). Our results show that there is a tradeoff among different traffic grooming policies, which should be adopted based on the network operator's objectives. The proposed traffic grooming with Spectrum Engineering schemes can reduce OPEX as well as increase spectrum efficiency by efficiently utilizing the bandwidth variability and capability of sliceable optical transponders.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Prochnow, Bo; O'Reilly, Ossian; Dunham, Eric M.
In this paper, we develop a high-order finite difference scheme for axisymmetric wave propagation in a cylindrical conduit filled with a viscous fluid. The scheme is provably stable, and overcomes the difficulty of the polar coordinate singularity in the radial component of the diffusion operator. The finite difference approximation satisfies the principle of summation-by-parts (SBP), which is used to establish stability using the energy method. To treat the coordinate singularity without losing the SBP property of the scheme, a staggered grid is introduced and quadrature rules with weights set to zero at the endpoints are considered. Finally, the accuracy ofmore » the scheme is studied both for a model problem with periodic boundary conditions at the ends of the conduit and its practical utility is demonstrated by modeling acoustic-gravity waves in a magmatic conduit.« less
An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks.
Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun
2017-12-08
Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie-Hellman problem.
Xie, Ying Peng; Yang, Yongqiang; Wang, Guosheng; Liu, Gang
2017-10-01
The solid-state Z-scheme trinary/binary heterostructures show the advantage of utilizing the high-energy photogenerated charge carriers in photocatalysis. However, the key factors controlling such Z-scheme in the binary heterostructures are still unclear. In this paper, we showed that oxygen vacancies could act as an interface electron transfer mediator to promote the direct Z-scheme charge transfer process in binary semiconductor heterostructures of CdS/ZnS. Increasing the concentration of surface oxygen vacancies of ZnO crystal can greatly enhance photocatalytic hydrogen generation of CdS/ZnO heterostructure. This was attributed to the strengthened direct Z-scheme charge transfer process in CdS/ZnO, as evidenced by steady-state/time-resolved photoluminescence spectroscopy and selective photodeposition of metal particles on the heterostructure. Copyright © 2017 Elsevier Inc. All rights reserved.
An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks
Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun
2017-01-01
Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem. PMID:29292792
All-Particle Multiscale Computation of Hypersonic Rarefied Flow
NASA Astrophysics Data System (ADS)
Jun, E.; Burt, J. M.; Boyd, I. D.
2011-05-01
This study examines a new hybrid particle scheme used as an alternative means of multiscale flow simulation. The hybrid particle scheme employs the direct simulation Monte Carlo (DSMC) method in rarefied flow regions and the low diffusion (LD) particle method in continuum flow regions. The numerical procedures of the low diffusion particle method are implemented within an existing DSMC algorithm. The performance of the LD-DSMC approach is assessed by studying Mach 10 nitrogen flow over a sphere with a global Knudsen number of 0.002. The hybrid scheme results show good overall agreement with results from standard DSMC and CFD computation. Subcell procedures are utilized to improve computational efficiency and reduce sensitivity to DSMC cell size in the hybrid scheme. This makes it possible to perform the LD-DSMC simulation on a much coarser mesh that leads to a significant reduction in computation time.
Direct adaptive control of manipulators in Cartesian space
NASA Technical Reports Server (NTRS)
Seraji, H.
1987-01-01
A new adaptive-control scheme for direct control of manipulator end effector to achieve trajectory tracking in Cartesian space is developed in this article. The control structure is obtained from linear multivariable theory and is composed of simple feedforward and feedback controllers and an auxiliary input. The direct adaptation laws are derived from model reference adaptive control theory and are not based on parameter estimation of the robot model. The utilization of adaptive feedforward control and the inclusion of auxiliary input are novel features of the present scheme and result in improved dynamic performance over existing adaptive control schemes. The adaptive controller does not require the complex mathematical model of the robot dynamics or any knowledge of the robot parameters or the payload, and is computationally fast for on-line implementation with high sampling rates. The control scheme is applied to a two-link manipulator for illustration.
Optimal Resource Allocation for NOMA-TDMA Scheme with α-Fairness in Industrial Internet of Things.
Sun, Yanjing; Guo, Yiyu; Li, Song; Wu, Dapeng; Wang, Bin
2018-05-15
In this paper, a joint non-orthogonal multiple access and time division multiple access (NOMA-TDMA) scheme is proposed in Industrial Internet of Things (IIoT), which allowed multiple sensors to transmit in the same time-frequency resource block using NOMA. The user scheduling, time slot allocation, and power control are jointly optimized in order to maximize the system α -fair utility under transmit power constraint and minimum rate constraint. The optimization problem is nonconvex because of the fractional objective function and the nonconvex constraints. To deal with the original problem, we firstly convert the objective function in the optimization problem into a difference of two convex functions (D.C.) form, and then propose a NOMA-TDMA-DC algorithm to exploit the global optimum. Numerical results show that the NOMA-TDMA scheme significantly outperforms the traditional orthogonal multiple access scheme in terms of both spectral efficiency and user fairness.
Prochnow, Bo; O'Reilly, Ossian; Dunham, Eric M.; ...
2017-03-16
In this paper, we develop a high-order finite difference scheme for axisymmetric wave propagation in a cylindrical conduit filled with a viscous fluid. The scheme is provably stable, and overcomes the difficulty of the polar coordinate singularity in the radial component of the diffusion operator. The finite difference approximation satisfies the principle of summation-by-parts (SBP), which is used to establish stability using the energy method. To treat the coordinate singularity without losing the SBP property of the scheme, a staggered grid is introduced and quadrature rules with weights set to zero at the endpoints are considered. Finally, the accuracy ofmore » the scheme is studied both for a model problem with periodic boundary conditions at the ends of the conduit and its practical utility is demonstrated by modeling acoustic-gravity waves in a magmatic conduit.« less
NASA Astrophysics Data System (ADS)
Wang, Song-Bai; Chen, Ye-Hong; Wu, Qi-Cheng; Shi, Zhi-Cheng; Huang, Bi-Hua; Song, Jie; Xia, Yan
2018-07-01
A scheme is proposed to implement quantum state engineering (QSE) in a four-state system via counterdiabatic driving. In the scheme, single- and multi-mode driving methods are used respectively to drive the system to a target state at a predefined time. It is found that a fast QSE can be realized by utilizing simply designed pulses. In addition, a beneficial discussion on the energy consumption between the single- and multi-mode driving protocols shows that the multi-mode driving method seems to have a wider range of applications than the single-mode driving method with respect to different parameters. Finally, the scheme is also helpful for implementing the generalization QSE in high-dimensional systems via the concept of a dressed state. Therefore, the scheme can be implemented with the present experimental technology, which is useful in quantum information processing.
NASA Astrophysics Data System (ADS)
Pantano, Carlos
2005-11-01
We describe a hybrid finite difference method for large-eddy simulation (LES) of compressible flows with a low-numerical dissipation scheme and structured adaptive mesh refinement (SAMR). Numerical experiments and validation calculations are presented including a turbulent jet and the strongly shock-driven mixing of a Richtmyer-Meshkov instability. The approach is a conservative flux-based SAMR formulation and as such, it utilizes refinement to computational advantage. The numerical method for the resolved scale terms encompasses the cases of scheme alternation and internal mesh interfaces resulting from SAMR. An explicit centered scheme that is consistent with a skew-symmetric finite difference formulation is used in turbulent flow regions while a weighted essentially non-oscillatory (WENO) scheme is employed to capture shocks. The subgrid stresses and transports are calculated by means of the streched-vortex model, Misra & Pullin (1997)
Secure Dynamic access control scheme of PHR in cloud computing.
Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching
2012-12-01
With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access scheme in Cloud computing environments is proven flexible and secure and could effectively correspond to real-time appending and deleting user access authorization and appending and revising PHR records.
SU-D-210-03: Limited-View Multi-Source Quantitative Photoacoustic Tomography
DOE Office of Scientific and Technical Information (OSTI.GOV)
Feng, J; Gao, H
2015-06-15
Purpose: This work is to investigate a novel limited-view multi-source acquisition scheme for the direct and simultaneous reconstruction of optical coefficients in quantitative photoacoustic tomography (QPAT), which has potentially improved signal-to-noise ratio and reduced data acquisition time. Methods: Conventional QPAT is often considered in two steps: first to reconstruct the initial acoustic pressure from the full-view ultrasonic data after each optical illumination, and then to quantitatively reconstruct optical coefficients (e.g., absorption and scattering coefficients) from the initial acoustic pressure, using multi-source or multi-wavelength scheme.Based on a novel limited-view multi-source scheme here, We have to consider the direct reconstruction of opticalmore » coefficients from the ultrasonic data, since the initial acoustic pressure can no longer be reconstructed as an intermediate variable due to the incomplete acoustic data in the proposed limited-view scheme. In this work, based on a coupled photo-acoustic forward model combining diffusion approximation and wave equation, we develop a limited-memory Quasi-Newton method (LBFGS) for image reconstruction that utilizes the adjoint forward problem for fast computation of gradients. Furthermore, the tensor framelet sparsity is utilized to improve the image reconstruction which is solved by Alternative Direction Method of Multipliers (ADMM). Results: The simulation was performed on a modified Shepp-Logan phantom to validate the feasibility of the proposed limited-view scheme and its corresponding image reconstruction algorithms. Conclusion: A limited-view multi-source QPAT scheme is proposed, i.e., the partial-view acoustic data acquisition accompanying each optical illumination, and then the simultaneous rotations of both optical sources and ultrasonic detectors for next optical illumination. Moreover, LBFGS and ADMM algorithms are developed for the direct reconstruction of optical coefficients from the acoustic data. Jing Feng and Hao Gao were partially supported by the NSFC (#11405105), the 973 Program (#2015CB856000) and the Shanghai Pujiang Talent Program (#14PJ1404500)« less
Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs.
Huang, Changqin; Ma, Ming; Liu, Xiao; Liu, Anfeng; Zuo, Zhengbang
2017-06-17
Fog (from core to edge) computing is a newly emerging computing platform, which utilizes a large number of network devices at the edge of a network to provide ubiquitous computing, thus having great development potential. However, the issue of security poses an important challenge for fog computing. In particular, the Internet of Things (IoT) that constitutes the fog computing platform is crucial for preserving the security of a huge number of wireless sensors, which are vulnerable to attack. In this paper, a new unequal probability marking approach is proposed to enhance the security performance of logging and migration traceback (LM) schemes in tree-based wireless sensor networks (WSNs). The main contribution of this paper is to overcome the deficiency of the LM scheme that has a higher network lifetime and large storage space. In the unequal probability marking logging and migration (UPLM) scheme of this paper, different marking probabilities are adopted for different nodes according to their distances to the sink. A large marking probability is assigned to nodes in remote areas (areas at a long distance from the sink), while a small marking probability is applied to nodes in nearby area (areas at a short distance from the sink). This reduces the consumption of storage and energy in addition to enhancing the security performance, lifetime, and storage capacity. Marking information will be migrated to nodes at a longer distance from the sink for increasing the amount of stored marking information, thus enhancing the security performance in the process of migration. The experimental simulation shows that for general tree-based WSNs, the UPLM scheme proposed in this paper can store 1.12-1.28 times the amount of stored marking information that the equal probability marking approach achieves, and has 1.15-1.26 times the storage utilization efficiency compared with other schemes.
Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs
Huang, Changqin; Ma, Ming; Liu, Xiao; Liu, Anfeng; Zuo, Zhengbang
2017-01-01
Fog (from core to edge) computing is a newly emerging computing platform, which utilizes a large number of network devices at the edge of a network to provide ubiquitous computing, thus having great development potential. However, the issue of security poses an important challenge for fog computing. In particular, the Internet of Things (IoT) that constitutes the fog computing platform is crucial for preserving the security of a huge number of wireless sensors, which are vulnerable to attack. In this paper, a new unequal probability marking approach is proposed to enhance the security performance of logging and migration traceback (LM) schemes in tree-based wireless sensor networks (WSNs). The main contribution of this paper is to overcome the deficiency of the LM scheme that has a higher network lifetime and large storage space. In the unequal probability marking logging and migration (UPLM) scheme of this paper, different marking probabilities are adopted for different nodes according to their distances to the sink. A large marking probability is assigned to nodes in remote areas (areas at a long distance from the sink), while a small marking probability is applied to nodes in nearby area (areas at a short distance from the sink). This reduces the consumption of storage and energy in addition to enhancing the security performance, lifetime, and storage capacity. Marking information will be migrated to nodes at a longer distance from the sink for increasing the amount of stored marking information, thus enhancing the security performance in the process of migration. The experimental simulation shows that for general tree-based WSNs, the UPLM scheme proposed in this paper can store 1.12–1.28 times the amount of stored marking information that the equal probability marking approach achieves, and has 1.15–1.26 times the storage utilization efficiency compared with other schemes. PMID:28629135
NASA Technical Reports Server (NTRS)
Tao, W.-K.; Wang, Y.; Lang, S.; Ferrier, B.; Simpson, J.; Einaudi, Franco (Technical Monitor)
2000-01-01
The 3D Goddard Cumulus Ensemble (GCE) model was utilized to examine the behavior and response of simulated deep tropical cloud systems that occurred over the west Pacific warm pool region, the Atlantic ocean and the central United States. The periods chosen for simulation were convectively active periods during TOGA-COARE (February 22 1993, December 11-17, 1992; December 19-28, February 9-13, 1993), GATE (September 4, 1974), LBA (January 26 and February 23, 1998), ARM (1997 IOP) and PRESTORM (June 11, 1985). We will examine differences in the microphysics for both warm rain and ice processes (evaporation /sublimation and condensation/ deposition), Q1 (Temperature), Q2 (Water vapor) and Q3 (momentum both U and V) budgets for these three convective events from different large-scale environments. The contribution of stratiform precipitation and its relationship to the vertical shear of the large-scale horizontal wind will also be examined. New improvements to the GCE model (i.e., microphysics: 4ICE two moments and 3ICE one moment; advection schemes) as well as their sensitivity to the model results will be discussed. Preliminary results indicated that various microphysical schemes could have a major impact on stratiform formation as well as the size of convective systems. However, they do not change the major characteristics of the convective systems, such as: arc shape, strong rotational circulation on both ends of system, heavy precipitation along the leading edge of systems.
NASA Astrophysics Data System (ADS)
Wang, Haoliang; Liu, Yubao; Cheng, William Y. Y.; Zhao, Tianliang; Xu, Mei; Liu, Yuewei; Shen, Si; Calhoun, Kristin M.; Fierro, Alexandre O.
2017-11-01
In this study, a lightning data assimilation (LDA) scheme was developed and implemented in the National Center for Atmospheric Research Weather Research and Forecasting-Real-Time Four-Dimensional Data Assimilation system. In this LDA method, graupel mixing ratio (qg) is retrieved from observed total lightning. To retrieve qg on model grid boxes, column-integrated graupel mass is first calculated using an observation-based linear formula between graupel mass and total lightning rate. Then the graupel mass is distributed vertically according to the empirical qg vertical profiles constructed from model simulations. Finally, a horizontal spread method is utilized to consider the existence of graupel in the adjacent regions of the lightning initiation locations. Based on the retrieved qg fields, latent heat is adjusted to account for the latent heat releases associated with the formation of the retrieved graupel and to promote convection at the observed lightning locations, which is conceptually similar to the method developed by Fierro et al. Three severe convection cases were studied to evaluate the LDA scheme for short-term (0-6 h) lightning and precipitation forecasts. The simulation results demonstrated that the LDA was effective in improving the short-term lightning and precipitation forecasts by improving the model simulation of the qg fields, updrafts, cold pool, and front locations. The improvements were most notable in the first 2 h, indicating a highly desired benefit of the LDA in lightning and convective precipitation nowcasting (0-2 h) applications.
ADAPTIVE TETRAHEDRAL GRID REFINEMENT AND COARSENING IN MESSAGE-PASSING ENVIRONMENTS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hallberg, J.; Stagg, A.
2000-10-01
A grid refinement and coarsening scheme has been developed for tetrahedral and triangular grid-based calculations in message-passing environments. The element adaption scheme is based on an edge bisection of elements marked for refinement by an appropriate error indicator. Hash-table/linked-list data structures are used to store nodal and element formation. The grid along inter-processor boundaries is refined and coarsened consistently with the update of these data structures via MPI calls. The parallel adaption scheme has been applied to the solution of a transient, three-dimensional, nonlinear, groundwater flow problem. Timings indicate efficiency of the grid refinement process relative to the flow solvermore » calculations.« less
An Improvement to a Multi-Client Searchable Encryption Scheme for Boolean Queries.
Jiang, Han; Li, Xue; Xu, Qiuliang
2016-12-01
The migration of e-health systems to the cloud computing brings huge benefits, as same as some security risks. Searchable Encryption(SE) is a cryptography encryption scheme that can protect the confidentiality of data and utilize the encrypted data at the same time. The SE scheme proposed by Cash et al. in Crypto2013 and its follow-up work in CCS2013 are most practical SE Scheme that support Boolean queries at present. In their scheme, the data user has to generate the search tokens by the counter number one by one and interact with server repeatedly, until he meets the correct one, or goes through plenty of tokens to illustrate that there is no search result. In this paper, we make an improvement to their scheme. We allow server to send back some information and help the user to generate exact search token in the search phase. In our scheme, there are only two round interaction between server and user, and the search token has [Formula: see text] elements, where n is the keywords number in query expression, and [Formula: see text] is the minimum documents number that contains one of keyword in query expression, and the computation cost of server is [Formula: see text] modular exponentiation operation.
NASA Astrophysics Data System (ADS)
Sachko, A. V.; Zakordonskii, V. P.; Voloshinovskii, A. S.; Golod, T. Yu.
2009-07-01
A complex of physicochemical methods (light scattering, potentiometry, conductometry, viscometry, tensiometry, and fluorescence spectroscopy) were used to show the possibility of formation of intermolecular associates/complexes in systems with likely charged components. The driving forces of such interactions were analyzed and a possible scheme of complex formation between polymethacrylic acid and sodium dodecylbenzenesulfonate was suggested.
Scheme for Quantum Computing Immune to Decoherence
NASA Technical Reports Server (NTRS)
Williams, Colin; Vatan, Farrokh
2008-01-01
A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report that the derivation provides explicit constructions for finding the exchange couplings in the physical basis needed to implement any arbitrary 1-qubit gate. These constructions lead to spintronic encodings of quantum logic that are more efficient than those of a previously published scheme that utilizes a universal but fixed set of gates.
Liu, Xiaoting; Wong, Hung; Liu, Kai
2016-01-14
Against the achievement of nearly universal coverage for social health insurance for the elderly in China, a problem of inequity among different insurance schemes on health outcomes is still a big challenge for the health care system. Whether various health insurance schemes have divergent effects on health outcome is still a puzzle. Empirical evidence will be investigated in this study. This study employs a nationally representative survey database, the National Survey of the Aged Population in Urban/Rural China, to compare the changes of health outcomes among the elderly before and after the reform. A one-way ANOVA is utilized to detect disparities in health care expenditures and health status among different health insurance schemes. Multiple Linear Regression is applied later to examine the further effects of different insurance plans on health outcomes while controlling for other social determinants. The one-way ANOVA result illustrates that although the gaps in insurance reimbursements between the Urban Employee Basic Medical Insurance (UEBMI) and the other schemes, the New Rural Cooperative Medical Scheme (NCMS) and Urban Residents Basic Medical Insurance (URBMI) decreased, out-of-pocket spending accounts for a larger proportion of total health care expenditures, and the disparities among different insurances enlarged. Results of the Multiple Linear Regression suggest that UEBMI participants have better self-reported health status, physical functions and psychological wellbeing than URBMI and NCMS participants, and those uninsured. URBMI participants report better self-reported health than NCMS ones and uninsured people, while having worse psychological wellbeing compared with their NCMS counterparts. This research contributes to a transformation in health insurance studies from an emphasis on the opportunity-oriented health equity measured by coverage and healthcare accessibility to concern with outcome-based equity composed of health expenditure and health status. The results indicate that fragmented health insurance schemes generate inequitable health care utilization and health outcomes for the elderly. This study re-emphasizes the importance of reforming health insurance systems based on their health outcome rather than entitlement, which will particularly benefit the most vulnerable older groups.
