Chung, Yun Won; Kwon, Jae Kyun; Park, Suwon
2014-01-01
One of the key technologies to support mobility of mobile station (MS) in mobile communication systems is location management which consists of location update and paging. In this paper, an improved movement-based location management scheme with two movement thresholds is proposed, considering bursty data traffic characteristics of packet-switched (PS) services. The analytical modeling for location update and paging signaling loads of the proposed scheme is developed thoroughly and the performance of the proposed scheme is compared with that of the conventional scheme. We show that the proposed scheme outperforms the conventional scheme in terms of total signaling load with an appropriate selection of movement thresholds.
Design and Analysis of a Dynamic Mobility Management Scheme for Wireless Mesh Network
Roy, Sudipta
2013-01-01
Seamless mobility management of the mesh clients (MCs) in wireless mesh network (WMN) has drawn a lot of attention from the research community. A number of mobility management schemes such as mesh network with mobility management (MEMO), mesh mobility management (M3), and wireless mesh mobility management (WMM) have been proposed. The common problem with these schemes is that they impose uniform criteria on all the MCs for sending route update message irrespective of their distinct characteristics. This paper proposes a session-to-mobility ratio (SMR) based dynamic mobility management scheme for handling both internet and intranet traffic. To reduce the total communication cost, this scheme considers each MC's session and mobility characteristics by dynamically determining optimal threshold SMR value for each MC. A numerical analysis of the proposed scheme has been carried out. Comparison with other schemes shows that the proposed scheme outperforms MEMO, M3, and WMM with respect to total cost. PMID:24311982
A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method
Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Chen, Wei
2016-01-01
With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment. Current key management researches pay less attention to the security of sensor networks with MS. This paper proposes a hybrid key management schemes based on a Polynomial Pool-based key pre-distribution and Basic Random key pre-distribution (PPBR) to be used in WSNs with MS. The scheme takes full advantages of these two kinds of methods to improve the cracking difficulty of the key system. The storage effectiveness and the network resilience can be significantly enhanced as well. The tree-based path key establishment method is introduced to effectively solve the problem of communication link connectivity. Simulation clearly shows that the proposed scheme performs better in terms of network resilience, connectivity and storage effectiveness compared to other widely used schemes. PMID:27070624
A scheme of hidden-structure attribute-based encryption with multiple authorities
NASA Astrophysics Data System (ADS)
Ling, J.; Weng, A. X.
2018-05-01
In the most of the CP-ABE schemes with hidden access structure, both all the user attributes and the key generation are managed by only one authority. The key generation efficiency will decrease as the number of user increases, and the data will encounter security issues as the only authority is attacked. We proposed a scheme of hidden-structure attribute-based encryption with multiple authorities, which introduces multiple semi-trusted attribute authorities, avoiding the threat even though one or more authorities are attacked. We also realized user revocation by managing a revocation list. Based on DBDH assumption, we proved that our scheme is of IND-CMA security. The analysis shows that our scheme improves the key generation efficiency.
Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.
Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei
2016-01-29
In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.
ERIC Educational Resources Information Center
Kis, Viktoria
2016-01-01
Realising the potential of work-based learning schemes as a driver of productivity requires careful design and support. The length of work-based learning schemes should be adapted to the profile of productivity gains. A scheme that is too long for a given skill set might be unattractive for learners and waste public resources, but a scheme that is…
Silva, Bhagya Nathali; Khan, Murad; Han, Kijun
2018-02-25
The emergence of smart devices and smart appliances has highly favored the realization of the smart home concept. Modern smart home systems handle a wide range of user requirements. Energy management and energy conservation are in the spotlight when deploying sophisticated smart homes. However, the performance of energy management systems is highly influenced by user behaviors and adopted energy management approaches. Appliance scheduling is widely accepted as an effective mechanism to manage domestic energy consumption. Hence, we propose a smart home energy management system that reduces unnecessary energy consumption by integrating an automated switching off system with load balancing and appliance scheduling algorithm. The load balancing scheme acts according to defined constraints such that the cumulative energy consumption of the household is managed below the defined maximum threshold. The scheduling of appliances adheres to the least slack time (LST) algorithm while considering user comfort during scheduling. The performance of the proposed scheme has been evaluated against an existing energy management scheme through computer simulation. The simulation results have revealed a significant improvement gained through the proposed LST-based energy management scheme in terms of cost of energy, along with reduced domestic energy consumption facilitated by an automated switching off mechanism.
Resource Management Scheme Based on Ubiquitous Data Analysis
Lee, Heung Ki; Jung, Jaehee
2014-01-01
Resource management of the main memory and process handler is critical to enhancing the system performance of a web server. Owing to the transaction delay time that affects incoming requests from web clients, web server systems utilize several web processes to anticipate future requests. This procedure is able to decrease the web generation time because there are enough processes to handle the incoming requests from web browsers. However, inefficient process management results in low service quality for the web server system. Proper pregenerated process mechanisms are required for dealing with the clients' requests. Unfortunately, it is difficult to predict how many requests a web server system is going to receive. If a web server system builds too many web processes, it wastes a considerable amount of memory space, and thus performance is reduced. We propose an adaptive web process manager scheme based on the analysis of web log mining. In the proposed scheme, the number of web processes is controlled through prediction of incoming requests, and accordingly, the web process management scheme consumes the least possible web transaction resources. In experiments, real web trace data were used to prove the improved performance of the proposed scheme. PMID:25197692
Yu, Si; Gui, Xiaolin; Lin, Jiancai; Tian, Feng; Zhao, Jianqiang; Dai, Min
2014-01-01
Cloud computing gets increasing attention for its capacity to leverage developers from infrastructure management tasks. However, recent works reveal that side channel attacks can lead to privacy leakage in the cloud. Enhancing isolation between users is an effective solution to eliminate the attack. In this paper, to eliminate side channel attacks, we investigate the isolation enhancement scheme from the aspect of virtual machine (VM) management. The security-awareness VMs management scheme (SVMS), a VMs isolation enhancement scheme to defend against side channel attacks, is proposed. First, we use the aggressive conflict of interest relation (ACIR) and aggressive in ally with relation (AIAR) to describe user constraint relations. Second, based on the Chinese wall policy, we put forward four isolation rules. Third, the VMs placement and migration algorithms are designed to enforce VMs isolation between the conflict users. Finally, based on the normal distribution, we conduct a series of experiments to evaluate SVMS. The experimental results show that SVMS is efficient in guaranteeing isolation between VMs owned by conflict users, while the resource utilization rate decreases but not by much.
Gui, Xiaolin; Lin, Jiancai; Tian, Feng; Zhao, Jianqiang; Dai, Min
2014-01-01
Cloud computing gets increasing attention for its capacity to leverage developers from infrastructure management tasks. However, recent works reveal that side channel attacks can lead to privacy leakage in the cloud. Enhancing isolation between users is an effective solution to eliminate the attack. In this paper, to eliminate side channel attacks, we investigate the isolation enhancement scheme from the aspect of virtual machine (VM) management. The security-awareness VMs management scheme (SVMS), a VMs isolation enhancement scheme to defend against side channel attacks, is proposed. First, we use the aggressive conflict of interest relation (ACIR) and aggressive in ally with relation (AIAR) to describe user constraint relations. Second, based on the Chinese wall policy, we put forward four isolation rules. Third, the VMs placement and migration algorithms are designed to enforce VMs isolation between the conflict users. Finally, based on the normal distribution, we conduct a series of experiments to evaluate SVMS. The experimental results show that SVMS is efficient in guaranteeing isolation between VMs owned by conflict users, while the resource utilization rate decreases but not by much. PMID:24688434
NASA Astrophysics Data System (ADS)
Kazakova, E. I.; Medvedev, A. N.; Kolomytseva, A. O.; Demina, M. I.
2017-11-01
The paper presents a mathematical model of blasting schemes management in presence of random disturbances. Based on the lemmas and theorems proved, a control functional is formulated, which is stable. A universal classification of blasting schemes is developed. The main classification attributes are suggested: the orientation in plan the charging wells rows relatively the block of rocks; the presence of cuts in the blasting schemes; the separation of the wells series onto elements; the sequence of the blasting. The periodic regularity of transition from one Short-delayed scheme of blasting to another is proved.
Silva, Bhagya Nathali; Khan, Murad; Han, Kijun
2018-01-01
The emergence of smart devices and smart appliances has highly favored the realization of the smart home concept. Modern smart home systems handle a wide range of user requirements. Energy management and energy conservation are in the spotlight when deploying sophisticated smart homes. However, the performance of energy management systems is highly influenced by user behaviors and adopted energy management approaches. Appliance scheduling is widely accepted as an effective mechanism to manage domestic energy consumption. Hence, we propose a smart home energy management system that reduces unnecessary energy consumption by integrating an automated switching off system with load balancing and appliance scheduling algorithm. The load balancing scheme acts according to defined constraints such that the cumulative energy consumption of the household is managed below the defined maximum threshold. The scheduling of appliances adheres to the least slack time (LST) algorithm while considering user comfort during scheduling. The performance of the proposed scheme has been evaluated against an existing energy management scheme through computer simulation. The simulation results have revealed a significant improvement gained through the proposed LST-based energy management scheme in terms of cost of energy, along with reduced domestic energy consumption facilitated by an automated switching off mechanism. PMID:29495346
An effective and secure key-management scheme for hierarchical access control in E-medicine system.
Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit
2013-04-01
Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.
Rudasingwa, Martin; Soeters, Robert; Bossuyt, Michel
2015-01-01
To strengthen the health care delivery, the Burundian Government in collaboration with international NGOs piloted performance-based financing (PBF) in 2006. The health facilities were assigned - by using a simple matching method - to begin PBF scheme or to continue with the traditional input-based funding. Our objective was to analyse the effect of that PBF scheme on the quality of health services between 2006 and 2008. We conducted the analysis in 16 health facilities with PBF scheme and 13 health facilities without PBF scheme. We analysed the PBF effect by using 58 composite quality indicators of eight health services: Care management, outpatient care, maternity care, prenatal care, family planning, laboratory services, medicines management and materials management. The differences in quality improvement in the two groups of health facilities were performed applying descriptive statistics, a paired non-parametric Wilcoxon Signed Ranks test and a simple difference-in-difference approach at a significance level of 5%. We found an improvement of the quality of care in the PBF group and a significant deterioration in the non-PBF group in the same four health services: care management, outpatient care, maternity care, and prenatal care. The findings suggest a PBF effect of between 38 and 66 percentage points (p<0.001) in the quality scores of care management, outpatient care, prenatal care, and maternal care. We found no PBF effect on clinical support services: laboratory services, medicines management, and material management. The PBF scheme in Burundi contributed to the improvement of the health services that were strongly under the control of medical personnel (physicians and nurses) in a short time of two years. The clinical support services that did not significantly improved were strongly under the control of laboratory technicians, pharmacists and non-medical personnel. PMID:25948432
Campbell, Princess Christina; Korie, Patrick Chukwuemeka; Nnaji, Feziechukwu Collins
2014-01-01
Background: The National Health Insurance Scheme (NHIS), operated majorly in Nigeria by health maintenance organisations (HMOs), took off formally in June 2005. In view of the inherent risks in the operation of any social health insurance, it is necessary to efficiently manage these risks for sustainability of the scheme. Consequently the risk-management strategies deployed by HMOs need regular assessment. This study assessed the risk management in the Nigeria social health insurance scheme among HMOs. Materials and Methods: Cross-sectional survey of 33 HMOs participating in the NHIS. Results: Utilisation of standard risk-management strategies by the HMOs was 11 (52.6%). The other risk-management strategies not utilised in the NHIS 10 (47.4%) were risk equalisation and reinsurance. As high as 11 (52.4%) of participating HMOs had a weak enrollee base (less than 30,000 and poor monthly premium and these impacted negatively on the HMOs such that a large percentage 12 (54.1%) were unable to meet up with their financial obligations. Most of the HMOs 15 (71.4%) participated in the Millennium development goal (MDG) maternal and child health insurance programme. Conclusions: Weak enrollee base and poor monthly premium predisposed the HMOs to financial risk which impacted negatively on the overall performance in service delivery in the NHIS, further worsened by the non-utilisation of risk equalisation and reinsurance as risk-management strategies in the NHIS. There is need to make the scheme compulsory and introduce risk equalisation and reinsurance. PMID:25298605
Signature scheme based on bilinear pairs
NASA Astrophysics Data System (ADS)
Tong, Rui Y.; Geng, Yong J.
2013-03-01
An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.
Decentralising Zimbabwe’s water management: The case of Guyu-Chelesa irrigation scheme
NASA Astrophysics Data System (ADS)
Tambudzai, Rashirayi; Everisto, Mapedza; Gideon, Zhou
Smallholder irrigation schemes are largely supply driven such that they exclude the beneficiaries on the management decisions and the choice of the irrigation schemes that would best suit their local needs. It is against this background that the decentralisation framework and the Dublin Principles on Integrated Water Resource Management (IWRM) emphasise the need for a participatory approach to water management. The Zimbabwean government has gone a step further in decentralising the management of irrigation schemes, that is promoting farmer managed irrigation schemes so as to ensure effective management of scarce community based land and water resources. The study set to investigate the way in which the Guyu-Chelesa irrigation scheme is managed with specific emphasis on the role of the Irrigation Management Committee (IMC), the level of accountability and the powers devolved to the IMC. Merrey’s 2008 critique of IWRM also informs this study which views irrigation as going beyond infrastructure by looking at how institutions and decision making processes play out at various levels including at the irrigation scheme level. The study was positioned on the hypothesis that ‘decentralised or autonomous irrigation management enhances the sustainability and effectiveness of irrigation schemes’. To validate or falsify the stated hypothesis, data was gathered using desk research in the form of reviewing articles, documents from within the scheme and field research in the form of questionnaire surveys, key informant interviews and field observation. The Statistical Package for Social Sciences was used to analyse data quantitatively, whilst content analysis was utilised to analyse qualitative data whereby data was analysed thematically. Comparative analysis was carried out as Guyu-Chelesa irrigation scheme was compared with other smallholder irrigation scheme’s experiences within Zimbabwe and the Sub Saharan African region at large. The findings were that whilst the scheme is a model of a decentralised entity whose importance lies at improving food security and employment creation within the community, it falls short in representing a downwardly accountable decentralised irrigation scheme. The scheme is faced with various challenges which include its operation which is below capacity utilisation, absence of specialised technical human personnel to address infrastructural breakdowns, uneven distribution of water pressure, incapacitated Irrigation Management Committee (IMC), absence of a locally legitimate constitution, compromised beneficiary participation and unclear lines of communication between various institutions involved in water management. Understanding decentralization is important since one of the key tenets of IWRM is stakeholder participation which the decentralization framework interrogates.
NASA Technical Reports Server (NTRS)
Ansari, Nirwan; Liu, Dequan
1991-01-01
A neural-network-based traffic management scheme for a satellite communication network is described. The scheme consists of two levels of management. The front end of the scheme is a derivation of Kohonen's self-organization model to configure maps for the satellite communication network dynamically. The model consists of three stages. The first stage is the pattern recognition task, in which an exemplar map that best meets the current network requirements is selected. The second stage is the analysis of the discrepancy between the chosen exemplar map and the state of the network, and the adaptive modification of the chosen exemplar map to conform closely to the network requirement (input data pattern) by means of Kohonen's self-organization. On the basis of certain performance criteria, whether a new map is generated to replace the original chosen map is decided in the third stage. A state-dependent routing algorithm, which arranges the incoming call to some proper path, is used to make the network more efficient and to lower the call block rate. Simulation results demonstrate that the scheme, which combines self-organization and the state-dependent routing mechanism, provides better performance in terms of call block rate than schemes that only have either the self-organization mechanism or the routing mechanism.
Management initiatives in a community-based health insurance scheme.
Sinha, Tara; Ranson, M Kent; Chatterjee, Mirai; Mills, Anne
2007-01-01
Community-based health insurance (CBHI) schemes have developed in response to inadequacies of alternate systems for protecting the poor against health care expenditures. Some of these schemes have arisen within community-based organizations (CBOs), which have strong links with poor communities, and are therefore well situated to offer CBHI. However, the managerial capacities of many such CBOs are limited. This paper describes management initiatives undertaken in a CBHI scheme in India, in the course of an action-research project. The existing structures and systems at the CBHI had several strengths, but fell short on some counts, which became apparent in the course of planning for two interventions under the research project. Management initiatives were introduced that addressed four features of the CBHI, viz. human resources, organizational structure, implementation systems, and data management. Trained personnel were hired and given clear roles and responsibilities. Lines of reporting and accountability were spelt out, and supportive supervision was provided to team members. The data resources of the organization were strengthened for greater utilization of this information. While the changes that were introduced took some time to be accepted by team members, the commitment of the CBHI's leadership to these initiatives was critical to their success. Copyright (c) 2007 John Wiley & Sons, Ltd.
Chapman, J F; Cook, R
2002-10-01
The Blood Stocks Management Scheme (BSMS) has been established as a joint venture between the National Blood Service (NBS) in England and North Wales and participating hospitals to monitor the blood supply chain. Stock and wastage data are submitted to a web-based data-management system, facilitating continuous and complete red cell data collection and 'real time' data extraction. The data-management system enables peer review of performance in respect of stock holding levels and red cell wastage. The BSMS has developed an innovative web-based data-management system that enables data collection and benchmarking of practice, which should drive changes in stock management practice, therefore optimizing the use of donated blood.
Don’t make cache too complex: A simple probability-based cache management scheme for SSDs
Cho, Sangyeun; Choi, Jongmoo
2017-01-01
Solid-state drives (SSDs) have recently become a common storage component in computer systems, and they are fueled by continued bit cost reductions achieved with smaller feature sizes and multiple-level cell technologies. However, as the flash memory stores more bits per cell, the performance and reliability of the flash memory degrade substantially. To solve this problem, a fast non-volatile memory (NVM-)based cache has been employed within SSDs to reduce the long latency required to write data. Absorbing small writes in a fast NVM cache can also reduce the number of flash memory erase operations. To maximize the benefits of an NVM cache, it is important to increase the NVM cache utilization. In this paper, we propose and study ProCache, a simple NVM cache management scheme, that makes cache-entrance decisions based on random probability testing. Our scheme is motivated by the observation that frequently written hot data will eventually enter the cache with a high probability, and that infrequently accessed cold data will not enter the cache easily. Owing to its simplicity, ProCache is easy to implement at a substantially smaller cost than similar previously studied techniques. We evaluate ProCache and conclude that it achieves comparable performance compared to a more complex reference counter-based cache-management scheme. PMID:28358897
Don't make cache too complex: A simple probability-based cache management scheme for SSDs.
Baek, Seungjae; Cho, Sangyeun; Choi, Jongmoo
2017-01-01
Solid-state drives (SSDs) have recently become a common storage component in computer systems, and they are fueled by continued bit cost reductions achieved with smaller feature sizes and multiple-level cell technologies. However, as the flash memory stores more bits per cell, the performance and reliability of the flash memory degrade substantially. To solve this problem, a fast non-volatile memory (NVM-)based cache has been employed within SSDs to reduce the long latency required to write data. Absorbing small writes in a fast NVM cache can also reduce the number of flash memory erase operations. To maximize the benefits of an NVM cache, it is important to increase the NVM cache utilization. In this paper, we propose and study ProCache, a simple NVM cache management scheme, that makes cache-entrance decisions based on random probability testing. Our scheme is motivated by the observation that frequently written hot data will eventually enter the cache with a high probability, and that infrequently accessed cold data will not enter the cache easily. Owing to its simplicity, ProCache is easy to implement at a substantially smaller cost than similar previously studied techniques. We evaluate ProCache and conclude that it achieves comparable performance compared to a more complex reference counter-based cache-management scheme.
A Survey of Knowledge Management Research & Development at NASA Ames Research Center
NASA Technical Reports Server (NTRS)
Keller, Richard M.; Clancy, Daniel (Technical Monitor)
2002-01-01
This chapter catalogs knowledge management research and development activities at NASA Ames Research Center as of April 2002. A general categorization scheme for knowledge management systems is first introduced. This categorization scheme divides knowledge management capabilities into five broad categories: knowledge capture, knowledge preservation, knowledge augmentation, knowledge dissemination, and knowledge infrastructure. Each of nearly 30 knowledge management systems developed at Ames is then classified according to this system. Finally, a capsule description of each system is presented along with information on deployment status, funding sources, contact information, and both published and internet-based references.
Foli, Samson; Ros-Tonen, Mirjam A F; Reed, James; Sunderland, Terry
2018-07-01
In recognition of the failures of sectoral approaches to overcome global challenges of biodiversity loss, climate change, food insecurity and poverty, scientific discourse on biodiversity conservation and sustainable development is shifting towards integrated landscape governance arrangements. Current landscape initiatives however very much depend on external actors and funding, raising the question of whether, and how, and under what conditions, locally embedded resource management schemes can serve as entry points for the implementation of integrated landscape approaches. This paper assesses the entry point potential for three established natural resource management schemes in West Africa that target landscape degradation with involvement of local communities: the Chantier d'Aménagement Forestier scheme encompassing forest management sites across Burkina Faso and the Modified Taungya System and community wildlife resource management initiatives in Ghana. Based on a review of the current literature, we analyze the extent to which design principles that define a landscape approach apply to these schemes. We found that the CREMA meets most of the desired criteria, but that its scale may be too limited to guarantee effective landscape governance, hence requiring upscaling. Conversely, the other two initiatives are strongly lacking in their design principles on fundamental components regarding integrated approaches, continual learning, and capacity building. Monitoring and evaluation bodies and participatory learning and negotiation platforms could enhance the schemes' alignment with integrated landscape approaches.
Pay-for-performance in disease management: a systematic review of the literature.
de Bruin, Simone R; Baan, Caroline A; Struijs, Jeroen N
2011-10-14
Pay-for-performance (P4P) is increasingly implemented in the healthcare system to encourage improvements in healthcare quality. P4P is a payment model that rewards healthcare providers for meeting pre-established targets for delivery of healthcare services by financial incentives. Based on their performance, healthcare providers receive either additional or reduced payment. Currently, little is known about P4P schemes intending to improve delivery of chronic care through disease management. The objectives of this paper are therefore to provide an overview of P4P schemes used to stimulate delivery of chronic care through disease management and to provide insight into their effects on healthcare quality and costs. A systematic PubMed search was performed for English language papers published between 2000 and 2010 describing P4P schemes related to the implementation of disease management. Wagner's chronic care model was used to make disease management operational. Eight P4P schemes were identified, introduced in the USA (n = 6), Germany (n = 1), and Australia (n = 1). Five P4P schemes were part of a larger scheme of interventions to improve quality of care, whereas three P4P schemes were solely implemented. Most financial incentives were rewards, selective, and granted on the basis of absolute performance. More variation was found in incented entities and the basis for providing incentives. Information about motivation, certainty, size, frequency, and duration of the financial incentives was generally limited. Five studies were identified that evaluated the effects of P4P on healthcare quality. Most studies showed positive effects of P4P on healthcare quality. No studies were found that evaluated the effects of P4P on healthcare costs. The number of P4P schemes to encourage disease management is limited. Hardly any information is available about the effects of such schemes on healthcare quality and costs. © 2011 de Bruin et al; licensee BioMed Central Ltd.
Pay-for-performance in disease management: a systematic review of the literature
2011-01-01
Background Pay-for-performance (P4P) is increasingly implemented in the healthcare system to encourage improvements in healthcare quality. P4P is a payment model that rewards healthcare providers for meeting pre-established targets for delivery of healthcare services by financial incentives. Based on their performance, healthcare providers receive either additional or reduced payment. Currently, little is known about P4P schemes intending to improve delivery of chronic care through disease management. The objectives of this paper are therefore to provide an overview of P4P schemes used to stimulate delivery of chronic care through disease management and to provide insight into their effects on healthcare quality and costs. Methods A systematic PubMed search was performed for English language papers published between 2000 and 2010 describing P4P schemes related to the implementation of disease management. Wagner's chronic care model was used to make disease management operational. Results Eight P4P schemes were identified, introduced in the USA (n = 6), Germany (n = 1), and Australia (n = 1). Five P4P schemes were part of a larger scheme of interventions to improve quality of care, whereas three P4P schemes were solely implemented. Most financial incentives were rewards, selective, and granted on the basis of absolute performance. More variation was found in incented entities and the basis for providing incentives. Information about motivation, certainty, size, frequency, and duration of the financial incentives was generally limited. Five studies were identified that evaluated the effects of P4P on healthcare quality. Most studies showed positive effects of P4P on healthcare quality. No studies were found that evaluated the effects of P4P on healthcare costs. Conclusion The number of P4P schemes to encourage disease management is limited. Hardly any information is available about the effects of such schemes on healthcare quality and costs. PMID:21999234
Compiler-directed cache management in multiprocessors
NASA Technical Reports Server (NTRS)
Cheong, Hoichi; Veidenbaum, Alexander V.
1990-01-01
The necessity of finding alternatives to hardware-based cache coherence strategies for large-scale multiprocessor systems is discussed. Three different software-based strategies sharing the same goals and general approach are presented. They consist of a simple invalidation approach, a fast selective invalidation scheme, and a version control scheme. The strategies are suitable for shared-memory multiprocessor systems with interconnection networks and a large number of processors. Results of trace-driven simulations conducted on numerical benchmark routines to compare the performance of the three schemes are presented.
NASA Technical Reports Server (NTRS)
Brooner, W. G.; Nichols, D. A.
1972-01-01
Development of a scheme for utilizing remote sensing technology in an operational program for regional land use planning and land resource management program applications. The scheme utilizes remote sensing imagery as one of several potential inputs to derive desired and necessary data, and considers several alternative approaches to the expansion and/or reduction and analysis of data, using automated data handling techniques. Within this scheme is a five-stage program development which includes: (1) preliminary coordination, (2) interpretation and encoding, (3) creation of data base files, (4) data analysis and generation of desired products, and (5) applications.
A New Proxy Electronic Voting Scheme Achieved by Six-Particle Entangled States
NASA Astrophysics Data System (ADS)
Cao, Hai-Jing; Ding, Li-Yuan; Jiang, Xiu-Li; Li, Peng-Fei
2018-03-01
In this paper, we use quantum proxy signature to construct a new secret electronic voting scheme. In our scheme, six particles entangled states function as quantum channels. The voter Alice, the Vote Management Center Bob, the scrutineer Charlie only perform two particles measurements on the Bell bases to realize the electronic voting process. So the scheme reduces the technical difficulty and increases operation efficiency. We use quantum key distribution and one-time pad to guarantee its unconditional security. The significant advantage of our scheme is that transmitted information capacity is twice as much as the capacity of other schemes.
BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks
Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo
2010-01-01
Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain. PMID:22319333
BARI+: a biometric based distributed key management approach for wireless body area networks.
Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo
2010-01-01
Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.
Fuzzy energy management for hybrid fuel cell/battery systems for more electric aircraft
NASA Astrophysics Data System (ADS)
Corcau, Jenica-Ileana; Dinca, Liviu; Grigorie, Teodor Lucian; Tudosie, Alexandru-Nicolae
2017-06-01
In this paper is presented the simulation and analysis of a Fuzzy Energy Management for Hybrid Fuel cell/Battery Systems used for More Electric Aircraft. The fuel cell hybrid system contains of fuel cell, lithium-ion batteries along with associated dc to dc boost converters. In this configuration the battery has a dc to dc converter, because it is an active in the system. The energy management scheme includes the rule based fuzzy logic strategy. This scheme has a faster response to load change and is more robust to measurement imprecisions. Simulation will be provided using Matlab/Simulink based models. Simulation results are given to show the overall system performance.
NASA Astrophysics Data System (ADS)
Niu, Xiaoliang; Yuan, Fen; Huang, Shanguo; Guo, Bingli; Gu, Wanyi
2011-12-01
A Dynamic clustering scheme based on coordination of management and control is proposed to reduce network congestion rate and improve the blocking performance of hierarchical routing in Multi-layer and Multi-region intelligent optical network. Its implement relies on mobile agent (MA) technology, which has the advantages of efficiency, flexibility, functional and scalability. The paper's major contribution is to adjust dynamically domain when the performance of working network isn't in ideal status. And the incorporation of centralized NMS and distributed MA control technology migrate computing process to control plane node which releases the burden of NMS and improves process efficiently. Experiments are conducted on Multi-layer and multi-region Simulation Platform for Optical Network (MSPON) to assess the performance of the scheme.
Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho
2015-01-01
In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties.