Wang, Yang; Wang, Jian; Maitland, Elizabeth; Zhao, Yaohui; Nicholas, Stephen; Lu, Mingshan
2012-09-04
China's recent growth in income has been unequally distributed, resulting in an unusually rapid retreat from relative income equality, which has impacted negatively on health services access. There exists a significant gap between health care utilization in rural and urban areas and inequality in health care access due to differences in socioeconomic status is increasing. We investigate inequality in service utilization among the mid-aged and elderly, with a special attention of health insurance. This paper measures the income-related inequality and horizontal inequity in inpatient and outpatient health care utilization among the mid-aged and elderly in two provinces of China. The data for this study come from the pilot survey of the China Health and Retirement Longitudinal Study in Gansu and Zhejiang. Concentration Index (CI) and its decomposition approach were deployed to reflect inequality degree and explore the source of these inequalities. There is a pro-rich inequality in the probability of receiving health service utilization in Gansu (CI outpatient = 0.067; CI inpatient = 0.011) and outpatient for Zhejiang (CI = 0.016), but a pro-poor inequality in inpatient utilization in Zhejiang (CI = -0.090). All the Horizontal Inequity Indices (HI) are positive. Income was the dominant factor in health care utilization for out-patient in Gansu (40.3 percent) and Zhejiang (55.5 percent). The non-need factors' contribution to inequity in Gansu and Zhejiang outpatient care had the same pattern across the two provinces, with the factors evenly split between pro-rich and pro-poor biases. The insurance schemes were strongly pro-rich, except New Cooperative Medical Scheme (NCMS) in Zhejiang. For the middle-aged and elderly, there is a strong pro-rich inequality of health care utilization in both provinces. Income was the most important factor in outpatient care in both provinces, but access to inpatient care was driven by a mix of income, need and non-need factors that significantly differed across and within the two provinces. These differences were the result of different levels of health care provision, different out-of-pocket expenses for health care and different access to and coverage of health insurance for rural and urban families. To address health care utilization inequality, China will need to reduce the unequal distribution of income and expand the coverage of its health insurance schemes.
2012-01-01
Background China’s recent growth in income has been unequally distributed, resulting in an unusually rapid retreat from relative income equality, which has impacted negatively on health services access. There exists a significant gap between health care utilization in rural and urban areas and inequality in health care access due to differences in socioeconomic status is increasing. We investigate inequality in service utilization among the mid-aged and elderly, with a special attention of health insurance. Methods This paper measures the income-related inequality and horizontal inequity in inpatient and outpatient health care utilization among the mid-aged and elderly in two provinces of China. The data for this study come from the pilot survey of the China Health and Retirement Longitudinal Study in Gansu and Zhejiang. Concentration Index (CI) and its decomposition approach were deployed to reflect inequality degree and explore the source of these inequalities. Results There is a pro-rich inequality in the probability of receiving health service utilization in Gansu (CI outpatient = 0.067; CI inpatient = 0.011) and outpatient for Zhejiang (CI = 0.016), but a pro-poor inequality in inpatient utilization in Zhejiang (CI = −0.090). All the Horizontal Inequity Indices (HI) are positive. Income was the dominant factor in health care utilization for out-patient in Gansu (40.3 percent) and Zhejiang (55.5 percent). The non-need factors’ contribution to inequity in Gansu and Zhejiang outpatient care had the same pattern across the two provinces, with the factors evenly split between pro-rich and pro-poor biases. The insurance schemes were strongly pro-rich, except New Cooperative Medical Scheme (NCMS) in Zhejiang. Conclusions For the middle-aged and elderly, there is a strong pro-rich inequality of health care utilization in both provinces. Income was the most important factor in outpatient care in both provinces, but access to inpatient care was driven by a mix of income, need and non-need factors that significantly differed across and within the two provinces. These differences were the result of different levels of health care provision, different out-of-pocket expenses for health care and different access to and coverage of health insurance for rural and urban families. To address health care utilization inequality, China will need to reduce the unequal distribution of income and expand the coverage of its health insurance schemes. PMID:22947369
NASA Astrophysics Data System (ADS)
Xiong, Jieqing; Huang, Zhitong; Zhuang, Kaiyu; Ji, Yuefeng
2016-08-01
We propose a novel handover scheme for indoor microcellular visible light communication (VLC) network. With such a scheme, the room, which is fully coverage by light, is divided into several microcells according to the layout of light-emitting diodes (LEDs). However, the directionality of light arises new challenges in keeping the connectivity between the mobile devices and light source under the mobile circumstances. The simplest solution is that all LEDs broadcast data of every user simultaneously, but it wastes too much bandwidth resource, especially when the amount of users increases. To solve this key problem, we utilize the optical positioning assisting handover procedure in this paper. In the positioning stage, the network manager obtains the location information of user device via downlink and uplink signal strength information, which is white light and infrared, respectively. After that, a Kalman filter is utilized for improving the tracking performance of a mobile device. Then, the network manager decides how to initiate the handover process by the previous information. Results show that the proposed scheme can achieve low-cost, seamless data communication, and a high probability of successful handover.
Photon Shot Noise Limited Radio Frequency Electric Field Sensing Using Rydberg Atoms in Vapor Cells
NASA Astrophysics Data System (ADS)
Kumar, Santosh; Jahangiri, Akbar J.; Fan, Haoquan; Kuebler, Harald; Shaffer, James P.
2017-04-01
We report Rydberg atom-based radio frequency (RF) electrometry measurements at a sensitivity limited by probe laser photon shot noise. By utilizing the phenomena of electromagnetically induced transparency (EIT) in room temperature atomic vapor cells, Rydberg atoms can be used for absolute electric field measurements that significantly surpass conventional methods in utility, sensitivity and accuracy. We show that by using a Mach-Zehnder interferometer with homodyne detection or using frequency modulation spectroscopy with active control of residual amplitude modulation we can achieve a RF electric field detection sensitivity of 3 μVcm-1Hz/2. The sensitivity is limited by photon shot noise on the detector used to readout the probe laser of the EIT scheme. We suggest a new multi-photon scheme that can mitigate the effect of photon shot noise. The multi-photon approach allows an increase in probe laser power without decreasing atomic coherence times that result from collisions caused by an increase in Rydberg atom excitation. The multi-photon scheme also reduces Residual Doppler broadening enabling more accurate measurements to be carried out. This work is supported by DARPA, and NRO.
Plume trajectory formation under stack tip self-enveloping
NASA Astrophysics Data System (ADS)
Gribkov, A. M.; Zroichikov, N. A.; Prokhorov, V. B.
2017-10-01
The phenomenon of stack tip self-enveloping and its influence upon the conditions of plume formation and on the trajectory of its motion are considered. Processes are described occurring in the initial part of the plume while the interaction between vertically directed flue gases outflowing from the stack and a horizontally directed moving air flow at high wind velocities that lead to the formation of a flag-like plume. Conditions responsible for the origin and evolution of interaction between these flows are demonstrated. For the first time, a plume formed under these conditions without bifurcation is registered. A photo image thereof is presented. A scheme for the calculation of the motion of a plume trajectory is proposed, the quantitative characteristics of which are obtained based on field observations. The wind velocity and direction, air temperature, and atmospheric turbulence at the level of the initial part of the trajectory have been obtained based on data obtained from an automatic meteorological system (mounted on the outer parts of a 250 m high stack no. 1 at the Naberezhnye Chelny TEPP plant) as well as based on the results of photographing and theodolite sighting of smoke puffs' trajectory taking into account their velocity within its initial part. The calculation scheme is supplemented with a new acting force—the force of self-enveloping. Based on the comparison of the new calculation scheme with the previous one, a significant contribution of this force to the development of the trajectory is revealed. A comparison of the natural full-scale data with the results of the calculation according to the proposed new scheme is made. The proposed calculation scheme has allowed us to extend the application of the existing technique to the range of high wind velocities. This approach would make it possible to simulate and investigate the trajectory and full rising height of the calculated the length above the mouth of flue-pipes, depending on various modal and meteorological parameters under the interrelation between the dynamic and thermal components of the rise as well as to obtain a universal calculation expression for determining the height of the plume rise for different classes of atmospheric stability.
Escalator: An Autonomous Scheduling Scheme for Convergecast in TSCH
Oh, Sukho; Hwang, DongYeop; Kim, Ki-Hyung; Kim, Kangseok
2018-01-01
Time Slotted Channel Hopping (TSCH) is widely used in the industrial wireless sensor networks due to its high reliability and energy efficiency. Various timeslot and channel scheduling schemes have been proposed for achieving high reliability and energy efficiency for TSCH networks. Recently proposed autonomous scheduling schemes provide flexible timeslot scheduling based on the routing topology, but do not take into account the network traffic and packet forwarding delays. In this paper, we propose an autonomous scheduling scheme for convergecast in TSCH networks with RPL as a routing protocol, named Escalator. Escalator generates a consecutive timeslot schedule along the packet forwarding path to minimize the packet transmission delay. The schedule is generated autonomously by utilizing only the local routing topology information without any additional signaling with other nodes. The generated schedule is guaranteed to be conflict-free, in that all nodes in the network could transmit packets to the sink in every slotframe cycle. We implement Escalator and evaluate its performance with existing autonomous scheduling schemes through a testbed and simulation. Experimental results show that the proposed Escalator has lower end-to-end delay and higher packet delivery ratio compared to the existing schemes regardless of the network topology. PMID:29659508
A High-Resolution Capability for Large-Eddy Simulation of Jet Flows
NASA Technical Reports Server (NTRS)
DeBonis, James R.
2011-01-01
A large-eddy simulation (LES) code that utilizes high-resolution numerical schemes is described and applied to a compressible jet flow. The code is written in a general manner such that the accuracy/resolution of the simulation can be selected by the user. Time discretization is performed using a family of low-dispersion Runge-Kutta schemes, selectable from first- to fourth-order. Spatial discretization is performed using central differencing schemes. Both standard schemes, second- to twelfth-order (3 to 13 point stencils) and Dispersion Relation Preserving schemes from 7 to 13 point stencils are available. The code is written in Fortran 90 and uses hybrid MPI/OpenMP parallelization. The code is applied to the simulation of a Mach 0.9 jet flow. Four-stage third-order Runge-Kutta time stepping and the 13 point DRP spatial discretization scheme of Bogey and Bailly are used. The high resolution numerics used allows for the use of relatively sparse grids. Three levels of grid resolution are examined, 3.5, 6.5, and 9.2 million points. Mean flow, first-order turbulent statistics and turbulent spectra are reported. Good agreement with experimental data for mean flow and first-order turbulent statistics is shown.
Escalator: An Autonomous Scheduling Scheme for Convergecast in TSCH.
Oh, Sukho; Hwang, DongYeop; Kim, Ki-Hyung; Kim, Kangseok
2018-04-16
Time Slotted Channel Hopping (TSCH) is widely used in the industrial wireless sensor networks due to its high reliability and energy efficiency. Various timeslot and channel scheduling schemes have been proposed for achieving high reliability and energy efficiency for TSCH networks. Recently proposed autonomous scheduling schemes provide flexible timeslot scheduling based on the routing topology, but do not take into account the network traffic and packet forwarding delays. In this paper, we propose an autonomous scheduling scheme for convergecast in TSCH networks with RPL as a routing protocol, named Escalator. Escalator generates a consecutive timeslot schedule along the packet forwarding path to minimize the packet transmission delay. The schedule is generated autonomously by utilizing only the local routing topology information without any additional signaling with other nodes. The generated schedule is guaranteed to be conflict-free, in that all nodes in the network could transmit packets to the sink in every slotframe cycle. We implement Escalator and evaluate its performance with existing autonomous scheduling schemes through a testbed and simulation. Experimental results show that the proposed Escalator has lower end-to-end delay and higher packet delivery ratio compared to the existing schemes regardless of the network topology.
Gilmore-Bykovskyi, Andrea L.
2015-01-01
Mealtime behavioral symptoms are distressing and frequently interrupt eating for the individual experiencing them and others in the environment. In order to enable identification of potential antecedents to mealtime behavioral symptoms, a computer-assisted coding scheme was developed to measure caregiver person-centeredness and behavioral symptoms for nursing home residents with dementia during mealtime interactions. The purpose of this pilot study was to determine the acceptability and feasibility of procedures for video-capturing naturally-occurring mealtime interactions between caregivers and residents with dementia, to assess the feasibility, ease of use, and inter-observer reliability of the coding scheme, and to explore the clinical utility of the coding scheme. Trained observers coded 22 observations. Data collection procedures were feasible and acceptable to caregivers, residents and their legally authorized representatives. Overall, the coding scheme proved to be feasible, easy to execute and yielded good to very good inter-observer agreement following observer re-training. The coding scheme captured clinically relevant, modifiable antecedents to mealtime behavioral symptoms, but would be enhanced by the inclusion of measures for resident engagement and consolidation of items for measuring caregiver person-centeredness that co-occurred and were difficult for observers to distinguish. PMID:25784080
A Dynamic Resilience Approach for WDM Optical Networks
NASA Astrophysics Data System (ADS)
Garg, Amit Kumar
2017-12-01
Optical fibres have been developed as a transmission medium to carry traffic in order to provide various services in telecommunications platform. Failure of this fibre caused loss of data which can interrupt communication services. This paper has been focused only on survivable schemes in order to guarantee both protection and restoration in WDM optical networks. In this paper, a dynamic resilience approach has been proposed whose objective is to route the flows in a way which minimizes the total amount of bandwidth used for working and protection paths. In the proposed approach, path-based protection is utilized because it yields lower overhead and is also suitable for global optimization where, in case of a single link failure, all the flows utilizing the failed link are re-routed to a pre-computed set of paths. The simulation results demonstrate that proposed approach is much more efficient as it provides better quality of services (QoS) in terms of network resource utilization, blocking probability etc. as compared to conventional protection and restoration schemes. The proposed approach seems to offer an attractive combination of features, with both ring like speed and mesh-like efficiency.
Ancient oceans and Martian paleohydrology
NASA Technical Reports Server (NTRS)
Baker, Victor R.; Strom, Robert G.; Gulick, Virginia C.; Kargel, Jeffrey S.; Komatsu, Goro; Kale, Vishwas S.
1991-01-01
The global model of ocean formation on Mars is discussed. The studies of impact crater densities on certain Martian landforms show that late in Martian history there could have been coincident formation of: (1) glacial features in the Southern Hemisphere; (2) ponded water and related ice features in the northern plains; (3) fluvial runoff on Martian uplands; and (4) active ice-related mass-movement. This model of transient ocean formation ties these diverse observations together in a long-term cyclic scheme of global planetary operation.
NASA Astrophysics Data System (ADS)
Al-Fadhalah, Khaled; Aleem, Muhammad
2018-04-01
Repetitive thermomechanical processing (TMP) was applied for evaluating the effect of strain-induced α'-martensite transformation and reversion annealing on microstructure refinement and mechanical properties of 304 austenitic stainless steel. The first TMP scheme consisted of four cycles of tensile deformation to strain of 0.4, while the second TMP scheme applied two cycles of tensile straining to 0.6. For both schemes, tensile tests were conducted at 173 K (- 100 °C) followed by 5-minute annealing at 1073 K (800 °C). The volume fraction of α'-martensite in deformed samples increased with increasing cycles, reaching a maximum of 98 vol pct. Examination of annealed microstructure by electron backscattered diffraction indicated that increasing strain and/or number of cycles resulted in stronger reversion to austenite with finer grain size of 1 μm. Yet, increasing strain reduced the formation of Σ3 boundaries. The annealing textures generally show reversion of α'-martensite texture components to the austenite texture of brass and copper orientations. The increase in strain and/or number of cycles resulted in stronger intensity of copper orientation, accompanied by the formation of recrystallization texture components of Goss, cube, and rotated cube. The reduction in grain size with increasing cycles caused an increase in yield strength. It also resulted in an increase in strain hardening rate during deformation due to the increase in the formation of α'-martensite. The increase in strain hardening rate occurred in two consecutive stages, marked as stages II and III. The strain hardening in stage II is due to the formation of α'-martensite from either austenite or ɛ-martensite, while the stage-III strain hardening is attributed to the necessity to break the α'-martensite-banded structure for forming block-type martensite at high strains.
Auctionable fixed transmission rights for congestion management
NASA Astrophysics Data System (ADS)
Alomoush, Muwaffaq Irsheid
Electric power deregulation has proposed a major change to the regulated utility monopoly. The change manifests the main part of engineers' efforts to reshape three components of today's regulated monopoly: generation, distribution and transmission. In this open access deregulated power market, transmission network plays a major role, and transmission congestion is a major problem that requires further consideration especially when inter-zonal/intra-zonal scheme is implemented. Declaring that engineering studies and experience are the criteria to define zonal boundaries or defining a zone based on the fact that a zone is a densely interconnected area (lake) and paths connecting these densely interconnected areas are inter-zonal lines will render insufficient and fuzzy definitions. Moreover, a congestion problem formulation should take into consideration interactions between intra-zonal and inter-zonal flows and their effects on power systems. In this thesis, we introduce a procedure for minimizing the number of adjustments of preferred schedules to alleviate congestion and apply control schemes to minimize interactions between zones. In addition, we give the zone definition a certain criterion based on the Locational Marginal Price (LMP). This concept will be used to define congestion zonal boundaries and to decide whether any zone should be merged with another zone or split into new zones. The thesis presents a unified scheme that combines zonal and FTR schemes to manage congestion. This combined scheme is utilized with LMPs to define zonal boundaries more appropriately. The presented scheme gains the best features of the FTR scheme, which are providing financial certainty, maximizing the efficient use of the system and making users pay for the actual use of congested paths. LMPs may give an indication of the impact of wheeling transactions, and calculations of and comparisons of LMPs with and without wheeling transactions should be adequate criteria to approve the transaction by the ISO, take a decision to expand the existing system, or retain the original structure of the system. Also, the thesis investigates the impact of wheeling transactions on congestion management, where we present a generalized mathematical model for the Fixed Transmission Right (FTR) auction. The auction guarantees FTR availability to all participants on a non-discriminatory basis, in which system users are permitted to buy, sell and trade FTRs through an auction. When FTRs are utilized with LMPs, they increase the efficient use of the transmission system and let a transmission customer gain advantageous features such as acquiring a mechanism to offset the extra cost due to congestion charges, providing financial and operational certainty and making system users pay for the actual use of the congested paths. The thesis also highlighted FTR trading in secondary markets to self-arrange access across different paths, create long-term transmission rights and provide more commercial certainty.
Randomness determines practical security of BB84 quantum key distribution.
Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2015-11-10
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.
Parallel Dynamics Simulation Using a Krylov-Schwarz Linear Solution Scheme
Abhyankar, Shrirang; Constantinescu, Emil M.; Smith, Barry F.; ...
2016-11-07
Fast dynamics simulation of large-scale power systems is a computational challenge because of the need to solve a large set of stiff, nonlinear differential-algebraic equations at every time step. The main bottleneck in dynamic simulations is the solution of a linear system during each nonlinear iteration of Newton’s method. In this paper, we present a parallel Krylov- Schwarz linear solution scheme that uses the Krylov subspacebased iterative linear solver GMRES with an overlapping restricted additive Schwarz preconditioner. As a result, performance tests of the proposed Krylov-Schwarz scheme for several large test cases ranging from 2,000 to 20,000 buses, including amore » real utility network, show good scalability on different computing architectures.« less
Randomness determines practical security of BB84 quantum key distribution
Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2015-01-01
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system. PMID:26552359
Randomness determines practical security of BB84 quantum key distribution
NASA Astrophysics Data System (ADS)
Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2015-11-01
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.
Parallel Dynamics Simulation Using a Krylov-Schwarz Linear Solution Scheme
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abhyankar, Shrirang; Constantinescu, Emil M.; Smith, Barry F.
Fast dynamics simulation of large-scale power systems is a computational challenge because of the need to solve a large set of stiff, nonlinear differential-algebraic equations at every time step. The main bottleneck in dynamic simulations is the solution of a linear system during each nonlinear iteration of Newton’s method. In this paper, we present a parallel Krylov- Schwarz linear solution scheme that uses the Krylov subspacebased iterative linear solver GMRES with an overlapping restricted additive Schwarz preconditioner. As a result, performance tests of the proposed Krylov-Schwarz scheme for several large test cases ranging from 2,000 to 20,000 buses, including amore » real utility network, show good scalability on different computing architectures.« less
NASA Astrophysics Data System (ADS)
MacArt, Jonathan F.; Mueller, Michael E.
2016-12-01
Two formally second-order accurate, semi-implicit, iterative methods for the solution of scalar transport-reaction equations are developed for Direct Numerical Simulation (DNS) of low Mach number turbulent reacting flows. The first is a monolithic scheme based on a linearly implicit midpoint method utilizing an approximately factorized exact Jacobian of the transport and reaction operators. The second is an operator splitting scheme based on the Strang splitting approach. The accuracy properties of these schemes, as well as their stability, cost, and the effect of chemical mechanism size on relative performance, are assessed in two one-dimensional test configurations comprising an unsteady premixed flame and an unsteady nonpremixed ignition, which have substantially different Damköhler numbers and relative stiffness of transport to chemistry. All schemes demonstrate their formal order of accuracy in the fully-coupled convergence tests. Compared to a (non-)factorized scheme with a diagonal approximation to the chemical Jacobian, the monolithic, factorized scheme using the exact chemical Jacobian is shown to be both more stable and more economical. This is due to an improved convergence rate of the iterative procedure, and the difference between the two schemes in convergence rate grows as the time step increases. The stability properties of the Strang splitting scheme are demonstrated to outpace those of Lie splitting and monolithic schemes in simulations at high Damköhler number; however, in this regime, the monolithic scheme using the approximately factorized exact Jacobian is found to be the most economical at practical CFL numbers. The performance of the schemes is further evaluated in a simulation of a three-dimensional, spatially evolving, turbulent nonpremixed planar jet flame.
The use and management of water in the Likangala Irrigation Scheme Complex in Southern Malawi
NASA Astrophysics Data System (ADS)
Mulwafu, Wapulumuka O.; Nkhoma, Bryson G.
This paper examines the uses and management of water for agriculture in Lake Chilwa catchment area in Zomba district of Southern Malawi. It focuses on the Likangala Rice Irrigation Scheme Complex situated along the Likangala River. The scheme is one of the largest government-run schemes. Established in the late 1960s by the government to meet the growing demand for rice, the scheme contributes greatly to the agricultural industry of the country. Besides, the scheme was established to ensure maximum utilization of Malawi's largest wetland, which, due to its hydromorphic soils and the littoral floodplains, does not favour the production of traditional upland seasonal crops such as maize. The scheme's overdependence on water from the Likangala River has attracted a considerable degree of academic interest in the use and management of the river to ensure that there is equity and efficiency for both productive and domestic users. The paper focuses on four main issues: the historical development of the scheme, the distribution of water to farmers, social relations, and the overall contribution of the scheme towards the social and economic development of the area and the country in general. The paper contends that the growing population of the basin and the increase in the number of formal and informal smallholder farmers, contributes greatly to the growth of competition and conflicts over water, which tends to undermine the economic potential of the scheme. Furthermore, the paper provides clearest indication of the need for a realistic and informed water management policy and strategy to solve the growing problem of social inequity without necessarily compromising the production of rice in the scheme.
NASA Technical Reports Server (NTRS)
Greenberg, Albert G.; Lubachevsky, Boris D.; Nicol, David M.; Wright, Paul E.
1994-01-01
Fast, efficient parallel algorithms are presented for discrete event simulations of dynamic channel assignment schemes for wireless cellular communication networks. The driving events are call arrivals and departures, in continuous time, to cells geographically distributed across the service area. A dynamic channel assignment scheme decides which call arrivals to accept, and which channels to allocate to the accepted calls, attempting to minimize call blocking while ensuring co-channel interference is tolerably low. Specifically, the scheme ensures that the same channel is used concurrently at different cells only if the pairwise distances between those cells are sufficiently large. Much of the complexity of the system comes from ensuring this separation. The network is modeled as a system of interacting continuous time automata, each corresponding to a cell. To simulate the model, conservative methods are used; i.e., methods in which no errors occur in the course of the simulation and so no rollback or relaxation is needed. Implemented on a 16K processor MasPar MP-1, an elegant and simple technique provides speedups of about 15 times over an optimized serial simulation running on a high speed workstation. A drawback of this technique, typical of conservative methods, is that processor utilization is rather low. To overcome this, new methods were developed that exploit slackness in event dependencies over short intervals of time, thereby raising the utilization to above 50 percent and the speedup over the optimized serial code to about 120 times.
α Heating in a Stagnated Z-pinch
NASA Astrophysics Data System (ADS)
Appelbe, Brian; Chittenden, Jeremy
2009-01-01
A computational investigation of a scheme for magneto-inertial confinement fusion in a Z-pinch is carried out. In the scheme implosion of a deuterium-tritium fuel mass is preceded by formation of a hotspot containing warm, dense plasma on axis. The presence of the hotspot increases energy yield. Compression of the hotspot by the main fuel mass initiates thermonuclear burn. There is significant heating of the plasma by thermonuclear α particles which are confined by the strong magnetic field of the Z-pinch.
NASA Astrophysics Data System (ADS)
De Meij, A.; Vinuesa, J.-F.; Maupas, V.
2018-05-01
The sensitivity of different microphysics and dynamics schemes on calculated global horizontal irradiation (GHI) values in the Weather Research Forecasting (WRF) model is studied. 13 sensitivity simulations were performed for which the microphysics, cumulus parameterization schemes and land surface models were changed. Firstly we evaluated the model's performance by comparing calculated GHI values for the Base Case with observations for the Reunion Island for 2014. In general, the model calculates the largest bias during the austral summer. This indicates that the model is less accurate in timing the formation and dissipation of clouds during the summer, when higher water vapor quantities are present in the atmosphere than during the austral winter. Secondly, the model sensitivity on changing the microphysics, cumulus parameterization and land surface models on calculated GHI values is evaluated. The sensitivity simulations showed that changing the microphysics from the Thompson scheme (or Single-Moment 6-class scheme) to the Morrison double-moment scheme, the relative bias improves from 45% to 10%. The underlying reason for this improvement is that the Morrison double-moment scheme predicts the mass and number concentrations of five hydrometeors, which help to improve the calculation of the densities, size and lifetime of the cloud droplets. While the single moment schemes only predicts the mass for less hydrometeors. Changing the cumulus parameterization schemes and land surface models does not have a large impact on GHI calculations.
Stochastic dynamics of virus capsid formation: direct versus hierarchical self-assembly
2012-01-01
Background In order to replicate within their cellular host, many viruses have developed self-assembly strategies for their capsids which are sufficiently robust as to be reconstituted in vitro. Mathematical models for virus self-assembly usually assume that the bonds leading to cluster formation have constant reactivity over the time course of assembly (direct assembly). In some cases, however, binding sites between the capsomers have been reported to be activated during the self-assembly process (hierarchical assembly). Results In order to study possible advantages of such hierarchical schemes for icosahedral virus capsid assembly, we use Brownian dynamics simulations of a patchy particle model that allows us to switch binding sites on and off during assembly. For T1 viruses, we implement a hierarchical assembly scheme where inter-capsomer bonds become active only if a complete pentamer has been assembled. We find direct assembly to be favorable for reversible bonds allowing for repeated structural reorganizations, while hierarchical assembly is favorable for strong bonds with small dissociation rate, as this situation is less prone to kinetic trapping. However, at the same time it is more vulnerable to monomer starvation during the final phase. Increasing the number of initial monomers does have only a weak effect on these general features. The differences between the two assembly schemes become more pronounced for more complex virus geometries, as shown here for T3 viruses, which assemble through homogeneous pentamers and heterogeneous hexamers in the hierarchical scheme. In order to complement the simulations for this more complicated case, we introduce a master equation approach that agrees well with the simulation results. Conclusions Our analysis shows for which molecular parameters hierarchical assembly schemes can outperform direct ones and suggests that viruses with high bond stability might prefer hierarchical assembly schemes. These insights increase our physical understanding of an essential biological process, with many interesting potential applications in medicine and materials science. PMID:23244740
Numerical approach to optimal portfolio in a power utility regime-switching model
NASA Astrophysics Data System (ADS)
Gyulov, Tihomir B.; Koleva, Miglena N.; Vulkov, Lubin G.
2017-12-01
We consider a system of weakly coupled degenerate semi-linear parabolic equations of optimal portfolio in a regime-switching with power utility function, derived by A.R. Valdez and T. Vargiolu [14]. First, we discuss some basic properties of the solution of this system. Then, we develop and analyze implicit-explicit, flux limited finite difference schemes for the differential problem. Numerical experiments are discussed.
NASA Astrophysics Data System (ADS)
Meng, Aiyun; Zhu, Bicheng; Zhong, Bo; Zhang, Liuyang; Cheng, Bei
2017-11-01
Photocatalytic H2 evolution, which utilizes solar energy via water splitting, is a promising route to deal with concerns about energy and environment. Herein, a direct Z-scheme TiO2/CdS binary hierarchical photocatalyst was fabricated via a successive ionic layer adsorption and reaction (SILAR) technique, and photocatalytic H2 production was measured afterwards. The as-prepared TiO2/CdS hybrid photocatalyst exhibited noticeably promoted photocatalytic H2-production activity of 51.4 μmol h-1. The enhancement of photocatalytic activity was ascribed to the hierarchical structure, as well as the efficient charge separation and migration from TiO2 nanosheets to CdS nanoparticles (NPs) at their tight contact interfaces. Moreover, the direct Z-scheme photocatalytic reaction mechanism was demonstrated to elucidate the improved photocatalytic performance of TiO2/CdS composite photocatalyst. The photoluminescence (PL) analysis of hydroxyl radicals were conducted to provide clues for the direct Z-scheme mechanism. This work provides a facile route for the construction of redox mediator-free Z-scheme photocatalytic system for photocatalytic water splitting.
Distributed Fair Auto Rate Medium Access Control for IEEE 802.11 Based WLANs
NASA Astrophysics Data System (ADS)
Zhu, Yanfeng; Niu, Zhisheng
Much research has shown that a carefully designed auto rate medium access control can utilize the underlying physical multi-rate capability to exploit the time-variation of the channel. In this paper, we develop a simple analytical model to elucidate the rule that maximizes the throughput of RTS/CTS based multi-rate wireless local area networks. Based on the discovered rule, we propose two distributed fair auto rate medium access control schemes called FARM and FARM+ from the view-point of throughput fairness and time-share fairness, respectively. With the proposed schemes, after receiving a RTS frame, the receiver selectively returns the CTS frame to inform the transmitter the maximum feasible rate probed by the signal-to-noise ratio of the received RTS frame. The key feature of the proposed schemes is that they are capable of maintaining throughput/time-share fairness in asymmetric situation where the distribution of SNR varies with stations. Extensive simulation results show that the proposed schemes outperform the existing throughput/time-share fair auto rate schemes in time-varying channel conditions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Odéen, Henrik, E-mail: h.odeen@gmail.com; Diakite, Mahamadou; Todd, Nick
2014-09-15
Purpose: To investigate k-space subsampling strategies to achieve fast, large field-of-view (FOV) temperature monitoring using segmented echo planar imaging (EPI) proton resonance frequency shift thermometry for MR guided high intensity focused ultrasound (MRgHIFU) applications. Methods: Five different k-space sampling approaches were investigated, varying sample spacing (equally vs nonequally spaced within the echo train), sampling density (variable sampling density in zero, one, and two dimensions), and utilizing sequential or centric sampling. Three of the schemes utilized sequential sampling with the sampling density varied in zero, one, and two dimensions, to investigate sampling the k-space center more frequently. Two of the schemesmore » utilized centric sampling to acquire the k-space center with a longer echo time for improved phase measurements, and vary the sampling density in zero and two dimensions, respectively. Phantom experiments and a theoretical point spread function analysis were performed to investigate their performance. Variable density sampling in zero and two dimensions was also implemented in a non-EPI GRE pulse sequence for comparison. All subsampled data were reconstructed with a previously described temporally constrained reconstruction (TCR) algorithm. Results: The accuracy of each sampling strategy in measuring the temperature rise in the HIFU focal spot was measured in terms of the root-mean-square-error (RMSE) compared to fully sampled “truth.” For the schemes utilizing sequential sampling, the accuracy was found to improve with the dimensionality of the variable density sampling, giving values of 0.65 °C, 0.49 °C, and 0.35 °C for density variation in zero, one, and two dimensions, respectively. The schemes utilizing centric sampling were found to underestimate the temperature rise, with RMSE values of 1.05 °C and 1.31 °C, for variable density sampling in zero and two dimensions, respectively. Similar subsampling schemes with variable density sampling implemented in zero and two dimensions in a non-EPI GRE pulse sequence both resulted in accurate temperature measurements (RMSE of 0.70 °C and 0.63 °C, respectively). With sequential sampling in the described EPI implementation, temperature monitoring over a 192 × 144 × 135 mm{sup 3} FOV with a temporal resolution of 3.6 s was achieved, while keeping the RMSE compared to fully sampled “truth” below 0.35 °C. Conclusions: When segmented EPI readouts are used in conjunction with k-space subsampling for MR thermometry applications, sampling schemes with sequential sampling, with or without variable density sampling, obtain accurate phase and temperature measurements when using a TCR reconstruction algorithm. Improved temperature measurement accuracy can be achieved with variable density sampling. Centric sampling leads to phase bias, resulting in temperature underestimations.« less
Nuclear Decay Data in the MIRD Format
nuclear decay and decay scheme drawings will be produced in the Medical Internal Radiation Dose (MIRD National Laboratory Report BNL-NCS-52142, February 29, 1988) More information concerning medical
Spoof four-wave mixing for all-optical wavelength conversion.
Gong, Yongkang; Huang, Jungang; Li, Kang; Copner, Nigel; Martinez, J J; Wang, Leirang; Duan, Tao; Zhang, Wenfu; Loh, W H
2012-10-08
We present for the first time an all-optical wavelength conversion (AOWC) scheme supporting modulation format independency without requiring phase matching. The new scheme is named "spoof" four wave mixing (SFWM) and in contrast to the well-known FWM theory, where the induced dynamic refractive index grating modulates photons to create a wave at a new frequency, the SFWM is different in that the dynamic refractive index grating is generated in a nonlinear Bragg Grating (BG) to excite additional reflective peaks at either side of the original BG bandgap in reflection spectrum. This fundamental difference enable the SFWM to avoid the intrinsic shortcoming of stringent phase matching required in the conventional FWM, and allows AOWC with modulation format transparency and ultrabroad conversion range, which may have great potential applications for next generation of all-optical networks.
NASA Astrophysics Data System (ADS)
Cai, Kai; Pickett, Megan K.; Durisen, Richard H.; Milne, Anne M.
2010-06-01
There has been disagreement about whether cooling in protoplanetary disks can be sufficiently fast to induce the formation of gas giant protoplanets via gravitational instabilities. Simulations by our own group and others indicate that this method of planet formation does not work for disks around young, low-mass stars inside several tens of AU, while simulations by other groups show fragmentation into protoplanetary clumps in this region. To allow direct comparison in hopes of isolating the cause of the differences, we here present a high-resolution three-dimensional hydrodynamics simulation of a protoplanetary disk, where the disk model, initial perturbation, and simulation conditions are essentially identical to those used in a recent set of simulations by Boss in 2007, hereafter B07. As in earlier papers by the same author, B07 purports to show that cooling is fast enough to produce protoplanetary clumps. Here, we evolve the same B07 disk using an improved version of one of our own radiative schemes and find that the disk does not fragment in our code but instead quickly settles into a state with only low amplitude nonaxisymmetric structure, which persists for at least several outer disk rotations. We see no rapid radiative or convective cooling. We conclude that the differences in results are due to different treatments of regions at and above the disk photosphere, and we explain at least one way in which the scheme in B07 may lead to artificially fast cooling.
Failure of Non-Circular Composite Cylinders
NASA Technical Reports Server (NTRS)
Hyer, M. W.
2004-01-01
In this study, a progressive failure analysis is used to investigate leakage in internally pressurized non-circular composite cylinders. This type of approach accounts for the localized loss of stiffness when material failure occurs at some location in a structure by degrading the local material elastic properties by a certain factor. The manner in which this degradation of material properties takes place depends on the failure modes, which are determined by the application of a failure criterion. The finite-element code STAGS, which has the capability to perform progressive failure analysis using different degradation schemes and failure criteria, is utilized to analyze laboratory scale, graphite-epoxy, elliptical cylinders with quasi-isotropic, circumferentially-stiff, and axially-stiff material orthotropies. The results are divided into two parts. The first part shows that leakage, which is assumed to develop if there is material failure in every layer at some axial and circumferential location within the cylinder, does not occur without failure of fibers. Moreover before fibers begin to fail, only matrix tensile failures, or matrix cracking, takes place, and at least one layer in all three cylinders studied remain uncracked, preventing the formation of a leakage path. That determination is corroborated by the use of different degradation schemes and various failure criteria. Among the degradation schemes investigated are the degradation of different engineering properties, the use of various degradation factors, the recursive or non-recursive degradation of the engineering properties, and the degradation of material properties using different computational approaches. The failure criteria used in the analysis include the noninteractive maximum stress criterion and the interactive Hashin and Tsai-Wu criteria. The second part of the results shows that leakage occurs due to a combination of matrix tensile and compressive, fiber tensile and compressive, and inplane shear failure modes in all three cylinders. Leakage develops after a relatively low amount of fiber damage, at about the same pressure for three material orthotropies, and at approximately the same location.
NASA Astrophysics Data System (ADS)
Zhang, Junhua; Lohmann, Ulrike
2003-08-01
The single column model of the Canadian Centre for Climate Modeling and Analysis (CCCma) climate model is used to simulate Arctic spring cloud properties observed during the Surface Heat Budget of the Arctic Ocean (SHEBA) experiment. The model is driven by the rawinsonde observations constrained European Center for Medium-Range Weather Forecasts (ECMWF) reanalysis data. Five cloud parameterizations, including three statistical and two explicit schemes, are compared and the sensitivity to mixed phase cloud parameterizations is studied. Using the original mixed phase cloud parameterization of the model, the statistical cloud schemes produce more cloud cover, cloud water, and precipitation than the explicit schemes and in general agree better with observations. The mixed phase cloud parameterization from ECMWF decreases the initial saturation specific humidity threshold of cloud formation. This improves the simulated cloud cover in the explicit schemes and reduces the difference between the different cloud schemes. On the other hand, because the ECMWF mixed phase cloud scheme does not consider the Bergeron-Findeisen process, less ice crystals are formed. This leads to a higher liquid water path and less precipitation than what was observed.
Online fault adaptive control for efficient resource management in Advanced Life Support Systems
NASA Technical Reports Server (NTRS)
Abdelwahed, Sherif; Wu, Jian; Biswas, Gautam; Ramirez, John; Manders, Eric-J
2005-01-01
This article presents the design and implementation of a controller scheme for efficient resource management in Advanced Life Support Systems. In the proposed approach, a switching hybrid system model is used to represent the dynamics of the system components and their interactions. The operational specifications for the controller are represented by utility functions, and the corresponding resource management problem is formulated as a safety control problem. The controller is designed as a limited-horizon online supervisory controller that performs a limited forward search on the state-space of the system at each time step, and uses the utility functions to decide on the best action. The feasibility and accuracy of the online algorithm can be assessed at design time. We demonstrate the effectiveness of the scheme by running a set of experiments on the Reverse Osmosis (RO) subsystem of the Water Recovery System (WRS).
Capturing planar shapes by approximating their outlines
NASA Astrophysics Data System (ADS)
Sarfraz, M.; Riyazuddin, M.; Baig, M. H.
2006-05-01
A non-deterministic evolutionary approach for approximating the outlines of planar shapes has been developed. Non-uniform Rational B-splines (NURBS) have been utilized as an underlying approximation curve scheme. Simulated Annealing heuristic is used as an evolutionary methodology. In addition to independent studies of the optimization of weight and knot parameters of the NURBS, a separate scheme has also been developed for the optimization of weights and knots simultaneously. The optimized NURBS models have been fitted over the contour data of the planar shapes for the ultimate and automatic output. The output results are visually pleasing with respect to the threshold provided by the user. A web-based system has also been developed for the effective and worldwide utilization. The objective of this system is to provide the facility to visualize the output to the whole world through internet by providing the freedom to the user for various desired input parameters setting in the algorithm designed.
Online fault adaptive control for efficient resource management in Advanced Life Support Systems.
Abdelwahed, Sherif; Wu, Jian; Biswas, Gautam; Ramirez, John; Manders, Eric-J
2005-01-01
This article presents the design and implementation of a controller scheme for efficient resource management in Advanced Life Support Systems. In the proposed approach, a switching hybrid system model is used to represent the dynamics of the system components and their interactions. The operational specifications for the controller are represented by utility functions, and the corresponding resource management problem is formulated as a safety control problem. The controller is designed as a limited-horizon online supervisory controller that performs a limited forward search on the state-space of the system at each time step, and uses the utility functions to decide on the best action. The feasibility and accuracy of the online algorithm can be assessed at design time. We demonstrate the effectiveness of the scheme by running a set of experiments on the Reverse Osmosis (RO) subsystem of the Water Recovery System (WRS).
Jo, Wan-Kuen; Sivakumar Natarajan, Thillai
2015-08-12
Novel redox-mediator-free direct Z-scheme CaIn2S4 marigold-flower-like/TiO2 (CIS/TNP) photocatalysts with different CaIn2S4 weight percentages were synthesized using a facile wet-impregnation method. Uniform hierarchical marigold-flower-like CaIn2S4 (CIS) microspheres were synthesized using a hydrothermal method. Field-emission scanning electron microscopy and transmission electron microscopy analyses suggested that the formation and aggregation of nanoparticles, followed by the growth of petals or sheets and their subsequent self-assembly, led to the formation of the uniform hierarchical marigold-flower-like CIS structures. The photocatalytic degradation efficiency of the direct Z-scheme CIS/TNP photocatalysts was evaluated through the degradation of the pharmaceutical compounds isoniazid (ISN) and metronidazole (MTZ). The direct Z-scheme CaIn2S4 marigold-flower-like/TiO2 (1%-CIS/TNP) photocatalyst showed enhanced performance in the ISN (71.9%) and MTZ (86.5%) photocatalytic degradations as compared to composites with different CaIn2S4 contents or the individual TiO2 and CaIn2S4. A possible enhancement mechanism based on the Z-scheme formed between the CIS and TNP for the improved photocatalytic efficiency was also proposed. The recombination rate of the photoinduced charge carriers was significantly suppressed for the direct Z-scheme CIS/TNP photocatalyst, which was confirmed by photoluminescence analysis. Radical-trapping studies revealed that photogenerated holes (h+), •OH, and O2•- are the primary active species, and suggested that the enhanced photocatalytic efficiency of the 1%-CIS/TNP follows the Z-scheme mechanism for transferring the charge carriers. It was further confirmed by hydroxyl (•OH) radical determination via fluorescence techniques revealed that higher concentration of •OH radical were formed over 1%-CIS/TNP than over bare CIS and TNP. The separation of the charge carriers was further confirmed using photocurrent and electron spin resonance measurements. Kinetic and chemical oxygen demand analyses were performed to confirm the ISN and MTZ degradation. The results demonstrated that the direct Z-scheme CIS/TNP photocatalyst shows superior decomposition efficiency for the degradation of these pharmaceuticals under the given reaction conditions.