Yé, M; Aninanya, G A; Sié, A; Kakoko, D C V; Chatio, S; Kagoné, M; Prytherch, H; Loukanova, S; Williams, J E; Sauerborn, R
2014-01-01
Performance-based incentives (PBIs) are currently receiving attention as a strategy for improving the quality of care that health providers deliver. Experiences from several African countries have shown that PBIs can trigger improvements, particularly in the area of maternal and neonatal health. The involvement of health workers in deciding how their performance should be measured is recommended. Only limited information is available about how such schemes can be made sustainable. This study explored the types of PBIs that rural health workers suggested, their ideas regarding the management and sustainability of such schemes, and their views on which indicators best lend themselves to the monitoring of performance. In this article the authors reported the findings from a cross-country survey conducted in Burkina Faso, Ghana and Tanzania. The study was exploratory with qualitative methodology. In-depth interviews were conducted with 29 maternal and neonatal healthcare providers, four district health managers and two policy makers (total 35 respondents) from one district in each of the three countries. The respondents were purposively selected from six peripheral health facilities. Care was taken to include providers who had a management role. By also including respondents from district and policy level a comparison of perspectives from different levels of the health system was facilitated. The data that was collected was coded and analysed with support of NVivo v8 software. The most frequently suggested PBIs amongst the respondents in Burkina Faso were training with per-diems, bonuses and recognition of work done. The respondents in Tanzania favoured training with per-diems, as well as payment of overtime, and timely promotion. The respondents in Ghana also called for training, including paid study leave, payment of overtime and recognition schemes for health workers or facilities. Respondents in the three countries supported the mobilisation of local resources to make incentive schemes more sustainable. There was a general view that it was easier to integrate the cost of non-financial incentives in local budgets. There were concerns about the fairness of such schemes from the provider level in all three countries. District managers were worried about the workload that would be required to manage the schemes. The providers themselves were less clear about which indicators best lent themselves to the purpose of performance monitoring. District managers and policy makers most commonly suggested indicators that were in line with national maternal and neonatal healthcare indicators. The study showed that health workers have considerable interest in performance-based incentive schemes and are concerned about their sustainability. There is a need to further explore the use of non-financial incentives in PBI schemes, as such incentives were considered to stand a greater chance of being integrated into local budgets. Ensuring participation of healthcare providers in the design of such schemes is likely to achieve buy-in and endorsement from the health workers involved. However, input from managers and policy makers is essential to keep expectations realistic and to ensure the indicators selected fit the purpose and are part of routine reporting systems.
Considering User's Access Pattern in Multimedia File Systems
NASA Astrophysics Data System (ADS)
Cho, KyoungWoon; Ryu, YeonSeung; Won, Youjip; Koh, Kern
2002-12-01
Legacy buffer cache management schemes for multimedia server are grounded at the assumption that the application sequentially accesses the multimedia file. However, user access pattern may not be sequential in some circumstances, for example, in distance learning application, where the user may exploit the VCR-like function(rewind and play) of the system and accesses the particular segments of video repeatedly in the middle of sequential playback. Such a looping reference can cause a significant performance degradation of interval-based caching algorithms. And thus an appropriate buffer cache management scheme is required in order to deliver desirable performance even under the workload that exhibits looping reference behavior. We propose Adaptive Buffer cache Management(ABM) scheme which intelligently adapts to the file access characteristics. For each opened file, ABM applies either the LRU replacement or the interval-based caching depending on the Looping Reference Indicator, which indicates that how strong temporally localized access pattern is. According to our experiment, ABM exhibits better buffer cache miss ratio than interval-based caching or LRU, especially when the workload exhibits not only sequential but also looping reference property.
Hybrid scheduling mechanisms for Next-generation Passive Optical Networks based on network coding
NASA Astrophysics Data System (ADS)
Zhao, Jijun; Bai, Wei; Liu, Xin; Feng, Nan; Maier, Martin
2014-10-01
Network coding (NC) integrated into Passive Optical Networks (PONs) is regarded as a promising solution to achieve higher throughput and energy efficiency. To efficiently support multimedia traffic under this new transmission mode, novel NC-based hybrid scheduling mechanisms for Next-generation PONs (NG-PONs) including energy management, time slot management, resource allocation, and Quality-of-Service (QoS) scheduling are proposed in this paper. First, we design an energy-saving scheme that is based on Bidirectional Centric Scheduling (BCS) to reduce the energy consumption of both the Optical Line Terminal (OLT) and Optical Network Units (ONUs). Next, we propose an intra-ONU scheduling and an inter-ONU scheduling scheme, which takes NC into account to support service differentiation and QoS assurance. The presented simulation results show that BCS achieves higher energy efficiency under low traffic loads, clearly outperforming the alternative NC-based Upstream Centric Scheduling (UCS) scheme. Furthermore, BCS is shown to provide better QoS assurance.
Qin, Zhongyuan; Zhang, Xinshuai; Feng, Kerong; Zhang, Qunfang; Huang, Jie
2014-01-01
With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, small memory, power supply limitations and price, we propose an efficient identity-based key management (IBKM) scheme, which exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead. PMID:25264955
Optimal Management of Redundant Control Authority for Fault Tolerance
NASA Technical Reports Server (NTRS)
Wu, N. Eva; Ju, Jianhong
2000-01-01
This paper is intended to demonstrate the feasibility of a solution to a fault tolerant control problem. It explains, through a numerical example, the design and the operation of a novel scheme for fault tolerant control. The fundamental principle of the scheme was formalized in [5] based on the notion of normalized nonspecificity. The novelty lies with the use of a reliability criterion for redundancy management, and therefore leads to a high overall system reliability.
Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho
2015-01-01
In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user’s management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.’s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.’s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.’s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties. PMID:26709702
Wireless Instrumentation System and Power Management Scheme Therefore
NASA Technical Reports Server (NTRS)
Perotti, Jose (Inventor); Lucena, Angel (Inventor); Eckhoff, Anthony (Inventor); Mata, Carlos T. (Inventor); Blalock, Norman N. (Inventor); Medelius, Pedro J. (Inventor)
2007-01-01
A wireless instrumentation system enables a plurality of low power wireless transceivers to transmit measurement data from a plurality of remote station sensors to a central data station accurately and reliably. The system employs a relay based communications scheme where remote stations that cannot communicate directly with the central station due to interference, poor signal strength, etc., are instructed to communicate with other of the remote stations that act as relays to the central station. A unique power management scheme is also employed to minimize power usage at each remote station and thereby maximize battery life. Each of the remote stations prefembly employs a modular design to facilitate easy reconfiguration of the stations as required.
Research on crude oil storage and transportation based on optimization algorithm
NASA Astrophysics Data System (ADS)
Yuan, Xuhua
2018-04-01
At present, the optimization theory and method have been widely used in the optimization scheduling and optimal operation scheme of complex production systems. Based on C++Builder 6 program development platform, the theoretical research results are implemented by computer. The simulation and intelligent decision system of crude oil storage and transportation inventory scheduling are designed. The system includes modules of project management, data management, graphics processing, simulation of oil depot operation scheme. It can realize the optimization of the scheduling scheme of crude oil storage and transportation system. A multi-point temperature measuring system for monitoring the temperature field of floating roof oil storage tank is developed. The results show that by optimizing operating parameters such as tank operating mode and temperature, the total transportation scheduling costs of the storage and transportation system can be reduced by 9.1%. Therefore, this method can realize safe and stable operation of crude oil storage and transportation system.
2012-01-01
Background In 2003 Ghana introduced a social health insurance scheme which resulted in the separation of purchasing of health services by the health insurance authority on the one hand and the provision of health services by hospitals at the other side of the spectrum. This separation has a lot of implications for managing accredited hospitals. This paper examines whether decoupling purchasing and service provision translate into opportunities or challenges in the management of accredited hospitals. Methods A qualitative exploratory study of 15 accredited district hospitals were selected from five of Ghana’s ten administrative regions for the study. A semi-structured interview guide was designed to solicit information from key informants, Health Service Administrators, Pharmacists, Accountants and Scheme Managers of the hospitals studied. Data was analysed thematically. Results The results showed that under the health insurance scheme, hospitals are better-off in terms of cash flow and adequate stock levels of drugs. Adequate stock of non-drugs under the scheme was reportedly intermittent. The major challenges confronting the hospitals were identified as weak purchasing power due to low tariffs, non computerisation of claims processing, unpredictable payment pattern, poor gate-keeping systems, lack of logistics and other new and emerging challenges relating to moral hazards and the use of false identity cards under pretence for medical care. Conclusion Study’s findings have a lot of policy implications for proper management of hospitals. The findings suggest rationalisation of the current tariff structure, the application of contract based payment system to inject efficiency into hospitals management and piloting facility based vetting systems to offset vetting loads of the insurance authority. Proper gate-keeping mechanisms are also needed to curtail the phenomenon of moral hazard and false documentation. PMID:22726666
Atinga, Roger A; Mensah, Sylvester A; Asenso-Boadi, Francis; Adjei, Francis-Xavier Andoh
2012-06-22
In 2003 Ghana introduced a social health insurance scheme which resulted in the separation of purchasing of health services by the health insurance authority on the one hand and the provision of health services by hospitals at the other side of the spectrum. This separation has a lot of implications for managing accredited hospitals. This paper examines whether decoupling purchasing and service provision translate into opportunities or challenges in the management of accredited hospitals. A qualitative exploratory study of 15 accredited district hospitals were selected from five of Ghana's ten administrative regions for the study. A semi-structured interview guide was designed to solicit information from key informants, Health Service Administrators, Pharmacists, Accountants and Scheme Managers of the hospitals studied. Data was analysed thematically. The results showed that under the health insurance scheme, hospitals are better-off in terms of cash flow and adequate stock levels of drugs. Adequate stock of non-drugs under the scheme was reportedly intermittent. The major challenges confronting the hospitals were identified as weak purchasing power due to low tariffs, non computerisation of claims processing, unpredictable payment pattern, poor gate-keeping systems, lack of logistics and other new and emerging challenges relating to moral hazards and the use of false identity cards under pretence for medical care. Study's findings have a lot of policy implications for proper management of hospitals. The findings suggest rationalisation of the current tariff structure, the application of contract based payment system to inject efficiency into hospitals management and piloting facility based vetting systems to offset vetting loads of the insurance authority. Proper gate-keeping mechanisms are also needed to curtail the phenomenon of moral hazard and false documentation.
NASA Astrophysics Data System (ADS)
Huang, Wei; Zhang, Xingnan; Li, Chenming; Wang, Jianying
Management of group decision-making is an important issue in water source management development. In order to overcome the defects in lacking of effective communication and cooperation in the existing decision-making models, this paper proposes a multi-layer dynamic model for coordination in water resource allocation and scheduling based group decision making. By introducing the scheme-recognized cooperative satisfaction index and scheme-adjusted rationality index, the proposed model can solve the problem of poor convergence of multi-round decision-making process in water resource allocation and scheduling. Furthermore, the problem about coordination of limited resources-based group decision-making process can be solved based on the effectiveness of distance-based group of conflict resolution. The simulation results show that the proposed model has better convergence than the existing models.
A robust and high-performance queue management controller for large round trip time networks
NASA Astrophysics Data System (ADS)
Khoshnevisan, Ladan; Salmasi, Farzad R.
2016-05-01
Congestion management for transmission control protocol is of utmost importance to prevent packet loss within a network. This necessitates strategies for active queue management. The most applied active queue management strategies have their inherent disadvantages which lead to suboptimal performance and even instability in the case of large round trip time and/or external disturbance. This paper presents an internal model control robust queue management scheme with two degrees of freedom in order to restrict the undesired effects of large and small round trip time and parameter variations in the queue management. Conventional approaches such as proportional integral and random early detection procedures lead to unstable behaviour due to large delay. Moreover, internal model control-Smith scheme suffers from large oscillations due to the large round trip time. On the other hand, other schemes such as internal model control-proportional integral and derivative show excessive sluggish performance for small round trip time values. To overcome these shortcomings, we introduce a system entailing two individual controllers for queue management and disturbance rejection, simultaneously. Simulation results based on Matlab/Simulink and also Network Simulator 2 (NS2) demonstrate the effectiveness of the procedure and verify the analytical approach.
Lessons from community-based payment for ecosystem service schemes: from forests to rangelands.
Dougill, Andrew J; Stringer, Lindsay C; Leventon, Julia; Riddell, Mike; Rueff, Henri; Spracklen, Dominick V; Butt, Edward
2012-11-19
Climate finance investments and international policy are driving new community-based projects incorporating payments for ecosystem services (PES) to simultaneously store carbon and generate livelihood benefits. Most community-based PES (CB-PES) research focuses on forest areas. Rangelands, which store globally significant quantities of carbon and support many of the world's poor, have seen little CB-PES research attention, despite benefitting from several decades of community-based natural resource management (CBNRM) projects. Lessons from CBNRM suggest institutional considerations are vital in underpinning the design and implementation of successful community projects. This study uses documentary analysis to explore the institutional characteristics of three African community-based forest projects that seek to deliver carbon-storage and poverty-reduction benefits. Strong existing local institutions, clear land tenure, community control over land management decision-making and up-front, flexible payment schemes are found to be vital. Additionally, we undertake a global review of rangeland CBNRM literature and identify that alongside the lessons learned from forest projects, rangeland CB-PES project design requires specific consideration of project boundaries, benefit distribution, capacity building for community monitoring of carbon storage together with awareness-raising using decision-support tools to display the benefits of carbon-friendly land management. We highlight that institutional analyses must be undertaken alongside improved scientific studies of the carbon cycle to enable links to payment schemes, and for them to contribute to poverty alleviation in rangelands.
Lessons from community-based payment for ecosystem service schemes: from forests to rangelands
Dougill, Andrew J.; Stringer, Lindsay C.; Leventon, Julia; Riddell, Mike; Rueff, Henri; Spracklen, Dominick V.; Butt, Edward
2012-01-01
Climate finance investments and international policy are driving new community-based projects incorporating payments for ecosystem services (PES) to simultaneously store carbon and generate livelihood benefits. Most community-based PES (CB-PES) research focuses on forest areas. Rangelands, which store globally significant quantities of carbon and support many of the world's poor, have seen little CB-PES research attention, despite benefitting from several decades of community-based natural resource management (CBNRM) projects. Lessons from CBNRM suggest institutional considerations are vital in underpinning the design and implementation of successful community projects. This study uses documentary analysis to explore the institutional characteristics of three African community-based forest projects that seek to deliver carbon-storage and poverty-reduction benefits. Strong existing local institutions, clear land tenure, community control over land management decision-making and up-front, flexible payment schemes are found to be vital. Additionally, we undertake a global review of rangeland CBNRM literature and identify that alongside the lessons learned from forest projects, rangeland CB-PES project design requires specific consideration of project boundaries, benefit distribution, capacity building for community monitoring of carbon storage together with awareness-raising using decision-support tools to display the benefits of carbon-friendly land management. We highlight that institutional analyses must be undertaken alongside improved scientific studies of the carbon cycle to enable links to payment schemes, and for them to contribute to poverty alleviation in rangelands. PMID:23045714
Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah
2017-03-24
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.
Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah
2017-01-01
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure. PMID:28338632
Liarokapis, Minas V; Artemiadis, Panagiotis K; Kyriakopoulos, Kostas J; Manolakos, Elias S
2013-09-01
A learning scheme based on random forests is used to discriminate between different reach to grasp movements in 3-D space, based on the myoelectric activity of human muscles of the upper-arm and the forearm. Task specificity for motion decoding is introduced in two different levels: Subspace to move toward and object to be grasped. The discrimination between the different reach to grasp strategies is accomplished with machine learning techniques for classification. The classification decision is then used in order to trigger an EMG-based task-specific motion decoding model. Task specific models manage to outperform "general" models providing better estimation accuracy. Thus, the proposed scheme takes advantage of a framework incorporating both a classifier and a regressor that cooperate advantageously in order to split the task space. The proposed learning scheme can be easily used to a series of EMG-based interfaces that must operate in real time, providing data-driven capabilities for multiclass problems, that occur in everyday life complex environments.
Security analysis and enhanced user authentication in proxy mobile IPv6 networks.
Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho
2017-01-01
The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.
Dynamic Hierarchical Sleep Scheduling for Wireless Ad-Hoc Sensor Networks
Wen, Chih-Yu; Chen, Ying-Chih
2009-01-01
This paper presents two scheduling management schemes for wireless sensor networks, which manage the sensors by utilizing the hierarchical network structure and allocate network resources efficiently. A local criterion is used to simultaneously establish the sensing coverage and connectivity such that dynamic cluster-based sleep scheduling can be achieved. The proposed schemes are simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithms provide efficient network power control and can achieve high scalability in wireless sensor networks. PMID:22412343
Dynamic hierarchical sleep scheduling for wireless ad-hoc sensor networks.
Wen, Chih-Yu; Chen, Ying-Chih
2009-01-01
This paper presents two scheduling management schemes for wireless sensor networks, which manage the sensors by utilizing the hierarchical network structure and allocate network resources efficiently. A local criterion is used to simultaneously establish the sensing coverage and connectivity such that dynamic cluster-based sleep scheduling can be achieved. The proposed schemes are simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithms provide efficient network power control and can achieve high scalability in wireless sensor networks.
NASA Astrophysics Data System (ADS)
Tsaur, Woei-Jiunn; Pai, Haw-Tyng
2008-11-01
The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.
Zhang, Xiaoling; Huang, Kai; Zou, Rui; Liu, Yong; Yu, Yajuan
2013-01-01
The conflict of water environment protection and economic development has brought severe water pollution and restricted the sustainable development in the watershed. A risk explicit interval linear programming (REILP) method was used to solve integrated watershed environmental-economic optimization problem. Interval linear programming (ILP) and REILP models for uncertainty-based environmental economic optimization at the watershed scale were developed for the management of Lake Fuxian watershed, China. Scenario analysis was introduced into model solution process to ensure the practicality and operability of optimization schemes. Decision makers' preferences for risk levels can be expressed through inputting different discrete aspiration level values into the REILP model in three periods under two scenarios. Through balancing the optimal system returns and corresponding system risks, decision makers can develop an efficient industrial restructuring scheme based directly on the window of "low risk and high return efficiency" in the trade-off curve. The representative schemes at the turning points of two scenarios were interpreted and compared to identify a preferable planning alternative, which has the relatively low risks and nearly maximum benefits. This study provides new insights and proposes a tool, which was REILP, for decision makers to develop an effectively environmental economic optimization scheme in integrated watershed management.
Zou, Rui; Liu, Yong; Yu, Yajuan
2013-01-01
The conflict of water environment protection and economic development has brought severe water pollution and restricted the sustainable development in the watershed. A risk explicit interval linear programming (REILP) method was used to solve integrated watershed environmental-economic optimization problem. Interval linear programming (ILP) and REILP models for uncertainty-based environmental economic optimization at the watershed scale were developed for the management of Lake Fuxian watershed, China. Scenario analysis was introduced into model solution process to ensure the practicality and operability of optimization schemes. Decision makers' preferences for risk levels can be expressed through inputting different discrete aspiration level values into the REILP model in three periods under two scenarios. Through balancing the optimal system returns and corresponding system risks, decision makers can develop an efficient industrial restructuring scheme based directly on the window of “low risk and high return efficiency” in the trade-off curve. The representative schemes at the turning points of two scenarios were interpreted and compared to identify a preferable planning alternative, which has the relatively low risks and nearly maximum benefits. This study provides new insights and proposes a tool, which was REILP, for decision makers to develop an effectively environmental economic optimization scheme in integrated watershed management. PMID:24191144
Implementation research to improve quality of maternal and newborn health care, Malawi.
Brenner, Stephan; Wilhelm, Danielle; Lohmann, Julia; Kambala, Christabel; Chinkhumba, Jobiba; Muula, Adamson S; De Allegri, Manuela
2017-07-01
To evaluate the impact of a performance-based financing scheme on maternal and neonatal health service quality in Malawi. We conducted a non-randomized controlled before and after study to evaluate the effects of district- and facility-level performance incentives for health workers and management teams. We assessed changes in the facilities' essential drug stocks, equipment maintenance and clinical obstetric care processes. Difference-in-difference regression models were used to analyse effects of the scheme on adherence to obstetric care treatment protocols and provision of essential drugs, supplies and equipment. We observed 33 health facilities, 23 intervention facilities and 10 control facilities and 401 pregnant women across four districts. The scheme improved the availability of both functional equipment and essential drug stocks in the intervention facilities. We observed positive effects in respect to drug procurement and clinical care activities at non-intervention facilities, likely in response to improved district management performance. Birth assistants' adherence to clinical protocols improved across all studied facilities as district health managers supervised and coached clinical staff more actively. Despite nation-wide stock-outs and extreme health worker shortages, facilities in the study districts managed to improve maternal and neonatal health service quality by overcoming bottlenecks related to supply procurement, equipment maintenance and clinical performance. To strengthen and reform health management structures, performance-based financing may be a promising approach to sustainable improvements in quality of health care.
Euler, Johannes; Heldt, Sonja
2018-04-15
The European Union Water Framework Directive (EU WFD, 2000) calls for active inclusion of the public in the governance of waterbodies to enhance the effectiveness and legitimacy of water management schemes across the EU. As complex socio-ecological systems, river basins in western Europe could benefit from further support for inclusive management schemes. This paper makes use of case studies from Germany, England and Spain to explore the potential opportunities and challenges of different participatory management approaches. Grounded in theoretical considerations around participation within ecological management schemes, including Arnstein's Ladder of Participation and commons theories, this work provides an evaluation of each case study based on key indicators, such as inclusivity, representativeness, self-organization, decision-making power, spatial fit and temporal continuity. As investors and the public develop a heightened awareness for long-term sustainability of industrial projects, this analysis supports the suggestion that increased participatory river basin management is both desirable and economically feasible, and should thus be considered a viable option for future projects aiming to move beyond current requirements of the European Union Water Framework Directive. Copyright © 2017. Published by Elsevier B.V.
2014-01-01
Background Nigeria has included a regulated community-based health insurance (CBHI) model within its National Health Insurance Scheme (NHIS). Uptake to date has been disappointing, however. The aim of this study is to review the present status of CBHI in SSA in general to highlight the issues that affect its successful integration within the NHIS of Nigeria and more widely in developing countries. Methods A literature survey using PubMed and EconLit was carried out to identify and review studies that report factors affecting implementation of CBHI in SSA with a focus on Nigeria. Results CBHI schemes with a variety of designs have been introduced across SSA but with generally disappointing results so far. Two exceptions are Ghana and Rwanda, both of which have introduced schemes with effective government control and support coupled with intensive implementation programmes. Poor support for CBHI is repeatedly linked elsewhere with failure to engage and account for the ‘real world’ needs of beneficiaries, lack of clear legislative and regulatory frameworks, inadequate financial support, and unrealistic enrolment requirements. Nigeria’s CBHI-type schemes for the informal sectors of its NHIS have been set up under an appropriate legislative framework, but work is needed to eliminate regressive financing, to involve scheme members in the setting up and management of programmes, to inform and educate more effectively, to eliminate lack of confidence in the schemes, and to address inequity in provision. Targeted subsidies should also be considered. Conclusions Disappointing uptake of CBHI-type NHIS elements in Nigeria can be addressed through closer integration of informal and formal programmes under the NHIS umbrella, with increasing involvement of beneficiaries in scheme design and management, improved communication and education, and targeted financial assistance. PMID:24559409
NASA Astrophysics Data System (ADS)
Jin, Juliang; Li, Lei; Wang, Wensheng; Zhang, Ming
2006-10-01
The optimal selection of schemes of water transportation projects is a process of choosing a relatively optimal scheme from a number of schemes of water transportation programming and management projects, which is of importance in both theory and practice in water resource systems engineering. In order to achieve consistency and eliminate the dimensions of fuzzy qualitative and fuzzy quantitative evaluation indexes, to determine the weights of the indexes objectively, and to increase the differences among the comprehensive evaluation index values of water transportation project schemes, a projection pursuit method, named FPRM-PP for short, was developed in this work for selecting the optimal water transportation project scheme based on the fuzzy preference relation matrix. The research results show that FPRM-PP is intuitive and practical, the correction range of the fuzzy preference relation matrix
Fadlallah, Racha; El-Jardali, Fadi; Hemadi, Nour; Morsi, Rami Z; Abou Samra, Clara Abou; Ahmad, Ali; Arif, Khurram; Hishi, Lama; Honein-AbouHaidar, Gladys; Akl, Elie A
2018-01-29
Community-based health insurance (CBHI) has evolved as an alternative health financing mechanism to out of pocket payments in low- and middle-income countries (LMICs), particularly in areas where government or employer-based health insurance is minimal. This systematic review aimed to assess the barriers and facilitators to implementation, uptake and sustainability of CHBI schemes in LMICs. We searched six electronic databases and grey literature. We included both quantitative and qualitative studies written in English language and published after year 1992. Two reviewers worked in duplicate and independently to complete study selection, data abstraction, and assessment of methodological features. We synthesized the findings based on thematic analysis and categorized according to the ecological model into individual, interpersonal, community and systems levels. Of 15,510 citations, 51 met the eligibility criteria. Individual factors included awareness and understanding of the concept of CBHI, trust in scheme and scheme managers, perceived service quality, and demographic characteristics, which influenced enrollment and sustainability. Interpersonal factors such as household dynamics, other family members enrolled in the scheme, and social solidarity influenced enrollment and renewal of membership. Community-level factors such as culture and community involvement in scheme development influenced enrollment and sustainability of scheme. Systems-level factors encompassed governance, financial and delivery arrangement. Government involvement, accountability of scheme management, and strong policymaker-implementer relation facilitated implementation and sustainability of scheme. Packages that covered outpatient and inpatient care and those tailored to community needs contributed to increased enrollment. Amount and timing of premium collection was reported to negatively influence enrollment while factors reported as threats to sustainability included facility bankruptcy, operating on small budgets, rising healthcare costs, small risk pool, irregular contributions, and overutilization of services. At the delivery level, accessibility of facilities, facility environment, and health personnel influenced enrollment, service utilization and dropout rates. There are a multitude of interrelated factors at the individual, interpersonal, community and systems levels that drive the implementation, uptake and sustainability of CBHI schemes. We discuss the implications of the findings at the policy and research level. The review protocol is registered in PROSPERO International prospective register of systematic reviews (ID = CRD42015019812 ).
Revocable identity-based proxy re-signature against signing key exposure.
Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen
2018-01-01
Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.
Revocable identity-based proxy re-signature against signing key exposure
Ma, Tingchun; Wang, Jinli; Wang, Caifen
2018-01-01
Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification. PMID:29579125
NASA Astrophysics Data System (ADS)
Ani, Adi Irfan Che; Sairi, Ahmad; Tawil, Norngainy Mohd; Wahab, Siti Rashidah Hanum Abd; Razak, Muhd Zulhanif Abd
2016-08-01
High demand for housing and limited land in town area has increasing the provision of high-rise residential scheme. This type of housing has different owners but share the same land lot and common facilities. Thus, maintenance works of the buildings and common facilities must be well organized. The purpose of this paper is to identify and classify basic facilities for high-rise residential building hoping to improve the management of the scheme. The method adopted is a survey on 100 high-rise residential schemes that ranged from affordable housing to high cost housing by using a snowball sampling. The scope of this research is within Kajang area, which is rapidly developed with high-rise housing. The objective of the survey is to list out all facilities in every sample of the schemes. The result confirmed that pre-determined 11 classifications hold true and can provide the realistic classification for high-rise residential scheme. This paper proposed for redefinition of facilities provided to create a better management system and give a clear definition on the type of high-rise residential based on its facilities.
Action versus Result-Oriented Schemes in a Grassland Agroecosystem: A Dynamic Modelling Approach
Sabatier, Rodolphe; Doyen, Luc; Tichit, Muriel
2012-01-01
Effects of agri-environment schemes (AES) on biodiversity remain controversial. While most AES are action-oriented, result-oriented and habitat-oriented schemes have recently been proposed as a solution to improve AES efficiency. The objective of this study was to compare action-oriented, habitat-oriented and result-oriented schemes in terms of ecological and productive performance as well as in terms of management flexibility. We developed a dynamic modelling approach based on the viable control framework to carry out a long term assessment of the three schemes in a grassland agroecosystem. The model explicitly links grazed grassland dynamics to bird population dynamics. It is applied to lapwing conservation in wet grasslands in France. We ran the model to assess the three AES scenarios. The model revealed the grazing strategies respecting ecological and productive constraints specific to each scheme. Grazing strategies were assessed by both their ecological and productive performance. The viable control approach made it possible to obtain the whole set of viable grazing strategies and therefore to quantify the management flexibility of the grassland agroecosystem. Our results showed that habitat and result-oriented scenarios led to much higher ecological performance than the action-oriented one. Differences in both ecological and productive performance between the habitat and result-oriented scenarios were limited. Flexibility of the grassland agroecosystem in the result-oriented scenario was much higher than in that of habitat-oriented scenario. Our model confirms the higher flexibility as well as the better ecological and productive performance of result-oriented schemes. A larger use of result-oriented schemes in conservation may also allow farmers to adapt their management to local conditions and to climatic variations. PMID:22496746
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Yousu; Huang, Zhenyu; Chavarría-Miranda, Daniel
Contingency analysis is a key function in the Energy Management System (EMS) to assess the impact of various combinations of power system component failures based on state estimation. Contingency analysis is also extensively used in power market operation for feasibility test of market solutions. High performance computing holds the promise of faster analysis of more contingency cases for the purpose of safe and reliable operation of today’s power grids with less operating margin and more intermittent renewable energy sources. This paper evaluates the performance of counter-based dynamic load balancing schemes for massive contingency analysis under different computing environments. Insights frommore » the performance evaluation can be used as guidance for users to select suitable schemes in the application of massive contingency analysis. Case studies, as well as MATLAB simulations, of massive contingency cases using the Western Electricity Coordinating Council power grid model are presented to illustrate the application of high performance computing with counter-based dynamic load balancing schemes.« less
Autonomous distributed self-organization for mobile wireless sensor networks.