Star Formation and AGN Activity in Ultraluminous Infrared Galaxies at z > 1.15
NASA Astrophysics Data System (ADS)
Baldassare, Vivienne; Kartaltepe, J.
2012-01-01
We studied active galactic nucleus (AGN) activity and star formation in a sample of 52 luminous and ultraluminous infrared galaxies ((U)LIRGs) with 1.17 < z < 1.602 and LIR > 1011.5 Lsolar. ULIRGs get their extreme infrared luminosities from the heating of dust by star formation and/or AGN. Studies done in the local universe have revealed that all local ULIRGs are mergers (Sanders & Mirabel 1996), and have proposed evolutionary schemes in which early merger stages are dominated by starbursts, intermediate merger stages are dominated by starburst-AGN composite objects, and late merger stages are dominated by AGN (Yuan et al. 2010). They have also shown that most ULIRGs with LIR > 1012.4-12.5 Lsolar appear AGN-like (Tran et al. 2001). We used near infrared spectroscopy in order to determine whether these trends extend to high redshift, utilizing the [NII]/H-alpha and [OIII]/H-beta line ratios to plot our objects on a BPT diagram which classifies them as star forming, AGN, or composite. We find that many of the objects in our sample show evidence of mergers or interactions, and that all objects in our sample with LIR >1012.5 Lsolar are AGN or composite objects. Vivienne Baldassare was supported by the NOAO/KPNO Research Experiences for Undergraduates (REU) Program which is funded by the National Science Foundation Research Experiences for Undergraduates Program and the Department of Defense ASSURE program through Scientific Program Order No. 13 (AST-0754223) of the Cooperative Agreement No. AST-0132798 between the Association of Universities for Research in Astronomy (AURA) and the NSF.
NASA Astrophysics Data System (ADS)
Ghasemi, S.; Khorasani, K.
2015-10-01
In this paper, the problem of fault detection and isolation (FDI) of the attitude control subsystem (ACS) of spacecraft formation flying systems is considered. For developing the FDI schemes, an extended Kalman filter (EKF) is utilised which belongs to a class of nonlinear state estimation methods. Three architectures, namely centralised, decentralised, and semi-decentralised, are considered and the corresponding FDI strategies are designed and constructed. Appropriate residual generation techniques and threshold selection criteria are proposed for these architectures. The capabilities of the proposed architectures for accomplishing the FDI tasks are studied through extensive numerical simulations for a team of four satellites in formation flight. Using a confusion matrix evaluation criterion, it is shown that the centralised architecture can achieve the most reliable results relative to the semi-decentralised and decentralised architectures at the expense of availability of a centralised processing module that requires the entire team information set. On the other hand, the semi-decentralised performance is close to the centralised scheme without relying on the availability of the entire team information set. Furthermore, the results confirm that the FDI results in formations with angular velocity measurement sensors achieve higher level of accuracy, true faulty, and precision, along with lower level of false healthy misclassification as compared to the formations that utilise attitude measurement sensors.
Decision-aided ICI mitigation with time-domain average approximation in CO-OFDM
NASA Astrophysics Data System (ADS)
Ren, Hongliang; Cai, Jiaxing; Ye, Xin; Lu, Jin; Cao, Quanjun; Guo, Shuqin; Xue, Lin-lin; Qin, Yali; Hu, Weisheng
2015-07-01
We introduce and investigate the feasibility of a novel iterative blind phase noise inter-carrier interference (ICI) mitigation scheme for coherent optical orthogonal frequency division multiplexing (CO-OFDM) systems. The ICI mitigation scheme is performed through the combination of frequency-domain symbol decision-aided estimation and the ICI phase noise time-average approximation. An additional initial decision process with suitable threshold is introduced in order to suppress the decision error symbols. Our proposed ICI mitigation scheme is proved to be effective in removing the ICI for a simulated CO-OFDM with 16-QAM modulation format. With the slightly high computational complexity, it outperforms the time-domain average blind ICI (Avg-BL-ICI) algorithm at a relatively wide laser line-width and high OSNR.
XDesign: an open-source software package for designing X-ray imaging phantoms and experiments.
Ching, Daniel J; Gürsoy, Dogˇa
2017-03-01
The development of new methods or utilization of current X-ray computed tomography methods is impeded by the substantial amount of expertise required to design an X-ray computed tomography experiment from beginning to end. In an attempt to make material models, data acquisition schemes and reconstruction algorithms more accessible to researchers lacking expertise in some of these areas, a software package is described here which can generate complex simulated phantoms and quantitatively evaluate new or existing data acquisition schemes and image reconstruction algorithms for targeted applications.
Dynamic Hierarchical Sleep Scheduling for Wireless Ad-Hoc Sensor Networks
Wen, Chih-Yu; Chen, Ying-Chih
2009-01-01
This paper presents two scheduling management schemes for wireless sensor networks, which manage the sensors by utilizing the hierarchical network structure and allocate network resources efficiently. A local criterion is used to simultaneously establish the sensing coverage and connectivity such that dynamic cluster-based sleep scheduling can be achieved. The proposed schemes are simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithms provide efficient network power control and can achieve high scalability in wireless sensor networks. PMID:22412343
Dynamic hierarchical sleep scheduling for wireless ad-hoc sensor networks.
Wen, Chih-Yu; Chen, Ying-Chih
2009-01-01
This paper presents two scheduling management schemes for wireless sensor networks, which manage the sensors by utilizing the hierarchical network structure and allocate network resources efficiently. A local criterion is used to simultaneously establish the sensing coverage and connectivity such that dynamic cluster-based sleep scheduling can be achieved. The proposed schemes are simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithms provide efficient network power control and can achieve high scalability in wireless sensor networks.
Negative refraction with low absorption using Raman transitions with magnetoelectric coupling
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sikes, D. E.; Yavuz, D. D.
2010-07-15
We suggest a scheme for obtaining negative refraction that does not require the simultaneous presence of an electric-dipole and a magnetic-dipole transition near the same transition frequency. The key idea of the scheme is to obtain a strong electric response by using far-off-resonant Raman transitions. We propose to use a pair of electric-dipole Raman transitions and utilize magneto-electric cross coupling to achieve a negative index of refraction without requiring negative permeability. The interference of the two Raman transitions allows tunable negative refraction with low absorption.
XDesign: An open-source software package for designing X-ray imaging phantoms and experiments
Ching, Daniel J.; Gursoy, Dogˇa
2017-02-21
Here, the development of new methods or utilization of current X-ray computed tomography methods is impeded by the substantial amount of expertise required to design an X-ray computed tomography experiment from beginning to end. In an attempt to make material models, data acquisition schemes and reconstruction algorithms more accessible to researchers lacking expertise in some of these areas, a software package is described here which can generate complex simulated phantoms and quantitatively evaluate new or existing data acquisition schemes and image reconstruction algorithms for targeted applications.
Design of fire detection equipment based on ultraviolet detection technology
NASA Astrophysics Data System (ADS)
Liu, Zhenji; Liu, Jin; Chu, Sheng; Ping, Chao; Yuan, Xiaobing
2015-03-01
Utilized the feature of wide bandgap semiconductor of MgZnO, researched and developed a kind of Mid-Ultraviolet-Band(MUV) ultraviolet detector which has passed the simulation experiment in the sun circumstance. Based on the ultraviolet detector, it gives out a design scheme of gun-shot detection device, which is composed of twelve ultraviolet detectors, signal amplifier, processor, annunciator , azimuth indicator and the bracket. Through Analysing the feature of solar blind, ultraviolet responsivity, fire feature of gunshots and detection distance, the feasibility of this design scheme is proved.
Electromechanical converters for electric vehicles
NASA Astrophysics Data System (ADS)
Ambros, T.; Burduniuc, M.; Deaconu, S. I.; Rujanschi, N.
2018-01-01
The paper presents the analysis of various constructive schemes of synchronous electromechanical converters with permanent magnets fixed on the rotor and asynchronous with the short-circuit rotor. Various electrical stator winding schemes have also been compared, demonstrating the efficiency of copper utilization in toroidal windings. The electromagnetic calculus of the axial machine has particularities compared to the cylindrical machine, in the paper is presented the method of correlating the geometry of the cylindrical and axial machines. In this case the method and recommendations used in the design of such machines may be used.
An Operator-Integration-Factor Splitting (OIFS) method for Incompressible Flows in Moving Domains
DOE Office of Scientific and Technical Information (OSTI.GOV)
Patel, Saumil S.; Fischer, Paul F.; Min, Misun
In this paper, we present a characteristic-based numerical procedure for simulating incompressible flows in domains with moving boundaries. Our approach utilizes an operator-integration-factor splitting technique to help produce an effcient and stable numerical scheme. Using the spectral element method and an arbitrary Lagrangian-Eulerian formulation, we investigate flows where the convective acceleration effects are non-negligible. Several examples, ranging from laminar to turbulent flows, are considered. Comparisons with a standard, semi-implicit time-stepping procedure illustrate the improved performance of the scheme.
Cache-based error recovery for shared memory multiprocessor systems
NASA Technical Reports Server (NTRS)
Wu, Kun-Lung; Fuchs, W. Kent; Patel, Janak H.
1989-01-01
A multiprocessor cache-based checkpointing and recovery scheme for of recovering from transient processor errors in a shared-memory multiprocessor with private caches is presented. New implementation techniques that use checkpoint identifiers and recovery stacks to reduce performance degradation in processor utilization during normal execution are examined. This cache-based checkpointing technique prevents rollback propagation, provides for rapid recovery, and can be integrated into standard cache coherence protocols. An analytical model is used to estimate the relative performance of the scheme during normal execution. Extensions that take error latency into account are presented.
SHABERTH - ANALYSIS OF A SHAFT BEARING SYSTEM (CRAY VERSION)
NASA Technical Reports Server (NTRS)
Coe, H. H.
1994-01-01
The SHABERTH computer program was developed to predict operating characteristics of bearings in a multibearing load support system. Lubricated and non-lubricated bearings can be modeled. SHABERTH calculates the loads, torques, temperatures, and fatigue life for ball and/or roller bearings on a single shaft. The program also allows for an analysis of the system reaction to the termination of lubricant supply to the bearings and other lubricated mechanical elements. SHABERTH has proven to be a valuable tool in the design and analysis of shaft bearing systems. The SHABERTH program is structured with four nested calculation schemes. The thermal scheme performs steady state and transient temperature calculations which predict system temperatures for a given operating state. The bearing dimensional equilibrium scheme uses the bearing temperatures, predicted by the temperature mapping subprograms, and the rolling element raceway load distribution, predicted by the bearing subprogram, to calculate bearing diametral clearance for a given operating state. The shaft-bearing system load equilibrium scheme calculates bearing inner ring positions relative to the respective outer rings such that the external loading applied to the shaft is brought into equilibrium by the rolling element loads which develop at each bearing inner ring for a given operating state. The bearing rolling element and cage load equilibrium scheme calculates the rolling element and cage equilibrium positions and rotational speeds based on the relative inner-outer ring positions, inertia effects, and friction conditions. The ball bearing subprograms in the current SHABERTH program have several model enhancements over similar programs. These enhancements include an elastohydrodynamic (EHD) film thickness model that accounts for thermal heating in the contact area and lubricant film starvation; a new model for traction combined with an asperity load sharing model; a model for the hydrodynamic rolling and shear forces in the inlet zone of lubricated contacts, which accounts for the degree of lubricant film starvation; modeling normal and friction forces between a ball and a cage pocket, which account for the transition between the hydrodynamic and elastohydrodynamic regimes of lubrication; and a model of the effect on fatigue life of the ratio of the EHD plateau film thickness to the composite surface roughness. SHABERTH is intended to be as general as possible. The models in SHABERTH allow for the complete mathematical simulation of real physical systems. Systems are limited to a maximum of five bearings supporting the shaft, a maximum of thirty rolling elements per bearing, and a maximum of one hundred temperature nodes. The SHABERTH program structure is modular and has been designed to permit refinement and replacement of various component models as the need and opportunities develop. A preprocessor is included in the IBM PC version of SHABERTH to provide a user friendly means of developing SHABERTH models and executing the resulting code. The preprocessor allows the user to create and modify data files with minimal effort and a reduced chance for errors. Data is utilized as it is entered; the preprocessor then decides what additional data is required to complete the model. Only this required information is requested. The preprocessor can accommodate data input for any SHABERTH compatible shaft bearing system model. The system may include ball bearings, roller bearings, and/or tapered roller bearings. SHABERTH is written in FORTRAN 77, and two machine versions are available from COSMIC. The CRAY version (LEW-14860) has a RAM requirement of 176K of 64 bit words. The IBM PC version (MFS-28818) is written for IBM PC series and compatible computers running MS-DOS, and includes a sample MS-DOS executable. For execution, the PC version requires at least 1Mb of RAM and an 80386 or 486 processor machine with an 80x87 math co-processor. The standard distribution medium for the IBM PC version is a set of two 5.25 inch 360K MS-DOS format diskettes. The contents of the diskettes are compressed using the PKWARE archiving tools. The utility to unarchive the files, PKUNZIP.EXE, is included. The standard distribution medium for the CRAY version is also a 5.25 inch 360K MS-DOS format diskette, but alternate distribution media and formats are available upon request. The original version of SHABERTH was developed in FORTRAN IV at Lewis Research Center for use on a UNIVAC 1100 series computer. The Cray version was released in 1988, and was updated in 1990 to incorporate fluid rheological data for Rocket Propellant 1 (RP-1), thereby allowing the analysis of bearings lubricated with RP-1. The PC version is a port of the 1990 CRAY version and was developed in 1992 by SRS Technologies under contract to NASA Marshall Space Flight Center.
Fast packet switching algorithms for dynamic resource control over ATM networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tsang, R.P.; Keattihananant, P.; Chang, T.
1996-12-01
Real-time continuous media traffic, such as digital video and audio, is expected to comprise a large percentage of the network load on future high speed packet switch networks such as ATM. A major feature which distinguishes high speed networks from traditional slower speed networks is the large amount of data the network must process very quickly. For efficient network usage, traffic control mechanisms are essential. Currently, most mechanisms for traffic control (such as flow control) have centered on the support of Available Bit Rate (ABR), i.e., non real-time, traffic. With regard to ATM, for ABR traffic, two major types ofmore » schemes which have been proposed are rate- control and credit-control schemes. Neither of these schemes are directly applicable to Real-time Variable Bit Rate (VBR) traffic such as continuous media traffic. Traffic control for continuous media traffic is an inherently difficult problem due to the time- sensitive nature of the traffic and its unpredictable burstiness. In this study, we present a scheme which controls traffic by dynamically allocating/de- allocating resources among competing VCs based upon their real-time requirements. This scheme incorporates a form of rate- control, real-time burst-level scheduling and link-link flow control. We show analytically potential performance improvements of our rate- control scheme and present a scheme for buffer dimensioning. We also present simulation results of our schemes and discuss the tradeoffs inherent in maintaining high network utilization and statistically guaranteeing many users` Quality of Service.« less
Reduction of bias and variance for evaluation of computer-aided diagnostic schemes.
Li, Qiang; Doi, Kunio
2006-04-01
Computer-aided diagnostic (CAD) schemes have been developed to assist radiologists in detecting various lesions in medical images. In addition to the development, an equally important problem is the reliable evaluation of the performance levels of various CAD schemes. It is good to see that more and more investigators are employing more reliable evaluation methods such as leave-one-out and cross validation, instead of less reliable methods such as resubstitution, for assessing their CAD schemes. However, the common applications of leave-one-out and cross-validation evaluation methods do not necessarily imply that the estimated performance levels are accurate and precise. Pitfalls often occur in the use of leave-one-out and cross-validation evaluation methods, and they lead to unreliable estimation of performance levels. In this study, we first identified a number of typical pitfalls for the evaluation of CAD schemes, and conducted a Monte Carlo simulation experiment for each of the pitfalls to demonstrate quantitatively the extent of bias and/or variance caused by the pitfall. Our experimental results indicate that considerable bias and variance may exist in the estimated performance levels of CAD schemes if one employs various flawed leave-one-out and cross-validation evaluation methods. In addition, for promoting and utilizing a high standard for reliable evaluation of CAD schemes, we attempt to make recommendations, whenever possible, for overcoming these pitfalls. We believe that, with the recommended evaluation methods, we can considerably reduce the bias and variance in the estimated performance levels of CAD schemes.
Peer counsellors' views on the collegial support scheme for doctors.
Rø, Karin Isaksson; Aasland, Olaf Gjerløw
2016-02-23
The health condition and health-related behaviour of doctors are important to the doctors themselves as well as for their treatment of patients. The collegial support scheme is a county-based and easily accessible health and care service for doctors. We therefore wanted to describe the framework and functions of this scheme and examine its utility. Fourteen focus-group interviews with a total of 61 peer counsellors from all the counties were conducted. The interviews were recorded, transcribed and analysed with the aid of systematic text condensation. The framework--easy accessibility, a readily available offer of up to three sessions, a high degree of confidentiality and informal contact--was emphasised as crucial for doctors to make use of the scheme. The peer counsellors described their role as that of a listener and supportive helper. They helped bring clarity and discuss possible needs for further follow-up or treatment of numerous different and frequently complex issues. The peer counsellors highlighted three benefits in particular: the scheme helps raise awareness by legitimising help-seeking behaviour among doctors, it is a contingency scheme, and it eases the burden by lowering the threshold to seeking out further advice and treatment. A systematic evaluation of the collegial support scheme is important for an understanding of the totality of the collegial health and care services. The collegial support scheme may lower the threshold to seeking help, and encourage some doctors to seek necessary treatment.
Coherent control of the formation of cold heteronuclear molecules by photoassociation
NASA Astrophysics Data System (ADS)
de Lima, Emanuel F.
2017-01-01
We consider the formation of cold diatomic molecules in the electronic ground state by photoassociation of atoms of dissimilar species. A combination of two transition pathways from the free colliding pair of atoms to a bound vibrational level of the electronic molecular ground state is envisioned. The first pathway consists of a pump-dump scheme with two time-delayed laser pulses in the near-infrared frequency domain. The pump pulse drives the transition to a bound vibrational level of an excited electronic state, while the dump pulse transfers the population to a bound vibrational level of the electronic ground state. The second pathway takes advantage of the existing permanent dipole moment and employs a single pulse in the far-infrared domain to drive the transition from the unbound atoms directly to a bound vibrational level in the electronic ground state. We show that this scheme offers the possibility to coherently control the photoassociation yield by manipulating the relative phase and timing of the pulses. The photoassociation mechanism is illustrated for the formation of cold LiCs molecules.
Sun, Zhijian; Zhang, Guoqing; Lu, Yu; Zhang, Weidong
2018-01-01
This paper studies the leader-follower formation control of underactuated surface vehicles with model uncertainties and environmental disturbances. A parameter estimation and upper bound estimation based sliding mode control scheme is proposed to solve the problem of the unknown plant parameters and environmental disturbances. For each of these leader-follower formation systems, the dynamic equations of position and attitude are analyzed using coordinate transformation with the aid of the backstepping technique. All the variables are guaranteed to be uniformly ultimately bounded stable in the closed-loop system, which is proven by the distribution design Lyapunov function synthesis. The main advantages of this approach are that: first, parameter estimation based sliding mode control can enhance the robustness of the closed-loop system in presence of model uncertainties and environmental disturbances; second, a continuous function is developed to replace the signum function in the design of sliding mode scheme, which devotes to reduce the chattering of the control system. Finally, numerical simulations are given to demonstrate the effectiveness of the proposed method. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.