Wen, Chih-Yu; Tang, Hung-Kai
2009-01-01
This paper presents an adaptive combined-metrics-based clustering scheme for mobile wireless sensor networks, which manages the mobile sensors by utilizing the hierarchical network structure and allocates network resources efficiently A local criteria is used to help mobile sensors form a new cluster or join a current cluster. The messages transmitted during hierarchical clustering are applied to choose distributed gateways such that communication for adjacent clusters and distributed topology control can be achieved. In order to balance the load among clusters and govern the topology change, a cluster reformation scheme using localized criterions is implemented. The proposed scheme is simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithm provides efficient network topology management and achieves high scalability in mobile sensor networks.
NASA Astrophysics Data System (ADS)
Davies, J. S.; Guillaumont, B.; Tempera, F.; Vertino, A.; Beuck, L.; Ólafsdóttir, S. H.; Smith, C. J.; Fosså, J. H.; van den Beld, I. M. J.; Savini, A.; Rengstorf, A.; Bayle, C.; Bourillet, J.-F.; Arnaud-Haond, S.; Grehan, A.
2017-11-01
Cold-water corals (CWC) can form complex structures which provide refuge, nursery grounds and physical support for a diversity of other living organisms. However, irrespectively from such ecological significance, CWCs are still vulnerable to human pressures such as fishing, pollution, ocean acidification and global warming Providing coherent and representative conservation of vulnerable marine ecosystems including CWCs is one of the aims of the Marine Protected Areas networks being implemented across European seas and oceans under the EC Habitats Directive, the Marine Strategy Framework Directive and the OSPAR Convention. In order to adequately represent ecosystem diversity, these initiatives require a standardised habitat classification that organises the variety of biological assemblages and provides consistent and functional criteria to map them across European Seas. One such classification system, EUNIS, enables a broad level classification of the deep sea based on abiotic and geomorphological features. More detailed lower biotope-related levels are currently under-developed, particularly with regards to deep-water habitats (>200 m depth). This paper proposes a hierarchical CWC biotope classification scheme that could be incorporated by existing classification schemes such as EUNIS. The scheme was developed within the EU FP7 project CoralFISH to capture the variability of CWC habitats identified using a wealth of seafloor imagery datasets from across the Northeast Atlantic and Mediterranean. Depending on the resolution of the imagery being interpreted, this hierarchical scheme allows data to be recorded from broad CWC biotope categories down to detailed taxonomy-based levels, thereby providing a flexible yet valuable information level for management. The CWC biotope classification scheme identifies 81 biotopes and highlights the limitations of the classification framework and guidance provided by EUNIS, the EC Habitats Directive, OSPAR and FAO; which largely underrepresent CWC habitats.
Zand, Pouria; Dilo, Arta; Havinga, Paul
2013-06-27
Current wireless technologies for industrial applications, such as WirelessHART and ISA100.11a, use a centralized management approach where a central network manager handles the requirements of the static network. However, such a centralized approach has several drawbacks. For example, it cannot cope with dynamicity/disturbance in large-scale networks in a real-time manner and it incurs a high communication overhead and latency for exchanging management traffic. In this paper, we therefore propose a distributed network management scheme, D-MSR. It enables the network devices to join the network, schedule their communications, establish end-to-end connections by reserving the communication resources for addressing real-time requirements, and cope with network dynamicity (e.g., node/edge failures) in a distributed manner. According to our knowledge, this is the first distributed management scheme based on IEEE 802.15.4e standard, which guides the nodes in different phases from joining until publishing their sensor data in the network. We demonstrate via simulation that D-MSR can address real-time and reliable communication as well as the high throughput requirements of industrial automation wireless networks, while also achieving higher efficiency in network management than WirelessHART, in terms of delay and overhead.
Zand, Pouria; Dilo, Arta; Havinga, Paul
2013-01-01
Current wireless technologies for industrial applications, such as WirelessHART and ISA100.11a, use a centralized management approach where a central network manager handles the requirements of the static network. However, such a centralized approach has several drawbacks. For example, it cannot cope with dynamicity/disturbance in large-scale networks in a real-time manner and it incurs a high communication overhead and latency for exchanging management traffic. In this paper, we therefore propose a distributed network management scheme, D-MSR. It enables the network devices to join the network, schedule their communications, establish end-to-end connections by reserving the communication resources for addressing real-time requirements, and cope with network dynamicity (e.g., node/edge failures) in a distributed manner. According to our knowledge, this is the first distributed management scheme based on IEEE 802.15.4e standard, which guides the nodes in different phases from joining until publishing their sensor data in the network. We demonstrate via simulation that D-MSR can address real-time and reliable communication as well as the high throughput requirements of industrial automation wireless networks, while also achieving higher efficiency in network management than WirelessHART, in terms of delay and overhead. PMID:23807687
Agent-based power sharing scheme for active hybrid power sources
NASA Astrophysics Data System (ADS)
Jiang, Zhenhua
The active hybridization technique provides an effective approach to combining the best properties of a heterogeneous set of power sources to achieve higher energy density, power density and fuel efficiency. Active hybrid power sources can be used to power hybrid electric vehicles with selected combinations of internal combustion engines, fuel cells, batteries, and/or supercapacitors. They can be deployed in all-electric ships to build a distributed electric power system. They can also be used in a bulk power system to construct an autonomous distributed energy system. An important aspect in designing an active hybrid power source is to find a suitable control strategy that can manage the active power sharing and take advantage of the inherent scalability and robustness benefits of the hybrid system. This paper presents an agent-based power sharing scheme for active hybrid power sources. To demonstrate the effectiveness of the proposed agent-based power sharing scheme, simulation studies are performed for a hybrid power source that can be used in a solar car as the main propulsion power module. Simulation results clearly indicate that the agent-based control framework is effective to coordinate the various energy sources and manage the power/voltage profiles.
Privacy Enhancements for Inexact Biometric Templates
NASA Astrophysics Data System (ADS)
Ratha, Nalini; Chikkerur, Sharat; Connell, Jonathan; Bolle, Ruud
Traditional authentication schemes utilize tokens or depend on some secret knowledge possessed by the user for verifying his or her identity. Although these techniques are widely used, they have several limitations. Both tokenand knowledge-based approaches cannot differentiate between an authorized user and an impersonator having access to the tokens or passwords. Biometrics-based authentication schemes overcome these limitations while offering usability advantages in the area of password management. However, despite its obvious advantages, the use of biometrics raises several security and privacy concerns.
Méndez-López, María Elena; García-Frapolli, Eduardo; Pritchard, Diana J; Sánchez González, María Consuelo; Ruiz-Mallén, Isabel; Porter-Bolland, Luciana; Reyes-Garcia, Victoria
2014-12-01
In Mexico, biodiversity conservation is primarily implemented through three schemes: 1) protected areas, 2) payment-based schemes for environmental services, and 3) community-based conservation, officially recognized in some cases as Indigenous and Community Conserved Areas. In this paper we compare levels of local participation across conservation schemes. Through a survey applied to 670 households across six communities in Southeast Mexico, we document local participation during the creation, design, and implementation of the management plan of different conservation schemes. To analyze the data, we first calculated the frequency of participation at the three different stages mentioned, then created a participation index that characterizes the presence and relative intensity of local participation for each conservation scheme. Results showed that there is a low level of local participation across all the conservation schemes explored in this study. Nonetheless, the payment for environmental services had the highest local participation while the protected areas had the least. Our findings suggest that local participation in biodiversity conservation schemes is not a predictable outcome of a specific (community-based) model, thus implying that other factors might be important in determining local participation. This has implications on future strategies that seek to encourage local involvement in conservation. Copyright © 2014 Elsevier Ltd. All rights reserved.
A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.
Farash, Mohammad Sabzinejad; Nawaz, Omer; Mahmood, Khalid; Chaudhry, Shehzad Ashraf; Khan, Muhammad Khurram
2016-07-01
To enhance the quality of healthcare in the management of chronic disease, telecare medical information systems have increasingly been used. Very recently, Zhang and Qi (J. Med. Syst. 38(5):47, 32), and Zhao (J. Med. Syst. 38(5):46, 33) separately proposed two authentication schemes for telecare medical information systems using radio frequency identification (RFID) technology. They claimed that their protocols achieve all security requirements including forward secrecy. However, this paper demonstrates that both Zhang and Qi's scheme, and Zhao's scheme could not provide forward secrecy. To augment the security, we propose an efficient RFID authentication scheme using elliptic curves for healthcare environments. The proposed RFID scheme is secure under common random oracle model.
Mixed biodiversity benefits of agri-environment schemes in five European countries.
Kleijn, D; Baquero, R A; Clough, Y; Díaz, M; De Esteban, J; Fernández, F; Gabriel, D; Herzog, F; Holzschuh, A; Jöhl, R; Knop, E; Kruess, A; Marshall, E J P; Steffan-Dewenter, I; Tscharntke, T; Verhulst, J; West, T M; Yela, J L
2006-03-01
Agri-environment schemes are an increasingly important tool for the maintenance and restoration of farmland biodiversity in Europe but their ecological effects are poorly known. Scheme design is partly based on non-ecological considerations and poses important restrictions on evaluation studies. We describe a robust approach to evaluate agri-environment schemes and use it to evaluate the biodiversity effects of agri-environment schemes in five European countries. We compared species density of vascular plants, birds, bees, grasshoppers and crickets, and spiders on 202 paired fields, one with an agri-environment scheme, the other conventionally managed. In all countries, agri-environment schemes had marginal to moderately positive effects on biodiversity. However, uncommon species benefited in only two of five countries and species listed in Red Data Books rarely benefited from agri-environment schemes. Scheme objectives may need to differentiate between biodiversity of common species that can be enhanced with relatively simple modifications in farming practices and diversity or abundance of endangered species which require more elaborate conservation measures.
Deylami, Mohammad N; Jovanov, Emil
2014-01-01
The overlap of transmission ranges between wireless networks as a result of mobility is referred to as dynamic coexistence. The interference caused by coexistence may significantly affect the performance of wireless body area networks (WBANs) where reliability is particularly critical for health monitoring applications. In this paper, we analytically study the effects of dynamic coexistence on the operation of IEEE 802.15.4-based health monitoring WBANs. The current IEEE 802.15.4 standard lacks mechanisms for effectively managing the coexistence of mobile WBANs. Considering the specific characteristics and requirements of health monitoring WBANs, we propose the dynamic coexistence management (DCM) mechanism to make IEEE 802.15.4-based WBANs able to detect and mitigate the harmful effects of coexistence. We assess the effectiveness of this scheme using extensive OPNET simulations. Our results indicate that DCM improves the successful transmission rates of dynamically coexisting WBANs by 20%-25% for typical medical monitoring applications.
Goose management schemes to resolve conflicts with agriculture: Theory, practice and effects.
Eythórsson, Einar; Tombre, Ingunn M; Madsen, Jesper
2017-03-01
In 2012, the four countries hosting the Svalbard population of pink-footed goose Anser brachyrhynchus along its flyway launched an International Species Management Plan for the population. One of the aims was to reduce conflicts between geese and agriculture to an acceptable level. Since 2006, Norway has offered subsidies to farmers that provide refuge areas for geese on their land. We evaluate the mid-Norwegian goose management subsidy scheme, with a view to its adjustment to prevailing ecological and socio-economic parameters. The analysis indicates that the legitimacy of the scheme is highly dependent on transparency of knowledge management and accountability of management scheme to the farming community. Among farmers, as well as front-line officials, outcomes of prioritisation processes within the scheme are judged unfair when there is an evident mismatch between payments and genuine damage. We suggest how the scheme can be made more fair and responsive to ecological changes, within a framework of adaptive management.
NASA Technical Reports Server (NTRS)
1975-01-01
A shuttle EVLSS Thermal Control System (TCS) is defined. Thirteen heat rejection subsystems, thirteen water management subsystems, nine humidity control subsystems, three pressure control schemes and five temperature control schemes are evaluated. Sixteen integrated TCS systems are studied, and an optimum system is selected based on quantitative weighting of weight, volume, cost, complexity and other factors. The selected sybsystem contains a sublimator for heat rejection, a bubble expansion tank for water management, and a slurper and rotary separator for humidity control. Design of the selected subsystem prototype hardware is presented.
Sharma, Brij Mohan; Bharat, Girija K; Tayal, Shresth; Nizzetto, Luca; Larssen, Thorjørn
2014-08-15
India's rapid agro-economic growth has resulted into many environmental issues, especially related to chemical pollution. Environmental management and control of toxic chemicals have gained significant attention from policy makers, researchers, and enterprises in India. The present study reviews the policy and legal and non-regulatory schemes set in place in this country during the last decades to manage chemical risk and compares them with those in developed nations. India has a large and fragmented body of regulation to control and manage chemical pollution which appears to be ineffective in protecting environment and human health. The example of POPs contamination in India is proposed to support such a theory. Overlapping of jurisdictions and retrospectively approached environmental policy and risk management currently adopted in India are out of date and excluding Indian economy from the process of building and participating into new, environmentally-sustainable market spaces for chemical products. To address these issues, the introduction of a new integrated and scientifically-informed regulation and management scheme is recommended. Such scheme should acknowledge the principle of risk management rather than the current one based on risk acceptance. To this end, India should take advantage of the experience of recently introduced chemical management regulation in some developed nations. Copyright © 2014 Elsevier B.V. All rights reserved.
Security analysis and enhanced user authentication in proxy mobile IPv6 networks
Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick
2017-01-01
The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN’s identity, password and session key. In this paper, we analyze Alizadeh et al.’s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key. PMID:28719621
Implementation research to improve quality of maternal and newborn health care, Malawi
Wilhelm, Danielle; Lohmann, Julia; Kambala, Christabel; Chinkhumba, Jobiba; Muula, Adamson S; De Allegri, Manuela
2017-01-01
Abstract Objective To evaluate the impact of a performance-based financing scheme on maternal and neonatal health service quality in Malawi. Methods We conducted a non-randomized controlled before and after study to evaluate the effects of district- and facility-level performance incentives for health workers and management teams. We assessed changes in the facilities’ essential drug stocks, equipment maintenance and clinical obstetric care processes. Difference-in-difference regression models were used to analyse effects of the scheme on adherence to obstetric care treatment protocols and provision of essential drugs, supplies and equipment. Findings We observed 33 health facilities, 23 intervention facilities and 10 control facilities and 401 pregnant women across four districts. The scheme improved the availability of both functional equipment and essential drug stocks in the intervention facilities. We observed positive effects in respect to drug procurement and clinical care activities at non-intervention facilities, likely in response to improved district management performance. Birth assistants’ adherence to clinical protocols improved across all studied facilities as district health managers supervised and coached clinical staff more actively. Conclusion Despite nation-wide stock-outs and extreme health worker shortages, facilities in the study districts managed to improve maternal and neonatal health service quality by overcoming bottlenecks related to supply procurement, equipment maintenance and clinical performance. To strengthen and reform health management structures, performance-based financing may be a promising approach to sustainable improvements in quality of health care. PMID:28670014
Intellectual Production Supervision Perform based on RFID Smart Electricity Meter
NASA Astrophysics Data System (ADS)
Chen, Xiangqun; Huang, Rui; Shen, Liman; chen, Hao; Xiong, Dezhi; Xiao, Xiangqi; Liu, Mouhai; Xu, Renheng
2018-03-01
This topic develops the RFID intelligent electricity meter production supervision project management system. The system is designed for energy meter production supervision in the management of the project schedule, quality and cost information management requirements in RFID intelligent power, and provide quantitative information more comprehensive, timely and accurate for supervision engineer and project manager management decisions, and to provide technical information for the product manufacturing stage file. From the angle of scheme analysis, design, implementation and test, the system development of production supervision project management system for RFID smart meter project is discussed. Focus on the development of the system, combined with the main business application and management mode at this stage, focuses on the energy meter to monitor progress information, quality information and cost based information on RFID intelligent power management function. The paper introduces the design scheme of the system, the overall client / server architecture, client oriented graphical user interface universal, complete the supervision of project management and interactive transaction information display, the server system of realizing the main program. The system is programmed with C# language and.NET operating environment, and the client and server platforms use Windows operating system, and the database server software uses Oracle. The overall platform supports mainstream information and standards and has good scalability.
Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth
2016-11-29
Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.
Advanced control design for hybrid turboelectric vehicle
NASA Technical Reports Server (NTRS)
Abban, Joseph; Norvell, Johnesta; Momoh, James A.
1995-01-01
The new environment standards are a challenge and opportunity for industry and government who manufacture and operate urban mass transient vehicles. A research investigation to provide control scheme for efficient power management of the vehicle is in progress. Different design requirements using functional analysis and trade studies of alternate power sources and controls have been performed. The design issues include portability, weight and emission/fuel efficiency of induction motor, permanent magnet and battery. A strategic design scheme to manage power requirements using advanced control systems is presented. It exploits fuzzy logic, technology and rule based decision support scheme. The benefits of our study will enhance the economic and technical feasibility of technological needs to provide low emission/fuel efficient urban mass transit bus. The design team includes undergraduate researchers in our department. Sample results using NASA HTEV simulation tool are presented.
Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
2008-01-01
For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully. PMID:27873956
Singh, Riddhi; Quinn, Julianne D; Reed, Patrick M; Keller, Klaus
2018-01-01
Many coupled human-natural systems have the potential to exhibit a highly nonlinear threshold response to external forcings resulting in fast transitions to undesirable states (such as eutrophication in a lake). Often, there are considerable uncertainties that make identifying the threshold challenging. Thus, rapid learning is critical for guiding management actions to avoid abrupt transitions. Here, we adopt the shallow lake problem as a test case to compare the performance of four common data assimilation schemes to predict an approaching transition. In order to demonstrate the complex interactions between management strategies and the ability of the data assimilation schemes to predict eutrophication, we also analyze our results across two different management strategies governing phosphorus emissions into the shallow lake. The compared data assimilation schemes are: ensemble Kalman filtering (EnKF), particle filtering (PF), pre-calibration (PC), and Markov Chain Monte Carlo (MCMC) estimation. While differing in their core assumptions, each data assimilation scheme is based on Bayes' theorem and updates prior beliefs about a system based on new information. For large computational investments, EnKF, PF and MCMC show similar skill in capturing the observed phosphorus in the lake (measured as expected root mean squared prediction error). EnKF, followed by PF, displays the highest learning rates at low computational cost, thus providing a more reliable signal of an impending transition. MCMC approaches the true probability of eutrophication only after a strong signal of an impending transition emerges from the observations. Overall, we find that learning rates are greatest near regions of abrupt transitions, posing a challenge to early learning and preemptive management of systems with such abrupt transitions.
Quinn, Julianne D.; Reed, Patrick M.; Keller, Klaus
2018-01-01
Many coupled human-natural systems have the potential to exhibit a highly nonlinear threshold response to external forcings resulting in fast transitions to undesirable states (such as eutrophication in a lake). Often, there are considerable uncertainties that make identifying the threshold challenging. Thus, rapid learning is critical for guiding management actions to avoid abrupt transitions. Here, we adopt the shallow lake problem as a test case to compare the performance of four common data assimilation schemes to predict an approaching transition. In order to demonstrate the complex interactions between management strategies and the ability of the data assimilation schemes to predict eutrophication, we also analyze our results across two different management strategies governing phosphorus emissions into the shallow lake. The compared data assimilation schemes are: ensemble Kalman filtering (EnKF), particle filtering (PF), pre-calibration (PC), and Markov Chain Monte Carlo (MCMC) estimation. While differing in their core assumptions, each data assimilation scheme is based on Bayes’ theorem and updates prior beliefs about a system based on new information. For large computational investments, EnKF, PF and MCMC show similar skill in capturing the observed phosphorus in the lake (measured as expected root mean squared prediction error). EnKF, followed by PF, displays the highest learning rates at low computational cost, thus providing a more reliable signal of an impending transition. MCMC approaches the true probability of eutrophication only after a strong signal of an impending transition emerges from the observations. Overall, we find that learning rates are greatest near regions of abrupt transitions, posing a challenge to early learning and preemptive management of systems with such abrupt transitions. PMID:29389938
Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
2008-12-03
For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODE plus . It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODE plus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.
Free web-based modelling platform for managed aquifer recharge (MAR) applications
NASA Astrophysics Data System (ADS)
Stefan, Catalin; Junghanns, Ralf; Glaß, Jana; Sallwey, Jana; Fatkhutdinov, Aybulat; Fichtner, Thomas; Barquero, Felix; Moreno, Miguel; Bonilla, José; Kwoyiga, Lydia
2017-04-01
Managed aquifer recharge represents a valuable instrument for sustainable water resources management. The concept implies purposeful infiltration of surface water into underground for later recovery or environmental benefits. Over decades, MAR schemes were successfully installed worldwide for a variety of reasons: to maximize the natural storage capacity of aquifers, physical aquifer management, water quality management, and ecological benefits. The INOWAS-DSS platform provides a collection of free web-based tools for planning, management and optimization of main components of MAR schemes. The tools are grouped into 13 specific applications that cover most relevant challenges encountered at MAR sites, both from quantitative and qualitative perspectives. The applications include among others the optimization of MAR site location, the assessment of saltwater intrusion, the restoration of groundwater levels in overexploited aquifers, the maximization of natural storage capacity of aquifers, the improvement of water quality, the design and operational optimization of MAR schemes, clogging development and risk assessment. The platform contains a collection of about 35 web-based tools of various degrees of complexity, which are either included in application specific workflows or used as standalone modelling instruments. Among them are simple tools derived from data mining and empirical equations, analytical groundwater related equations, as well as complex numerical flow and transport models (MODFLOW, MT3DMS and SEAWAT). Up to now, the simulation core of the INOWAS-DSS, which is based on the finite differences groundwater flow model MODFLOW, is implemented and runs on the web. A scenario analyser helps to easily set up and evaluate new management options as well as future development such as land use and climate change and compare them to previous scenarios. Additionally simple tools such as analytical equations to assess saltwater intrusion are already running online. Besides the simulation tools, a web-based data base is under development where geospatial and time series data can be stored, managed, and processed. Furthermore, a web-based information system containing user guides for the various developed tools and applications as well as basic information on MAR and related topics is published and will be regularly expanded as new tools are getting implemented. The INOWAS-DSS including its simulation tools, data base and information system provides an extensive framework to manage, plan and optimize MAR facilities. As the INOWAS-DSS is an open-source software accessible via the internet using standard web browsers, it offers new ways for data sharing and collaboration among various partners and decision makers.
NASA Astrophysics Data System (ADS)
Zhang, Yuchao; Gan, Chaoqin; Gou, Kaiyu; Xu, Anni; Ma, Jiamin
2018-01-01
DBA scheme based on Load balance algorithm (LBA) and wavelength recycle mechanism (WRM) for multi-wavelength upstream transmission is proposed in this paper. According to 1 Gbps and 10 Gbps line rates, ONUs are grouped into different VPONs. To facilitate wavelength management, resource pool is proposed to record wavelength state. To realize quantitative analysis, a mathematical model describing metro-access network (MAN) environment is presented. To 10G-EPON upstream, load balance algorithm is designed to ensure load distribution fairness for 10G-OLTs. To 1G-EPON upstream, wavelength recycle mechanism is designed to share remained wavelengths. Finally, the effectiveness of the proposed scheme is demonstrated by simulation and analysis.
A Mobile IPv6 based Distributed Mobility Management Mechanism of Mobile Internet
NASA Astrophysics Data System (ADS)
Yan, Shi; Jiayin, Cheng; Shanzhi, Chen
A flatter architecture is one of the trends of mobile Internet. Traditional centralized mobility management mechanism faces the challenges such as scalability and UE reachability. A MIPv6 based distributed mobility management mechanism is proposed in this paper. Some important network entities and signaling procedures are defined. UE reachability is also considered in this paper through extension to DNS servers. Simulation results show that the proposed approach can overcome the scalability problem of the centralized scheme.
Little, R; Wheeler, K; Edge, S
2017-02-11
This paper examines farmer attitudes towards the development of a voluntary risk-based trading scheme for cattle in England as a risk mitigation measure for bovine tuberculosis (bTB). The research reported here was commissioned to gather evidence on the type of scheme that would have a good chance of success in improving the information farmers receive about the bTB risk of cattle they buy. Telephone interviews were conducted with a stratified random sample of 203 cattle farmers in England, splitting the interviews equally between respondents in the high-risk area and low-risk area for bTB. Supplementary interviews and focus groups with farmers were also carried out across the risk areas. Results suggest a greater enthusiasm for a risk-based trading scheme in low-risk areas compared with high-risk areas and among members of breed societies and cattle health schemes. Third-party certification of herds by private vets or the Animal and Plant Health Agency were regarded as the most credible source, with farmer self-certification being favoured by sellers, but being regarded as least credible by buyers. Understanding farmers' attitudes towards voluntary risk-based trading is important to gauge likely uptake, understand preferences for information provision and to assist in monitoring, evaluating and refining the scheme once established. British Veterinary Association.
Using Ada to implement the operations management system in a community of experts
NASA Technical Reports Server (NTRS)
Frank, M. S.
1986-01-01
An architecture is described for the Space Station Operations Management System (OMS), consisting of a distributed expert system framework implemented in Ada. The motivation for such a scheme is based on the desire to integrate the very diverse elements of the OMS while taking maximum advantage of knowledge based systems technology. Part of the foundation of an Ada based distributed expert system was accomplished in the form of a proof of concept prototype for the KNOMES project (Knowledge-based Maintenance Expert System). This prototype successfully used concurrently active experts to accomplish monitoring and diagnosis for the Remote Manipulator System. The basic concept of this software architecture is named ACTORS for Ada Cognitive Task ORganization Scheme. It is when one considers the overall problem of integrating all of the OMS elements into a cooperative system that the AI solution stands out. By utilizing a distributed knowledge based system as the framework for OMS, it is possible to integrate those components which need to share information in an intelligent manner.
Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks
Chen, Chin-Ling; Lin, I-Hsien
2010-01-01
Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths. PMID:22163606
Location-aware dynamic session-key management for grid-based Wireless Sensor Networks.
Chen, Chin-Ling; Lin, I-Hsien
2010-01-01
Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.
Birch, G F; Gunns, T J; Chapman, D; Harrison, D
2016-05-01
As coastal populations increase, considerable pressures are exerted on estuarine environments. Recently, there has been a trend towards the development and use of estuarine assessment schemes as a decision support tool in the management of these environments. These schemes offer a method by which complex environmental data is converted into a readily understandable and communicable format for informed decision making and effective distribution of limited management resources. Reliability and effectiveness of these schemes are often limited due to a complex assessment framework, poor data management and use of ineffective environmental indicators. The current scheme aims to improve reliability in the reporting of estuarine condition by including a concise assessment framework, employing high-value indicators and, in a unique approach, employing fuzzy logic in indicator evaluation. Using Sydney estuary as a case study, each of the 15 sub-catchment/sub-estuary systems were assessed using the current scheme. Results identified that poor sediment quality was a significant issue in Blackwattle/Rozelle Bay, Iron Cove and Hen and Chicken Bay while poor water quality was of particular concern in Duck River, Homebush Bay and the Parramatta River. Overall results of the assessment scheme were used to prioritise the management of each sub-catchment/sub-estuary assessed with Blackwattle/Rozelle Bay, Homebush Bay, Iron Cove and Duck River considered to be in need of a high priority management response. A report card format, using letter grades, was employed to convey the results of the assessment in a readily understood manner to estuarine managers and members of the public. Letter grades also provide benchmarking and performance monitoring ability, allowing estuarine managers to set improvement targets and assesses the effectiveness of management strategies. The current assessment scheme provides an effective, integrated and consistent assessment of estuarine health and provides an effective decision support tool to maximise the efficient distribution of limited management resources.
Regional management of farmland feeding geese using an ecological prioritization tool.
Madsen, Jesper; Bjerrum, Morten; Tombre, Ingunn M
2014-10-01
Wild geese foraging on farmland cause increasing conflicts with agricultural interests, calling for a strategic approach to mitigation. In central Norway, conflicts between farmers and spring-staging pink-footed geese feeding on pastures have escalated. To alleviate the conflict, a scheme by which farmers are subsidized to allow geese to forage undisturbed was introduced. To guide allocation of subsidies, an ecological-based ranking of fields at a regional level was recommended and applied. Here we evaluate the scheme. On average, 40 % of subsidized fields were in the top 5 % of the ranking, and 80 % were within the top 20 %. Goose grazing pressure on subsidized pastures was 13 times higher compared to a stratified random selection of non-subsidized pastures, capturing 67 % of the pasture feeding geese despite that subsidized fields only comprised 13 % of the grassland area. Close dialogue between scientists and managers is regarded as a key to the success of the scheme.