Pozdnyakova, Natalia; Dubrovskaya, Ekaterina; Chernyshova, Marina; Makarov, Oleg; Golubev, Sergey; Balandina, Svetlana; Turkovskaya, Olga
2018-05-01
The degradation of two isomeric three-ringed polycyclic aromatic hydrocarbons by the white rot fungus Pleurotus ostreatus D1 and the litter-decomposing fungus Agaricus bisporus F-8 was studied. Despite some differences, the degradation of phenanthrene and anthracene followed the same scheme, forming quinone metabolites at the first stage. The further fate of these metabolites was determined by the composition of the ligninolytic enzyme complexes of the fungi. The quinone metabolites of phenanthrene and anthracene produced in the presence of only laccase were observed to accumulate, whereas those formed in presence of laccase and versatile peroxidase were metabolized further to form products that were further included in basal metabolism (e.g. phthalic acid). Laccase can catalyze the initial attack on the PAH molecule, which leads to the formation of quinones, and that peroxidase ensures their further oxidation, which eventually leads to PAH mineralization. A. bisporus, which produced only laccase, metabolized phenanthrene and anthracene to give the corresponding quinones as the dominant metabolites. No products of further utilization of these compounds were detected. Thus, the fungi's affiliation with different ecophysiological groups and their cultivation conditions affect the composition and dynamics of production of the ligninolytic enzyme complex and the completeness of PAH utilization. Copyright © 2018 British Mycological Society. Published by Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
An, YoungHwa; Lee, Jeongwon; Jo, JongGab; Jung, Bong-Ki; Lee, HyunYeong; Chung, Kyoung-Jae; Na, Yong-Su; Hahm, T. S.; Hwang, Y. S.
2017-01-01
An efficient and robust ECH (electron cyclotron heating)-assisted plasma start-up scheme with a low loop voltage and low volt-second consumption utilizing the trapped particle configuration (TPC) has been developed in the versatile experiment spherical torus (VEST). The TPC is a mirror-like magnetic field configuration providing a vertical magnetic field in the same direction as the equilibrium field. It significantly enhances ECH pre-ionization with enhanced particle confinement due to its mirror effect, and intrinsically provides an equilibrium field with a stable decay index enabling prompt plasma current initiation. Consequently, the formation of TPC before the onset of the loop voltage allows the plasma to start up with a lower loop voltage and lower volt-second consumption as well as a wider operation range in terms of ECH pre-ionization power and H2 filling pressure. The TPC can improve the widely-used field null configuration significantly for more efficient start-up when ECH pre-ionization is used. This can then be utilized in superconducting tokamaks requiring a low loop voltage start-up, such as ITER, or in spherical tori with limited volt-seconds. The TPC can be particularly useful in superconducting tokamaks with a limited current slew-rate of superconducting PF coils, as it can save volt-second consumption before plasma current initiation by providing prompt initiation with an intrinsic stable equilibrium field.
Chen, Huifang; Xie, Lei
2014-01-01
Self-healing group key distribution (SGKD) aims to deal with the key distribution problem over an unreliable wireless network. In this paper, we investigate the SGKD issue in resource-constrained wireless networks. We propose two improved SGKD schemes using the one-way hash chain (OHC) and the revocation polynomial (RP), the OHC&RP-SGKD schemes. In the proposed OHC&RP-SGKD schemes, by introducing the unique session identifier and binding the joining time with the capability of recovering previous session keys, the problem of the collusion attack between revoked users and new joined users in existing hash chain-based SGKD schemes is resolved. Moreover, novel methods for utilizing the one-way hash chain and constructing the personal secret, the revocation polynomial and the key updating broadcast packet are presented. Hence, the proposed OHC&RP-SGKD schemes eliminate the limitation of the maximum allowed number of revoked users on the maximum allowed number of sessions, increase the maximum allowed number of revoked/colluding users, and reduce the redundancy in the key updating broadcast packet. Performance analysis and simulation results show that the proposed OHC&RP-SGKD schemes are practical for resource-constrained wireless networks in bad environments, where a strong collusion attack resistance is required and many users could be revoked. PMID:25529204
NASA Astrophysics Data System (ADS)
Kim, Tae-Wook; Park, Sang-Gyu; Choi, Byong-Deok
2011-03-01
The previous pixel-level digital-to-analog-conversion (DAC) scheme that implements a part of a DAC in a pixel circuit turned out to be very efficient for reducing the peripheral area of an integrated data driver fabricated with low-temperature polycrystalline silicon thin-film transistors (LTPS TFTs). However, how the pixel-level DAC can be compatible with the existing pixel circuits including compensation schemes of TFT variations and IR drops on supply rails, which is of primary importance for active matrix organic light emitting diodes (AMOLEDs) is an issue in this scheme, because LTPS TFTs suffer from random variations in their characteristics. In this paper, we show that the pixel-level DAC scheme can be successfully used with the previous compensation schemes by giving two examples of voltage- and current-programming pixels. The previous pixel-level DAC schemes require additional two TFTs and one capacitor, but for these newly proposed pixel circuits, the overhead is no more than two TFTs by utilizing the already existing capacitor. In addition, through a detailed analysis, it has been shown that the pixel-level DAC can be expanded to a 4-bit resolution, or be applied together with 1:2 demultiplexing driving for 6- to 8-in. diagonal XGA AMOLED display panels.
A dual anthelmintic treatment strategic scheme for the control of fasciolosis in dairy sheep farms.
Cringoli, Giuseppe; Rinaldi, Laura; Veneziano, Vincenzo; Genchi, Claudio
2006-11-01
A clinical longitudinal field trial was conducted on a dairy sheep farm in southern Italy to assess the effectiveness of a novel anthelmintic treatment strategic scheme against Fasciola hepatica. The scheme utilizes a dual anthelmintic treatment (DAT), i.e., the use of either one of two different anthelmintics on the flock, albendazole sulphoxide (SO) at 1-month intervals and rafoxanide at 2-month intervals, administered to the lactating and non-lactating animals, respectively. The DAT strategic scheme lasted 3 years. In Year 1 and Year 2, shotgun monthly DATs for 5 consecutive months (July, August, September, October, and November) were performed on the flock. In Year 3 there was only one monthly DAT, in July. Overall, the DAT scheme reduced the prevalence of F. hepatica infection by 94.4% (from an average prevalence of 71.1% during the pre-DAT period to an average prevalence of 4.0% during Year 3), and the eggs/gram of faeces (EPG) from 29.3 to 1.3. In conclusion, the DAT strategic scheme reported in the present study successfully reduced both the prevalence and EPGs of F. hepatica to a level at which there were no longer any clinical symptoms of the disease. This scheme did not influence the albendazole SO efficacy against GI nematodes and might be used for the treatment of fasciolosis in dairy sheep farms.
Challenges of constructing salt cavern gas storage in China
NASA Astrophysics Data System (ADS)
Xia, Yan; Yuan, Guangjie; Ban, Fansheng; Zhuang, Xiaoqian; Li, Jingcui
2017-11-01
After more than ten years of research and engineering practice in salt cavern gas storage, the engineering technology of geology, drilling, leaching, completion, operation and monitoring system has been established. With the rapid growth of domestic consumption of natural gas, the requirement of underground gas storage is increasing. Because high-quality rock salt resources about 1000m depth are relatively scarce, the salt cavern gas storages will be built in deep rock salt. According to the current domestic conventional construction technical scheme, construction in deep salt formations will face many problems such as circulating pressure increasing, tubing blockage, deformation failure, higher completion risk and so on, caused by depth and the complex geological conditions. Considering these difficulties, the differences between current technical scheme and the construction scheme of twin well and big hole are analyzed, and the results show that the technical scheme of twin well and big hole have obvious advantages in reducing the circulating pressure loss, tubing blockage and failure risk, and they can be the alternative schemes to solve the technical difficulties of constructing salt cavern gas storages in the deep rock salt.
Limited effect of anthropogenic nitrogen oxides on secondary organic aerosol formation
Zheng, Y.; Unger, N.; Hodzic, A.; ...
2015-12-08
Globally, secondary organic aerosol (SOA) is mostly formed from emissions of biogenic volatile organic compounds (VOCs) by vegetation, but it can be modified by human activities as demonstrated in recent research. Specifically, nitrogen oxides (NO x = NO + NO 2) have been shown to play a critical role in the chemical formation of low volatility compounds. We have updated the SOA scheme in the global NCAR (National Center for Atmospheric Research) Community Atmospheric Model version 4 with chemistry (CAM4-chem) by implementing a 4-product volatility basis set (VBS) scheme, including NO x-dependent SOA yields and aging parameterizations. Small differences aremore » found for the no-aging VBS and 2-product schemes; large increases in SOA production and the SOA-to-OA ratio are found for the aging scheme. The predicted organic aerosol amounts capture both the magnitude and distribution of US surface annual mean measurements from the Interagency Monitoring of Protected Visual Environments (IMPROVE) network by 50 %, and the simulated vertical profiles are within a factor of 2 compared to aerosol mass spectrometer (AMS) measurements from 13 aircraft-based field campaigns across different regions and seasons. We then perform sensitivity experiments to examine how the SOA loading responds to a 50 % reduction in anthropogenic nitric oxide (NO) emissions in different regions. We find limited SOA reductions of 0.9–5.6, 6.4–12.0 and 0.9–2.8 % for global, southeast US and Amazon NO x perturbations, respectively. The fact that SOA formation is almost unaffected by changes in NO x can be largely attributed to a limited shift in chemical regime, to buffering in chemical pathways (low- and high-NO x pathways, O 3 versus NO 3-initiated oxidation) and to offsetting tendencies in the biogenic versus anthropogenic SOA responses.« less
An absolute scale for measuring the utility of money
NASA Astrophysics Data System (ADS)
Thomas, P. J.
2010-07-01
Measurement of the utility of money is essential in the insurance industry, for prioritising public spending schemes and for the evaluation of decisions on protection systems in high-hazard industries. Up to this time, however, there has been no universally agreed measure for the utility of money, with many utility functions being in common use. In this paper, we shall derive a single family of utility functions, which have risk-aversion as the only free parameter. The fact that they return a utility of zero at their low, reference datum, either the utility of no money or of one unit of money, irrespective of the value of risk-aversion used, qualifies them to be regarded as absolute scales for the utility of money. Evidence of validation for the concept will be offered based on inferential measurements of risk-aversion, using diverse measurement data.
Brugiavini, Agar; Pace, Noemi
2016-12-01
There is considerable interest in exploring the potential of social health insurance in Africa where a number of countries are currently experimenting with different approaches. Since these schemes have been introduced recently and are continuously evolving, it is important to evaluate their effectiveness in the enhancement of health care utilization and reduction of out-of-pocket expenses for potential policy suggestions. To investigate how the National Health Insurance Schemes (NHIS) in Ghana affects the utilization of maternal health care services and medical out-of-pocket expenses. We used nationally-representative household data from the Ghana Demographic and Health Survey (GDHS). We analyzed the 2014 GDHS focusing on four outcome variables, i.e. antenatal check up, delivery in a health facility, delivery assisted by a trained person and out-of-pocket expenditure. We estimated probit and bivariate probit models to take into account the issue of self selection into the health insurance schemes. The results suggest that, also taking into account the issue of self selection into the health insurance schemes, the NHIS enrollment positively affects the probability of formal antenatal check-ups before delivery, the probability of delivery in an institution and the probability of being assisted during delivery by a trained person. On the contrary, we find that, once the issue of self-selection is taken into account, the NHIS enrollment does not have a significant effect on out-of-pocket expenditure at the extensive margin. Since a greater utilization of health-care services has a strong positive effect on the current and future health status of women and their children, the health-care authorities in Ghana should make every effort to extend this coverage. In particular, since the results of the first step of the bivariate probit regressions suggest that the educational attainment of women is a strong determinant of enrollment, and those with low education and unable to read are less likely to enroll, information on the NHIS should be disseminated in ways that reach those with little or no education. Moreover, the availability of government health facilities in a region is associated with higher likelihood of enrollment in the NHIS. Accordingly, extending geographical access is an important strategy for expanding NHIS membership and improving access to health-care.
A Novel Piggyback Selection Scheme in IEEE 802.11e HCCA
NASA Astrophysics Data System (ADS)
Lee, Hyun-Jin; Kim, Jae-Hyun
A control frame can be piggybacked onto a data frame to increase channel efficiency in wireless communication. However, if the control frame including global control information is piggybacked, the delay of the data frame from a access point will be increased even though there is only one station with low physical transmission rate. It is similar to the anomaly phenomenon in a network which supports multi-rate transmission. In this letter, we define this phenomenon as “the piggyback problem at low physical transmission rate” and evaluate the effect of this problem with respect to physical transmission rate and normalized traffic load. Then, we propose a delay-based piggyback scheme. Simulations show that the proposed scheme reduces average frame transmission delay and improves channel utilization about 24% and 25%, respectively.
Discriminative Cooperative Networks for Detecting Phase Transitions
NASA Astrophysics Data System (ADS)
Liu, Ye-Hua; van Nieuwenburg, Evert P. L.
2018-04-01
The classification of states of matter and their corresponding phase transitions is a special kind of machine-learning task, where physical data allow for the analysis of new algorithms, which have not been considered in the general computer-science setting so far. Here we introduce an unsupervised machine-learning scheme for detecting phase transitions with a pair of discriminative cooperative networks (DCNs). In this scheme, a guesser network and a learner network cooperate to detect phase transitions from fully unlabeled data. The new scheme is efficient enough for dealing with phase diagrams in two-dimensional parameter spaces, where we can utilize an active contour model—the snake—from computer vision to host the two networks. The snake, with a DCN "brain," moves and learns actively in the parameter space, and locates phase boundaries automatically.
Sensor-less force-reflecting macro-micro telemanipulation systems by piezoelectric actuators.
Amini, H; Farzaneh, B; Azimifar, F; Sarhan, A A D
2016-09-01
This paper establishes a novel control strategy for a nonlinear bilateral macro-micro teleoperation system with time delay. Besides position and velocity signals, force signals are additionally utilized in the control scheme. This modification significantly improves the poor transparency during contact with the environment. To eliminate external force measurement, a force estimation algorithm is proposed for the master and slave robots. The closed loop stability of the nonlinear micro-micro teleoperation system with the proposed control scheme is investigated employing the Lyapunov theory. Consequently, the experimental results verify the efficiency of the new control scheme in free motion and during collision between the slave robot and the environment of slave robot with environment, and the efficiency of the force estimation algorithm. Copyright © 2016 ISA. Published by Elsevier Ltd. All rights reserved.
Autonomous distributed self-organization for mobile wireless sensor networks.
Wen, Chih-Yu; Tang, Hung-Kai
2009-01-01
This paper presents an adaptive combined-metrics-based clustering scheme for mobile wireless sensor networks, which manages the mobile sensors by utilizing the hierarchical network structure and allocates network resources efficiently A local criteria is used to help mobile sensors form a new cluster or join a current cluster. The messages transmitted during hierarchical clustering are applied to choose distributed gateways such that communication for adjacent clusters and distributed topology control can be achieved. In order to balance the load among clusters and govern the topology change, a cluster reformation scheme using localized criterions is implemented. The proposed scheme is simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithm provides efficient network topology management and achieves high scalability in mobile sensor networks.
NASA Astrophysics Data System (ADS)
Eaves, Nick A.; Zhang, Qingan; Liu, Fengshan; Guo, Hongsheng; Dworkin, Seth B.; Thomson, Murray J.
2016-10-01
Mitigation of soot emissions from combustion devices is a global concern. For example, recent EURO 6 regulations for vehicles have placed stringent limits on soot emissions. In order to allow design engineers to achieve the goal of reduced soot emissions, they must have the tools to so. Due to the complex nature of soot formation, which includes growth and oxidation, detailed numerical models are required to gain fundamental insights into the mechanisms of soot formation. A detailed description of the CoFlame FORTRAN code which models sooting laminar coflow diffusion flames is given. The code solves axial and radial velocity, temperature, species conservation, and soot aggregate and primary particle number density equations. The sectional particle dynamics model includes nucleation, PAH condensation and HACA surface growth, surface oxidation, coagulation, fragmentation, particle diffusion, and thermophoresis. The code utilizes a distributed memory parallelization scheme with strip-domain decomposition. The public release of the CoFlame code, which has been refined in terms of coding structure, to the research community accompanies this paper. CoFlame is validated against experimental data for reattachment length in an axi-symmetric pipe with a sudden expansion, and ethylene-air and methane-air diffusion flames for multiple soot morphological parameters and gas-phase species. Finally, the parallel performance and computational costs of the code is investigated.
Advanced modulation technology development for earth station demodulator applications
NASA Technical Reports Server (NTRS)
Davis, R. C.; Wernlund, J. V.; Gann, J. A.; Roesch, J. F.; Wright, T.; Crowley, R. D.
1989-01-01
The purpose of this contract was to develop a high rate (200 Mbps), bandwidth efficient, modulation format using low cost hardware, in 1990's technology. The modulation format chosen is 16-ary continuous phase frequency shift keying (CPFSK). The implementation of the modulation format uses a unique combination of a limiter/discriminator followed by an accumulator to determine transmitted phase. An important feature of the modulation scheme is the way coding is applied to efficiently gain back the performance lost by the close spacing of the phase points.
An 802.11 n wireless local area network transmission scheme for wireless telemedicine applications.
Lin, C F; Hung, S I; Chiang, I H
2010-10-01
In this paper, an 802.11 n transmission scheme is proposed for wireless telemedicine applications. IEEE 802.11n standards, a power assignment strategy, space-time block coding (STBC), and an object composition Petri net (OCPN) model are adopted. With the proposed wireless system, G.729 audio bit streams, Joint Photographic Experts Group 2000 (JPEG 2000) clinical images, and Moving Picture Experts Group 4 (MPEG-4) video bit streams achieve a transmission bit error rate (BER) of 10-7, 10-4, and 103 simultaneously. The proposed system meets the requirements prescribed for wireless telemedicine applications. An essential feature of this proposed transmission scheme is that clinical information that requires a high quality of service (QoS) is transmitted at a high power transmission rate with significant error protection. For maximizing resource utilization and minimizing the total transmission power, STBC and adaptive modulation techniques are used in the proposed 802.11 n wireless telemedicine system. Further, low power, direct mapping (DM), low-error protection scheme, and high-level modulation are adopted for messages that can tolerate a high BER. With the proposed transmission scheme, the required reliability of communication can be achieved. Our simulation results have shown that the proposed 802.11 n transmission scheme can be used for developing effective wireless telemedicine systems.
Effective Fragment Potential Method for H-Bonding: How To Obtain Parameters for Nonrigid Fragments.
Dubinets, Nikita; Slipchenko, Lyudmila V
2017-07-20
Accuracy of the effective fragment potential (EFP) method was explored for describing intermolecular interaction energies in three dimers with strong H-bonded interactions, formic acid, formamide, and formamidine dimers, which are a part of HBC6 database of noncovalent interactions. Monomer geometries in these dimers change significantly as a function of intermonomer separation. Several EFP schemes were considered, in which fragment parameters were prepared for a fragment in its gas-phase geometry or recomputed for each unique fragment geometry. Additionally, a scheme in which gas-phase fragment parameters are shifted according to relaxed fragment geometries is introduced and tested. EFP data are compared against the coupled cluster with single, double, and perturbative triple excitations (CCSD(T)) method in a complete basis set (CBS) and the symmetry adapted perturbation theory (SAPT). All considered EFP schemes provide a good agreement with CCSD(T)/CBS for binding energies at equilibrium separations, with discrepancies not exceeding 2 kcal/mol. However, only the schemes that utilize relaxed fragment geometries remain qualitatively correct at shorter than equilibrium intermolecular distances. The EFP scheme with shifted parameters behaves quantitatively similar to the scheme in which parameters are recomputed for each monomer geometry and thus is recommended as a computationally efficient approach for large-scale EFP simulations of flexible systems.
NASA Astrophysics Data System (ADS)
Mielikainen, Jarno; Huang, Bormin; Huang, Allen H.
2014-10-01
Purdue-Lin scheme is a relatively sophisticated microphysics scheme in the Weather Research and Forecasting (WRF) model. The scheme includes six classes of hydro meteors: water vapor, cloud water, raid, cloud ice, snow and graupel. The scheme is very suitable for massively parallel computation as there are no interactions among horizontal grid points. In this paper, we accelerate the Purdue Lin scheme using Intel Many Integrated Core Architecture (MIC) hardware. The Intel Xeon Phi is a high performance coprocessor consists of up to 61 cores. The Xeon Phi is connected to a CPU via the PCI Express (PICe) bus. In this paper, we will discuss in detail the code optimization issues encountered while tuning the Purdue-Lin microphysics Fortran code for Xeon Phi. In particularly, getting a good performance required utilizing multiple cores, the wide vector operations and make efficient use of memory. The results show that the optimizations improved performance of the original code on Xeon Phi 5110P by a factor of 4.2x. Furthermore, the same optimizations improved performance on Intel Xeon E5-2603 CPU by a factor of 1.2x compared to the original code.