NASA Astrophysics Data System (ADS)
da Silva, Eduardo; Dos Santos, Aldri Luiz; Lima, Michele N.; Albini, Luiz Carlos Pessoa
Among the key management schemes for MANETs, the Self-Organized Public-Key Management System (PGP-Like) is the main chaining-based key management scheme. It is fully self-organized and does not require any certificate authority. Two kinds of misbehavior attacks are considered to be great threats to PGP-Like: lack of cooperation and impersonation attacks. This work quantifies the impact of such attacks on the PGP-Like. Simulation results show that PGP-Like was able to maintain its effectiveness when submitted to the lack of cooperation attack, contradicting previously theoretical results. It correctly works even in the presence of more than 60% of misbehaving nodes, although the convergence time is affected with only 20% of misbehaving nodes. On the other hand, PGP-Like is completely vulnerable to the impersonation attack. Its functionality is affected with just 5% of misbehaving nodes, confirming previously theoretical results.
NASA Astrophysics Data System (ADS)
Benaskeur, Abder R.; Roy, Jean
2001-08-01
Sensor Management (SM) has to do with how to best manage, coordinate and organize the use of sensing resources in a manner that synergistically improves the process of data fusion. Based on the contextual information, SM develops options for collecting further information, allocates and directs the sensors towards the achievement of the mission goals and/or tunes the parameters for the realtime improvement of the effectiveness of the sensing process. Conscious of the important role that SM has to play in modern data fusion systems, we are currently studying advanced SM Concepts that would help increase the survivability of the current Halifax and Iroquois Class ships, as well as their possible future upgrades. For this purpose, a hierarchical scheme has been proposed for data fusion and resource management adaptation, based on the control theory and within the process refinement paradigm of the JDL data fusion model, and taking into account the multi-agent model put forward by the SASS Group for the situation analysis process. The novelty of this work lies in the unified framework that has been defined for tackling the adaptation of both the fusion process and the sensor/weapon management.
NASA Astrophysics Data System (ADS)
Cavaglieri, Daniele; Bewley, Thomas
2015-04-01
Implicit/explicit (IMEX) Runge-Kutta (RK) schemes are effective for time-marching ODE systems with both stiff and nonstiff terms on the RHS; such schemes implement an (often A-stable or better) implicit RK scheme for the stiff part of the ODE, which is often linear, and, simultaneously, a (more convenient) explicit RK scheme for the nonstiff part of the ODE, which is often nonlinear. Low-storage RK schemes are especially effective for time-marching high-dimensional ODE discretizations of PDE systems on modern (cache-based) computational hardware, in which memory management is often the most significant computational bottleneck. In this paper, we develop and characterize eight new low-storage implicit/explicit RK schemes which have higher accuracy and better stability properties than the only low-storage implicit/explicit RK scheme available previously, the venerable second-order Crank-Nicolson/Runge-Kutta-Wray (CN/RKW3) algorithm that has dominated the DNS/LES literature for the last 25 years, while requiring similar storage (two, three, or four registers of length N) and comparable floating-point operations per timestep.
NASA Astrophysics Data System (ADS)
Hayatbini, N.; Faridzad, M.; Yang, T.; Akbari Asanjan, A.; Gao, X.; Sorooshian, S.
2016-12-01
The Artificial Neural Networks (ANNs) are useful in many fields, including water resources engineering and management. However, due to the non-linear and chaotic characteristics associated with natural processes and human decision making, the use of ANNs in real-world applications is still limited, and its performance needs to be further improved for a broader practical use. The commonly used Back-Propagation (BP) scheme and gradient-based optimization in training the ANNs have already found to be problematic in some cases. The BP scheme and gradient-based optimization methods are associated with the risk of premature convergence, stuck in local optimums, and the searching is highly dependent on initial conditions. Therefore, as an alternative to BP and gradient-based searching scheme, we propose an effective and efficient global searching method, termed the Shuffled Complex Evolutionary Global optimization algorithm with Principal Component Analysis (SP-UCI), to train the ANN connectivity weights. Large number of real-world datasets are tested with the SP-UCI-based ANN, as well as various popular Evolutionary Algorithms (EAs)-enhanced ANNs, i.e., Particle Swarm Optimization (PSO)-, Genetic Algorithm (GA)-, Simulated Annealing (SA)-, and Differential Evolution (DE)-enhanced ANNs. Results show that SP-UCI-enhanced ANN is generally superior over other EA-enhanced ANNs with regard to the convergence and computational performance. In addition, we carried out a case study for hydropower scheduling in the Trinity Lake in the western U.S. In this case study, multiple climate indices are used as predictors for the SP-UCI-enhanced ANN. The reservoir inflows and hydropower releases are predicted up to sub-seasonal to seasonal scale. Results show that SP-UCI-enhanced ANN is able to achieve better statistics than other EAs-based ANN, which implies the usefulness and powerfulness of proposed SP-UCI-enhanced ANN for reservoir operation, water resources engineering and management. The SP-UCI-enhanced ANN is universally applicable to many other regression and prediction problems, and it has a good potential to be an alternative to the classical BP scheme and gradient-based optimization methods.
Li, Y P; Huang, G H
2010-09-15
Considerable public concerns have been raised in the past decades since a large amount of pollutant emissions from municipal solid waste (MSW) disposal of processes pose risks on surrounding environment and human health. Moreover, in MSW management, various uncertainties exist in the related costs, impact factors and objectives, which can affect the optimization processes and the decision schemes generated. In this study, an interval-based possibilistic programming (IBPP) method is developed for planning the MSW management with minimized system cost and environmental impact under uncertainty. The developed method can deal with uncertainties expressed as interval values and fuzzy sets in the left- and right-hand sides of constraints and objective function. An interactive algorithm is provided for solving the IBPP problem, which does not lead to more complicated intermediate submodels and has a relatively low computational requirement. The developed model is applied to a case study of planning a MSW management system, where mixed integer linear programming (MILP) technique is introduced into the IBPP framework to facilitate dynamic analysis for decisions of timing, sizing and siting in terms of capacity expansion for waste-management facilities. Three cases based on different waste-management policies are examined. The results obtained indicate that inclusion of environmental impacts in the optimization model can change the traditional waste-allocation pattern merely based on the economic-oriented planning approach. The results obtained can help identify desired alternatives for managing MSW, which has advantages in providing compromised schemes under an integrated consideration of economic efficiency and environmental impact under uncertainty. Copyright 2010 Elsevier B.V. All rights reserved.
Wang, Mingming; Sun, Yuanxiang; Sweetapple, Chris
2017-12-15
Storage is important for flood mitigation and non-point source pollution control. However, to seek a cost-effective design scheme for storage tanks is very complex. This paper presents a two-stage optimization framework to find an optimal scheme for storage tanks using storm water management model (SWMM). The objectives are to minimize flooding, total suspended solids (TSS) load and storage cost. The framework includes two modules: (i) the analytical module, which evaluates and ranks the flooding nodes with the analytic hierarchy process (AHP) using two indicators (flood depth and flood duration), and then obtains the preliminary scheme by calculating two efficiency indicators (flood reduction efficiency and TSS reduction efficiency); (ii) the iteration module, which obtains an optimal scheme using a generalized pattern search (GPS) method based on the preliminary scheme generated by the analytical module. The proposed approach was applied to a catchment in CZ city, China, to test its capability in choosing design alternatives. Different rainfall scenarios are considered to test its robustness. The results demonstrate that the optimal framework is feasible, and the optimization is fast based on the preliminary scheme. The optimized scheme is better than the preliminary scheme for reducing runoff and pollutant loads under a given storage cost. The multi-objective optimization framework presented in this paper may be useful in finding the best scheme of storage tanks or low impact development (LID) controls. Copyright © 2017 Elsevier Ltd. All rights reserved.
The global increase of noxious bloom occurrences has increased the need for phytoplankton management schemes. Such schemes require the ability to predict phytoplankton succession. Equilibrium Resources Competition theory, which is popular for predicting succession in lake systems...
Multi-criteria analysis for the determination of the best WEEE management scenario in Cyprus.
Rousis, K; Moustakas, K; Malamis, S; Papadopoulos, A; Loizidou, M
2008-01-01
Waste from electrical and electronic equipment (WEEE) constitutes one of the most complicated solid waste streams in terms of its composition, and, as a result, it is difficult to be effectively managed. In view of the environmental problems derived from WEEE management, many countries have established national legislation to improve the reuse, recycling and other forms of recovery of this waste stream so as to apply suitable management schemes. In this work, alternative systems are examined for the WEEE management in Cyprus. These systems are evaluated by developing and applying the Multi-Criteria Decision Making (MCDM) method PROMETHEE. In particular, through this MCDM method, 12 alternative management systems were compared and ranked according to their performance and efficiency. The obtained results show that the management schemes/systems based on partial disassembly are the most suitable for implementation in Cyprus. More specifically, the optimum scenario/system that can be implemented in Cyprus is that of partial disassembly and forwarding of recyclable materials to the native existing market and disposal of the residues at landfill sites.
Obermann, Konrad; Chanturidze, Tata; Glazinski, Bernd; Dobberschuetz, Karin; Steinhauer, Heiko; Schmidt, Jean-Olivier
2018-02-20
Managers and administrators in charge of social protection and health financing, service purchasing and provision play a crucial role in harnessing the potential advantage of prudent organization, management and purchasing of health services, thereby supporting the attainment of Universal Health Coverage. However, very little is known about the needed quantity and quality of such staff, in particular when it comes to those institutions managing mandatory health insurance schemes and purchasing services. As many health care systems in low- and middle-income countries move towards independent institutions (both purchasers and providers) there is a clear need to have good data on staff and administrative cost in different social health protection schemes as a basis for investing in the development of a cadre of health managers and administrators for such schemes. We report on a systematic literature review of human resources in health management and administration in social protection schemes and suggest some aspects in moving research, practical applications and the policy debate forward.
ERIC Educational Resources Information Center
Jones, Daniel; Monsen, Jeremy; Franey, John
2013-01-01
This paper explores how educational psychologists working in a training/consultative way can enable teachers to manage challenging pupil behaviour more effectively. It sets out a rationale which encourages schools to embrace a group based teacher peer-support system as part of regular school development. It then explores the usefulness of the…
Authenticated IGMP for Controlling Access to Multicast Distribution Tree
NASA Astrophysics Data System (ADS)
Park, Chang-Seop; Kang, Hyun-Sun
A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.
Advanced Health Management of a Brushless Direct Current Motor/Controller
NASA Technical Reports Server (NTRS)
Pickett, R. D.
2003-01-01
This effort demonstrates that health management can be taken to the component level for electromechanical systems. The same techniques can be applied to take any health management system to the component level, based on the practicality of the implementation for that particular system. This effort allows various logic schemes to be implemented for the identification and management of failures. By taking health management to the component level, integrated vehicle health management systems can be enhanced by protecting box-level avionics from being shut down in order to isolate a failed computer.
Remote coding scheme based on waveguide Bragg grating in PLC splitter chip for PON monitoring.
Zhang, Xuan; Lu, Fengjun; Chen, Si; Zhao, Xingqun; Zhu, Min; Sun, Xiaohan
2016-03-07
A distributing arranged waveguide Bragg gratings (WBGs) in PLC splitter chip based remote coding scheme is proposed and analyzed for passive optical network (PON) monitoring, by which the management system can identify each drop fiber link through the same reflector in the terminal of each optical network unit, even though there exist several equidistant users. The corresponding coding and capacity models are respectively established and investigated so that we can obtain a minimum number of the WBGs needed under the condition of the distributed structure. Signal-to-noise ratio (SNR) model related to the number of equidistant users is also developed to extend the analyses for the overall performance of the system. Simulation results show the proposed scheme is feasible and allow the monitoring of a 64 users PON with SNR range of 7.5~10.6dB. The scheme can solve some of difficulties of construction site at the lower user cost for PON system.
NASA Astrophysics Data System (ADS)
Huang, H. E.; Liang, C. P.; Jang, C. S.; Chen, J. S.
2015-12-01
Land subsidence due to groundwater exploitation is an urgent environmental problem in Choushui river alluvial fan in Taiwan. Aquifer storage and recovery (ASR), where excess surface water is injected into subsurface aquifers for later recovery, is one promising strategy for managing surplus water and may overcome water shortages. The performance of an ASR scheme is generally evaluated in terms of recovery efficiency, which is defined as percentage of water injected in to a system in an ASR site that fulfills the targeted water quality criterion. Site selection of an ASR scheme typically faces great challenges, due to the spatial variability of groundwater quality and hydrogeological condition. This study proposes a novel method for the ASR site selection based on drinking quality criterion. Simplified groundwater flow and contaminant transport model spatial distributions of the recovery efficiency with the help of the groundwater quality, hydrological condition, ASR operation. The results of this study may provide government administrator for establishing reliable ASR scheme.
Efficient Buffering Scheme in the LMA for Seamless Handover in PMIPv6
NASA Astrophysics Data System (ADS)
Kim, Kwang-Ryoul; Lee, Hyo-Beom; Choi, Hyon-Young; Min, Sung-Gi; Han, Youn-Hee
Proxy Mobile IPv6 (PMIPv6) is proposed as a new network-based local mobility protocol which does not involve the Mobile Node (MN) in mobility management. PMIPv6, which uses link-layer attachment information, reduces the movement detection time and eliminates duplicate address detection procedures in order to provide faster handover than Mobile IPv6 (MIPv6). To eliminate packet loss during the handover period, the Local Mobility Anchor (LMA) buffering scheme is proposed. In this scheme, the LMA buffers lost packets of the Mobile Access Gateway (MAG) and the MN during the handover and recovers them after handover. A new Automatic Repeat reQuest (ARQ) handler is defined which efficiently manages the LMA buffer. The ARQ handler relays ARQ result between the MAG and the MN to the LMA. The LMA removes any buffered packets which have been successfully delivered to the MN. The ARQ handler recovers the packet loss during the handover using buffered packets in the LMA. The ARQ information, between the MAG and LMA, is inserted in the outer header of IP-in-IP encapsulated packets of a standard PMIPv6 tunnel. Since the proposed scheme simply adds information to the standard operation of an IP-in-IP tunnel between the LMA and the MAG, it can be implemented seamlessly without modification to the original PMIPv6 messages and signaling sequence. Unlike other Fast Handovers for Mobile IPv6 (FMIPv6) based enhancement for PMIPv6, the proposed scheme does not require any handover related information before the actual handover.
A High Fuel Consumption Efficiency Management Scheme for PHEVs Using an Adaptive Genetic Algorithm
Lee, Wah Ching; Tsang, Kim Fung; Chi, Hao Ran; Hung, Faan Hei; Wu, Chung Kit; Chui, Kwok Tai; Lau, Wing Hong; Leung, Yat Wah
2015-01-01
A high fuel efficiency management scheme for plug-in hybrid electric vehicles (PHEVs) has been developed. In order to achieve fuel consumption reduction, an adaptive genetic algorithm scheme has been designed to adaptively manage the energy resource usage. The objective function of the genetic algorithm is implemented by designing a fuzzy logic controller which closely monitors and resembles the driving conditions and environment of PHEVs, thus trading off between petrol versus electricity for optimal driving efficiency. Comparison between calculated results and publicized data shows that the achieved efficiency of the fuzzified genetic algorithm is better by 10% than existing schemes. The developed scheme, if fully adopted, would help reduce over 600 tons of CO2 emissions worldwide every day. PMID:25587974
Microinsurance: innovations in low-cost health insurance.
Dror, David M; Radermacher, Ralf; Khadilkar, Shrikant B; Schout, Petra; Hay, François-Xavier; Singh, Arbind; Koren, Ruth
2009-01-01
Microinsurance--low-cost health insurance based on a community, cooperative, or mutual and self-help arrangements-can provide financial protection for poor households and improve access to health care. However, low benefit caps and a low share of premiums paid as benefits--both designed to keep these arrangements in business--perversely limited these schemes' ability to extend coverage, offer financial protection, and retain members. We studied three schemes in India, two of which are member-operated and one a commercial scheme, using household surveys of insured and uninsured households and interviews with managers. All three enrolled poor households and raised their use of hospital services, as intended. Financial exposure was greatest, and protection was least, in the commercial scheme, which imposed the lowest caps on benefits and where income was the lowest.
NASA Technical Reports Server (NTRS)
Idris, Husni; Shen, Ni; Wing, David J.
2011-01-01
The growing demand for air travel is increasing the need for mitigating air traffic congestion and complexity problems, which are already at high levels. At the same time new surveillance, navigation, and communication technologies are enabling major transformations in the air traffic management system, including net-based information sharing and collaboration, performance-based access to airspace resources, and trajectory-based rather than clearance-based operations. The new system will feature different schemes for allocating tasks and responsibilities between the ground and airborne agents and between the human and automation, with potential capacity and cost benefits. Therefore, complexity management requires new metrics and methods that can support these new schemes. This paper presents metrics and methods for preserving trajectory flexibility that have been proposed to support a trajectory-based approach for complexity management by airborne or ground-based systems. It presents extensions to these metrics as well as to the initial research conducted to investigate the hypothesis that using these metrics to guide user and service provider actions will naturally mitigate traffic complexity. The analysis showed promising results in that: (1) Trajectory flexibility preservation mitigated traffic complexity as indicated by inducing self-organization in the traffic patterns and lowering traffic complexity indicators such as dynamic density and traffic entropy. (2)Trajectory flexibility preservation reduced the potential for secondary conflicts in separation assurance. (3) Trajectory flexibility metrics showed potential application to support user and service provider negotiations for minimizing the constraints imposed on trajectories without jeopardizing their objectives.
Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs
Islam, Md. Motaharul; Huh, Eui-Nam
2011-01-01
IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly. PMID:22319386
Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2018-03-20
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.
2018-01-01
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406
Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs.
Islam, Md Motaharul; Huh, Eui-Nam
2011-01-01
IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.
Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange
Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti
2017-01-01
A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328
Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.
Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti
2017-03-31
A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.
Secure SCADA communication by using a modified key management scheme.
Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra
2013-07-01
This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.
A Survey on Urban Traffic Management System Using Wireless Sensor Networks.
Nellore, Kapileswar; Hancke, Gerhard P
2016-01-27
Nowadays, the number of vehicles has increased exponentially, but the bedrock capacities of roads and transportation systems have not developed in an equivalent way to efficiently cope with the number of vehicles traveling on them. Due to this, road jamming and traffic correlated pollution have increased with the associated adverse societal and financial effect on different markets worldwide. A static control system may block emergency vehicles due to traffic jams. Wireless Sensor networks (WSNs) have gained increasing attention in traffic detection and avoiding road congestion. WSNs are very trendy due to their faster transfer of information, easy installation, less maintenance, compactness and for being less expensive compared to other network options. There has been significant research on Traffic Management Systems using WSNs to avoid congestion, ensure priority for emergency vehicles and cut the Average Waiting Time (AWT) of vehicles at intersections. In recent decades, researchers have started to monitor real-time traffic using WSNs, RFIDs, ZigBee, VANETs, Bluetooth devices, cameras and infrared signals. This paper presents a survey of current urban traffic management schemes for priority-based signalling, and reducing congestion and the AWT of vehicles. The main objective of this survey is to provide a taxonomy of different traffic management schemes used for avoiding congestion. Existing urban traffic management schemes for the avoidance of congestion and providing priority to emergency vehicles are considered and set the foundation for further research.
A Survey on Urban Traffic Management System Using Wireless Sensor Networks
Nellore, Kapileswar; Hancke, Gerhard P.
2016-01-01
Nowadays, the number of vehicles has increased exponentially, but the bedrock capacities of roads and transportation systems have not developed in an equivalent way to efficiently cope with the number of vehicles traveling on them. Due to this, road jamming and traffic correlated pollution have increased with the associated adverse societal and financial effect on different markets worldwide. A static control system may block emergency vehicles due to traffic jams. Wireless Sensor networks (WSNs) have gained increasing attention in traffic detection and avoiding road congestion. WSNs are very trendy due to their faster transfer of information, easy installation, less maintenance, compactness and for being less expensive compared to other network options. There has been significant research on Traffic Management Systems using WSNs to avoid congestion, ensure priority for emergency vehicles and cut the Average Waiting Time (AWT) of vehicles at intersections. In recent decades, researchers have started to monitor real-time traffic using WSNs, RFIDs, ZigBee, VANETs, Bluetooth devices, cameras and infrared signals. This paper presents a survey of current urban traffic management schemes for priority-based signalling, and reducing congestion and the AWT of vehicles. The main objective of this survey is to provide a taxonomy of different traffic management schemes used for avoiding congestion. Existing urban traffic management schemes for the avoidance of congestion and providing priority to emergency vehicles are considered and set the foundation for further research. PMID:26828489
Gutierrez, Hialy; Shewade, Ashwini; Dai, Minghan; Mendoza-Arana, Pedro; Gómez-Dantés, Octavio; Jain, Nishant; Khonelidze, Irma; Nabyonga-Orem, Juliet; Saleh, Karima; Teerawattananon, Yot; Nishtar, Sania; Hornberger, John
2015-08-01
Lessons learned by countries that have successfully implemented coverage schemes for health services may be valuable for other countries, especially low- and middle-income countries (LMICs), which likewise are seeking to provide/expand coverage. The research team surveyed experts in population health management from LMICs for information on characteristics of health care coverage schemes and factors that influenced decision-making processes. The level of coverage provided by the different schemes varied. Nearly all the health care coverage schemes involved various representatives and stakeholders in their decision-making processes. Maternal and child health, cardiovascular diseases, cancer, and HIV were among the highest priorities guiding coverage development decisions. Evidence used to inform coverage decisions included medical literature, regional and global epidemiology, and coverage policies of other coverage schemes. Funding was the most commonly reported reason for restricting coverage. This exploratory study provides an overview of health care coverage schemes from participating LMICs and contributes to the scarce evidence base on coverage decision making. Sharing knowledge and experiences among LMICs can support efforts to establish systems for accessible, affordable, and equitable health care.
Working better together: joint leadership development for doctors and managers.
Kelly, Nicola
2014-01-01
Traditionally, there have been tensions between frontline healthcare professionals and managers, with well-known stereotypes of difficult consultants and pen-pushing managers. Many junior doctors have limited management experience and have often never even met a manager prior to taking on a consultant role. Based on a successful programme pioneered by Dr Robert Klaber (Imperial, London) we have set-up an innovative scheme for Birmingham Children's Hospital, pairing junior doctors and managers to learn and work together. Our aim was to cultivate positive attitudes and understanding between the two groups, break down inter-professional barriers, and to provide practical leadership experience and education. We recruited 60 managers and doctors to participate in shadowing, conversation, and quality improvement projects. Thought-provoking online materials, blogs, socials, and popular monthly workshops consisting of patient-focused debate and discussion around key leadership themes, have helped to support learning and cement shared values. Formal evaluation has demonstrated an improvement in how participants perceive their knowledge and ability based on key NHS Leadership Framework competencies. Participant feedback has been extremely positive, and everyone plans to continue to incorporate Paired Learning into their continuing professional development. We are now embedding Paired Learning in the on-going educational programme offered at Birmingham Children's Hospital, whilst looking at extending the scheme to include different professional groups and other trusts across the region and nationally.
Research on multi-user encrypted search scheme in cloud environment
NASA Astrophysics Data System (ADS)
Yu, Zonghua; Lin, Sui
2017-05-01
Aiming at the existing problems of multi-user encrypted search scheme in cloud computing environment, a basic multi-user encrypted scheme is proposed firstly, and then the basic scheme is extended to an anonymous hierarchical management authority. Compared with most of the existing schemes, the scheme not only to achieve the protection of keyword information, but also to achieve the protection of user identity privacy; the same time, data owners can directly control the user query permissions, rather than the cloud server. In addition, through the use of a special query key generation rules, to achieve the hierarchical management of the user's query permissions. The safety analysis shows that the scheme is safe and that the performance analysis and experimental data show that the scheme is practicable.
ERIC Educational Resources Information Center
Arunatilake, Nisha; Jayawardena, Priyanka
2010-01-01
Using the experience of the Educational Quality Inputs (EQI) Scheme in Sri Lanka the paper examines the distributional aspects of formula-based funding and efficiency of decentralized management of education funds in a developing country setting. The study finds that the EQI fund distribution is largely pro-poor. However, results show that to…
The use and management of water in the Likangala Irrigation Scheme Complex in Southern Malawi
NASA Astrophysics Data System (ADS)
Mulwafu, Wapulumuka O.; Nkhoma, Bryson G.
This paper examines the uses and management of water for agriculture in Lake Chilwa catchment area in Zomba district of Southern Malawi. It focuses on the Likangala Rice Irrigation Scheme Complex situated along the Likangala River. The scheme is one of the largest government-run schemes. Established in the late 1960s by the government to meet the growing demand for rice, the scheme contributes greatly to the agricultural industry of the country. Besides, the scheme was established to ensure maximum utilization of Malawi's largest wetland, which, due to its hydromorphic soils and the littoral floodplains, does not favour the production of traditional upland seasonal crops such as maize. The scheme's overdependence on water from the Likangala River has attracted a considerable degree of academic interest in the use and management of the river to ensure that there is equity and efficiency for both productive and domestic users. The paper focuses on four main issues: the historical development of the scheme, the distribution of water to farmers, social relations, and the overall contribution of the scheme towards the social and economic development of the area and the country in general. The paper contends that the growing population of the basin and the increase in the number of formal and informal smallholder farmers, contributes greatly to the growth of competition and conflicts over water, which tends to undermine the economic potential of the scheme. Furthermore, the paper provides clearest indication of the need for a realistic and informed water management policy and strategy to solve the growing problem of social inequity without necessarily compromising the production of rice in the scheme.
NASA Technical Reports Server (NTRS)
Grantham, Katie
2003-01-01
Reusable Launch Vehicles (RLVs) have different mission requirements than the Space Shuttle, which is used for benchmark guidance design. Therefore, alternative Terminal Area Energy Management (TAEM) and Approach and Landing (A/L) Guidance schemes can be examined in the interest of cost reduction. A neural network based solution for a finite horizon trajectory optimization problem is presented in this paper. In this approach the optimal trajectory of the vehicle is produced by adaptive critic based neural networks, which were trained off-line to maintain a gradual glideslope.
Dynamic Online Bandwidth Adjustment Scheme Based on Kalai-Smorodinsky Bargaining Solution
NASA Astrophysics Data System (ADS)
Kim, Sungwook
Virtual Private Network (VPN) is a cost effective method to provide integrated multimedia services. Usually heterogeneous multimedia data can be categorized into different types according to the required Quality of Service (QoS). Therefore, VPN should support the prioritization among different services. In order to support multiple types of services with different QoS requirements, efficient bandwidth management algorithms are important issues. In this paper, I employ the Kalai-Smorodinsky Bargaining Solution (KSBS) for the development of an adaptive bandwidth adjustment algorithm. In addition, to effectively manage the bandwidth in VPNs, the proposed control paradigm is realized in a dynamic online approach, which is practical for real network operations. The simulations show that the proposed scheme can significantly improve the system performances.
ROSA: Resource-Oriented Service Management Schemes for Web of Things in a Smart Home.
Liao, Chun-Feng; Chen, Peng-Yu
2017-09-21
A Pervasive-computing-enriched smart home environment, which contains many embedded and tiny intelligent devices and sensors coordinated by service management mechanisms, is capable of anticipating intentions of occupants and providing appropriate services accordingly. Although there are a wealth of research achievements in recent years, the degree of market acceptance is still low. The main reason is that most of the devices and services in such environments depend on particular platform or technology, making it hard to develop an application by composing the devices or services. Meanwhile, the concept of Web of Things (WoT) is becoming popular recently. Based on WoT, the developers can build applications based on popular web tools or technologies. Consequently, the objective of this paper is to propose a set of novel WoT-driven plug-and-play service management schemes for a smart home called Resource-Oriented Service Administration (ROSA). We have implemented an application prototype, and experiments are performed to show the effectiveness of the proposed approach. The results of this research can be a foundation for realizing the vision of "end user programmable smart environments".
Rizvi, Sanam Shahla; Chung, Tae-Sun
2010-01-01
Flash memory has become a more widespread storage medium for modern wireless devices because of its effective characteristics like non-volatility, small size, light weight, fast access speed, shock resistance, high reliability and low power consumption. Sensor nodes are highly resource constrained in terms of limited processing speed, runtime memory, persistent storage, communication bandwidth and finite energy. Therefore, for wireless sensor networks supporting sense, store, merge and send schemes, an efficient and reliable file system is highly required with consideration of sensor node constraints. In this paper, we propose a novel log structured external NAND flash memory based file system, called Proceeding to Intelligent service oriented memorY Allocation for flash based data centric Sensor devices in wireless sensor networks (PIYAS). This is the extended version of our previously proposed PIYA [1]. The main goals of the PIYAS scheme are to achieve instant mounting and reduced SRAM space by keeping memory mapping information to a very low size of and to provide high query response throughput by allocation of memory to the sensor data by network business rules. The scheme intelligently samples and stores the raw data and provides high in-network data availability by keeping the aggregate data for a longer period of time than any other scheme has done before. We propose effective garbage collection and wear-leveling schemes as well. The experimental results show that PIYAS is an optimized memory management scheme allowing high performance for wireless sensor networks.
Using object-based image analysis to guide the selection of field sample locations
USDA-ARS?s Scientific Manuscript database
One of the most challenging tasks for resource management and research is designing field sampling schemes to achieve unbiased estimates of ecosystem parameters as efficiently as possible. This study focused on the potential of fine-scale image objects from object-based image analysis (OBIA) to be u...
Changes and Challenges: Key Issues for Scottish Rural Schools and Communities
ERIC Educational Resources Information Center
Dowling, Jennie
2009-01-01
Education in rural Scottish schools has changed rapidly over the past 15 years. These changes include the implementation of national curriculum and assessment guidelines, increased parental influence and a shift from local authority based management to more locally based schemes. During the 1990s, research in the field focused largely on learning…
Boote, Jonathan D; Twiddy, Maureen; Baird, Wendy; Birks, Yvonne; Clarke, Clare; Beever, Daniel
2015-10-01
It is good practice for the public to be involved in developing health research. Resources should be available for researchers to fund the involvement of the public in the development of their grants. To describe a funding award scheme to support public involvement in grant development, managed by an NIHR Research Design Service (RDS). Case examples of how the award contributed to successful grant applications and findings from a recent evaluation of the scheme are presented. A case study of resource provision to support public involvement activities in one region of England. University and NHS-based researchers, and members of the public. Between 2009 and 2012, the RDS approved 45 public involvement funding awards (totalling nearly £19,000). These awards contributed to 27 submitted applications at the time of writing, of which 11 were successful (totalling over £7.5 million). The evaluation revealed difficulties encountered by some researchers when involving the public in grant development, which led to suggestions about how the scheme could be improved. This award scheme represents an efficient method of providing researchers with resources to involve the public in grant development and would appear to represent good value for money. © 2013 John Wiley & Sons Ltd.
A Bookmarking Service for Organizing and Sharing URLs
NASA Technical Reports Server (NTRS)
Keller, Richard M.; Wolfe, Shawn R.; Chen, James R.; Mathe, Nathalie; Rabinowitz, Joshua L.
1997-01-01
Web browser bookmarking facilities predominate as the method of choice for managing URLs. In this paper, we describe some deficiencies of current bookmarking schemes, and examine an alternative to current approaches. We present WebTagger(TM), an implemented prototype of a personal bookmarking service that provides both individuals and groups with a customizable means of organizing and accessing Web-based information resources. In addition, the service enables users to supply feedback on the utility of these resources relative to their information needs, and provides dynamically-updated ranking of resources based on incremental user feedback. Individuals may access the service from anywhere on the Internet, and require no special software. This service greatly simplifies the process of sharing URLs within groups, in comparison with manual methods involving email. The underlying bookmark organization scheme is more natural and flexible than current hierarchical schemes supported by the major Web browsers, and enables rapid access to stored bookmarks.
The research-based learning development model as a foundation in generating research ideas
NASA Astrophysics Data System (ADS)
Puspitasari, Poppy; Dika, Johan Wayan; Permanasari, Avita Ayu
2017-09-01
Research Based Learning is learning that requires students to have exploration skills related to their field. By doing so, students are encouraged to create skills in managing the higherorder of abstraction in order to resolve any problems encountered. The study was done to make the schemes and sequences of learning needed by the students in order to help them to explore first ideas for their upcoming thesis. The scheme development resulted in five stages consisting of 1) identifying research journals; 2) track the development of research topics; 3) reviewing research journals; 4) discussing the results of the reviews; and 5) formulating the research topic. Furthermore, the application of 5 the stage receives percentage agreement of students was 85.9%. Therefore, it can be noted that the application of the scheme is definitely a help for students to find research ideas.
One size fits all? An assessment tool for solid waste management at local and national levels
DOE Office of Scientific and Technical Information (OSTI.GOV)
Broitman, Dani, E-mail: danib@techunix.technion.ac.il; Ayalon, Ofira; Kan, Iddo
2012-10-15
Highlights: Black-Right-Pointing-Pointer Waste management schemes are generally implemented at national or regional level. Black-Right-Pointing-Pointer Local conditions characteristics and constraints are often neglected. Black-Right-Pointing-Pointer We developed an economic model able to compare multi-level waste management options. Black-Right-Pointing-Pointer A detailed test case with real economic data and a best-fit scenario is described. Black-Right-Pointing-Pointer Most efficient schemes combine clear National directives with local level flexibility. - Abstract: As environmental awareness rises, integrated solid waste management (WM) schemes are increasingly being implemented all over the world. The different WM schemes usually address issues such as landfilling restrictions (mainly due to methane emissions and competingmore » land use), packaging directives and compulsory recycling goals. These schemes are, in general, designed at a national or regional level, whereas local conditions and constraints are sometimes neglected. When national WM top-down policies, in addition to setting goals, also dictate the methods by which they are to be achieved, local authorities lose their freedom to optimize their operational WM schemes according to their specific characteristics. There are a myriad of implementation options at the local level, and by carrying out a bottom-up approach the overall national WM system will be optimal on economic and environmental scales. This paper presents a model for optimizing waste strategies at a local level and evaluates this effect at a national level. This is achieved by using a waste assessment model which enables us to compare both the economic viability of several WM options at the local (single municipal authority) level, and aggregated results for regional or national levels. A test case based on various WM approaches in Israel (several implementations of mixed and separated waste) shows that local characteristics significantly influence WM costs, and therefore the optimal scheme is one under which each local authority is able to implement its best-fitting mechanism, given that national guidelines are kept. The main result is that strict national/regional WM policies may be less efficient, unless some type of local flexibility is implemented. Our model is designed both for top-down and bottom-up assessment, and can be easily adapted for a wide range of WM option comparisons at different levels.« less
Mergias, I; Moustakas, K; Papadopoulos, A; Loizidou, M
2007-08-25
Each alternative scheme for treating a vehicle at its end of life has its own consequences from a social, environmental, economic and technical point of view. Furthermore, the criteria used to determine these consequences are often contradictory and not equally important. In the presence of multiple conflicting criteria, an optimal alternative scheme never exists. A multiple-criteria decision aid (MCDA) method to aid the Decision Maker (DM) in selecting the best compromise scheme for the management of End-of-Life Vehicles (ELVs) is presented in this paper. The constitution of a set of alternatives schemes, the selection of a list of relevant criteria to evaluate these alternative schemes and the choice of an appropriate management system are also analyzed in this framework. The proposed procedure relies on the PROMETHEE method which belongs to the well-known family of multiple criteria outranking methods. For this purpose, level, linear and Gaussian functions are used as preference functions.
Kaplan, Warren A; Ashigbie, Paul G; Brooks, Mohamad I; Wirtz, Veronika J
2017-01-01
Many middle-income countries are scaling up health insurance schemes to provide financial protection and access to affordable medicines to poor and uninsured populations. Although there is a wealth of evidence on how high income countries with mature insurance schemes manage cost-effective use of medicines, there is limited evidence on the strategies used in middle-income countries. This paper compares the medicines management strategies that four insurance schemes in middle-income countries use to improve access and cost-effective use of medicines among beneficiaries. We compare key strategies promoting cost-effective medicines use in the New Rural Cooperative Medical Scheme (NCMS) in China, National Health Insurance Scheme in Ghana, Jamkesmas in Indonesia and Seguro Popular in Mexico. Through the peer-reviewed and grey literature as of late 2013, we identified strategies that met our inclusion criteria as well as any evidence showing if, and/or how, these strategies affected medicines management. Stakeholders involved and affected by medicines coverage policies in these insurance schemes were asked to provide relevant documents describing the medicines related aspects of these insurance programs. We also asked them specifically to identify publications discussing the unintended consequences of the strategies implemented. Use of formularies, bulk procurement, standard treatment guidelines and separation of prescribing and dispensing were present in all four schemes. Also, increased transparency through publication of tender agreements and procurement prices was introduced in all four. Common strategies shared by three out of four schemes were medicine price negotiation or rebates, generic reference pricing, fixed salaries for prescribers, accredited preferred provider network, disease management programs, and monitoring of medicines purchases. Cost-sharing and payment for performance was rarely used. There was a lack of performance monitoring strategies in all schemes. Most of the strategies used in the insurance schemes focus on containing expenditure growth, including budget caps on pharmaceutical expenditures (Mexico) and ceiling prices on medicines (all four countries). There were few strategies targeting quality improvement as healthcare providers are mostly paid through fixed salaries, irrespective of the quality of their prescribing or the health outcomes actually achieved. Monitoring healthcare system performance has received little attention.
Pitman, Martha B; Centeno, Barbara A; Ali, Syed Z; Genevay, Muriel; Stelow, Ed; Mino-Kenudson, Mari; Castillo, Carlos Fernandez-Del; Schmidt, C Max; Brugge, William R; Layfield, Lester J
2014-01-01
The Papanicolaou Society of Cytopathology has developed a set of guidelines for pancreatobiliary cytology including indications for endoscopic ultrasound (EUS) guided fine-needle aspiration (FNA) biopsy, techniques of EUS-FNA, terminology and nomenclature of pancreatobiliary disease, ancillary testing and post-biopsy treatment and management. All documents are based on the expertise of the authors, a review of the literature, discussion of the draft document at several national and international meetings over an 18 month period and synthesis of online comments of the draft document on the Papanicolaou Society of Cytopathology web site [www.papsociety.org]. This document selectively presents the results of these discussions and focuses on a proposed standardized terminology scheme for pancreatobiliary specimens that correlate cytological diagnosis with biological behavior and increasingly conservative patient management of surveillance only. The proposed terminology scheme recommends a six-tiered system: Non-diagnostic, negative, atypical, neoplastic [benign or other], suspicious and positive. Unique to this scheme is the "neoplastic" category separated into "benign" (serous cystadenoma) or "other" (premalignant mucinous cysts, neuroendocrine tumors and solid-pseudopapillary neoplasms (SPNs)). The positive or malignant category is reserved for high-grade, aggressive malignancies including ductal adenocarcinoma, acinar cell carcinoma, poorly differentiated neuroendocrine carcinomas, pancreatoblastoma, lymphoma and metastases. Interpretation categories do not have to be used. Some pathology laboratory information systems require an interpretation category, which places the cytological diagnosis into a general category. This proposed scheme provides terminology that standardizes the category of the various diseases of the pancreas, some of which are difficult to diagnose specifically by cytology. In addition, this terminology scheme attempts to provide maximum flexibility for patient management, which has become increasingly conservative for some neoplasms.
Pitman, Martha B; Centeno, Barbara A; Ali, Syed Z; Genevay, Muriel; Stelow, Ed; Mino-Kenudson, Mari; Fernandez-del Castillo, Carlos; Max Schmidt, C; Brugge, William; Layfield, Lester
2014-04-01
The Papanicolaou Society of Cytopathology has developed a set of guidelines for pancreatobiliary cytology including indications for endoscopic ultrasound (EUS)-guided fine needle aspiration (FNA) biopsy, techniques of EUS-FNA, terminology and nomenclature of pancreatobiliary disease, ancillary testing, and postbiopsy treatment and management. All documents are based on the expertise of the authors, a review of the literature, discussions of the draft document at several national and international meetings over an 18-month period and synthesis of online comments of the draft document on the Papanicolaou Society of Cytopathology web site (www.papsociety.org). This document selectively presents the results of these discussions and focuses on a proposed standardized terminology scheme for pancreatobiliary specimens that correlate cytological diagnosis with biological behavior and increasingly conservative patient management of surveillance only. The proposed terminology scheme recommends a six-tiered system: Nondiagnostic, Negative, Atypical, Neoplastic (benign or other), Suspicious and Positive. Unique to this scheme is the "Neoplastic" category separated into "benign" (serous cystadenoma), or "Other" (premalignant mucinous cysts, neuroendocrine tumors, and solid-pseudopapillary neoplasms). The positive or malignant category is reserved for high-grade, aggressive malignancies including ductal adenocarcinoma, acinar cell carcinoma, poorly differentiated neuroendocrine carcinomas, pancreatoblastoma, lymphoma, and metastases. Interpretation categories do not have to be used. Some pathology laboratory information systems require an interpretation category, which places the cytological diagnosis into a general category. This proposed scheme provides terminology that standardizes the category of the various diseases of the pancreas, some of which are difficult to diagnose specifically by cytology. In addition, this terminology scheme attempts to provide maximum flexibility for patient management, which has become increasingly conservative for some neoplasms. Copyright © 2014 Wiley Periodicals, Inc.
TFOS DEWS II Definition and Classification Report.
Craig, Jennifer P; Nichols, Kelly K; Akpek, Esen K; Caffery, Barbara; Dua, Harminder S; Joo, Choun-Ki; Liu, Zuguo; Nelson, J Daniel; Nichols, Jason J; Tsubota, Kazuo; Stapleton, Fiona
2017-07-01
The goals of the TFOS DEWS II Definition and Classification Subcommittee were to create an evidence-based definition and a contemporary classification system for dry eye disease (DED). The new definition recognizes the multifactorial nature of dry eye as a disease where loss of homeostasis of the tear film is the central pathophysiological concept. Ocular symptoms, as a broader term that encompasses reports of discomfort or visual disturbance, feature in the definition and the key etiologies of tear film instability, hyperosmolarity, and ocular surface inflammation and damage were determined to be important for inclusion in the definition. In the light of new data, neurosensory abnormalities were also included in the definition for the first time. In the classification of DED, recent evidence supports a scheme based on the pathophysiology where aqueous deficient and evaporative dry eye exist as a continuum, such that elements of each are considered in diagnosis and management. Central to the scheme is a positive diagnosis of DED with signs and symptoms, and this is directed towards management to restore homeostasis. The scheme also allows consideration of various related manifestations, such as non-obvious disease involving ocular surface signs without related symptoms, including neurotrophic conditions where dysfunctional sensation exists, and cases where symptoms exist without demonstrable ocular surface signs, including neuropathic pain. This approach is not intended to override clinical assessment and judgment but should prove helpful in guiding clinical management and research. Copyright © 2017 Elsevier Inc. All rights reserved.
Tua, Camilla; Nessi, Simone; Rigamonti, Lucia; Dolci, Giovanni; Grosso, Mario
2017-04-01
In recent years, alternative food supply chains based on short distance production and delivery have been promoted as being more environmentally friendly than those applied by the traditional retailing system. An example is the supply of seasonal and possibly locally grown fruit and vegetables directly to customers inside a returnable crate (the so-called 'box scheme'). In addition to other claimed environmental and economic advantages, the box scheme is often listed among the packaging waste prevention measures. To check whether such a claim is soundly based, a life cycle assessment was carried out to verify the real environmental effectiveness of the box scheme in comparison to the Italian traditional distribution. The study focused on two reference products, carrots and apples, which are available in the crate all year round. An experience of a box scheme carried out in Italy was compared with some traditional scenarios where the product is distributed loose or packaged at the large-scale retail trade. The packaging waste generation, 13 impact indicators on environment and human health and energy consumptions were calculated. Results show that the analysed experience of the box scheme, as currently managed, cannot be considered a packaging waste prevention measure when compared with the traditional distribution of fruit and vegetables. The weaknesses of the alternative system were identified and some recommendations were given to improve its environmental performance.
Assessment strategies for municipal selective waste collection schemes.
Ferreira, Fátima; Avelino, Catarina; Bentes, Isabel; Matos, Cristina; Teixeira, Carlos Afonso
2017-01-01
An important strategy to promote a strong sustainable growth relies on an efficient municipal waste management, and phasing out waste landfilling through waste prevention and recycling emerges as a major target. For this purpose, effective collection schemes are required, in particular those regarding selective waste collection, pursuing a more efficient and high quality recycling of reusable materials. This paper addresses the assessment and benchmarking of selective collection schemes, relevant to guide future operational improvements. In particular, the assessment is based on the monitoring and statistical analysis of a core-set of performance indicators that highlights collection trends, complemented with a performance index that gathers a weighted linear combination of these indicators. This combined analysis underlines a potential tool to support decision makers involved in the process of selecting the collection scheme with best overall performance. The presented approach was applied to a case study conducted in Oporto Municipality, with data gathered from two distinct selective collection schemes. Copyright © 2016 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Feyen, Luc; Gorelick, Steven M.
2005-03-01
We propose a framework that combines simulation optimization with Bayesian decision analysis to evaluate the worth of hydraulic conductivity data for optimal groundwater resources management in ecologically sensitive areas. A stochastic simulation optimization management model is employed to plan regionally distributed groundwater pumping while preserving the hydroecological balance in wetland areas. Because predictions made by an aquifer model are uncertain, groundwater supply systems operate below maximum yield. Collecting data from the groundwater system can potentially reduce predictive uncertainty and increase safe water production. The price paid for improvement in water management is the cost of collecting the additional data. Efficient data collection using Bayesian decision analysis proceeds in three stages: (1) The prior analysis determines the optimal pumping scheme and profit from water sales on the basis of known information. (2) The preposterior analysis estimates the optimal measurement locations and evaluates whether each sequential measurement will be cost-effective before it is taken. (3) The posterior analysis then revises the prior optimal pumping scheme and consequent profit, given the new information. Stochastic simulation optimization employing a multiple-realization approach is used to determine the optimal pumping scheme in each of the three stages. The cost of new data must not exceed the expected increase in benefit obtained in optimal groundwater exploitation. An example based on groundwater management practices in Florida aimed at wetland protection showed that the cost of data collection more than paid for itself by enabling a safe and reliable increase in production.
Dror, David Mark; Hossain, S A Shahed; Majumdar, Atanu; Pérez Koehlmoos, Tracey Lynn; John, Denny; Panda, Pradeep Kumar
2016-01-01
This research article reports on factors influencing initial voluntary uptake of community-based health insurance (CBHI) schemes in low- and middle-income countries (LMIC), and renewal decisions. Following PRISMA protocol, we conducted a comprehensive search of academic and gray literature, including academic databases in social science, economics and medical sciences (e.g., Econlit, Global health, Medline, Proquest) and other electronic resources (e.g., Eldis and Google scholar). Search strategies were developed using the thesaurus or index terms (e.g., MeSH) specific to the databases, combined with free text terms related to CBHI or health insurance. Searches were conducted from May 2013 to November 2013 in English, French, German, and Spanish. From the initial search yield of 15,770 hits, 54 relevant studies were retained for analysis of factors influencing enrolment and renewal decisions. The quantitative synthesis (informed by meta-analysis) and the qualitative analysis (informed by thematic synthesis) were compared to gain insight for an overall synthesis of findings/statements. Meta-analysis suggests that enrolments in CBHI were positively associated with household income, education and age of the household head (HHH), household size, female-headed household, married HHH and chronic illness episodes in the household. The thematic synthesis suggests the following factors as enablers for enrolment: (a) knowledge and understanding of insurance and CBHI, (b) quality of healthcare, (c) trust in scheme management. Factors found to be barriers to enrolment include: (a) inappropriate benefits package, (b) cultural beliefs, (c) affordability, (d) distance to healthcare facility, (e) lack of adequate legal and policy frameworks to support CBHI, and (f) stringent rules of some CBHI schemes. HHH education, household size and trust in the scheme management were positively associated with member renewal decisions. Other motivators were: (a) knowledge and understanding of insurance and CBHI, (b) healthcare quality, (c) trust in scheme management, and (d) receipt of an insurance payout the previous year. The barriers to renewal decisions were: (a) stringent rules of some CBHI schemes, (b) inadequate legal and policy frameworks to support CBHI and (c) inappropriate benefits package. The demand-side factors positively affecting enrolment in CBHI include education, age, female household heads, and the socioeconomic status of households. Moreover, when individuals understand how their CBHI functions they are more likely to enroll and when people have a positive claims experience, they are more likely to renew. A higher prevalence of chronic conditions or the perception that healthcare is of good quality and nearby act as factors enhancing enrolment. The perception that services are distant or deficient leads to lower enrolments. The second insight is that trust in the scheme enables enrolment. Thirdly, clarity about the legal or policy framework acts as a factor influencing enrolments. This is significant, as it points to hitherto unpublished evidence that governments can effectively broaden their outreach to grassroots groups that are excluded from social protection by formulating supportive regulatory and policy provisions even if they cannot fund such schemes in full, by leveraging people's willingness to exercise voluntary and contributory enrolment in a community-based health insurance.
Contribution to systematic education of quality management in Slovak health care.
Rusnakova, V; Bacharova, L
2001-01-01
Of the study was to contribute to quality improvement initiatives in Slovak health services through systematic approach to the education and training in quality management (QM). Consequently, the main objectives were to analyse the content of the education in QM abroad, to conduct an audit of perceived training needs in Slovakia, and to propose the design of QM training programme to be applied within CME scheme based on the study results. Triangular method in the design of the study was implemented. Review of relevant information, data from the questionnaire and semi-structured interview in the sample of 67 Slovak trainees from Health Management School and School of Public Health--were adopted in complementary fashion. Highlighted in the survey are positive attitudes to training in quality management documented by the median score higher than 6 in all tested areas, on scale 0-10. No significant differences in profession groups as physicians, nurses, HC managers or among training institutions involved were displayed. However, potential obstacles were identified in deeper study using interviews. The absence of knowledge and skills in management in general and in quality management approaches especially are observed. Typically, the role of strategic planning is undermined. The large scale of quality management approaches is converted to problems of accreditation. Barriers to participative culture, innovation, devolution of accountability, resistance to change and to team based management are authentic findings as well. Drawn from the study were related to: fostering managers--"transformational leaders" for locally driven decision making in health care policy and practice; need of training activities for the continuing education in quality with respect to specific target groups interests and their level of knowledge in management; content of training oriented towards combination of rational utilization of information, critical analytical skills and planning for quality with human resource development-interpersonal skills, team building (soft skills), not just reduction of quality management tools to hard techniques (statistics, ISO norms); methods of education, where the usage of experiential learning methods, participative training inclusive action learning is highlighted; team training complemented with individual professional development support inclusive a coaching and mentoring scheme. AS IMPLICATIONS: Four types of CME training: Basic Module QM, Training for QM teams, Training Trainers Scheme and Guiding through Accreditation and Quality Award were proposed. (Tab. 9, Ref. 38.)
Autonomous power expert system
NASA Technical Reports Server (NTRS)
Ringer, Mark J.; Quinn, Todd M.
1990-01-01
The goal of the Autonomous Power System (APS) program is to develop and apply intelligent problem solving and control technologies to the Space Station Freedom Electrical Power Systems (SSF/EPS). The objectives of the program are to establish artificial intelligence/expert system technology paths, to create knowledge based tools with advanced human-operator interfaces, and to integrate and interface knowledge-based and conventional control schemes. This program is being developed at the NASA-Lewis. The APS Brassboard represents a subset of a 20 KHz Space Station Power Management And Distribution (PMAD) testbed. A distributed control scheme is used to manage multiple levels of computers and switchgear. The brassboard is comprised of a set of intelligent switchgear used to effectively switch power from the sources to the loads. The Autonomous Power Expert System (APEX) portion of the APS program integrates a knowledge based fault diagnostic system, a power resource scheduler, and an interface to the APS Brassboard. The system includes knowledge bases for system diagnostics, fault detection and isolation, and recommended actions. The scheduler autonomously assigns start times to the attached loads based on temporal and power constraints. The scheduler is able to work in a near real time environment for both scheduling and dynamic replanning.
Autonomous power expert system
NASA Technical Reports Server (NTRS)
Ringer, Mark J.; Quinn, Todd M.
1990-01-01
The goal of the Autonomous Power System (APS) program is to develop and apply intelligent problem solving and control technologies to the Space Station Freedom Electrical Power Systems (SSF/EPS). The objectives of the program are to establish artificial intelligence/expert system technology paths, to create knowledge based tools with advanced human-operator interfaces, and to integrate and interface knowledge-based and conventional control schemes. This program is being developed at the NASA-Lewis. The APS Brassboard represents a subset of a 20 KHz Space Station Power Management And Distribution (PMAD) testbed. A distributed control scheme is used to manage multiple levels of computers and switchgear. The brassboard is comprised of a set of intelligent switchgear used to effectively switch power from the sources to the loads. The Autonomous Power Expert System (APEX) portion of the APS program integrates a knowledge based fault diagnostic system, a power resource scheduler, and an interface to the APS Brassboard. The system includes knowledge bases for system diagnostics, fault detection and isolation, and recommended actions. The scheduler autonomously assigns start times to the attached loads based on temporal and power constraints. The scheduler is able to work in a near real time environment for both scheduling an dynamic replanning.
Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad
2015-01-01
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.
Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad
2015-01-01
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963
A neural network model for credit risk evaluation.
Khashman, Adnan
2009-08-01
Credit scoring is one of the key analytical techniques in credit risk evaluation which has been an active research area in financial risk management. This paper presents a credit risk evaluation system that uses a neural network model based on the back propagation learning algorithm. We train and implement the neural network to decide whether to approve or reject a credit application, using seven learning schemes and real world credit applications from the Australian credit approval datasets. A comparison of the system performance under the different learning schemes is provided, furthermore, we compare the performance of two neural networks; with one and two hidden layers following the ideal learning scheme. Experimental results suggest that neural networks can be effectively used in automatic processing of credit applications.
Thermal control extravehicular life support system
NASA Technical Reports Server (NTRS)
1975-01-01
The results of a comprehensive study which defined an Extravehicular Life Support System Thermal Control System (TCS) are presented. The design of the prototype hardware and a detail summary of the prototype TCS fabrication and test effort are given. Several heat rejection subsystems, water management subsystems, humidity control subsystems, pressure control schemes and temperature control schemes were evaluated. Alternative integrated TCS systems were studied, and an optimum system was selected based on quantitative weighing of weight, volume, cost, complexity and other factors. The selected subsystem contains a sublimator for heat rejection, bubble expansion tank for water management, a slurper and rotary separator for humidity control, and a pump, a temperature control valve, a gas separator and a vehicle umbilical connector for water transport. The prototype hardware complied with program objectives.
NASA Astrophysics Data System (ADS)
Yang, Shuyu; Mitra, Sunanda
2002-05-01
Due to the huge volumes of radiographic images to be managed in hospitals, efficient compression techniques yielding no perceptual loss in the reconstructed images are becoming a requirement in the storage and management of such datasets. A wavelet-based multi-scale vector quantization scheme that generates a global codebook for efficient storage and transmission of medical images is presented in this paper. The results obtained show that even at low bit rates one is able to obtain reconstructed images with perceptual quality higher than that of the state-of-the-art scalar quantization method, the set partitioning in hierarchical trees.
Oxman, Andrew D; Fretheim, Atle
2009-08-01
Results-based financing (RBF) refers to the transfer of money or material goods conditional on taking a measurable action or achieving a predetermined performance target. RBF is being promoted for helping to achieve the Millennium Development Goals (MDGs). We undertook a critical appraisal of selected evaluations of RBF schemes in the health sector in low and middle-income countries (LMIC). In addition, key informants were interviewed to identify literature relevant to the use of RBF in the health sector in LMIC, key examples, evaluations, and other key informants. The use of RBF in LMIC has commonly been a part of a package that may include increased funding, technical support, training, changes in management, and new information systems. It is not possible to disentangle the effects of financial incentives as one element of RBF schemes, and there is very limited evidence of RBF per se having an effect. RBF schemes can have unintended effects. When RBF schemes are used, they should be designed carefully, including the level at which they are targeted, the choice of targets and indicators, the type and magnitude of incentives, the proportion of financing that is paid based on results, and the ancillary components of the scheme. For RBF to be effective, it must be part of an appropriate package of interventions, and technical capacity or support must be available. RBF schemes should be monitored for possible unintended effects and evaluated using rigorous study designs. © 2009 Blackwell Publishing Asia Pty Ltd and Chinese Cochrane Center, West China Hospital of Sichuan University.
Management Review: Progress and Challenges at the Defense Logistics Agency.
1986-04-01
with safety and worklife problems (warehousing schemes, replacement or improvement of equipment, loading dock shelters, and employee orientation systems... balances . Accuracy of DCASR Contingent The contingent liability record is one of the more important records Liability Records maintained by DCASRs because...needed for making management decisions and for certifying to the accu- racy of ULO balances . Problems in Data Reported to Based on our interviews with
Coffee agroforestry for sustainability of Upper Sekampung Watershed management
NASA Astrophysics Data System (ADS)
Fitriani; Arifin, Bustanul; Zakaria, Wan Abbas; Hanung Ismono, R.
2018-03-01
The main objective of watershed management is to ensure the optimal hydrological and natural resource use for ecological, social and economic importance. One important adaptive management step in dealing with the risk of damage to forest ecosystems is the practice of agroforestry coffee. This study aimed to (1) assess the farmer's response to ecological service responsibility and (2) analyze the Sekampung watersheds management by providing environmental services. The research location was Air Naningan sub-district, Tanggamus, Lampung Province, Indonesia. The research was conducted from July until November 2016. Stratification random sampling based on the pattern of ownership of land rights is used to determine the respondents. Data were analyzed using descriptive statistics and logistic regression analysis. Based on the analysis, it was concluded that coffee farmers' participation in the practice of coffee agroforestry in the form of 38% shade plants and multiple cropping (62%). The logistic regression analysis indicated that the variables of experience and status of land ownership, and incentive-size plans were able to explain variations in the willingness of coffee growers to follow the scheme of providing environmental services. The existence of farmer with partnership and CBFM scheme on different land tenure on upper Sekampung has a strategic position to minimize the deforestation and recovery watersheds destruction.