NASA Astrophysics Data System (ADS)
Lin, Shin-Hsun; Liou, Tai-Sheng
2013-04-01
In this study, migration of CO2 in a deep saline aquifer with anticlines under various injection schemes was numerically simulated using the ECO2N simulator. The hypothetical study site was selected at the Taoyuan Plateau near the second largest coal-fired power plant, Datan power plant (annual CO2 emission of 1.5 Mt/yr), in Northwestern Taiwan. A 15x15 km2 simulation domain, containing two sub-parallel east-northeast Hukou and Pingzhen anticlines, was discretized into unstructured grid with spatial refinement at the injection borehole. Kueichulin sandstone and Chinshui shale in the simulation domain were considered as the storage formation and the cap rock, respectively. It was assumed that no CO2 exists in the aquifer prior to injection, and that the aquifer has a hydrostatic pressure distribution and a constant salinity of 3%. All boundaries were assumed to be "open". Isothermal simulations with 1 Mt/yr injection rate and 20 years of injection period were considered. van Genuchten capillary pressure and Corey relative permeability were assumed for all rock formations. Simulation results indicated that pressure buildup characterized the CO2 migration into three different phases: drainage of brine, formation dry-out, and dissolution and gravity take-over . It was found that the worst leakage scenario occurs if a single injection borehole is placed along the anticline axis. In this case, rock formations near the anticline axis provide a leakage path such that CO2 ultimately leaks out of the upper boundary. On the other hand, CO2 can be safely sequestrated in the storage formation if the injection borehole was placed away from the anticline axis. This is because gas phase CO2 migrates along the counter dipping direction of the anticline as a result of buoyancy. More favorable scenarios were found if a multiple-borehole injection scheme was used. In such cases, not only pressure buildup was significantly mitigated but the amount of precipitated salt was reduced. If a five-borehole scheme was used, for example, pressure buildup and the amount of precipitated salt can be reduced by 20% and 90%, respectively. More interestingly, if injection borehole was placed midway between the two anticlines, buoyancy dominates the migration of CO2 such that most CO2 is accumulated under the apex of anticline. Therefore, it is suggested that a multiple-borehole injection scheme would be a preferable scenario because of the reduced risks of pressure buildup and salt precipitation. Moreover, it would be better to place the injection boreholes away from the anticline axis in order to make good use of all possible trapping mechanisms to permanently sequestrate CO2 in deep rock formations.
Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data.
Xie, Qingqing; Wang, Liangmin
2016-11-25
With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman) algorithm and ciphertext policy attribute-based encryption (CP-ABE) scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA) and efficient enough for practical applications in terms of user side computation overhead.
Data traffic reduction schemes for sparse Cholesky factorizations
NASA Technical Reports Server (NTRS)
Naik, Vijay K.; Patrick, Merrell L.
1988-01-01
Load distribution schemes are presented which minimize the total data traffic in the Cholesky factorization of dense and sparse, symmetric, positive definite matrices on multiprocessor systems with local and shared memory. The total data traffic in factoring an n x n sparse, symmetric, positive definite matrix representing an n-vertex regular 2-D grid graph using n (sup alpha), alpha is equal to or less than 1, processors are shown to be O(n(sup 1 + alpha/2)). It is O(n(sup 3/2)), when n (sup alpha), alpha is equal to or greater than 1, processors are used. Under the conditions of uniform load distribution, these results are shown to be asymptotically optimal. The schemes allow efficient use of up to O(n) processors before the total data traffic reaches the maximum value of O(n(sup 3/2)). The partitioning employed within the scheme, allows a better utilization of the data accessed from shared memory than those of previously published methods.
NASA Astrophysics Data System (ADS)
Wang, Lian; Zhou, Yuan-yuan; Zhou, Xue-jun; Chen, Xiao
2018-03-01
Based on the orbital angular momentum and pulse position modulation, we present a novel passive measurement-device-independent quantum key distribution (MDI-QKD) scheme with the two-mode source. Combining with the tight bounds of the yield and error rate of single-photon pairs given in our paper, we conduct performance analysis on the scheme with heralded single-photon source. The numerical simulations show that the performance of our scheme is significantly superior to the traditional MDI-QKD in the error rate, key generation rate and secure transmission distance, since the application of orbital angular momentum and pulse position modulation can exclude the basis-dependent flaw and increase the information content for each single photon. Moreover, the performance is improved with the rise of the frame length. Therefore, our scheme, without intensity modulation, avoids the source side channels and enhances the key generation rate. It has greatly utility value in the MDI-QKD setups.
Design and evaluation of nonverbal sound-based input for those with motor handicapped.
Punyabukkana, Proadpran; Chanjaradwichai, Supadaech; Suchato, Atiwong
2013-03-01
Most personal computing interfaces rely on the users' ability to use their hand and arm movements to interact with on-screen graphical widgets via mainstream devices, including keyboards and mice. Without proper assistive devices, this style of input poses difficulties for motor-handicapped users. We propose a sound-based input scheme enabling users to operate Windows' Graphical User Interface by producing hums and fricatives through regular microphones. Hierarchically arranged menus are utilized so that only minimal numbers of different actions are required at a time. The proposed scheme was found to be accurate and capable of responding promptly compared to other sound-based schemes. Being able to select from multiple item-selecting modes helps reducing the average time duration needed for completing tasks in the test scenarios almost by half the time needed when the tasks were performed solely through cursor movements. Still, improvements on facilitating users to select the most appropriate modes for desired tasks should improve the overall usability of the proposed scheme.
Fang, Li-Jun; Xu, Hai-Gen; Guan, Jian-Ling
2013-09-01
Butterfly is an important bio-indicator for biodiversity monitoring and ecological environment assessment. In Europe, the species composition, population dynamics, and distribution pattern of butterfly have been monitored for decades, and many long-term monitoring schemes with international effects have been implemented. These schemes are aimed to assess the regional and national variation trends of butterfly species abundance, and to analyze the relationships of this species abundance with habitat, climate change, and other environmental factors, providing basic data for researching, protecting, and utilizing butterfly resources and predicting environmental changes, and playing important roles in the division of butterfly' s threatened level, the formulation of related protection measures, and the protection and management of ecological environment. This paper reviewed the history and present status of butterfly monitoring in Europe, with the focus on the well-known long-term monitoring programs, e. g. , the UK Butterfly Monitoring Scheme and the Germany and European Union Butterfly Monitoring Scheme. Some specific proposals for conducting butterflies monitoring in China were suggested.
Sysko, Robyn; Walsh, B. Timothy
2010-01-01
Objective This study evaluated whether the Broad Categories for the Diagnosis of Eating Disorders (BCD-ED) proposal (Walsh & Sysko, 2009) reduces the number of individuals who receive a DSM-IV eating disorder not otherwise specified (EDNOS) diagnosis. Method Individuals calling a tertiary care facility completed a brief telephone interview and were classified into a DSM-IV eating disorder category (anorexia nervosa, bulimia nervosa, EDNOS). Subsequently, the proposed DSM-5 criteria for eating disorders and the BCD-ED scheme were also applied. Results A total of 247 individuals with telephone interview data met criteria for an eating disorder, including 97 (39.3%) with an EDNOS. Of patients with an EDNOS diagnosis, 97.6% were re-classified using the BCD-ED scheme. Discussion The BCD-ED scheme has the potential to virtually eliminate the use of DSM-IV EDNOS; however, additional data are needed to document its validity and clinical utility. PMID:21997426
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
NASA Astrophysics Data System (ADS)
Ristenpart, Thomas; Yilek, Scott
Multiparty signature protocols need protection against rogue-key attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, provable security has only been established under the knowledge of secret key (KOSK) assumption where the adversary is required to reveal the secret keys it utilizes. In practice, certifying authorities rarely require the strong proofs of knowledge of secret keys required to substantiate the KOSK assumption. Instead, proofs of possession (POPs) are required and can be as simple as just a signature over the certificate request message. We propose a general registered key model, within which we can model both the KOSK assumption and in-use POP protocols. We show that simple POP protocols yield provable security of Boldyreva's multisignature scheme [11], the LOSSW multisignature scheme [28], and a 2-user ring signature scheme due to Bender, Katz, and Morselli [10]. Our results are the first to provide formal evidence that POPs can stop rogue-key attacks.
Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data †
Xie, Qingqing; Wang, Liangmin
2016-01-01
With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman) algorithm and ciphertext policy attribute-based encryption (CP-ABE) scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA) and efficient enough for practical applications in terms of user side computation overhead. PMID:27897984
Lin, Yuehe; Bennett, Wendy D.; Timchalk, Charles; Thrall, Karla D.
2004-03-02
Microanalytical systems based on a microfluidics/electrochemical detection scheme are described. Individual modules, such as microfabricated piezoelectrically actuated pumps and a microelectrochemical cell were integrated onto portable platforms. This allowed rapid change-out and repair of individual components by incorporating "plug and play" concepts now standard in PC's. Different integration schemes were used for construction of the microanalytical systems based on microfluidics/electrochemical detection. In one scheme, all individual modules were integrated in the surface of the standard microfluidic platform based on a plug-and-play design. Microelectrochemical flow cell which integrated three electrodes based on a wall-jet design was fabricated on polymer substrate. The microelectrochemical flow cell was then plugged directly into the microfluidic platform. Another integration scheme was based on a multilayer lamination method utilizing stacking modules with different functionality to achieve a compact microanalytical device. Application of the microanalytical system for detection of lead in, for example, river water and saliva samples using stripping voltammetry is described.
Optimal design of mixed-media packet-switching networks - Routing and capacity assignment
NASA Technical Reports Server (NTRS)
Huynh, D.; Kuo, F. F.; Kobayashi, H.
1977-01-01
This paper considers a mixed-media packet-switched computer communication network which consists of a low-delay terrestrial store-and-forward subnet combined with a low-cost high-bandwidth satellite subnet. We show how to route traffic via ground and/or satellite links by means of static, deterministic procedures and assign capacities to channels subject to a given linear cost such that the network average delay is minimized. Two operational schemes for this network model are investigated: one is a scheme in which the satellite channel is used as a slotted ALOHA channel; the other is a new multiaccess scheme we propose in which whenever a channel collision occurs, retransmission of the involved packets will route through ground links to their destinations. The performance of both schemes is evaluated and compared in terms of cost and average packet delay tradeoffs for some examples. The results offer guidelines for the design and optimal utilization of mixed-media networks.
Yang, Hui; Zhang, Jie; Ji, Yuefeng; Tian, Rui; Han, Jianrui; Lee, Young
2015-11-30
Data center interconnect with elastic optical network is a promising scenario to meet the high burstiness and high-bandwidth requirements of data center services. In our previous work, we implemented multi-stratum resilience between IP and elastic optical networks that allows to accommodate data center services. In view of this, this study extends to consider the resource integration by breaking the limit of network device, which can enhance the resource utilization. We propose a novel multi-stratum resources integration (MSRI) architecture based on network function virtualization in software defined elastic data center optical interconnect. A resource integrated mapping (RIM) scheme for MSRI is introduced in the proposed architecture. The MSRI can accommodate the data center services with resources integration when the single function or resource is relatively scarce to provision the services, and enhance globally integrated optimization of optical network and application resources. The overall feasibility and efficiency of the proposed architecture are experimentally verified on the control plane of OpenFlow-based enhanced software defined networking (eSDN) testbed. The performance of RIM scheme under heavy traffic load scenario is also quantitatively evaluated based on MSRI architecture in terms of path blocking probability, provisioning latency and resource utilization, compared with other provisioning schemes.
Coproduction of volatiles and metals from extraterrestrial materials
NASA Technical Reports Server (NTRS)
Lewis, John S.
1991-01-01
Two main efforts in support of the general goals of SERC/culpr are presented. Investigations of processes for the coproduction of metals from extra-terrestrial materials in conjunction with plausible schemes for oxygen extraction continue. The principal emphasis was on the extraction and purification of iron from the ilmenite reduction process for oxygen, from the cathode metal deposits made in the magma electrolysis process for oxygen, and from native ferrous metal alloys on the moon and asteroids. All work on the separation and purification of ferrous metals was focussed upon the gaseous carbonyl process, a scheme that involves only temperatures attainable by passive thermal control. The exploration of a variety of schemes was initiated, involving the use of several different propulsion options and both propulsive and aerobraking capture at earth, for return of extraterrestrial resources to earth orbits. In addition, the search for new opportunities in space resource utilization continues. Examples include the continuation of work underway on: (1) the feasibility of locating solar power satellites in highly eccentric earth orbit; (2) the energetics of extracting the potential clean fusion fuel He-3 from the atmosphere for return to earth; and (3) the utility of a nuclear steam rocket (using non-terrestrial water as the working fluid) for transportation in the inner solar system.
A core-halo pattern of entropy creation in gravitational collapse
NASA Astrophysics Data System (ADS)
Wren, Andrew J.
2018-03-01
This paper presents a kinetic theory model of gravitational collapse due to a small perturbation. Solving the relevant equations yields a pattern of entropy destruction in a spherical core around the perturbation, and entropy creation in a surrounding halo. This indicates collisional "de-relaxation" in the core, and collisional relaxation in the halo. Core-halo patterns are ubiquitous in the astrophysics of gravitational collapse, and are found here without any of the prior assumptions of such a pattern usually made in analytical models. Motivated by this analysis, the paper outlines a possible scheme for identifying structure formation in a set of observations or a simulation. This scheme involves a choice of coarse-graining scale appropriate to the structure under consideration, and might aid exploration of hierarchical structure formation, supplementing the usual density-based methods for highlighting astrophysical and cosmological structure at various scales.
GANDALF - Graphical Astrophysics code for N-body Dynamics And Lagrangian Fluids
NASA Astrophysics Data System (ADS)
Hubber, D. A.; Rosotti, G. P.; Booth, R. A.
2018-01-01
GANDALF is a new hydrodynamics and N-body dynamics code designed for investigating planet formation, star formation and star cluster problems. GANDALF is written in C++, parallelized with both OPENMP and MPI and contains a PYTHON library for analysis and visualization. The code has been written with a fully object-oriented approach to easily allow user-defined implementations of physics modules or other algorithms. The code currently contains implementations of smoothed particle hydrodynamics, meshless finite-volume and collisional N-body schemes, but can easily be adapted to include additional particle schemes. We present in this paper the details of its implementation, results from the test suite, serial and parallel performance results and discuss the planned future development. The code is freely available as an open source project on the code-hosting website github at https://github.com/gandalfcode/gandalf and is available under the GPLv2 license.
A core-halo pattern of entropy creation in gravitational collapse
NASA Astrophysics Data System (ADS)
Wren, Andrew J.
2018-07-01
This paper presents a kinetic theory model of gravitational collapse due to a small perturbation. Solving the relevant equations yields a pattern of entropy destruction in a spherical core around the perturbation, and entropy creation in a surrounding halo. This indicates collisional `de-relaxation' in the core, and collisional relaxation in the halo. Core-halo patterns are ubiquitous in the astrophysics of gravitational collapse and are found here without any of the prior assumptions of such a pattern usually made in analytical models. Motivated by this analysis, the paper outlines a possible scheme for identifying structure formation in a set of observations or a simulation. This scheme involves a choice of coarse-graining scale appropriate to the structure under consideration, and might aid exploration of hierarchical structure formation, supplementing the usual density-based methods for highlighting astrophysical and cosmological structure at various scales.
Multiple core-hole formation by free-electron laser radiation in molecular nitrogen
NASA Astrophysics Data System (ADS)
Banks, H. I. B.; Little, D. A.; Emmanouilidou, A.
2018-05-01
We investigate the formation of multiple-core-hole states of molecular nitrogen interacting with a free-electron laser pulse. In previous work, we obtained bound and continuum molecular orbitals in the single-center expansion scheme and used these orbitals to calculate photo-ionization and auger decay rates. We extend our formulation to track the proportion of the population that accesses single-site versus two-site double-core-hole (TSDCH) states, before the formation of the final atomic ions. We investigate the pulse parameters that favor the formation of the single-site and TSDCH as well as triple-core-hole states for 525 and 1100 eV photons.
Nandi, Sulakshana; Schneider, Helen; Dixit, Priyanka
2017-01-01
Research on impact of publicly financed health insurance has paid relatively little attention to the nature of healthcare provision the schemes engage. India's National Health Insurance Scheme or RSBY was made universal by Chhattisgarh State in 2012. In the State, public and private sectors provide hospital services in a context of extensive gender, social, economic and geographical inequities. This study examined enrolment, utilization (public and private) and out of pocket (OOP) expenditure for the insured and uninsured, in Chhattisgarh. The Chhattisgarh State Central sample (n = 6026 members) of the 2014 National Sample Survey (71st Round) on Health was extracted and analyzed. Variables of enrolment, hospitalization, out of pocket (OOP) expenditure and catastrophic expenditure were descriptively analyzed. Multivariate analyses of factors associated with enrolment, hospitalization (by sector) and OOP expenditure were conducted, taking into account gender, socio-economic status, residence, type of facility and ailment. Insurance coverage was 38.8%. Rates of hospitalization were 33/1000 population among the insured and 29/1000 among the uninsured. Of those insured and hospitalized, 67.2% utilized the public sector. Women, rural residents, Scheduled Tribes and poorer groups were more likely to utilize the public sector for hospitalizations. Although the insured were less likely to incur out of pocket (OOP) expenditure, 95.1% of insured private sector users and 66.0% of insured public sector users, still incurred costs. Median OOP payments in the private sector were eight times those in the public sector. Of households with at least one member hospitalized, 35.5% experienced catastrophic health expenditures (>10% monthly household consumption expenditure). The study finds that despite insurance coverage, the majority still incurred OOP expenditure. The public sector was nevertheless less expensive, and catered to the more vulnerable groups. It suggests the need to further examine the roles of public and private sectors in financial risk protection through government health insurance.
Schneider, Helen; Dixit, Priyanka
2017-01-01
Research on impact of publicly financed health insurance has paid relatively little attention to the nature of healthcare provision the schemes engage. India’s National Health Insurance Scheme or RSBY was made universal by Chhattisgarh State in 2012. In the State, public and private sectors provide hospital services in a context of extensive gender, social, economic and geographical inequities. This study examined enrolment, utilization (public and private) and out of pocket (OOP) expenditure for the insured and uninsured, in Chhattisgarh. The Chhattisgarh State Central sample (n = 6026 members) of the 2014 National Sample Survey (71st Round) on Health was extracted and analyzed. Variables of enrolment, hospitalization, out of pocket (OOP) expenditure and catastrophic expenditure were descriptively analyzed. Multivariate analyses of factors associated with enrolment, hospitalization (by sector) and OOP expenditure were conducted, taking into account gender, socio-economic status, residence, type of facility and ailment. Insurance coverage was 38.8%. Rates of hospitalization were 33/1000 population among the insured and 29/1000 among the uninsured. Of those insured and hospitalized, 67.2% utilized the public sector. Women, rural residents, Scheduled Tribes and poorer groups were more likely to utilize the public sector for hospitalizations. Although the insured were less likely to incur out of pocket (OOP) expenditure, 95.1% of insured private sector users and 66.0% of insured public sector users, still incurred costs. Median OOP payments in the private sector were eight times those in the public sector. Of households with at least one member hospitalized, 35.5% experienced catastrophic health expenditures (>10% monthly household consumption expenditure). The study finds that despite insurance coverage, the majority still incurred OOP expenditure. The public sector was nevertheless less expensive, and catered to the more vulnerable groups. It suggests the need to further examine the roles of public and private sectors in financial risk protection through government health insurance. PMID:29149181
You, Hua; Gu, Hai; Ning, Weiqing; Zhou, Hua; Dong, Hengjin
2016-01-01
Background The New Rural Cooperative Medical Scheme (NCMS) includes a maternal care benefits package that is associated with increasing maternal health services. The local compensation policies have been frequently adjusted in recent years. This study examined the association between the NCMS maternal-services policy adjustment and expense reimbursement in Yuyao, China. Methods Two household surveys were conducted in Yuyao in 2008 and 2011 (before and after the NCMS policy adjustment, respectively). Local women (N = 154) who had delivery history in the past three years were recruited. A questionnaire was used to collect information about delivery history, maternal health services utilization (prenatal care, postnatal care, and the grade of delivery institutions), NCMS participation, and reimbursement status. Logistic regression analyses were used to predict the association between policy adjustment and maternal health utilization and the association between policy adjustment and out-of-pocket proportion. Next, t-tests and covariance analyses adjusting for household income were used to compare the out-of-pocket proportion between 2008 and 2011. Results Results revealed that compensation policy adjustment was associated with an increase in postnatal visits (adjusted OR = 3.32, p = 0.009) and the use of second level or above institutions for delivery (adjusted OR = 2.32, p = 0.03) among participants. In 2008, only 9.1% of pregnant women received reimbursement from the NCMS; however, this rate increased to 36.8% in 2011. After policy adjustment, there were no significant changes in the proportion of out-of-pocket expenses shared in delivery fee (F = 0.24, p = 0.63) and in household income (F = 0.46, p = 0.50). Conclusions Financial compensation increase improved maternal health services utilization; however, this effect was limited. Although the reimbursement rate was raised, the out-of-pocket proportion was not significant changed; therefore, the compensation design scheme must be adjusted in practice. PMID:27388439
Bandwidth reduction for video-on-demand broadcasting using secondary content insertion
NASA Astrophysics Data System (ADS)
Golynski, Alexander; Lopez-Ortiz, Alejandro; Poirier, Guillaume; Quimper, Claude-Guy
2005-01-01
An optimal broadcasting scheme under the presence of secondary content (i.e. advertisements) is proposed. The proposed scheme works both for movies encoded in a Constant Bit Rate (CBR) or a Variable Bit Rate (VBR) format. It is shown experimentally that secondary content in movies can make Video-on-Demand (VoD) broadcasting systems more efficient. An efficient algorithm is given to compute the optimal broadcasting schedule with secondary content, which in particular significantly improves over the best previously known algorithm for computing the optimal broadcasting schedule without secondary content.
Formation stability analysis of unmanned multi-vehicles under interconnection topologies
NASA Astrophysics Data System (ADS)
Yang, Aolei; Naeem, Wasif; Fei, Minrui
2015-04-01
In this paper, the overall formation stability of an unmanned multi-vehicle is mathematically presented under interconnection topologies. A novel definition of formation error is first given and followed by the proposed formation stability hypothesis. Based on this hypothesis, a unique extension-decomposition-aggregation scheme is then employed to support the stability analysis for the overall multi-vehicle formation under a mesh topology. It is proved that the overall formation control system consisting of N number of nonlinear vehicles is not only asymptotically stable, but also exponentially stable in the sense of Lyapunov within a neighbourhood of the desired formation. This technique is shown to be applicable for a mesh topology but is equally applicable for other topologies. A simulation study of the formation manoeuvre of multiple Aerosonde UAVs (unmanned aerial vehicles), in 3-D space, is finally carried out verifying the achieved formation stability result.
NASA Astrophysics Data System (ADS)
Yang, Fan; Xue, Lianqing; Zhang, Luochen; Chen, Xinfang; Chi, Yixia
2017-12-01
This article aims to explore the adaptive utilization strategies of flow regime versus traditional practices in the context of climate change and human activities in the arid area. The study presents quantitative analysis of climatic and anthropogenic factors to streamflow alteration in the Tarim River Basin (TRB) using the Budyko method and adaptive utilization strategies to eco-hydrological regime by comparing the applicability between autoregressive moving average model (ARMA) model and combined regression model. Our results suggest that human activities played a dominant role in streamflow deduction in the mainstream with contribution of 120.7%~190.1%. While in the headstreams, climatic variables were the primary determinant of streamflow by 56.5~152.6% of the increase. The comparison revealed that combined regression model performed better than ARMA model with the qualified rate of 80.49~90.24%. Based on the forecasts of streamflow for different purposes, the adaptive utilization scheme of water flow is established from the perspective of time and space. Our study presents an effective water resources scheduling scheme for the ecological environment and provides references for ecological protection and water allocation in the arid area.
NASA Astrophysics Data System (ADS)
Tao, C.-S.; Chen, S.-W.; Li, Y.-Z.; Xiao, S.-P.
2017-09-01
Land cover classification is an important application for polarimetric synthetic aperture radar (PolSAR) data utilization. Rollinvariant polarimetric features such as H / Ani / α / Span are commonly adopted in PolSAR land cover classification. However, target orientation diversity effect makes PolSAR images understanding and interpretation difficult. Only using the roll-invariant polarimetric features may introduce ambiguity in the interpretation of targets' scattering mechanisms and limit the followed classification accuracy. To address this problem, this work firstly focuses on hidden polarimetric feature mining in the rotation domain along the radar line of sight using the recently reported uniform polarimetric matrix rotation theory and the visualization and characterization tool of polarimetric coherence pattern. The former rotates the acquired polarimetric matrix along the radar line of sight and fully describes the rotation characteristics of each entry of the matrix. Sets of new polarimetric features are derived to describe the hidden scattering information of the target in the rotation domain. The latter extends the traditional polarimetric coherence at a given rotation angle to the rotation domain for complete interpretation. A visualization and characterization tool is established to derive new polarimetric features for hidden information exploration. Then, a classification scheme is developed combing both the selected new hidden polarimetric features in rotation domain and the commonly used roll-invariant polarimetric features with a support vector machine (SVM) classifier. Comparison experiments based on AIRSAR and multi-temporal UAVSAR data demonstrate that compared with the conventional classification scheme which only uses the roll-invariant polarimetric features, the proposed classification scheme achieves both higher classification accuracy and better robustness. For AIRSAR data, the overall classification accuracy with the proposed classification scheme is 94.91 %, while that with the conventional classification scheme is 93.70 %. Moreover, for multi-temporal UAVSAR data, the averaged overall classification accuracy with the proposed classification scheme is up to 97.08 %, which is much higher than the 87.79 % from the conventional classification scheme. Furthermore, for multitemporal PolSAR data, the proposed classification scheme can achieve better robustness. The comparison studies also clearly demonstrate that mining and utilization of hidden polarimetric features and information in the rotation domain can gain the added benefits for PolSAR land cover classification and provide a new vision for PolSAR image interpretation and application.
Bubble-free on-chip continuous-flow polymerase chain reaction: concept and application.
Wu, Wenming; Kang, Kyung-Tae; Lee, Nae Yoon
2011-06-07
Bubble formation inside a microscale channel is a significant problem in general microfluidic experiments. The problem becomes especially crucial when performing a polymerase chain reaction (PCR) on a chip which is subject to repetitive temperature changes. In this paper, we propose a bubble-free sample injection scheme applicable for continuous-flow PCR inside a glass/PDMS hybrid microfluidic chip, and attempt to provide a theoretical basis concerning bubble formation and elimination. Highly viscous paraffin oil plugs are employed in both the anterior and posterior ends of a sample plug, completely encapsulating the sample and eliminating possible nucleation sites for bubbles. In this way, internal channel pressure is increased, and vaporization of the sample is prevented, suppressing bubble formation. Use of an oil plug in the posterior end of the sample plug aids in maintaining a stable flow of a sample at a constant rate inside a heated microchannel throughout the entire reaction, as compared to using an air plug. By adopting the proposed sample injection scheme, we demonstrate various practical applications. On-chip continuous-flow PCR is performed employing genomic DNA extracted from a clinical single hair root sample, and its D1S80 locus is successfully amplified. Also, chip reusability is assessed using a plasmid vector. A single chip is used up to 10 times repeatedly without being destroyed, maintaining almost equal intensities of the resulting amplicons after each run, ensuring the reliability and reproducibility of the proposed sample injection scheme. In addition, the use of a commercially-available and highly cost-effective hot plate as a potential candidate for the heating source is investigated.
NASA Astrophysics Data System (ADS)
Skouteris, Dimitrios; Balucani, Nadia; Ceccarelli, Cecilia; Vazart, Fanny; Puzzarini, Cristina; Barone, Vincenzo; Codella, Claudio; Lefloch, Bertrand
2018-02-01
Despite the harsh conditions of the interstellar medium, chemistry thrives in it, especially in star-forming regions where several interstellar complex organic molecules (iCOMs) have been detected. Yet, how these species are synthesized is a mystery. The majority of current models claim that this happens on interstellar grain surfaces. Nevertheless, evidence is mounting that neutral gas-phase chemistry plays an important role. In this paper, we propose a new scheme for the gas-phase synthesis of glycolaldehyde, a species with a prebiotic potential and for which no gas-phase formation route was previously known. In the proposed scheme, the ancestor is ethanol and the glycolaldehyde sister species are acetic acid (another iCOM with unknown gas-phase formation routes) and formic acid. For the reactions of the new scheme with no available data, we have performed electronic structure and kinetics calculations deriving rate coefficients and branching ratios. Furthermore, after a careful review of the chemistry literature, we revised the available chemical networks, adding and correcting several reactions related to glycolaldehyde, acetic acid, and formic acid. The new chemical network has been used in an astrochemical model to predict the abundance of glycolaldehyde, acetic acid, and formic acid. The predicted abundance of glycolaldehyde depends on the ethanol abundance in the gas phase and is in excellent agreement with the measured one in hot corinos and shock sites. Our new model overpredicts the abundance of acetic acid and formic acid by about a factor of 10, which might imply a yet incomplete reaction network.
Treatment of solid tumors by interstitial release of recoiling short-lived alpha emitters
NASA Astrophysics Data System (ADS)
Arazi, L.; Cooks, T.; Schmidt, M.; Keisari, Y.; Kelson, I.
2007-08-01
A new method utilizing alpha particles to treat solid tumors is presented. Tumors are treated with interstitial radioactive sources which continually release short-lived alpha emitting atoms from their surface. The atoms disperse inside the tumor, delivering a high dose through their alpha decays. We implement this scheme using thin wire sources impregnated with 224Ra, which release by recoil 220Rn, 216Po and 212Pb atoms. This work aims to demonstrate the feasibility of our method by measuring the activity patterns of the released radionuclides in experimental tumors. Sources carrying 224Ra activities in the range 10-130 kBq were used in experiments on murine squamous cell carcinoma tumors. These included gamma spectroscopy of the dissected tumors and major organs, Fuji-plate autoradiography of histological tumor sections and tissue damage detection by Hematoxylin-Eosin staining. The measurements focused on 212Pb and 212Bi. The 220Rn/216Po distribution was treated theoretically using a simple diffusion model. A simplified scheme was used to convert measured 212Pb activities to absorbed dose estimates. Both physical and histological measurements confirmed the formation of a 5-7 mm diameter necrotic region receiving a therapeutic alpha-particle dose around the source. The necrotic regions shape closely corresponded to the measured activity patterns. 212Pb was found to leave the tumor through the blood at a rate which decreased with tumor mass. Our results suggest that the proposed method, termed DART (diffusing alpha-emitters radiation therapy), may potentially be useful for the treatment of human patients.
NASA Astrophysics Data System (ADS)
Yunardi, Y.; Darmadi, D.; Hisbullah, H.; Fairweather, M.
2011-12-01
This paper presents the results of an application of a first-order conditional moment closure (CMC) approach coupled with a semi-empirical soot model to investigate the effect of various detailed combustion chemistry schemes on soot formation and destruction in turbulent non-premixed flames. A two-equation soot model representing soot particle nucleation, growth, coagulation and oxidation, was incorporated into the CMC model. The turbulent flow-field of both flames is described using the Favre-averaged fluid-flow equations, applying a standard k-ɛ turbulence model. A number of five reaction kinetic mechanisms having 50-100 species and 200-1000 elementary reactions called ABF, Miller-Bowman, GRI-Mech3.0, Warnatz, and Qin were employed to study the effect of combustion chemistry schemes on soot predictions. The results showed that of various kinetic schemes being studied, each yields similar accuracy in temperature prediction when compared with experimental data. With respect to soot prediction, the kinetic scheme containing benzene elementary reactions tends to result in a better prediction on soot concentrations in comparison to those contain no benzene elementary reactions. Among five kinetic mechanisms being studied, the Qin combustion scheme mechanism turned to yield the best prediction on both flame temperature and soot levels.
Index files for Belle II - very small skim containers
NASA Astrophysics Data System (ADS)
Sevior, Martin; Bloomfield, Tristan; Kuhr, Thomas; Ueda, I.; Miyake, H.; Hara, T.
2017-10-01
The Belle II experiment[1] employs the root file format[2] for recording data and is investigating the use of “index-files” to reduce the size of data skims. These files contain pointers to the location of interesting events within the total Belle II data set and reduce the size of data skims by 2 orders of magnitude. We implement this scheme on the Belle II grid by recording the parent file metadata and the event location within the parent file. While the scheme works, it is substantially slower than a normal sequential read of standard skim files using default root file parameters. We investigate the performance of the scheme by adjusting the “splitLevel” and “autoflushsize” parameters of the root files in the parent data files.
Resource Management Scheme Based on Ubiquitous Data Analysis
Lee, Heung Ki; Jung, Jaehee
2014-01-01
Resource management of the main memory and process handler is critical to enhancing the system performance of a web server. Owing to the transaction delay time that affects incoming requests from web clients, web server systems utilize several web processes to anticipate future requests. This procedure is able to decrease the web generation time because there are enough processes to handle the incoming requests from web browsers. However, inefficient process management results in low service quality for the web server system. Proper pregenerated process mechanisms are required for dealing with the clients' requests. Unfortunately, it is difficult to predict how many requests a web server system is going to receive. If a web server system builds too many web processes, it wastes a considerable amount of memory space, and thus performance is reduced. We propose an adaptive web process manager scheme based on the analysis of web log mining. In the proposed scheme, the number of web processes is controlled through prediction of incoming requests, and accordingly, the web process management scheme consumes the least possible web transaction resources. In experiments, real web trace data were used to prove the improved performance of the proposed scheme. PMID:25197692
NASA Astrophysics Data System (ADS)
Chen, Wen-Yuan; Liu, Chen-Chung
2006-01-01
The problems with binary watermarking schemes are that they have only a small amount of embeddable space and are not robust enough. We develop a slice-based large-cluster algorithm (SBLCA) to construct a robust watermarking scheme for binary images. In SBLCA, a small-amount cluster selection (SACS) strategy is used to search for a feasible slice in a large-cluster flappable-pixel decision (LCFPD) method, which is used to search for the best location for concealing a secret bit from a selected slice. This method has four major advantages over the others: (a) SBLCA has a simple and effective decision function to select appropriate concealment locations, (b) SBLCA utilizes a blind watermarking scheme without the original image in the watermark extracting process, (c) SBLCA uses slice-based shuffling capability to transfer the regular image into a hash state without remembering the state before shuffling, and finally, (d) SBLCA has enough embeddable space that every 64 pixels could accommodate a secret bit of the binary image. Furthermore, empirical results on test images reveal that our approach is a robust watermarking scheme for binary images.
Performance Analysis of Transmit Diversity Systems with Multiple Antenna Replacement
NASA Astrophysics Data System (ADS)
Park, Ki-Hong; Yang, Hong-Chuan; Ko, Young-Chai
Transmit diversity systems based on orthogonal space-time block coding (OSTBC) usually suffer from rate loss and power spreading. Proper antenna selection scheme can help to more effectively utilize the transmit antennas and transmission power in such systems. In this paper, we propose a new antenna selection scheme for such systems based on the idea of antenna switching. In particular, targeting at reducing the number of pilot channels and RF chains, the transmitter now replaces the antennas with the lowest received SNR with unused ones if the output SNR of space time decoder at the receiver is below a certain threshold. With this new scheme, not only the number of pilot channels and RF chains to be implemented is decreased, the average amount of feedback information is also reduced. To analyze the performance of this scheme, we derive the exact integral closed form for the probability density function (PDF) of the received SNR. We show through numerical examples that the proposed scheme offers better performance than traditional OSTBC systems using all available transmitting antennas, with a small amount of feedback information. We also examine the effect of different antenna configuration and feedback delay.
Comparison of multiple atmospheric chemistry schemes in C-IFS
NASA Astrophysics Data System (ADS)
Flemming, Johannes; Huijnen, Vincent; Arteta, Joaquim; Stein, Olaf; Inness, Antje; Josse, Beatrice; Schultz, Martin; Peuch, Vincent-Henri
2013-04-01
As part of the MACCII -project (EU-FP7) ECMWF's integrated forecast system (IFS) is being extended by modules for chemistry, deposition and emission of reactive gases. This integration of the chemistry complements the integration of aerosol processes in IFS (Composition-IFS). C-IFS provides global forecasts and analysis of atmospheric composition. Its main motivation is to utilize the IFS for the assimilation of satellite observation of atmospheric composition. Furthermore, the integration of chemistry packages directly into IFS will achieve better consistency in terms of the treatment of physical processes and has the potential for simulating interactions between atmospheric composition and meteorology. Atmospheric chemistry in C-IFS can be represented by the modified CB05 scheme as implemented in the TM5 model and the RACMOBUS scheme as implemented in the MOCAGE model. An implementation of the scheme of the MOZART 3.5 model is ongoing. We will present the latest progress in the development and application of C-IFS. We will focus on the comparison of the different chemistry schemes in an otherwise identical C-IFS model setup (emissions, meteorology) as well as in their original Chemistry and Transport Model setup.
Li, Ning; Cao, Chao; Wang, Cong
2017-06-15
Supporting simultaneous access of machine-type devices is a critical challenge in machine-to-machine (M2M) communications. In this paper, we propose an optimal scheme to dynamically adjust the Access Class Barring (ACB) factor and the number of random access channel (RACH) resources for clustered machine-to-machine (M2M) communications, in which Delay-Sensitive (DS) devices coexist with Delay-Tolerant (DT) ones. In M2M communications, since delay-sensitive devices share random access resources with delay-tolerant devices, reducing the resources consumed by delay-sensitive devices means that there will be more resources available to delay-tolerant ones. Our goal is to optimize the random access scheme, which can not only satisfy the requirements of delay-sensitive devices, but also take the communication quality of delay-tolerant ones into consideration. We discuss this problem from the perspective of delay-sensitive services by adjusting the resource allocation and ACB scheme for these devices dynamically. Simulation results show that our proposed scheme realizes good performance in satisfying the delay-sensitive services as well as increasing the utilization rate of the random access resources allocated to them.
Cruza, Norberto Sotelo; Fierros, Luis E
2006-01-01
The present study was done at the internal medicine service oft he Hospital lnfantil in the State of Sonora, Mexico. We tried to address the question of the use of conceptual schemes and mind maps and its impact on the teaching-learning-evaluation process among medical residents. Analyze the effects of conceptual schemes, and mind maps as a teaching and evaluation tool and compare them with multiple choice exams among Pediatric residents. Twenty two residents (RI, RII, RIII)on service rotation during six months were assessed initially, followed by a lecture on a medical subject. Conceptual schemes and mind maps were then introduced as a teaching-learning-evaluation instrument. Comprehension impact and comparison with a standard multiple choice evaluation was done. The statistical package (JMP version 5, SAS inst. 2004) was used. We noted that when we used conceptual schemes and mind mapping, learning improvement was noticeable among the three groups of residents (P < 0.001) and constitutes a better evaluation tool when compared with multiple choice exams (P < 0.0005). Based on our experience we recommend the use of this educational technique for medical residents in training.
Access to anti-cancer drugs in India: is there a need to revise reimbursement policies?
Haitsma, Gertruud; Patel, Himanshu; Gurumurthy, Parthasarathi; Postma, Maarten J
2018-06-01
The aim of this study was to examine the access of Indian cancer patients to optimum cancer care under selected government schemes by reviewing reimbursement schemes for cancer care in India. All cancer care reimbursement schemes in India were identified and three highly utilized schemes (VAS, RAS, CMCHS) were selected. Quality of breast, colorectal, lung, head & neck, and gastric cancer care was reviewed with respect to NCCN guidelines. Direct medical costs and shortage of budget in reimbursed amounts were calculated for each listed chemotherapy regimen. Medical oncology practice following the schemes' formularies is inferior to recommendations by the NCCN guidelines. Innovative treatment (targeted therapies) like trastuzumab, pertuzumab (breast), bevacizumab, cetuximab, panitumumab (colorectal), erlotinib, gefitinib, crizotinib, and nivolumab (lung) are either not reimbursed (VAS, CMCHS) or partially reimbursed (RAS). Average shortage of budget was found to be 43% (breast), 55% (colorectal), 74% (lung), 7% (head & neck), and 51% (gastric cancer). Policy makers should consider addition of newer treatments, exclusion of sub-optimal treatments, increments in per patient budget and optimization of supportive care, which may contribute to improvements in survival and quality of life for Indian cancer patients.
Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding
NASA Astrophysics Data System (ADS)
Sun, Jianglin; Liao, Xiaofeng; Chen, Xin; Guo, Shangwei
The increasing need for image communication and storage has created a great necessity for securely transforming and storing images over a network. Whereas traditional image encryption algorithms usually consider the security of the whole plain image, region of interest (ROI) encryption schemes, which are of great importance in practical applications, protect the privacy regions of plain images. Existing ROI encryption schemes usually adopt approximate techniques to detect the privacy region and measure the quality of encrypted images; however, their performance is usually inconsistent with a human visual system (HVS) and is sensitive to statistical attacks. In this paper, we propose a novel privacy-aware ROI image encryption (PRIE) scheme based on logistical mapping and data hiding. The proposed scheme utilizes salient object detection to automatically, adaptively and accurately detect the privacy region of a given plain image. After private pixels have been encrypted using chaotic cryptography, the significant bits are embedded into the nonprivacy region of the plain image using data hiding. Extensive experiments are conducted to illustrate the consistency between our automatic ROI detection and HVS. Our experimental results also demonstrate that the proposed scheme exhibits satisfactory security performance.
Enhanced DNA Sensing via Catalytic Aggregation of Gold Nanoparticles
Huttanus, Herbert M.; Graugnard, Elton; Yurke, Bernard; Knowlton, William B.; Kuang, Wan; Hughes, William L.; Lee, Jeunghoon
2014-01-01
A catalytic colorimetric detection scheme that incorporates a DNA-based hybridization chain reaction into gold nanoparticles was designed and tested. While direct aggregation forms an inter-particle linkage from only ones target DNA strand, the catalytic aggregation forms multiple linkages from a single target DNA strand. Gold nanoparticles were functionalized with thiol-modified DNA strands capable of undergoing hybridization chain reactions. The changes in their absorption spectra were measured at different times and target concentrations and compared against direct aggregation. Catalytic aggregation showed a multifold increase in sensitivity at low target concentrations when compared to direct aggregation. Gel electrophoresis was performed to compare DNA hybridization reactions in catalytic and direct aggregation schemes, and the product formation was confirmed in the catalytic aggregation scheme at low levels of target concentrations. The catalytic aggregation scheme also showed high target specificity. This application of a DNA reaction network to gold nanoparticle-based colorimetric detection enables highly-sensitive, field-deployable, colorimetric readout systems capable of detecting a variety of biomolecules. PMID:23891867
An atomistic simulation scheme for modeling crystal formation from solution.