A distributed control approach for power and energy management in a notional shipboard power system
NASA Astrophysics Data System (ADS)
Shen, Qunying
The main goal of this thesis is to present a power control module (PCON) based approach for power and energy management and to examine its control capability in shipboard power system (SPS). The proposed control scheme is implemented in a notional medium voltage direct current (MVDC) integrated power system (IPS) for electric ship. To realize the control functions such as ship mode selection, generator launch schedule, blackout monitoring, and fault ride-through, a PCON based distributed power and energy management system (PEMS) is developed. The control scheme is proposed as two-layer hierarchical architecture with system level on the top as the supervisory control and zonal level on the bottom as the decentralized control, which is based on the zonal distribution characteristic of the notional MVDC IPS that was proposed as one of the approaches for Next Generation Integrated Power System (NGIPS) by Norbert Doerry. Several types of modules with different functionalities are used to derive the control scheme in detail for the notional MVDC IPS. Those modules include the power generation module (PGM) that controls the function of generators, the power conversion module (PCM) that controls the functions of DC/DC or DC/AC converters, etc. Among them, the power control module (PCON) plays a critical role in the PEMS. It is the core of the control process. PCONs in the PEMS interact with all the other modules, such as power propulsion module (PPM), energy storage module (ESM), load shedding module (LSHED), and human machine interface (HMI) to realize the control algorithm in PEMS. The proposed control scheme is implemented in real time using the real time digital simulator (RTDS) to verify its validity. To achieve this, a system level energy storage module (SESM) and a zonal level energy storage module (ZESM) are developed in RTDS to cooperate with PCONs to realize the control functionalities. In addition, a load shedding module which takes into account the reliability of power supply (in terms of quality of service) is developed. This module can supply uninterruptible power to the mission critical loads. In addition, a multi-agent system (MAS) based framework is proposed to implement the PCON based PEMS through a hardware setup that is composed of MAMBA boards and FPGA interface. Agents are implemented using Java Agent DEvelopment Framework (JADE). Various test scenarios were tested to validate the approach.
The experience of Ghana in implementing a user fee exemption policy to provide free delivery care.
Witter, Sophie; Arhinful, Daniel Kojo; Kusi, Anthony; Zakariah-Akoto, Sawudatu
2007-11-01
In resource-poor countries, the high cost of user fees for deliveries limits access to skilled attendance, and contributes to maternal and neonatal mortality and the impoverishment of vulnerable households. A growing number of countries are experimenting with different approaches to tackling financial barriers to maternal health care. This paper describes an innovative scheme introduced in Ghana in 2003 to exempt all pregnant women from payments for delivery, in which public, mission and private providers could claim back lost user fee revenues, according to an agreed tariff. The paper presents part of the findings of an evaluation of the policy based on interviews with 65 key informants in the health system at national, regional, district and facility level, including policymakers, managers and providers. The exemption mechanism was well accepted and appropriate, but there were important problems with disbursing and sustaining the funding, and with budgeting and management. Staff workloads increased as more women attended, and levels of compensation for services and staff were important to the scheme's acceptance. At the end of 2005, a national health insurance scheme, intended to include full maternal health care cover, was starting up in Ghana, and it was not yet clear how the exemptions scheme would fit into it.
Issues and solutions for storage, retrieval, and searching of MPEG-7 documents
NASA Astrophysics Data System (ADS)
Chang, Yuan-Chi; Lo, Ming-Ling; Smith, John R.
2000-10-01
The ongoing MPEG-7 standardization activity aims at creating a standard for describing multimedia content in order to facilitate the interpretation of the associated information content. Attempting to address a broad range of applications, MPEG-7 has defined a flexible framework consisting of Descriptors, Description Schemes, and Description Definition Language. Descriptors and Description Schemes describe features, structure and semantics of multimedia objects. They are written in the Description Definition Language (DDL). In the most recent revision, DDL applies XML (Extensible Markup Language) Schema with MPEG-7 extensions. DDL has constructs that support inclusion, inheritance, reference, enumeration, choice, sequence, and abstract type of Description Schemes and Descriptors. In order to enable multimedia systems to use MPEG-7, a number of important problems in storing, retrieving and searching MPEG-7 documents need to be solved. This paper reports on initial finding on issues and solutions of storing and accessing MPEG-7 documents. In particular, we discuss the benefits of using a virtual document management framework based on XML Access Server (XAS) in order to bridge the MPEG-7 multimedia applications and database systems. The need arises partly because MPEG-7 descriptions need customized storage schema, indexing and search engines. We also discuss issues arising in managing dependence and cross-description scheme search.
A Regev-type fully homomorphic encryption scheme using modulus switching.
Chen, Zhigang; Wang, Jian; Chen, Liqun; Song, Xinxia
2014-01-01
A critical challenge in a fully homomorphic encryption (FHE) scheme is to manage noise. Modulus switching technique is currently the most efficient noise management technique. When using the modulus switching technique to design and implement a FHE scheme, how to choose concrete parameters is an important step, but to our best knowledge, this step has drawn very little attention to the existing FHE researches in the literature. The contributions of this paper are twofold. On one hand, we propose a function of the lower bound of dimension value in the switching techniques depending on the LWE specific security levels. On the other hand, as a case study, we modify the Brakerski FHE scheme (in Crypto 2012) by using the modulus switching technique. We recommend concrete parameter values of our proposed scheme and provide security analysis. Our result shows that the modified FHE scheme is more efficient than the original Brakerski scheme in the same security level.
Contemplating case mix: A primer on case mix classification and management.
Costa, Andrew P; Poss, Jeffery W; McKillop, Ian
2015-01-01
Case mix classifications are the frameworks that underlie many healthcare funding schemes, including the so-called activity-based funding. Now more than ever, Canadian healthcare administrators are evaluating case mix-based funding and deciphering how they will influence their organization. Case mix is a topic fraught with technical jargon and largely relegated to government agencies or private industries. This article provides an abridged review of case mix classification as well as its implications for management in healthcare. © 2015 The Canadian College of Health Leaders.
Phytoremediation of landfill leachate.
Jones, D L; Williamson, K L; Owen, A G
2006-01-01
Leachate emissions from landfill sites are of concern, primarily due to their toxic impact when released unchecked into the environment, and the potential for landfill sites to generate leachate for many hundreds of years following closure. Consequently, economically and environmentally sustainable disposal options are a priority in waste management. One potential option is the use of soil-plant based remediation schemes. In many cases, using either trees (including short rotation coppice) or grassland, phytoremediation of leachate has been successful. However, there are a significant number of examples where phytoremediation has failed. Typically, this failure can be ascribed to excessive leachate application and poor management due to a fundamental lack of understanding of the plant-soil system. On balance, with careful management, phytoremediation can be viewed as a sustainable, cost effective and environmentally sound option which is capable of treating 250m(3)ha(-1)yr(-1). However, these schemes have a requirement for large land areas and must be capable of responding to changes in leachate quality and quantity, problems of scheme establishment and maintenance, continual environmental monitoring and seasonal patterns of plant growth. Although the fundamental underpinning science is well understood, further work is required to create long-term predictive remediation models, full environmental impact assessments, a complete life-cycle analysis and economic analyses for a wide range of landfill scenarios.
Modeling for waste management associated with environmental-impact abatement under uncertainty.
Li, P; Li, Y P; Huang, G H; Zhang, J L
2015-04-01
Municipal solid waste (MSW) treatment can generate significant amounts of pollutants, and thus pose a risk on human health. Besides, in MSW management, various uncertainties exist in the related costs, impact factors, and objectives, which can affect the optimization processes and the decision schemes generated. In this study, a life cycle assessment-based interval-parameter programming (LCA-IPP) method is developed for MSW management associated with environmental-impact abatement under uncertainty. The LCA-IPP can effectively examine the environmental consequences based on a number of environmental impact categories (i.e., greenhouse gas equivalent, acid gas emissions, and respiratory inorganics), through analyzing each life cycle stage and/or major contributing process related to various MSW management activities. It can also tackle uncertainties existed in the related costs, impact factors, and objectives and expressed as interval numbers. Then, the LCA-IPP method is applied to MSW management for the City of Beijing, the capital of China, where energy consumptions and six environmental parameters [i.e., CO2, CO, CH4, NOX, SO2, inhalable particle (PM10)] are used as systematic tool to quantify environmental releases in entire life cycle stage of waste collection, transportation, treatment, and disposal of. Results associated with system cost, environmental impact, and the related policy implication are generated and analyzed. Results can help identify desired alternatives for managing MSW flows, which has advantages in providing compromised schemes under an integrated consideration of economic efficiency and environmental impact under uncertainty.
NASA Technical Reports Server (NTRS)
Davis, Robert N.; Polites, Michael E.; Trevino, Luis C.
2004-01-01
This paper details a novel scheme for autonomous component health management (ACHM) with failed actuator detection and failed sensor detection, identification, and avoidance. This new scheme has features that far exceed the performance of systems with triple-redundant sensing and voting, yet requires fewer sensors and could be applied to any system with redundant sensing. Relevant background to the ACHM scheme is provided, and the simulation results for the application of that scheme to a single-axis spacecraft attitude control system with a 3rd order plant and dual-redundant measurement of system states are presented. ACHM fulfills key functions needed by an integrated vehicle health monitoring (IVHM) system. It is: autonomous; adaptive; works in realtime; provides optimal state estimation; identifies failed components; avoids failed components; reconfigures for multiple failures; reconfigures for intermittent failures; works for hard-over, soft, and zero-output failures; and works for both open- and closed-loop systems. The ACHM scheme combines a prefilter that generates preliminary state estimates, detects and identifies failed sensors and actuators, and avoids the use of failed sensors in state estimation with a fixed-gain Kalman filter that generates optimal state estimates and provides model-based state estimates that comprise an integral part of the failure detection logic. The results show that ACHM successfully isolates multiple persistent and intermittent hard-over, soft, and zero-output failures. It is now ready to be tested on a computer model of an actual system.
Thompson, Bryony A; Spurdle, Amanda B; Plazzer, John-Paul; Greenblatt, Marc S; Akagi, Kiwamu; Al-Mulla, Fahd; Bapat, Bharati; Bernstein, Inge; Capellá, Gabriel; den Dunnen, Johan T; du Sart, Desiree; Fabre, Aurelie; Farrell, Michael P; Farrington, Susan M; Frayling, Ian M; Frebourg, Thierry; Goldgar, David E; Heinen, Christopher D; Holinski-Feder, Elke; Kohonen-Corish, Maija; Robinson, Kristina Lagerstedt; Leung, Suet Yi; Martins, Alexandra; Moller, Pal; Morak, Monika; Nystrom, Minna; Peltomaki, Paivi; Pineda, Marta; Qi, Ming; Ramesar, Rajkumar; Rasmussen, Lene Juel; Royer-Pokora, Brigitte; Scott, Rodney J; Sijmons, Rolf; Tavtigian, Sean V; Tops, Carli M; Weber, Thomas; Wijnen, Juul; Woods, Michael O; Macrae, Finlay; Genuardi, Maurizio
2014-02-01
The clinical classification of hereditary sequence variants identified in disease-related genes directly affects clinical management of patients and their relatives. The International Society for Gastrointestinal Hereditary Tumours (InSiGHT) undertook a collaborative effort to develop, test and apply a standardized classification scheme to constitutional variants in the Lynch syndrome-associated genes MLH1, MSH2, MSH6 and PMS2. Unpublished data submission was encouraged to assist in variant classification and was recognized through microattribution. The scheme was refined by multidisciplinary expert committee review of the clinical and functional data available for variants, applied to 2,360 sequence alterations, and disseminated online. Assessment using validated criteria altered classifications for 66% of 12,006 database entries. Clinical recommendations based on transparent evaluation are now possible for 1,370 variants that were not obviously protein truncating from nomenclature. This large-scale endeavor will facilitate the consistent management of families suspected to have Lynch syndrome and demonstrates the value of multidisciplinary collaboration in the curation and classification of variants in public locus-specific databases.
Plazzer, John-Paul; Greenblatt, Marc S.; Akagi, Kiwamu; Al-Mulla, Fahd; Bapat, Bharati; Bernstein, Inge; Capellá, Gabriel; den Dunnen, Johan T.; du Sart, Desiree; Fabre, Aurelie; Farrell, Michael P.; Farrington, Susan M.; Frayling, Ian M.; Frebourg, Thierry; Goldgar, David E.; Heinen, Christopher D.; Holinski-Feder, Elke; Kohonen-Corish, Maija; Robinson, Kristina Lagerstedt; Leung, Suet Yi; Martins, Alexandra; Moller, Pal; Morak, Monika; Nystrom, Minna; Peltomaki, Paivi; Pineda, Marta; Qi, Ming; Ramesar, Rajkumar; Rasmussen, Lene Juel; Royer-Pokora, Brigitte; Scott, Rodney J.; Sijmons, Rolf; Tavtigian, Sean V.; Tops, Carli M.; Weber, Thomas; Wijnen, Juul; Woods, Michael O.; Macrae, Finlay; Genuardi, Maurizio
2015-01-01
Clinical classification of sequence variants identified in hereditary disease genes directly affects clinical management of patients and their relatives. The International Society for Gastrointestinal Hereditary Tumours (InSiGHT) undertook a collaborative effort to develop, test and apply a standardized classification scheme to constitutional variants in the Lynch Syndrome genes MLH1, MSH2, MSH6 and PMS2. Unpublished data submission was encouraged to assist variant classification, and recognized by microattribution. The scheme was refined by multidisciplinary expert committee review of clinical and functional data available for variants, applied to 2,360 sequence alterations, and disseminated online. Assessment using validated criteria altered classifications for 66% of 12,006 database entries. Clinical recommendations based on transparent evaluation are now possible for 1,370 variants not obviously protein-truncating from nomenclature. This large-scale endeavor will facilitate consistent management of suspected Lynch Syndrome families, and demonstrates the value of multidisciplinary collaboration for curation and classification of variants in public locus-specific databases. PMID:24362816
Allocation and management issues in multiple-transaction open access transmission networks
NASA Astrophysics Data System (ADS)
Tao, Shu
This thesis focuses on some key issues related to allocation and management by the independent grid operator (IGO) of unbundled services in multiple-transaction open access transmission networks. The three unbundled services addressed in the thesis are transmission real power losses, reactive power support requirements from generation sources, and transmission congestion management. We develop the general framework that explicitly represents multiple transactions undertaken simultaneously in the transmission grid. This framework serves as the basis for formulating various problems treated in the thesis. We use this comprehensive framework to develop a physical-flow-based mechanism to allocate the total transmission losses to each transaction using the system. An important property of the allocation scheme is its capability to effectively deal with counter flows that result in the presence of specific transactions. Using the loss allocation results as the basis, we construct the equivalent loss compensation concept and apply it to develop flexible and effective procedures for compensating losses in multiple-transaction networks. We present a new physical-flow-based mechanism for allocating the reactive power support requirements provided by generators in multiple-transaction networks. The allocatable reactive support requirements are formulated as the sum of two specific components---the voltage magnitude variation component and the voltage angle variation component. The formulation utilizes the multiple-transaction framework and makes use of certain simplifying approximations. The formulation leads to a natural allocation as a function of the amount of each transaction. The physical interpretation of each allocation as a sensitivity of the reactive output of a generator is discussed. We propose a congestion management allocation scheme for multiple-transaction networks. The proposed scheme determines the allocation of congestion among the transactions on a physical-flow basis. It also proposes a congestion relief scheme that removes the congestion attributed to each transaction on the network in a least-cost manner to the IGO and determines the appropriate transmission charges to each transaction for its transmission usage. The thesis provides a compendium of problems that are natural extensions of the research results reported here and appear to be good candidates for future work.
NASA Astrophysics Data System (ADS)
Rajabi, Mohammad Mahdi; Ketabchi, Hamed
2017-12-01
Combined simulation-optimization (S/O) schemes have long been recognized as a valuable tool in coastal groundwater management (CGM). However, previous applications have mostly relied on deterministic seawater intrusion (SWI) simulations. This is a questionable simplification, knowing that SWI models are inevitably prone to epistemic and aleatory uncertainty, and hence a management strategy obtained through S/O without consideration of uncertainty may result in significantly different real-world outcomes than expected. However, two key issues have hindered the use of uncertainty-based S/O schemes in CGM, which are addressed in this paper. The first issue is how to solve the computational challenges resulting from the need to perform massive numbers of simulations. The second issue is how the management problem is formulated in presence of uncertainty. We propose the use of Gaussian process (GP) emulation as a valuable tool in solving the computational challenges of uncertainty-based S/O in CGM. We apply GP emulation to the case study of Kish Island (located in the Persian Gulf) using an uncertainty-based S/O algorithm which relies on continuous ant colony optimization and Monte Carlo simulation. In doing so, we show that GP emulation can provide an acceptable level of accuracy, with no bias and low statistical dispersion, while tremendously reducing the computational time. Moreover, five new formulations for uncertainty-based S/O are presented based on concepts such as energy distances, prediction intervals and probabilities of SWI occurrence. We analyze the proposed formulations with respect to their resulting optimized solutions, the sensitivity of the solutions to the intended reliability levels, and the variations resulting from repeated optimization runs.
Feshbach resonance management for Bose-Einstein condensates.
Kevrekidis, P G; Theocharis, G; Frantzeskakis, D J; Malomed, Boris A
2003-06-13
An experimentally realizable scheme of periodic sign-changing modulation of the scattering length is proposed for Bose-Einstein condensates similar to dispersion-management schemes in fiber optics. Because of controlling the scattering length via the Feshbach resonance, the scheme is named Feshbach-resonance management. The modulational-instability analysis of the quasiuniform condensate driven by this scheme leads to an analog of the Kronig-Penney model. The ensuing stable localized structures are found. These include breathers, which oscillate between the Thomas-Fermi and Gaussian configuration, or may be similar to the 2-soliton state of the nonlinear Schrödinger equation, and a nearly static state ("odd soliton") with a nested dark soliton. An overall phase diagram for breathers is constructed, and full stability of the odd solitons is numerically established.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Batiy, V.G.; Stojanov, A.I.; Schmieman, E.
2007-07-01
Methodological approach of optimization of schemes of solid radwaste management of the Object Shelter (Shelter) and ChNPP industrial site during transformation to the ecologically safe system was developed. On the basis of the conducted models researches the ALARA-analysis was carried out for the choice of optimum variant of schemes and technologies of solid radwaste management. The criteria of choice of optimum schemes, which are directed on optimization of doses and financial expenses, minimization of amount of the formed radwaste etc, were developed for realization of this ALARA-analysis. (authors)
Offset-Free Model Predictive Control of Open Water Channel Based on Moving Horizon Estimation
NASA Astrophysics Data System (ADS)
Ekin Aydin, Boran; Rutten, Martine
2016-04-01
Model predictive control (MPC) is a powerful control option which is increasingly used by operational water managers for managing water systems. The explicit consideration of constraints and multi-objective management are important features of MPC. However, due to the water loss in open water systems by seepage, leakage and evaporation a mismatch between the model and the real system will be created. These mismatch affects the performance of MPC and creates an offset from the reference set point of the water level. We present model predictive control based on moving horizon estimation (MHE-MPC) to achieve offset free control of water level for open water canals. MHE-MPC uses the past predictions of the model and the past measurements of the system to estimate unknown disturbances and the offset in the controlled water level is systematically removed. We numerically tested MHE-MPC on an accurate hydro-dynamic model of the laboratory canal UPC-PAC located in Barcelona. In addition, we also used well known disturbance modeling offset free control scheme for the same test case. Simulation experiments on a single canal reach show that MHE-MPC outperforms disturbance modeling offset free control scheme.
Borghi, Josephine; Makawia, Suzan; Kuwawenaruwa, August
2015-01-01
Community-based health insurance expansion has been proposed as a financing solution for the sizable informal sector in low-income settings. However, there is limited evidence of the administrative costs of such schemes. We assessed annual facility and district-level costs of running the Community Health Fund (CHF), a voluntary health insurance scheme for the informal sector in a rural and an urban district from the same region in Tanzania. Information on resource use, CHF membership and revenue was obtained from district managers and health workers from two facilities in each district. The administrative cost per CHF member household and the cost to revenue ratio were estimated. Revenue collection was the most costly activity at facility level (78% of total costs), followed by stewardship and management (13%) and pooling of funds (10%). Stewardship and management was the main activity at district level. The administration cost per CHF member household ranged from USD 3.33 to USD 12.12 per year. The cost to revenue ratio ranged from 50% to 364%. The cost of administering the CHF was high relative to revenue generated. Similar studies from other settings should be encouraged. PMID:24334331
ROSA: Resource-Oriented Service Management Schemes for Web of Things in a Smart Home
Chen, Peng-Yu
2017-01-01
A Pervasive-computing-enriched smart home environment, which contains many embedded and tiny intelligent devices and sensors coordinated by service management mechanisms, is capable of anticipating intentions of occupants and providing appropriate services accordingly. Although there are a wealth of research achievements in recent years, the degree of market acceptance is still low. The main reason is that most of the devices and services in such environments depend on particular platform or technology, making it hard to develop an application by composing the devices or services. Meanwhile, the concept of Web of Things (WoT) is becoming popular recently. Based on WoT, the developers can build applications based on popular web tools or technologies. Consequently, the objective of this paper is to propose a set of novel WoT-driven plug-and-play service management schemes for a smart home called Resource-Oriented Service Administration (ROSA). We have implemented an application prototype, and experiments are performed to show the effectiveness of the proposed approach. The results of this research can be a foundation for realizing the vision of “end user programmable smart environments”. PMID:28934159
Fuzzy Logic Control Based QoS Management in Wireless Sensor/Actuator Networks
Xia, Feng; Zhao, Wenhong; Sun, Youxian; Tian, Yu-Chu
2007-01-01
Wireless sensor/actuator networks (WSANs) are emerging rapidly as a new generation of sensor networks. Despite intensive research in wireless sensor networks (WSNs), limited work has been found in the open literature in the field of WSANs. In particular, quality-of-service (QoS) management in WSANs remains an important issue yet to be investigated. As an attempt in this direction, this paper develops a fuzzy logic control based QoS management (FLC-QM) scheme for WSANs with constrained resources and in dynamic and unpredictable environments. Taking advantage of the feedback control technology, this scheme deals with the impact of unpredictable changes in traffic load on the QoS of WSANs. It utilizes a fuzzy logic controller inside each source sensor node to adapt sampling period to the deadline miss ratio associated with data transmission from the sensor to the actuator. The deadline miss ratio is maintained at a pre-determined desired level so that the required QoS can be achieved. The FLC-QM has the advantages of generality, scalability, and simplicity. Simulation results show that the FLC-QM can provide WSANs with QoS support. PMID:28903288
Proposal of a Framework for Internet Based Licensing of Learning Objects
ERIC Educational Resources Information Center
Santos, Osvaldo A.; Ramos, Fernando M. S.
2004-01-01
This paper presents a proposal of a framework whose main objective is to manage the delivery and rendering of learning objects in a digital rights controlled environment. The framework is based on a digital licensing scheme that requires each learning object to have the proper license in order to be rendered by a trusted player. A conceptual model…
Grauer, Andreas; König, Andreas; Bunnefeld, Nils
2015-01-01
Numbers of large grazing bird (geese, swans, cranes) have increased all over Europe, but monitoring these species, e.g. for management purposes, can be time consuming and costly. In Bavaria, sedentary Greylag geese (Anser anser) are monitored during the winter by two different citizen-based monitoring schemes: the International Waterbird Census [IWC] and hunting bag statistics. We compared the results of both schemes for the seasons 1988/89 to 2010/11 by analysing annual indices calculated using the software TRends and Indices for Monitoring Data-TRIM. We identified similar, highly significant rates of increase in both data sets for the entire region of Bavaria (IWC 14% [13-15%], bag 13% [12-14%]). Furthermore, in all of the seven Bavarian regions, trends in annual indices of both data sets correlated significantly. The quality of both datasets as indicators of abundances in Greylag geese populations in Bavaria was not undermined by either weaknesses typically associated with citizen based monitoring or problems generally assumed for IWC and bag data. We also show that bag data are, under the German system of collecting bag statistics, a reliable indicator of species' distribution, especially for detecting newly colonized areas. Therefore, wildlife managers may want to consider bag data from citizen science led monitoring programmes as evidence supporting the decision making processes. We also discuss requirements for any bag monitoring schemes being established to monitor trends in species' distribution and abundance.
Capture and playback synchronization in video conferencing
NASA Astrophysics Data System (ADS)
Shae, Zon-Yin; Chang, Pao-Chi; Chen, Mon-Song
1995-03-01
Packet-switching based video conferencing has emerged as one of the most important multimedia applications. Lip synchronization can be disrupted in the packet network as the result of the network properties: packet delay jitters at the capture end, network delay jitters, packet loss, packet arrived out of sequence, local clock mismatch, and video playback overlay with the graphic system. The synchronization problem become more demanding as the real time and multiparty requirement of the video conferencing application. Some of the above mentioned problem can be solved in the more advanced network architecture as ATM having promised. This paper will present some of the solutions to the problems that can be useful at the end station terminals in the massively deployed packet switching network today. The playback scheme in the end station will consist of two units: compression domain buffer management unit and the pixel domain buffer management unit. The pixel domain buffer management unit is responsible for removing the annoying frame shearing effect in the display. The compression domain buffer management unit is responsible for parsing the incoming packets for identifying the complete data blocks in the compressed data stream which can be decoded independently. The compression domain buffer management unit is also responsible for concealing the effects of clock mismatch, lip synchronization, and packet loss, out of sequence, and network jitters. This scheme can also be applied to the multiparty teleconferencing environment. Some of the schemes presented in this paper have been implemented in the Multiparty Multimedia Teleconferencing (MMT) system prototype at the IBM watson research center.
Analytic redundancy management for SCOLE
NASA Technical Reports Server (NTRS)
Montgomery, Raymond C.
1988-01-01
The objective of this work is to develop a practical sensor analytic redundancy management scheme for flexible spacecraft and to demonstrate it using the SCOLE experimental apparatus. The particular scheme to be used is taken from previous work on the Grid apparatus by Williams and Montgomery.
DISSECT: a new mnemonic-based approach to the categorization of aortic dissection.
Dake, M D; Thompson, M; van Sambeek, M; Vermassen, F; Morales, J P
2013-08-01
Classification systems for aortic dissection provide important guides to clinical decision-making, but the relevance of traditional categorization schemes is being questioned in an era when endovascular techniques are assuming a growing role in the management of this frequently complex and catastrophic entity. In recognition of the expanding range of interventional therapies now used as alternatives to conventional treatment approaches, the Working Group on Aortic Diseases of the DEFINE Project developed a categorization system that features the specific anatomic and clinical manifestations of the disease process that are most relevant to contemporary decision-making. The DISSECT classification system is a mnemonic-based approach to the evaluation of aortic dissection. It guides clinicians through an assessment of six critical characteristics that facilitate optimal communication of the most salient details that currently influence the selection of a therapeutic option, including those findings that are key when considering an endovascular procedure, but are not taken into account by the DeBakey or Stanford categorization schemes. The six features of aortic dissection include: duration of disease; intimal tear location; size of the dissected aorta; segmental extent of aortic involvement; clinical complications of the dissection, and thrombus within the aortic false lumen. In current clinical practice, endovascular therapy is increasingly considered as an alternative to medical management or open surgical repair in select cases of type B aortic dissection. Currently, endovascular aortic repair is not used for patients with type A aortic dissection, but catheter-based techniques directed at peripheral branch vessel ischemia that may complicate type A dissection are considered valuable adjunctive interventions, when indicated. The use of a new system for categorization of aortic dissection, DISSECT, addresses the shortcomings of well-known established schemes devised more than 40 years ago, before the introduction of endovascular techniques. It will serve as a guide to support a critical analysis of contemporary therapeutic options and inform management decisions based on specific features of the disease process. Copyright © 2013 European Society for Vascular Surgery. All rights reserved.
Hossain, S. A. Shahed; Pérez Koehlmoos, Tracey Lynn; John, Denny
2016-01-01
Introduction This research article reports on factors influencing initial voluntary uptake of community-based health insurance (CBHI) schemes in low- and middle-income countries (LMIC), and renewal decisions. Methods Following PRISMA protocol, we conducted a comprehensive search of academic and gray literature, including academic databases in social science, economics and medical sciences (e.g., Econlit, Global health, Medline, Proquest) and other electronic resources (e.g., Eldis and Google scholar). Search strategies were developed using the thesaurus or index terms (e.g., MeSH) specific to the databases, combined with free text terms related to CBHI or health insurance. Searches were conducted from May 2013 to November 2013 in English, French, German, and Spanish. From the initial search yield of 15,770 hits, 54 relevant studies were retained for analysis of factors influencing enrolment and renewal decisions. The quantitative synthesis (informed by meta-analysis) and the qualitative analysis (informed by thematic synthesis) were compared to gain insight for an overall synthesis of findings/statements. Results Meta-analysis suggests that enrolments in CBHI were positively associated with household income, education and age of the household head (HHH), household size, female-headed household, married HHH and chronic illness episodes in the household. The thematic synthesis suggests the following factors as enablers for enrolment: (a) knowledge and understanding of insurance and CBHI, (b) quality of healthcare, (c) trust in scheme management. Factors found to be barriers to enrolment include: (a) inappropriate benefits package, (b) cultural beliefs, (c) affordability, (d) distance to healthcare facility, (e) lack of adequate legal and policy frameworks to support CBHI, and (f) stringent rules of some CBHI schemes. HHH education, household size and trust in the scheme management were positively associated with member renewal decisions. Other motivators were: (a) knowledge and understanding of insurance and CBHI, (b) healthcare quality, (c) trust in scheme management, and (d) receipt of an insurance payout the previous year. The barriers to renewal decisions were: (a) stringent rules of some CBHI schemes, (b) inadequate legal and policy frameworks to support CBHI and (c) inappropriate benefits package. Conclusion and Policy Implications The demand-side factors positively affecting enrolment in CBHI include education, age, female household heads, and the socioeconomic status of households. Moreover, when individuals understand how their CBHI functions they are more likely to enroll and when people have a positive claims experience, they are more likely to renew. A higher prevalence of chronic conditions or the perception that healthcare is of good quality and nearby act as factors enhancing enrolment. The perception that services are distant or deficient leads to lower enrolments. The second insight is that trust in the scheme enables enrolment. Thirdly, clarity about the legal or policy framework acts as a factor influencing enrolments. This is significant, as it points to hitherto unpublished evidence that governments can effectively broaden their outreach to grassroots groups that are excluded from social protection by formulating supportive regulatory and policy provisions even if they cannot fund such schemes in full, by leveraging people’s willingness to exercise voluntary and contributory enrolment in a community-based health insurance. PMID:27579731
A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment
Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda
2017-01-01
In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment. PMID:28629131
A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.
Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda
2017-06-17
In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment.
A secure data outsourcing scheme based on Asmuth-Bloom secret sharing
NASA Astrophysics Data System (ADS)
Idris Muhammad, Yusuf; Kaiiali, Mustafa; Habbal, Adib; Wazan, A. S.; Sani Ilyasu, Auwal
2016-11-01
Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users' queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients' data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth-Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing.
Enhanced Predictive Handover for Fast Proxy Mobile IPv6
NASA Astrophysics Data System (ADS)
Jeon, Seil; Kang, Namhi; Kim, Younghan
Proxy Mobile IPv6 (PMIPv6) has been proposed in order to overcome the limitations of host-based mobility management in IPv6 networks. However, packet losses during doing handover are still a problem. To solve this issue, several schemes have been developed, and can be classified into two approaches: predictive and reactive handover. Both approaches commonly use bi-directional tunnel between mobile access gateways (MAGs). In predictive schemes especially, mobility support for a mobile node (MN) is triggered by simplified link signal strength. Thereafter, the MN sends handover notification to its serving MAG, and is then able to initiate packet forwarding. Therefore, if the MN moves toward an unexpected MAG that does not have any pre-established tunnel with the serving MAG, it may lead to packet losses. In this paper, we define this problem as Early Packet Forwarding (EPF). As a solution, we propose an enhanced PMIPv6 scheme using two-phase tunnel control based on the IEEE 802.21 Media Independent Handover (MIH).
Buffer Management Simulation in ATM Networks
NASA Technical Reports Server (NTRS)
Yaprak, E.; Xiao, Y.; Chronopoulos, A.; Chow, E.; Anneberg, L.
1998-01-01
This paper presents a simulation of a new dynamic buffer allocation management scheme in ATM networks. To achieve this objective, an algorithm that detects congestion and updates the dynamic buffer allocation scheme was developed for the OPNET simulation package via the creation of a new ATM module.
Ben Said, Mohamed; Robel, Laurence; Messiaen, Claude; Craus, Yann; Jais, Jean Philippe; Golse, Bernard; Landais, Paul
2014-01-01
Patients explicit and unambiguous information, patients consents and privacy protection are reviewed in this article, in the frame of the deployment of the information system TEDIS dedicated to autism spectrum disorders. The role of the Delegate to the Protection of Data is essential at this stage. We developed a privacy protection scheme based on storing encrypted patients personal data on the server database and decrypting it on the Web browser. It tries to respond to the end-users request to manage nominative data in a human readable form and to meet with privacy protection framework.
Team Projects and Peer Evaluations
ERIC Educational Resources Information Center
Doyle, John Kevin; Meeker, Ralph D.
2008-01-01
The authors assign semester- or quarter-long team-based projects in several Computer Science and Finance courses. This paper reports on our experience in designing, managing, and evaluating such projects. In particular, we discuss the effects of team size and of various peer evaluation schemes on team performance and student learning. We report…
[Relevance of medical rehabilitation in disease management programmes].
Lüngen, M; Lauterbach, K W
2003-10-01
Disease management programmes will increasingly be introduced in Germany due to the new risk adjustment scheme. The first disease management programmes started in 2003 for breast cancer and diabetes mellitus type II. German rehabilitation will have to face several challenges. Disease management programmes are strongly based on the notion of Evidence so that proof of the efficacy of a care giving task should be present. Verification of the evidence of the specifically German rehabilitation treatments must therefore be given. However, integration of rehabilitation in disease management programmes could lead to changes in the alignment of German rehabilitation. The essence of German rehabilitation, notably its holistic approach, could get lost with integration in disease management programmes.
A Regev-Type Fully Homomorphic Encryption Scheme Using Modulus Switching
Chen, Zhigang; Wang, Jian; Song, Xinxia
2014-01-01
A critical challenge in a fully homomorphic encryption (FHE) scheme is to manage noise. Modulus switching technique is currently the most efficient noise management technique. When using the modulus switching technique to design and implement a FHE scheme, how to choose concrete parameters is an important step, but to our best knowledge, this step has drawn very little attention to the existing FHE researches in the literature. The contributions of this paper are twofold. On one hand, we propose a function of the lower bound of dimension value in the switching techniques depending on the LWE specific security levels. On the other hand, as a case study, we modify the Brakerski FHE scheme (in Crypto 2012) by using the modulus switching technique. We recommend concrete parameter values of our proposed scheme and provide security analysis. Our result shows that the modified FHE scheme is more efficient than the original Brakerski scheme in the same security level. PMID:25093212
Mapping Mangrove Density from Rapideye Data in Central America
NASA Astrophysics Data System (ADS)
Son, Nguyen-Thanh; Chen, Chi-Farn; Chen, Cheng-Ru
2017-06-01
Mangrove forests provide a wide range of socioeconomic and ecological services for coastal communities. Extensive aquaculture development of mangrove waters in many developing countries has constantly ignored services of mangrove ecosystems, leading to unintended environmental consequences. Monitoring the current status and distribution of mangrove forests is deemed important for evaluating forest management strategies. This study aims to delineate the density distribution of mangrove forests in the Gulf of Fonseca, Central America with Rapideye data using the support vector machines (SVM). The data collected in 2012 for density classification of mangrove forests were processed based on four different band combination schemes: scheme-1 (bands 1-3, 5 excluding the red-edge band 4), scheme-2 (bands 1-5), scheme-3 (bands 1-3, 5 incorporating with the normalized difference vegetation index, NDVI), and scheme-4 (bands 1-3, 5 incorporating with the normalized difference red-edge index, NDRI). We also hypothesized if the obvious contribution of Rapideye red-edge band could improve the classification results. Three main steps of data processing were employed: (1), data pre-processing, (2) image classification, and (3) accuracy assessment to evaluate the contribution of red-edge band in terms of the accuracy of classification results across these four schemes. The classification maps compared with the ground reference data indicated the slightly higher accuracy level observed for schemes 2 and 4. The overall accuracies and Kappa coefficients were 97% and 0.95 for scheme-2 and 96.9% and 0.95 for scheme-4, respectively.
Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.
Sanchez-Iborra, Ramon; Sánchez-Gómez, Jesús; Pérez, Salvador; Fernández, Pedro J; Santa, José; Hernández-Ramos, José L; Skarmeta, Antonio F
2018-06-05
Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN), which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa) and its layer-two supporter LoRa Wide Area Network (LoRaWAN), which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie⁻Hellman Over COSE (EDHOC) is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.
NASA Technical Reports Server (NTRS)
Coffin, T.
1986-01-01
A dynamic pressure data base and data base management system developed to characterize the Space Shuttle Main Engine (SSME) dynamic pressure environment is presented. The data base represents dynamic pressure measurements obtained during single engine hot firing tests of the SSME. Software is provided to permit statistical evaluation of selected measurements under specified operating conditions. An interpolation scheme is also included to estimate spectral trends with SSME power level.
Optimal rotated staggered-grid finite-difference schemes for elastic wave modeling in TTI media
NASA Astrophysics Data System (ADS)
Yang, Lei; Yan, Hongyong; Liu, Hong
2015-11-01
The rotated staggered-grid finite-difference (RSFD) is an effective approach for numerical modeling to study the wavefield characteristics in tilted transversely isotropic (TTI) media. But it surfaces from serious numerical dispersion, which directly affects the modeling accuracy. In this paper, we propose two different optimal RSFD schemes based on the sampling approximation (SA) method and the least-squares (LS) method respectively to overcome this problem. We first briefly introduce the RSFD theory, based on which we respectively derive the SA-based RSFD scheme and the LS-based RSFD scheme. Then different forms of analysis are used to compare the SA-based RSFD scheme and the LS-based RSFD scheme with the conventional RSFD scheme, which is based on the Taylor-series expansion (TE) method. The contrast in numerical accuracy analysis verifies the greater accuracy of the two proposed optimal schemes, and indicates that these schemes can effectively widen the wavenumber range with great accuracy compared with the TE-based RSFD scheme. Further comparisons between these two optimal schemes show that at small wavenumbers, the SA-based RSFD scheme performs better, while at large wavenumbers, the LS-based RSFD scheme leads to a smaller error. Finally, the modeling results demonstrate that for the same operator length, the SA-based RSFD scheme and the LS-based RSFD scheme can achieve greater accuracy than the TE-based RSFD scheme, while for the same accuracy, the optimal schemes can adopt shorter difference operators to save computing time.
NASA Astrophysics Data System (ADS)
Mehari, Abraham; Koppen, Barbara Van; McCartney, Matthew; Lankford, Bruce
Tanzania is currently attempting to improve water resources management through formal water rights and water fees systems, and formal institutions. The water rights system is expected to facilitate water allocation. The water fees system aims at cost-recovery for water resources management services. To enhance community involvement in water management, Water User Associations (WUAs) are being established and, in areas with growing upstream-downstream conflicts, apex bodies of all users along the stressed river stretch. The Mkoji sub-catchment (MSC) in the Rufiji basin is one of the first where these formal water management systems are being attempted. This paper analyzes the effectiveness of these systems in the light of their expected merits and the consequences of the juxtaposition of contemporary laws with traditional approaches. The study employed mainly qualitative, but also quantitative approaches on social and technical variables. Major findings were: (1) a good mix of formal (water fees and WUAs) and traditional (rotation-based water sharing, the Zamu) systems improved village-level water management services and reduced intra-scheme conflicts; (2) the water rights system has not brought abstractions into line with allocations and (3) so far, the MSC Apex body failed to mitigate inter-scheme conflicts. A more sophisticated design of allocation infrastructure and institutions is recommended.
Auctionable fixed transmission rights for congestion management
NASA Astrophysics Data System (ADS)
Alomoush, Muwaffaq Irsheid
Electric power deregulation has proposed a major change to the regulated utility monopoly. The change manifests the main part of engineers' efforts to reshape three components of today's regulated monopoly: generation, distribution and transmission. In this open access deregulated power market, transmission network plays a major role, and transmission congestion is a major problem that requires further consideration especially when inter-zonal/intra-zonal scheme is implemented. Declaring that engineering studies and experience are the criteria to define zonal boundaries or defining a zone based on the fact that a zone is a densely interconnected area (lake) and paths connecting these densely interconnected areas are inter-zonal lines will render insufficient and fuzzy definitions. Moreover, a congestion problem formulation should take into consideration interactions between intra-zonal and inter-zonal flows and their effects on power systems. In this thesis, we introduce a procedure for minimizing the number of adjustments of preferred schedules to alleviate congestion and apply control schemes to minimize interactions between zones. In addition, we give the zone definition a certain criterion based on the Locational Marginal Price (LMP). This concept will be used to define congestion zonal boundaries and to decide whether any zone should be merged with another zone or split into new zones. The thesis presents a unified scheme that combines zonal and FTR schemes to manage congestion. This combined scheme is utilized with LMPs to define zonal boundaries more appropriately. The presented scheme gains the best features of the FTR scheme, which are providing financial certainty, maximizing the efficient use of the system and making users pay for the actual use of congested paths. LMPs may give an indication of the impact of wheeling transactions, and calculations of and comparisons of LMPs with and without wheeling transactions should be adequate criteria to approve the transaction by the ISO, take a decision to expand the existing system, or retain the original structure of the system. Also, the thesis investigates the impact of wheeling transactions on congestion management, where we present a generalized mathematical model for the Fixed Transmission Right (FTR) auction. The auction guarantees FTR availability to all participants on a non-discriminatory basis, in which system users are permitted to buy, sell and trade FTRs through an auction. When FTRs are utilized with LMPs, they increase the efficient use of the transmission system and let a transmission customer gain advantageous features such as acquiring a mechanism to offset the extra cost due to congestion charges, providing financial and operational certainty and making system users pay for the actual use of the congested paths. The thesis also highlighted FTR trading in secondary markets to self-arrange access across different paths, create long-term transmission rights and provide more commercial certainty.
Spatial pattern formation facilitates eradication of infectious diseases
Eisinger, Dirk; Thulke, Hans-Hermann
2008-01-01
Control of animal-born diseases is a major challenge faced by applied ecologists and public health managers. To improve cost-effectiveness, the effort required to control such pathogens needs to be predicted as accurately as possible. In this context, we reviewed the anti-rabies vaccination schemes applied around the world during the past 25 years. We contrasted predictions from classic approaches based on theoretical population ecology (which governs rabies control to date) with a newly developed individual-based model. Our spatially explicit approach allowed for the reproduction of pattern formation emerging from a pathogen's spread through its host population. We suggest that a much lower management effort could eliminate the disease than that currently in operation. This is supported by empirical evidence from historic field data. Adapting control measures to the new prediction would save one-third of resources in future control programmes. The reason for the lower prediction is the spatial structure formed by spreading infections in spatially arranged host populations. It is not the result of technical differences between models. Synthesis and applications. For diseases predominantly transmitted by neighbourhood interaction, our findings suggest that the emergence of spatial structures facilitates eradication. This may have substantial implications for the cost-effectiveness of existing disease management schemes, and suggests that when planning management strategies consideration must be given to methods that reflect the spatial nature of the pathogen–host system. PMID:18784795
Prediction-based Dynamic Energy Management in Wireless Sensor Networks
Wang, Xue; Ma, Jun-Jie; Wang, Sheng; Bi, Dao-Wei
2007-01-01
Energy consumption is a critical constraint in wireless sensor networks. Focusing on the energy efficiency problem of wireless sensor networks, this paper proposes a method of prediction-based dynamic energy management. A particle filter was introduced to predict a target state, which was adopted to awaken wireless sensor nodes so that their sleep time was prolonged. With the distributed computing capability of nodes, an optimization approach of distributed genetic algorithm and simulated annealing was proposed to minimize the energy consumption of measurement. Considering the application of target tracking, we implemented target position prediction, node sleep scheduling and optimal sensing node selection. Moreover, a routing scheme of forwarding nodes was presented to achieve extra energy conservation. Experimental results of target tracking verified that energy-efficiency is enhanced by prediction-based dynamic energy management.
Pulley, Simon; Foster, Ian; Collins, Adrian L
2017-06-01
The objective classification of sediment source groups is at present an under-investigated aspect of source tracing studies, which has the potential to statistically improve discrimination between sediment sources and reduce uncertainty. This paper investigates this potential using three different source group classification schemes. The first classification scheme was simple surface and subsurface groupings (Scheme 1). The tracer signatures were then used in a two-step cluster analysis to identify the sediment source groupings naturally defined by the tracer signatures (Scheme 2). The cluster source groups were then modified by splitting each one into a surface and subsurface component to suit catchment management goals (Scheme 3). The schemes were tested using artificial mixtures of sediment source samples. Controlled corruptions were made to some of the mixtures to mimic the potential causes of tracer non-conservatism present when using tracers in natural fluvial environments. It was determined how accurately the known proportions of sediment sources in the mixtures were identified after unmixing modelling using the three classification schemes. The cluster analysis derived source groups (2) significantly increased tracer variability ratios (inter-/intra-source group variability) (up to 2122%, median 194%) compared to the surface and subsurface groupings (1). As a result, the composition of the artificial mixtures was identified an average of 9.8% more accurately on the 0-100% contribution scale. It was found that the cluster groups could be reclassified into a surface and subsurface component (3) with no significant increase in composite uncertainty (a 0.1% increase over Scheme 2). The far smaller effects of simulated tracer non-conservatism for the cluster analysis based schemes (2 and 3) was primarily attributed to the increased inter-group variability producing a far larger sediment source signal that the non-conservatism noise (1). Modified cluster analysis based classification methods have the potential to reduce composite uncertainty significantly in future source tracing studies. Copyright © 2016 Elsevier Ltd. All rights reserved.
Carey, Gemma; Dickinson, Helen
2017-08-17
Internationally there has been a growth in the use of publicly funded service markets as a mechanism to deliver health and social services. This has accompanied the emergence of 'self-directed care' in a number of different policy areas including disability and aged care - often referred to as 'personalisation' (Giaimo and Manow, Comp. Pol Stud 32:967-1000, 1999; Needham, Public Money Manage 30:136-8, 2010; [Hood], [The Idea of Joined-up Government: A Historical Perspective], [2005]; Klijn and Koppenjan, Public Manage 2:437-54, 2000, Greener, Policy Polit 36:93-108, 2008). These reforms are underpinned by an idea that individuals should be placed in control of their own service needs, given funding directly by government and encouraged to exercise choice and control through purchasing their own services. A major challenge for governments in charge of these reforms is determining the best way to structure and govern emerging service markets markets. Given the growing international embrace of market-based reform mechanisms to provide essential services to citizens, finding ways to ensure they promote, and not diminish, people's health and wellbeing is vital. The Australian National Disability Insurance Scheme (NDIS) is Australia's first national approach to the use of personalised budgets. The program of research outlined in this paper brings together streams from a range of different studies in order to investigate the implementation of the NDIS longitudinally across different administrative levels of government, service providers and scheme participants. This programme of research will make a contribution to our understanding of the Australian scheme and how individualised funding operates within this context, but will also generate much needed evidence that will have relevance to other jurisdictions and help fill a gap in the evidence base.
Efficient Secure and Privacy-Preserving Route Reporting Scheme for VANETs
NASA Astrophysics Data System (ADS)
Zhang, Yuanfei; Pei, Qianwen; Dai, Feifei; Zhang, Lei
2017-10-01
Vehicular ad-hoc network (VANET) is a core component of intelligent traffic management system which could provide various of applications such as accident prediction, route reporting, etc. Due to the problems caused by traffic congestion, route reporting becomes a prospective application which can help a driver to get optimal route to save her travel time. Before enjoying the convenience of route reporting, security and privacy-preserving issues need to be concerned. In this paper, we propose a new secure and privacy-preserving route reporting scheme for VANETs. In our scheme, only an authenticated vehicle can use the route reporting service provided by the traffic management center. Further, a vehicle may receive the response from the traffic management center with low latency and without violating the privacy of the vehicle. Experiment results show that our scheme is much more efficiency than the existing one.
Phytoremediation of landfill leachate
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, D.L.; Williamson, K.L.; Owen, A.G.
Leachate emissions from landfill sites are of concern, primarily due to their toxic impact when released unchecked into the environment, and the potential for landfill sites to generate leachate for many hundreds of years following closure. Consequently, economically and environmentally sustainable disposal options are a priority in waste management. One potential option is the use of soil-plant based remediation schemes. In many cases, using either trees (including short rotation coppice) or grassland, phytoremediation of leachate has been successful. However, there are a significant number of examples where phytoremediation has failed. Typically, this failure can be ascribed to excessive leachate applicationmore » and poor management due to a fundamental lack of understanding of the plant-soil system. On balance, with careful management, phytoremediation can be viewed as a sustainable, cost effective and environmentally sound option which is capable of treating 250 m{sup 3} ha{sup -1} yr{sup -1}. However, these schemes have a requirement for large land areas and must be capable of responding to changes in leachate quality and quantity, problems of scheme establishment and maintenance, continual environmental monitoring and seasonal patterns of plant growth. Although the fundamental underpinning science is well understood, further work is required to create long-term predictive remediation models, full environmental impact assessments, a complete life-cycle analysis and economic analyses for a wide range of landfill scenarios.« less
Impact of subsidies on cancer genetic testing uptake in Singapore.
Li, Shao-Tzu; Yuen, Jeanette; Zhou, Ke; Binte Ishak, Nur Diana; Chen, Yanni; Met-Domestici, Marie; Chan, Sock Hoai; Tan, Yee Pin; Allen, John Carson; Lim, Soon Thye; Soo, Khee Chee; Ngeow, Joanne
2017-04-01
Previous reports cite high costs of clinical cancer genetic testing as main barriers to patient's willingness to test. We report findings of a pilot study that evaluates how different subsidy schemes impact genetic testing uptake and total cost of cancer management. We included all patients who attended the Cancer Genetics Service at the National Cancer Centre Singapore (January 2014-May 2016). Two subsidy schemes, the blanket scheme (100% subsidy to all eligible patients), and the varied scheme (patients received 50%-100% subsidy dependent on financial status) were compared. We estimated total spending on cancer management from government's perspective using a decision model. 445 patients were included. Contrasting against the blanket scheme, the varied scheme observed a higher attendance of patients (34 vs 8 patients per month), of which a higher proportion underwent genetic testing (5% vs 38%), while lowering subsidy spending per person (S$1098 vs S$1161). The varied scheme may potentially save cost by reducing unnecessary cancer surveillance when first-degree relatives uptake rate is above 36%. Provision of subsidy leads to a considerable increase in genetic testing uptake rate. From the government's perspective, subsidising genetic testing may potentially reduce total costs on cancer management. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
A study on agent-based secure scheme for electronic medical record system.
Chen, Tzer-Long; Chung, Yu-Fang; Lin, Frank Y S
2012-06-01
Patient records, including doctors' diagnoses of diseases, trace of treatments and patients' conditions, nursing actions, and examination results from allied health profession departments, are the most important medical records of patients in medical systems. With patient records, medical staff can instantly understand the entire medical information of a patient so that, according to the patient's conditions, more accurate diagnoses and more appropriate in-depth treatments can be provided. Nevertheless, in such a modern society with booming information technologies, traditional paper-based patient records have faced a lot of problems, such as lack of uniform formats, low data mobility, slow data transfer, illegible handwritings, enormous and insufficient storage space, difficulty of conservation, being easily damaged, and low transferability. To improve such drawbacks, reduce medical costs, and advance medical quality, paper-based patient records are modified into electronic medical records and reformed into electronic patient records. However, since electronic patient records used in various hospitals are diverse and different, in consideration of cost, it is rather difficult to establish a compatible and complete integrated electronic patient records system to unify patient records from heterogeneous systems in hospitals. Moreover, as the booming of the Internet, it is no longer necessary to build an integrated system. Instead, doctors can instantly look up patients' complete information through the Internet access to electronic patient records as well as avoid the above difficulties. Nonetheless, the major problem of accessing to electronic patient records cross-hospital systems exists in the security of transmitting and accessing to the records in case of unauthorized medical personnels intercepting or stealing the information. This study applies the Mobile Agent scheme to cope with the problem. Since a Mobile Agent is a program, which can move among hosts and automatically disperse arithmetic processes, and moves from one host to another in heterogeneous network systems with the characteristics of autonomy and mobility, decreasing network traffic, reducing transfer lag, encapsulating protocol, availability on heterogeneous platforms, fault-tolerance, high flexibility, and personalization. However, since a Mobile Agent contacts and exchanges information with other hosts or agents on the Internet for rapid exchange and access to medical information, the security is threatened. In order to solve the problem, this study proposes a key management scheme based on Lagrange interpolation formulas and hierarchical management structure to make Mobile Agents a more secure and efficient access control scheme for electronic patient record systems when applied to the access of patients' personal electronic patient records cross hospitals. Meanwhile, with the comparison of security and efficacy analyses being the feasibility of validation scheme and the basis of better efficiency, the security of Mobile Agents in the process of operation can be guaranteed, key management efficacy can be advanced, and the security of the Mobile Agent system can be protected.
NASA Astrophysics Data System (ADS)
Dimopoulos, Konstantinos; Marti, Dominik; Andersen, Peter E.
2018-02-01
We want to implement two-photon excitation fluorescence microscopy (TPEFM) into endoscopes, since TPEFM can provide relevant biomarkers for cancer staging and grading in hollow organs, endoscopically accessible through natural orifices. However, many obstacles must be overcome, among others the delivery of short laser pulses to the distal end of the endoscope. To this avail, we present imaging results using an all-fibre dispersion management scheme in a TPEFM setup. The scheme has been conceived by Jespersen et al. in 20101 and relies on the combination of a single mode fibre with normal and a higher order mode fibre with anomalous dispersion properties, fused in series using a long period grating. We show that using this fibre assembly, a simple and robust pulsed laser delivery system without any free-space optics, which is thus suitable for clinical use, can be realised.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Su'ud, Zaki, E-mail: szaki@fi.itba.c.id; Sekimoto, H., E-mail: hsekimot@gmail.com
2014-09-30
Pb-Bi Cooled fast reactors with modified CANDLE burn-up scheme with 10 regions and 10 years cycle length has been investigated from neutronic aspects. In this study the safety aspect of such reactors have been investigated and discussed. Several condition of unprotected loss of flow (ULOF) and unprotected rod run-out transient over power (UTOP) have been simulated and the results show that the reactors excellent safety performance. At 80 seconds after unprotected loss of flow condition, the core flow rate drop to about 25% of its initial flow and slowly move toward its natural circulation level. The maximum fuel temperature canmore » be managed below 1000°C and the maximum cladding temperature can be managed below 700°C. The dominant reactivity feedback is radial core expansion and Doppler effect, followed by coolant density effect and fuel axial expansion effect.« less
Lin, Jinyao; Li, Xia
2016-04-01
Zoning eco-protected areas is important for ecological conservation and environmental management. Rapid and continuous urban expansion, however, may exert negative effects on the performance of practical zoning designs. Various methods have been developed for protected area zoning, but most of them failed to consider the conflicts between urban development (for the benefit of land developers) and ecological protection (local government). Some real-world zoning schemes even have to be modified occasionally after the lengthy negotiations between the government and land developers. Therefore, our study has presented a game theory-based method to deal with this problem. Future urban expansion in the study area will be predicted by a logistic regression cellular automaton, while eco-protected areas will be delimitated using multi-objective optimization algorithm. Then, two types of conflicts between them can be resolved based on game theory, a theory of decision-making. We established a two-person dynamic game for each conflict zone. The ecological compensation mechanism was taken into account by simulating the negotiation processes between the government and land developers. A final zoning scheme can be obtained when the two sides reach agreements. The proposed method is applied to the eco-protected area zoning in Guangzhou, a fast-growing city in China. The experiments indicate that the conflicts between eco-protection and urban development will inevitably arise when using only traditional zoning methods. Based on game theory, our method can effectively resolve those conflicts, and can provide a relatively reasonable zoning scheme. This method is expected to support policy-making in environmental management and urban planning. Copyright © 2015 Elsevier Ltd. All rights reserved.
Covering All the Bases: A Model Hazardous Waste Program for Small Universities.
ERIC Educational Resources Information Center
MacPherson, Robert A.
1991-01-01
The Colorado School of Mines' experience illustrates that with good planning and enough money, a small university can provide a high level of waste management service, complying with government regulations. Considerations in developing the plan include a segregation scheme for incompatible materials, vehicle selection, and costs of ongoing…
Using Quality Schemes in Adult and Community Learning: A Guide for Managers.
ERIC Educational Resources Information Center
Ewens, David; Watters, Kate
This document examines adult and community learning (ACL) and quality programs across England. The difficulties faced by local education agencies' ACL services in delivering quality are noted, along with ways quality improvement has been supported. Quality programs--whether internal or external, based on awards, or used as diagnostic tools--are…
An Overview and Analysis of Mobile Internet Protocols in Cellular Environments.