Kawska, Agnieszka; Brickmann, Jürgen; Kniep, Rüdiger; Hochrein, Oliver; Zahn, Dirk
2006-01-14
We present an atomistic simulation scheme for investigating crystal growth from solution. Molecular-dynamics simulation studies of such processes typically suffer from considerable limitations concerning both system size and simulation times. In our method this time-length scale problem is circumvented by an iterative scheme which combines a Monte Carlo-type approach for the identification of ion adsorption sites and, after each growth step, structural optimization of the ion cluster and the solvent by means of molecular-dynamics simulation runs. An important approximation of our method is based on assuming full structural relaxation of the aggregates between each of the growth steps. This concept only holds for compounds of low solubility. To illustrate our method we studied CaF2 aggregate growth from aqueous solution, which may be taken as prototypes for compounds of very low solubility. The limitations of our simulation scheme are illustrated by the example of NaCl aggregation from aqueous solution, which corresponds to a solute/solvent combination of very high salt solubility.
Generation and coherent detection of QPSK signal using a novel method of digital signal processing
NASA Astrophysics Data System (ADS)
Zhao, Yuan; Hu, Bingliang; He, Zhen-An; Xie, Wenjia; Gao, Xiaohui
2018-02-01
We demonstrate an optical quadrature phase-shift keying (QPSK) signal transmitter and an optical receiver for demodulating optical QPSK signal with homodyne detection and digital signal processing (DSP). DSP on the homodyne detection scheme is employed without locking the phase of the local oscillator (LO). In this paper, we present an extracting one-dimensional array of down-sampling method for reducing unwanted samples of constellation diagram measurement. Such a novel scheme embodies the following major advantages over the other conventional optical QPSK signal detection methods. First, this homodyne detection scheme does not need strict requirement on LO in comparison with linear optical sampling, such as having a flat spectral density and phase over the spectral support of the source under test. Second, the LabVIEW software is directly used for recovering the QPSK signal constellation without employing complex DSP circuit. Third, this scheme is applicable to multilevel modulation formats such as M-ary PSK and quadrature amplitude modulation (QAM) or higher speed signals by making minor changes.
A three-dimensional algebraic grid generation scheme for gas turbine combustors with inclined slots
NASA Technical Reports Server (NTRS)
Yang, S. L.; Cline, M. C.; Chen, R.; Chang, Y. L.
1993-01-01
A 3D algebraic grid generation scheme is presented for generating the grid points inside gas turbine combustors with inclined slots. The scheme is based on the 2D transfinite interpolation method. Since the scheme is a 2D approach, it is very efficient and can easily be extended to gas turbine combustors with either dilution hole or slot configurations. To demonstrate the feasibility and the usefulness of the technique, a numerical study of the quick-quench/lean-combustion (QQ/LC) zones of a staged turbine combustor is given. Preliminary results illustrate some of the major features of the flow and temperature fields in the QQ/LC zones. Formation of co- and counter-rotating bulk flow and shape temperature fields can be observed clearly, and the resulting patterns are consistent with experimental observations typical of the confined slanted jet-in-cross flow. Numerical solutions show the method to be an efficient and reliable tool for generating computational grids for analyzing gas turbine combustors with slanted slots.
Formation Flying Control of Multiple Spacecraft
NASA Technical Reports Server (NTRS)
Hadaegh, F. Y.; Lau, Kenneth; Wang, P. K. C.
1997-01-01
The problem of coordination and control of multiple spacecraft (MS) moving in formation is considered. Here, each MS is modeled by a rigid body with fixed center of mass. First, various schemes for generating the desired formation patterns are discussed, Then, explicit control laws for formation-keeping and relative attitude alignment based on nearest neighbor-tracking are derived. The necessary data which must be communicated between the MS to achieve effective control are examined. The time-domain behavior of the feedback-controlled MS formation for typical low-Earth orbits is studied both analytically and via computer simulation. The paper concludes with a discussion of the implementation of the derived control laws, and the integration of the MS formation coordination and control system with a proposed inter-spacecraft communication/computing network.
NASA Astrophysics Data System (ADS)
Ren, Danping; Wu, Shanshan; Zhang, Lijing
2016-09-01
In view of the characteristics of the global control and flexible monitor of software-defined networks (SDN), we proposes a new optical access network architecture dedicated to Wavelength Division Multiplexing-Passive Optical Network (WDM-PON) systems based on SDN. The network coding (NC) technology is also applied into this architecture to enhance the utilization of wavelength resource and reduce the costs of light source. Simulation results show that this scheme can optimize the throughput of the WDM-PON network, greatly reduce the system time delay and energy consumption.
Study of phase-locked diode laser array and DFB/DBR surface emitting laser diode
NASA Astrophysics Data System (ADS)
Hsin, Wei
New types of phased-array and surface-emitting lasers are designed. The importance and approaches (or structures) of different phased array and surface emitting laser diodes are reviewed. The following are described: (1) a large optical cavity channel substrate planar laser array with layer thickness chirping; (2) a vertical cavity surface emitter with distributed feedback (DFB) optical cavity and a transverse junction buried heterostructure; (3) a microcavity distributed Bragg reflector (DBR) surface emitter; and (4) two surface emitting laser structures which utilized lateral current injection schemes to overcome the problems occurring in the vertical injection scheme.
Non-resonant zeugmatography with muons (μ SI) and radioactive isotopes
NASA Astrophysics Data System (ADS)
Kaplan, N.; Kreitzman, S. R.; Schneider, J. W.; Brewer, J. H.; Hitti, B.
1994-12-01
The procedure of zeugmatographic imaging — hitherto implemented only with nuclear magnetic resonance to form the well known MRI technique — is examined with the aim of utilizing it also in combination with non resonant phenomena. It is shown that in principle, one may indeed use zeugmatographic schemes with Perturbed Angular Correlations (PAC) or with muon spin rotations ( μSR) to obtain image information from material bodies. The preliminary experimentation with zeugmatographic μ Spin Imaging scheme, ( μSI), will be described. Some μSI imaging results will be presented and the inherent limitations of the method will be discussed.
Status of the Polar Engineering Development Center's (PEDC) Open-Closed Boundary Synoptic Nowcast
NASA Astrophysics Data System (ADS)
Gerrard, A. J.; Kim, H.
2017-12-01
We present the most recent Polar Engineering Development Center (PEDC) developments, specifically the first magnetic-field open-closed boundary (OCB) determination scheme. This scheme is implemented in "near real time" and utilizes data from an array of fluxgate magnetometers that are distributed across the high Antarctic plateau, as per Urban et al. [2012]. This OCB determination enables a high-latitude, synoptic measure of space weather variability that provides for more regional determinations of particle precipitation and related impacts. This methodology therefore supplements exciting "index-based" or empically-based space weather nowcasts currently in use.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Xing, Yulong; Shu, Chi-wang; Noelle, Sebastian
This note aims at demonstrating the advantage of moving-water well-balanced schemes over still-water well-balanced schemes for the shallow water equations. We concentrate on numerical examples with solutions near a moving-water equilibrium. For such examples, still-water well-balanced methods are not capable of capturing the small perturbations of the moving-water equilibrium and may generate significant spurious oscillations, unless an extremely refined mesh is used. On the other hand, moving-water well-balanced methods perform well in these tests. The numerical examples in this note clearly demonstrate the importance of utilizing moving-water well-balanced methods for solutions near a moving-water equilibrium.
Rapid multispectral cw multiplexing technique for photon migration measurements
NASA Astrophysics Data System (ADS)
Siegel, Andrew M.; Boas, David A.
2001-06-01
A discussion of photon migration will introduce both some fundamental limitations and practical concerns which directly affect the design and construction of DOT instrumentation. The utility of four different multiplexing schemes will be discussed and then contrasted in light of these concerns. The relative merits of each scheme will be used to determine which measurements they are best suited for, given some of the realistic technical, legal, and practical issues common to the medical research community. Within this context, the unique advantages offered by a variant of time-division multiplexing; Pulse-TDM, will be introduced and explained.
High dynamic range coding imaging system
NASA Astrophysics Data System (ADS)
Wu, Renfan; Huang, Yifan; Hou, Guangqi
2014-10-01
We present a high dynamic range (HDR) imaging system design scheme based on coded aperture technique. This scheme can help us obtain HDR images which have extended depth of field. We adopt Sparse coding algorithm to design coded patterns. Then we utilize the sensor unit to acquire coded images under different exposure settings. With the guide of the multiple exposure parameters, a series of low dynamic range (LDR) coded images are reconstructed. We use some existing algorithms to fuse and display a HDR image by those LDR images. We build an optical simulation model and get some simulation images to verify the novel system.
Modeling of confined turbulent fluid-particle flows using Eulerian and Lagrangian schemes
NASA Technical Reports Server (NTRS)
Adeniji-Fashola, A.; Chen, C. P.
1990-01-01
Two important aspects of fluid-particulate interaction in dilute gas-particle turbulent flows (the turbulent particle dispersion and the turbulence modulation effects) are addressed, using the Eulerian and Lagrangian modeling approaches to describe the particulate phase. Gradient-diffusion approximations are employed in the Eulerian formulation, while a stochastic procedure is utilized to simulate turbulent dispersion in the Lagrangina formulation. The k-epsilon turbulence model is used to characterize the time and length scales of the continuous phase turbulence. Models proposed for both schemes are used to predict turbulent fully-developed gas-solid vertical pipe flow with reasonable accuracy.
Oriented regions grouping based candidate proposal for infrared pedestrian detection
NASA Astrophysics Data System (ADS)
Wang, Jiangtao; Zhang, Jingai; Li, Huaijiang
2018-04-01
Effectively and accurately locating the positions of pedestrian candidates in image is a key task for the infrared pedestrian detection system. In this work, a novel similarity measuring metric is designed. Based on the selective search scheme, the developed similarity measuring metric is utilized to yield the possible locations for pedestrian candidate. Besides this, corresponding diversification strategies are also provided according to the characteristics of the infrared thermal imaging system. Experimental results indicate that the presented scheme can achieve more efficient outputs than the traditional selective search methodology for the infrared pedestrian detection task.
Rise time measurement for ultrafast X-ray pulses
Celliers, Peter M [Berkeley, CA; Weber, Franz A [Oakland, CA; Moon, Stephen J [Tracy, CA
2005-04-05
A pump-probe scheme measures the rise time of ultrafast x-ray pulses. Conventional high speed x-ray diagnostics (x-ray streak cameras, PIN diodes, diamond PCD devices) do not provide sufficient time resolution to resolve rise times of x-ray pulses on the order of 50 fs or less as they are being produced by modern fast x-ray sources. Here, we are describing a pump-probe technique that can be employed to measure events where detector resolution is insufficient to resolve the event. The scheme utilizes a diamond plate as an x-ray transducer and a p-polarized probe beam.
Rise Time Measurement for Ultrafast X-Ray Pulses
Celliers, Peter M.; Weber, Franz A.; Moon, Stephen J.
2005-04-05
A pump-probe scheme measures the rise time of ultrafast x-ray pulses. Conventional high speed x-ray diagnostics (x-ray streak cameras, PIN diodes, diamond PCD devices) do not provide sufficient time resolution to resolve rise times of x-ray pulses on the order of 50 fs or less as they are being produced by modern fast x-ray sources. Here, we are describing a pump-probe technique that can be employed to measure events where detector resolution is insufficient to resolve the event. The scheme utilizes a diamond plate as an x-ray transducer and a p-polarized probe beam.
Clumpy Disks as a Testbed for Feedback-regulated Galaxy Formation
NASA Astrophysics Data System (ADS)
Mayer, Lucio; Tamburello, Valentina; Lupi, Alessandro; Keller, Ben; Wadsley, James; Madau, Piero
2016-10-01
We study the dependence of fragmentation in massive gas-rich galaxy disks at z > 1 on stellar feedback schemes and hydrodynamical solvers, employing the GASOLINE2 SPH code and the lagrangian mesh-less code GIZMO in finite mass mode. Non-cosmological galaxy disk runs with the standard delayed-cooling blastwave feedback are compared with runs adopting a new superbubble feedback, which produces winds by modeling the detailed physics of supernova-driven bubbles and leads to efficient self-regulation of star formation. We find that, with blastwave feedback, massive star-forming clumps form in comparable number and with very similar masses in GASOLINE2 and GIZMO. Typical clump masses are in the range 107-108 M ⊙, lower than in most previous works, while giant clumps with masses above 109 M ⊙ are exceedingly rare. By contrast, superbubble feedback does not produce massive star-forming bound clumps as galaxies never undergo a phase of violent disk instability. In this scheme, only sporadic, unbound star-forming overdensities lasting a few tens of Myr can arise, triggered by non-linear perturbations from massive satellite companions. We conclude that there is severe tension between explaining massive star-forming clumps observed at z > 1 primarily as the result of disk fragmentation driven by gravitational instability and the prevailing view of feedback-regulated galaxy formation. The link between disk stability and star formation efficiency should thus be regarded as a key testing ground for galaxy formation theory.
Data traffic reduction schemes for Cholesky factorization on asynchronous multiprocessor systems
NASA Technical Reports Server (NTRS)
Naik, Vijay K.; Patrick, Merrell L.
1989-01-01
Communication requirements of Cholesky factorization of dense and sparse symmetric, positive definite matrices are analyzed. The communication requirement is characterized by the data traffic generated on multiprocessor systems with local and shared memory. Lower bound proofs are given to show that when the load is uniformly distributed the data traffic associated with factoring an n x n dense matrix using n to the alpha power (alpha less than or equal 2) processors is omega(n to the 2 + alpha/2 power). For n x n sparse matrices representing a square root of n x square root of n regular grid graph the data traffic is shown to be omega(n to the 1 + alpha/2 power), alpha less than or equal 1. Partitioning schemes that are variations of block assignment scheme are described and it is shown that the data traffic generated by these schemes are asymptotically optimal. The schemes allow efficient use of up to O(n to the 2nd power) processors in the dense case and up to O(n) processors in the sparse case before the total data traffic reaches the maximum value of O(n to the 3rd power) and O(n to the 3/2 power), respectively. It is shown that the block based partitioning schemes allow a better utilization of the data accessed from shared memory and thus reduce the data traffic than those based on column-wise wrap around assignment schemes.
NASA Technical Reports Server (NTRS)
Yee, H. C.; Sjogreen, B.; Sandham, N. D.; Hadjadj, A.; Kwak, Dochan (Technical Monitor)
2000-01-01
In a series of papers, Olsson (1994, 1995), Olsson & Oliger (1994), Strand (1994), Gerritsen Olsson (1996), Yee et al. (1999a,b, 2000) and Sandham & Yee (2000), the issue of nonlinear stability of the compressible Euler and Navier-Stokes Equations, including physical boundaries, and the corresponding development of the discrete analogue of nonlinear stable high order schemes, including boundary schemes, were developed, extended and evaluated for various fluid flows. High order here refers to spatial schemes that are essentially fourth-order or higher away from shock and shear regions. The objective of this paper is to give an overview of the progress of the low dissipative high order shock-capturing schemes proposed by Yee et al. (1999a,b, 2000). This class of schemes consists of simple non-dissipative high order compact or non-compact central spatial differencings and adaptive nonlinear numerical dissipation operators to minimize the use of numerical dissipation. The amount of numerical dissipation is further minimized by applying the scheme to the entropy splitting form of the inviscid flux derivatives, and by rewriting the viscous terms to minimize odd-even decoupling before the application of the central scheme (Sandham & Yee). The efficiency and accuracy of these scheme are compared with spectral, TVD and fifth- order WENO schemes. A new approach of Sjogreen & Yee (2000) utilizing non-orthogonal multi-resolution wavelet basis functions as sensors to dynamically determine the appropriate amount of numerical dissipation to be added to the non-dissipative high order spatial scheme at each grid point will be discussed. Numerical experiments of long time integration of smooth flows, shock-turbulence interactions, direct numerical simulations of a 3-D compressible turbulent plane channel flow, and various mixing layer problems indicate that these schemes are especially suitable for practical complex problems in nonlinear aeroacoustics, rotorcraft dynamics, direct numerical simulation or large eddy simulation of compressible turbulent flows at various speeds including high-speed shock-turbulence interactions, and general long time wave propagation problems. These schemes, including entropy splitting, have also been extended to freestream preserving schemes on curvilinear moving grids for a thermally perfect gas (Vinokur & Yee 2000).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, Ju, E-mail: jliu@ices.utexas.edu; Gomez, Hector; Evans, John A.
2013-09-01
We propose a new methodology for the numerical solution of the isothermal Navier–Stokes–Korteweg equations. Our methodology is based on a semi-discrete Galerkin method invoking functional entropy variables, a generalization of classical entropy variables, and a new time integration scheme. We show that the resulting fully discrete scheme is unconditionally stable-in-energy, second-order time-accurate, and mass-conservative. We utilize isogeometric analysis for spatial discretization and verify the aforementioned properties by adopting the method of manufactured solutions and comparing coarse mesh solutions with overkill solutions. Various problems are simulated to show the capability of the method. Our methodology provides a means of constructing unconditionallymore » stable numerical schemes for nonlinear non-convex hyperbolic systems of conservation laws.« less
Metameric MIMO-OOK transmission scheme using multiple RGB LEDs.
Bui, Thai-Chien; Cusani, Roberto; Scarano, Gaetano; Biagi, Mauro
2018-05-28
In this work, we propose a novel visible light communication (VLC) scheme utilizing multiple different red green and blue triplets each with a different emission spectrum of red, green and blue for mitigating the effect of interference due to different colors using spatial multiplexing. On-off keying modulation is considered and its effect on light emission in terms of flickering, dimming and color rendering is discussed so as to demonstrate how metameric properties have been considered. At the receiver, multiple photodiodes with color filter-tuned on each transmit light emitting diode (LED) are employed. Three different detection mechanisms of color zero forcing, minimum mean square error estimation and minimum mean square error equalization are then proposed. The system performance of the proposed scheme is evaluated both with computer simulations and tests with an Arduino board implementation.
Progressive compressive imager
NASA Astrophysics Data System (ADS)
Evladov, Sergei; Levi, Ofer; Stern, Adrian
2012-06-01
We have designed and built a working automatic progressive sampling imaging system based on the vector sensor concept, which utilizes a unique sampling scheme of Radon projections. This sampling scheme makes it possible to progressively add information resulting in tradeoff between compression and the quality of reconstruction. The uniqueness of our sampling is that in any moment of the acquisition process the reconstruction can produce a reasonable version of the image. The advantage of the gradual addition of the samples is seen when the sparsity rate of the object is unknown, and thus the number of needed measurements. We have developed the iterative algorithm OSO (Ordered Sets Optimization) which employs our sampling scheme for creation of nearly uniform distributed sets of samples, which allows the reconstruction of Mega-Pixel images. We present the good quality reconstruction from compressed data ratios of 1:20.
An authenticated image encryption scheme based on chaotic maps and memory cellular automata
NASA Astrophysics Data System (ADS)
Bakhshandeh, Atieh; Eslami, Ziba
2013-06-01
This paper introduces a new image encryption scheme based on chaotic maps, cellular automata and permutation-diffusion architecture. In the permutation phase, a piecewise linear chaotic map is utilized to confuse the plain-image and in the diffusion phase, we employ the Logistic map as well as a reversible memory cellular automata to obtain an efficient and secure cryptosystem. The proposed method admits advantages such as highly secure diffusion mechanism, computational efficiency and ease of implementation. A novel property of the proposed scheme is its authentication ability which can detect whether the image is tampered during the transmission or not. This is particularly important in applications where image data or part of it contains highly sensitive information. Results of various analyses manifest high security of this new method and its capability for practical image encryption.
NASA Astrophysics Data System (ADS)
Zhang, Jinfang; Yan, Xiaoqing; Wang, Hongfu
2018-02-01
With the rapid development of renewable energy in Northwest China, curtailment phenomena is becoming more and more serve owing to lack of adjustment ability and enough transmission capacity. Based on the existing HVDC projects, exploring the hybrid transmission mode associated with thermal power and renewable power will be necessary and important. This paper has proposed a method on optimal thermal power and renewable energy combination for HVDC lines, based on multi-scheme comparison. Having established the mathematic model for electric power balance in time series mode, ten different schemes have been picked for figuring out the suitable one by test simulation. By the proposed related discriminated principle, including generation device utilization hours, renewable energy electricity proportion and curtailment level, the recommendation scheme has been found. The result has also validated the efficiency of the method.
Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae
2009-01-01
Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.