ERIC Educational Resources Information Center
Chao, Han-Chieh
2001-01-01
Notes that cellular is the inevitable future architecture for the personal communication service system. Discusses the current cellular support based on Mobile Internet Protocol version 6 (Ipv6) and points out the shortfalls of using Mobile IP. Highlights protocols especially for mobile management schemes which can optimize a high-speed mobile…
NASA Astrophysics Data System (ADS)
Magda, Danièle; de Sainte Marie, Christine; Plantureux, Sylvain; Agreil, Cyril; Amiaud, Bernard; Mestelan, Philippe; Mihout, Sarah
2015-11-01
Current agri-environmental schemes for reconciling agricultural production with biodiversity conservation are proving ineffective Europe-wide, increasing interest in results-based schemes (RBSs). We describe here the French "Flowering Meadows" competition, rewarding the "best agroecological balance" in semi-natural grasslands managed by livestock farmers. This competition, which was entered by about a thousand farmers in 50 regional nature parks between 2007 and 2014, explicitly promotes a new style of agri-environmental scheme focusing on an ability to reach the desired outcome rather than adherence to prescriptive management rules. Building on our experience in the design and monitoring of the competition, we argue that the cornerstone of successful RBSs is a collective learning process in which the reconciliation of agriculture and environment is reconsidered in terms of synergistic relationships between agricultural and ecological functioning. We present the interactive, iterative process by which we defined an original method for assessing species-rich grasslands in agroecological terms. This approach was based on the integration of new criteria, such as flexibility, feeding value, and consistency of use, into the assessment of forage production performance and the consideration of biodiversity conservation through its functional role within the grassland ecosystem, rather than simply noting the presence or abundance of species. We describe the adaptation of this methodology on the basis of competition feedback, to bring about a significant shift in the conventional working methods of agronomists and conservationists (including researchers).The potential and efficacy of RBSs for promoting ecologically sound livestock systems are discussed in the concluding remarks, and they relate to the ecological intensification debate.
NASA Technical Reports Server (NTRS)
Ozdogan, Mutlu; Rodell, Matthew; Beaudoing, Hiroko Kato; Toll, David L.
2009-01-01
A novel method is introduced for integrating satellite derived irrigation data and high-resolution crop type information into a land surface model (LSM). The objective is to improve the simulation of land surface states and fluxes through better representation of agricultural land use. Ultimately, this scheme could enable numerical weather prediction (NWP) models to capture land-atmosphere feedbacks in managed lands more accurately and thus improve forecast skill. Here we show that application of the new irrigation scheme over the continental US significantly influences the surface water and energy balances by modulating the partitioning of water between the surface and the atmosphere. In our experiment, irrigation caused a 12% increase in evapotranspiration (QLE) and an equivalent reduction in the sensible heat flux (QH) averaged over all irrigated areas in the continental US during the 2003 growing season. Local effects were more extreme: irrigation shifted more than 100 W/m from QH to QLE in many locations in California, eastern Idaho, southern Washington, and southern Colorado during peak crop growth. In these cases, the changes in ground heat flux (QG), net radiation (RNET), evapotranspiration (ET), runoff (R), and soil moisture (SM) were more than 3 W/m(sup 2), 20 W/m(sup 2), 5 mm/day, 0.3 mm/day, and 100 mm, respectively. These results are highly relevant to continental- to global-scale water and energy cycle studies that, to date, have struggled to quantify the effects of agricultural management practices such as irrigation. Based on the results presented here, we expect that better representation of managed lands will lead to improved weather and climate forecasting skill when the new irrigation scheme is incorporated into NWP models such as NOAA's Global Forecast System (GFS).
Fuzzy-logic based Q-Learning interference management algorithms in two-tier networks
NASA Astrophysics Data System (ADS)
Xu, Qiang; Xu, Zezhong; Li, Li; Zheng, Yan
2017-10-01
Unloading from macrocell network and enhancing coverage can be realized by deploying femtocells in the indoor scenario. However, the system performance of the two-tier network could be impaired by the co-tier and cross-tier interference. In this paper, a distributed resource allocation scheme is studied when each femtocell base station is self-governed and the resource cannot be assigned centrally through the gateway. A novel Q-Learning interference management scheme is proposed, that is divided into cooperative and independent part. In the cooperative algorithm, the interference information is exchanged between the cell-edge users which are classified by the fuzzy logic in the same cell. Meanwhile, we allocate the orthogonal subchannels to the high-rate cell-edge users to disperse the interference power when the data rate requirement is satisfied. The resource is assigned directly according to the minimum power principle in the independent algorithm. Simulation results are provided to demonstrate the significant performance improvements in terms of the average data rate, interference power and energy efficiency over the cutting-edge resource allocation algorithms.
Advances in Patch-Based Adaptive Mesh Refinement Scalability
Gunney, Brian T.N.; Anderson, Robert W.
2015-12-18
Patch-based structured adaptive mesh refinement (SAMR) is widely used for high-resolution simu- lations. Combined with modern supercomputers, it could provide simulations of unprecedented size and resolution. A persistent challenge for this com- bination has been managing dynamically adaptive meshes on more and more MPI tasks. The dis- tributed mesh management scheme in SAMRAI has made some progress SAMR scalability, but early al- gorithms still had trouble scaling past the regime of 105 MPI tasks. This work provides two critical SAMR regridding algorithms, which are integrated into that scheme to ensure efficiency of the whole. The clustering algorithm is an extensionmore » of the tile- clustering approach, making it more flexible and efficient in both clustering and parallelism. The partitioner is a new algorithm designed to prevent the network congestion experienced by its prede- cessor. We evaluated performance using weak- and strong-scaling benchmarks designed to be difficult for dynamic adaptivity. Results show good scaling on up to 1.5M cores and 2M MPI tasks. Detailed timing diagnostics suggest scaling would continue well past that.« less
Advances in Patch-Based Adaptive Mesh Refinement Scalability
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gunney, Brian T.N.; Anderson, Robert W.
Patch-based structured adaptive mesh refinement (SAMR) is widely used for high-resolution simu- lations. Combined with modern supercomputers, it could provide simulations of unprecedented size and resolution. A persistent challenge for this com- bination has been managing dynamically adaptive meshes on more and more MPI tasks. The dis- tributed mesh management scheme in SAMRAI has made some progress SAMR scalability, but early al- gorithms still had trouble scaling past the regime of 105 MPI tasks. This work provides two critical SAMR regridding algorithms, which are integrated into that scheme to ensure efficiency of the whole. The clustering algorithm is an extensionmore » of the tile- clustering approach, making it more flexible and efficient in both clustering and parallelism. The partitioner is a new algorithm designed to prevent the network congestion experienced by its prede- cessor. We evaluated performance using weak- and strong-scaling benchmarks designed to be difficult for dynamic adaptivity. Results show good scaling on up to 1.5M cores and 2M MPI tasks. Detailed timing diagnostics suggest scaling would continue well past that.« less
Constraints of nonresponding flows based on cross layers in the networks
NASA Astrophysics Data System (ADS)
Zhou, Zhi-Chao; Xiao, Yang; Wang, Dong
2016-02-01
In the active queue management (AQM) scheme, core routers cannot manage and constrain user datagram protocol (UDP) data flows by the sliding window control mechanism in the transport layer due to the nonresponsive nature of such traffic flows. However, the UDP traffics occupy a large part of the network service nowadays which brings a great challenge to the stability of the more and more complex networks. To solve the uncontrollable problem, this paper proposes a cross layers random early detection (CLRED) scheme, which can control the nonresponding UDP-like flows rate effectively when congestion occurs in the access point (AP). The CLRED makes use of the MAC frame acknowledgement (ACK) transmitting congestion information to the sources nodes and utilizes the back-off windows of the MAC layer throttling data rate. Consequently, the UDP-like flows data rate can be restrained timely by the sources nodes in order to alleviate congestion in the complex networks. The proposed CLRED can constrain the nonresponsive flows availably and make the communication expedite, so that the network can sustain stable. The simulation results of network simulator-2 (NS2) verify the proposed CLRED scheme.
Construct the stable vendor managed inventory partnership through a profit-sharing approach
NASA Astrophysics Data System (ADS)
Li, S.; Yu, Z.; Dong, M.
2015-01-01
In real life, the vendor managed inventory (VMI) model is not always a stable supply chain partnership. This paper proposes a cooperative game based profit-sharing method to stabilize the VMI partnership. Specifically, in a B2C setting, we consider a VMI program including a manufacturer and multiple online retailers. The manufacturer provides the finished product at the equal wholesale price to multiple online retailers. The online retailers face the same customer demand information. We offer the model to compute the increased profits generated by information sharing for total possible VMI coalitions. Using the solution concept of Shapley value, the profit-sharing scheme is produced to fairly divide the total increased profits among the VMI members. We find that under a fair allocation scheme, the higher inventory cost of one VMI member increases the surplus of the other members. Furthermore, the manufacturer is glad to increase the size of VMI coalition, whereas, the retailers are delighted to limit the size of the alliance. Finally, the manufacturer can select the appropriate retailer to boost its surplus, which has no effect on the surplus of the other retailers. The numerical examples indicate that the grand coalition is stable under the proposed allocation scheme.
Moradi, Saber; Qiao, Ning; Stefanini, Fabio; Indiveri, Giacomo
2018-02-01
Neuromorphic computing systems comprise networks of neurons that use asynchronous events for both computation and communication. This type of representation offers several advantages in terms of bandwidth and power consumption in neuromorphic electronic systems. However, managing the traffic of asynchronous events in large scale systems is a daunting task, both in terms of circuit complexity and memory requirements. Here, we present a novel routing methodology that employs both hierarchical and mesh routing strategies and combines heterogeneous memory structures for minimizing both memory requirements and latency, while maximizing programming flexibility to support a wide range of event-based neural network architectures, through parameter configuration. We validated the proposed scheme in a prototype multicore neuromorphic processor chip that employs hybrid analog/digital circuits for emulating synapse and neuron dynamics together with asynchronous digital circuits for managing the address-event traffic. We present a theoretical analysis of the proposed connectivity scheme, describe the methods and circuits used to implement such scheme, and characterize the prototype chip. Finally, we demonstrate the use of the neuromorphic processor with a convolutional neural network for the real-time classification of visual symbols being flashed to a dynamic vision sensor (DVS) at high speed.
Appropriate technology for domestic wastewater management in under-resourced regions of the world
NASA Astrophysics Data System (ADS)
Oladoja, Nurudeen Abiola
2017-11-01
Centralized wastewater management system is the modern day waste management practice, but the high cost and stringent requirements for the construction and operation have made it less attractive in the under-resourced regions of the world. Considering these challenges, the use of decentralized wastewater management system, on-site treatment system, as an appropriate technology for domestic wastewater treatment is hereby advocated. Adopting this technology helps save money, protects home owners' investment, promotes better watershed management, offers an appropriate solution for low-density communities, provides suitable alternatives for varying site conditions and furnishes effective solutions for ecologically sensitive areas. In the light of this, an overview of the on-site treatment scheme, at the laboratory scale, pilot study stage, and field trials was conducted to highlight the operational principles' strength and shortcomings of the scheme. The operational requirements for the establishing and operation of the scheme and best management practice to enhance the performance and sustenance were proffered.
Cofie, Patience; De Allegri, Manuela; Kouyaté, Bocar; Sauerborn, Rainer
2013-01-01
Objective The study analysed the effect of Information, Education, and Communication (IEC) campaign activities on the adoption of a community-based health insurance (CHI) scheme in Nouna, Burkina Faso. It also identified the factors that enhanced or limited the campaign's effectiveness. Design Complementary data collection approaches were used. A survey was conducted with 250 randomly selected household heads, followed by in-depth interviews with 22 purposively selected community leaders, group discussions with the project management team, and field observations. Bivariate analysis and multivariate logistic regression models were used to assess the association between household exposure to campaign and acquisition of knowledge as well as household exposure to campaign and enrolment. Results The IEC campaign had a positive effect on households’ knowledge about the CHI and to a lesser extent on household enrolment in the scheme. The effectiveness of the IEC strategy was mainly influenced by: (1) frequent and consistent IEC messages from multiple media channels (mass and interpersonal channels), including the radio, a mobile information van, and CHI team, and (2) community heads’ participation in the CHI scheme promotion. Education was the only significantly influential socio-demographic determinant of knowledge and enrolment among household heads. The relatively low effects of the IEC campaign on CHI enrolment are indicative of other important IEC mediating factors, which should be taken into account in future CHI campaign evaluation. Conclusion The study concludes that an IEC campaign is crucial to improving the understanding of the CHI scheme concept, which is an enabler to enrolment, and should be integrated into scheme designs and evaluations. PMID:24314344
Cofie, Patience; De Allegri, Manuela; Kouyaté, Bocar; Sauerborn, Rainer
2013-12-06
The study analysed the effect of Information, Education, and Communication (IEC) campaign activities on the adoption of a community-based health insurance (CHI) scheme in Nouna, Burkina Faso. It also identified the factors that enhanced or limited the campaign's effectiveness. Complementary data collection approaches were used. A survey was conducted with 250 randomly selected household heads, followed by in-depth interviews with 22 purposively selected community leaders, group discussions with the project management team, and field observations. Bivariate analysis and multivariate logistic regression models were used to assess the association between household exposure to campaign and acquisition of knowledge as well as household exposure to campaign and enrolment. The IEC campaign had a positive effect on households' knowledge about the CHI and to a lesser extent on household enrolment in the scheme. The effectiveness of the IEC strategy was mainly influenced by: (1) frequent and consistent IEC messages from multiple media channels (mass and interpersonal channels), including the radio, a mobile information van, and CHI team, and (2) community heads' participation in the CHI scheme promotion. Education was the only significantly influential socio-demographic determinant of knowledge and enrolment among household heads. The relatively low effects of the IEC campaign on CHI enrolment are indicative of other important IEC mediating factors, which should be taken into account in future CHI campaign evaluation. The study concludes that an IEC campaign is crucial to improving the understanding of the CHI scheme concept, which is an enabler to enrolment, and should be integrated into scheme designs and evaluations.
Devolved School Management in Tayside Region. Research Report Series.
ERIC Educational Resources Information Center
Wilson, Valerie; And Others
This report contains findings of an evaluation of the first phase of Tayside Region's (Scotland) Devolved School Management (DSM) scheme. The evaluation sought to evaluate the first phase of implementation and to suggest ways in which the scheme and accompanying training might be improved. Sixty schools chose to participate in the first phase,…
Predictive Modeling of Risk Associated with Temperature Extremes over Continental US
NASA Astrophysics Data System (ADS)
Kravtsov, S.; Roebber, P.; Brazauskas, V.
2016-12-01
We build an extremely statistically accurate, essentially bias-free empirical emulator of atmospheric surface temperature and apply it for meteorological risk assessment over the domain of continental US. The resulting prediction scheme achieves an order-of-magnitude or larger gain of numerical efficiency compared with the schemes based on high-resolution dynamical atmospheric models, leading to unprecedented accuracy of the estimated risk distributions. The empirical model construction methodology is based on our earlier work, but is further modified to account for the influence of large-scale, global climate change on regional US weather and climate. The resulting estimates of the time-dependent, spatially extended probability of temperature extremes over the simulation period can be used as a risk management tool by insurance companies and regulatory governmental agencies.
Development of a DC-DC conversion powering scheme for the CMS Phase-1 pixel upgrade
NASA Astrophysics Data System (ADS)
Feld, L.; Fimmers, C.; Karpinski, W.; Klein, K.; Lipinski, M.; Preuten, M.; Rauch, M.; Rittich, D.; Sammet, J.; Wlochal, M.
2014-01-01
A novel powering scheme based on the DC-DC conversion technique will be exploited to power the CMS Phase-1 pixel detector. DC-DC buck converters for the CMS pixel project have been developed, based on the AMIS5 ASIC designed by CERN. The powering system of the Phase-1 pixel detector is described and the performance of the converter prototypes is detailed, including power efficiency, stability of the output voltage, shielding, and thermal management. Results from a test of the magnetic field tolerance of the DC-DC converters are reported. System tests with pixel modules using many components of the future pixel barrel system are summarized. Finally first impressions from a pre-series of 200 DC-DC converters are presented.
Benchmarking and the laboratory
Galloway, M; Nadin, L
2001-01-01
This article describes how benchmarking can be used to assess laboratory performance. Two benchmarking schemes are reviewed, the Clinical Benchmarking Company's Pathology Report and the College of American Pathologists' Q-Probes scheme. The Clinical Benchmarking Company's Pathology Report is undertaken by staff based in the clinical management unit, Keele University with appropriate input from the professional organisations within pathology. Five annual reports have now been completed. Each report is a detailed analysis of 10 areas of laboratory performance. In this review, particular attention is focused on the areas of quality, productivity, variation in clinical practice, skill mix, and working hours. The Q-Probes scheme is part of the College of American Pathologists programme in studies of quality assurance. The Q-Probes scheme and its applicability to pathology in the UK is illustrated by reviewing two recent Q-Probe studies: routine outpatient test turnaround time and outpatient test order accuracy. The Q-Probes scheme is somewhat limited by the small number of UK laboratories that have participated. In conclusion, as a result of the government's policy in the UK, benchmarking is here to stay. Benchmarking schemes described in this article are one way in which pathologists can demonstrate that they are providing a cost effective and high quality service. Key Words: benchmarking • pathology PMID:11477112
Water management challenges at Mushandike irrigation scheme in Runde catchment, Zimbabwe
NASA Astrophysics Data System (ADS)
Malanco, Jose A.; Makurira, Hodson; Kaseke, Evans; Gumindoga, Webster
2018-05-01
Mushandike Irrigation Scheme, constructed in 1939, is located in Masvingo District and is one of the oldest irrigation schemes in Zimbabwe. Since 2002, the scheme has experienced severe water shortages resulting in poor crop yields. The low crop yields have led to loss of income to the smallholder farmers who constitute the irrigation scheme leading to water conflicts. The water stress at the scheme has been largely attributed to climate change and the uncontrolled expansion of the land under irrigation which is currently about 1000 ha against a design area of 613 ha. This study sought to determine the actual causes of water shortage at Mushandike Irrigation Scheme. Hydro-climatic data was analysed to establish if the Mushandike River system generates enough water to guarantee the calculated annual yield of the dam. Irrigation demands and efficiencies were compared against water availability and dam releases to establish if there is any deficit. The Spearman's Rank Correlation results of 0.196 for rainfall and 0.48 for evaporation confirmed positive but insignificant long-term changes in hydro-climatic conditions in the catchment. Water budgets established that the yield of the dam of 9.2 × 106 m3 year-1 is sufficient to support the expanded area of 1000 ha provided in-field water management efficiencies are adopted. The study concludes that water shortages currently experienced at the scheme are a result of inefficient water management (e.g. over-abstraction from the dam beyond the firm yield, adoption of inefficient irrigation methods and high channel losses in the canal system) and are not related to hydro-climatic conditions. The study also sees no value in considering inter-basin water transfer to cushion the losses being experienced at the scheme.
Combatting Pilot Attrition in the USAF in the 1990s
1990-05-01
Air Weaoons Control Officer, would oe a Watch Officer on an Air Base Operations staff. The last c’ass oz oosition is designated as an ANY position...which the 1OC belonqs. a oortion of the ANf positions designated by manning formulas devised by the Directorate in charge of Production Control and...also controls pDroouction and promotion quotas. it is the "sine ous non ’ for the Career Managers. Their management scheme is driven o’, the mismatch
Ethernet ring protection with managed FDB using APS payload
NASA Astrophysics Data System (ADS)
Im, Jinsung; Ryoo, Jeong-dong; Joo, Bheom Soon; Rhee, J.-K. Kevin
2007-11-01
Ethernet ring protection (ERP) is a new technology based on OAM (operations, administration, and maintenance) being standardized by the ITU-T G.8032 working group. In this paper, we present the recent development of Ethernet ring protection which is called FDB (filtering database) flush scheme and propose a new Ethernet ring protection technique introducing a managed FDB using APS to deliver information how to fix FDB selectively. We discuss the current development of the ERP technology at ITU-T and performance comparisons between different proposals.
Matching soil salinization and cropping systems in communally managed irrigation schemes
NASA Astrophysics Data System (ADS)
Malota, Mphatso; Mchenga, Joshua
2018-03-01
Occurrence of soil salinization in irrigation schemes can be a good indicator to introduce high salt tolerant crops in irrigation schemes. This study assessed the level of soil salinization in a communally managed 233 ha Nkhate irrigation scheme in the Lower Shire Valley region of Malawi. Soil samples were collected within the 0-0.4 m soil depth from eight randomly selected irrigation blocks. Irrigation water samples were also collected from five randomly selected locations along the Nkhate River which supplies irrigation water to the scheme. Salinity of both the soil and the irrigation water samples was determined using an electrical conductivity (EC) meter. Analysis of the results indicated that even for very low salinity tolerant crops (ECi < 2 dS/m), the irrigation water was suitable for irrigation purposes. However, root-zone soil salinity profiles depicted that leaching of salts was not adequate and that the leaching requirement for the scheme needs to be relooked and always be adhered to during irrigation operation. The study concluded that the crop system at the scheme needs to be adjusted to match with prevailing soil and irrigation water salinity levels.
Linear triangular optimization technique and pricing scheme in residential energy management systems
NASA Astrophysics Data System (ADS)
Anees, Amir; Hussain, Iqtadar; AlKhaldi, Ali Hussain; Aslam, Muhammad
2018-06-01
This paper presents a new linear optimization algorithm for power scheduling of electric appliances. The proposed system is applied in a smart home community, in which community controller acts as a virtual distribution company for the end consumers. We also present a pricing scheme between community controller and its residential users based on real-time pricing and likely block rates. The results of the proposed optimization algorithm demonstrate that by applying the anticipated technique, not only end users can minimise the consumption cost, but it can also reduce the power peak to an average ratio which will be beneficial for the utilities as well.
Organization and management of heterogeneous, dispersed data bases in nuclear engineering
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eastman, C.M.
1986-01-01
Large, complex, multiperson engineering projects in many areas, nuclear, aerospace, electronics, and manufacturing, have inherent needs for coordination, control, and management of the related engineering data. Taken in the abstract, the notion of an integrated engineering data base (IED) for such projects is attractive. The potential capabilities of an (IED) are that all data are managed in a coordinated way, are made accessible to all users who need it, allow relations between all parts of the data to be tracked and managed, provide backup, recovery, audit trails, security and access control, and allow overall project status to be monitored andmore » managed. Common data accessing schemes and user interfaces to applications are also part of an IED. This paper describes a new software product that allows incremental realization of many of the capabilities of an IED, without the massive disruption and risk.« less
[Disease management programs from a health insurer's point of view].
Szymkowiak, Christof; Walkenhorst, Karen; Straub, Christoph
2003-06-01
Disease Management Programmes represent a great challenge to the German statutory health insurance system. According to politicians, disease management programmes are an appropriate tool for increasing the level of care for chronically ill patients significantly, while at the same time they can slow down the cost explosion in health care. The statutory health insurers' point of view yields a more refined picture of the chances and risks involved. The chances are that a medical guideline-based, evidence-based, co-operative care of the chronically ill could be established. But also, there are the risks of misuse of disease management programmes and of misallocation of funds due to the ill-advised linkage with the so-called risk compensation scheme (RSA) balancing the sickness funds' structural deficits through redistribution. The nation-wide introduction of disease management programmes appears to be a gigantic experiment whose aim is to change the care of chronically ill patients and whose outcome is unpredictable.
NASA Astrophysics Data System (ADS)
Zhang, Hongtao; Wang, Pengfei
2012-06-01
The current schemes of detecting the status of passengers in airplanes cannot satisfy the more strict regulations recently released by the United States Transportation Security Administration. In basis of investigation on the current seat occupancy sensors for vehicles, in this paper we present a novel scheme of seat occupancy sensors based on Fiber Bragg Grating technology to improve the in-flight security of airplanes. This seat occupancy sensor system can be used to detect the status of passengers and to trigger the airbags to control the inflation of air bags, which have been installed in the airplanes of some major airlines under the new law. This scheme utilizes our previous research results of Weight-In- Motion sensor system based on optical fiber Bragg grating. In contrast to the current seat occupancy sensors for vehicles, this new seat occupancy sensor has so many merits that it is very suitable to be applied in aerospace industry or high speed railway system. Moreover, combined with existing Fiber Bragg Grating strain or temperature sensor systems built in airplanes, this proposed method can construct a complete airline passenger management system.
Planning Framework for Mesolevel Optimization of Urban Runoff Control Schemes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhou, Qianqian; Blohm, Andrew; Liu, Bo
A planning framework is developed to optimize runoff control schemes at scales relevant for regional planning at an early stage. The framework employs less sophisticated modeling approaches to allow a practical application in developing regions with limited data sources and computing capability. The methodology contains three interrelated modules: (1)the geographic information system (GIS)-based hydrological module, which aims at assessing local hydrological constraints and potential for runoff control according to regional land-use descriptions; (2)the grading module, which is built upon the method of fuzzy comprehensive evaluation. It is used to establish a priority ranking system to assist the allocation of runoffmore » control targets at the subdivision level; and (3)the genetic algorithm-based optimization module, which is included to derive Pareto-based optimal solutions for mesolevel allocation with multiple competing objectives. The optimization approach describes the trade-off between different allocation plans and simultaneously ensures that all allocation schemes satisfy the minimum requirement on runoff control. Our results highlight the importance of considering the mesolevel allocation strategy in addition to measures at macrolevels and microlevels in urban runoff management. (C) 2016 American Society of Civil Engineers.« less
Integration of hybrid wireless networks in cloud services oriented enterprise information systems
NASA Astrophysics Data System (ADS)
Li, Shancang; Xu, Lida; Wang, Xinheng; Wang, Jue
2012-05-01
This article presents a hybrid wireless network integration scheme in cloud services-based enterprise information systems (EISs). With the emerging hybrid wireless networks and cloud computing technologies, it is necessary to develop a scheme that can seamlessly integrate these new technologies into existing EISs. By combining the hybrid wireless networks and computing in EIS, a new framework is proposed, which includes frontend layer, middle layer and backend layers connected to IP EISs. Based on a collaborative architecture, cloud services management framework and process diagram are presented. As a key feature, the proposed approach integrates access control functionalities within the hybrid framework that provide users with filtered views on available cloud services based on cloud service access requirements and user security credentials. In future work, we will implement the proposed framework over SwanMesh platform by integrating the UPnP standard into an enterprise information system.
An Efficient Method for Detecting Misbehaving Zone Manager in MANET
NASA Astrophysics Data System (ADS)
Rafsanjani, Marjan Kuchaki; Pakzad, Farzaneh; Asadinia, Sanaz
In recent years, one of the wireless technologies increased tremendously is mobile ad hoc networks (MANETs) in which mobile nodes organize themselves without the help of any predefined infrastructure. MANETs are highly vulnerable to attack due to the open medium, dynamically changing network topology, cooperative algorithms, lack of centralized monitoring, management point and lack of a clear defense line. In this paper, we report our progress in developing intrusion detection (ID) capabilities for MANET. In our proposed scheme, the network with distributed hierarchical architecture is partitioned into zones, so that in each of them there is one zone manager. The zone manager is responsible for monitoring the cluster heads in its zone and cluster heads are in charge of monitoring their members. However, the most important problem is how the trustworthiness of the zone manager can be recognized. So, we propose a scheme in which "honest neighbors" of zone manager specify the validation of their zone manager. These honest neighbors prevent false accusations and also allow manager if it is wrongly misbehaving. However, if the manger repeats its misbehavior, then it will lose its management degree. Therefore, our scheme will be improved intrusion detection and also provide a more reliable network.
The potential of financial incentives to enhance householders' kerbside recycling behaviour.
Shaw, P J; Maynard, S J
2008-01-01
Although the successful enhancement of householders' participation in kerbside recycling schemes is essential for household waste recycling schemes to reach their desired levels of achievement, our understanding of householders' responses to the various incentives available to waste managers is incomplete. In particular, whether and how the recycling behaviour of householders may be favourably altered through imposition of financial penalties or rewards is not fully understood. Surveys of householders' attitudes in the London Borough of Havering, served by a kerbside co-mingled survival bag recycling scheme, showed they might be better encouraged to recycle more through improvements to structural and promotional aspects of the recycling scheme than through imposition of financial incentives. If financial incentives were to be imposed to enhance kerbside recycling, householders preferred: (1) rewards to penalties, and (2) community-based rewards and local taxation rebates to other or individual rewards. Given the attitudes of householders and the resources that would be needed to monitor their recycling behaviour as a basis for delivering financial incentives, it is suggested that the priority for enhancing recycling should be to make appropriate improvements in the infrastructure and support of the kerbside scheme and service.
Ecosystem services as a common language for coastal ecosystem-based management.
Granek, Elise F; Polasky, Stephen; Kappel, Carrie V; Reed, Denise J; Stoms, David M; Koch, Evamaria W; Kennedy, Chris J; Cramer, Lori A; Hacker, Sally D; Barbier, Edward B; Aswani, Shankar; Ruckelshaus, Mary; Perillo, Gerardo M E; Silliman, Brian R; Muthiga, Nyawira; Bael, David; Wolanski, Eric
2010-02-01
Ecosystem-based management is logistically and politically challenging because ecosystems are inherently complex and management decisions affect a multitude of groups. Coastal ecosystems, which lie at the interface between marine and terrestrial ecosystems and provide an array of ecosystem services to different groups, aptly illustrate these challenges. Successful ecosystem-based management of coastal ecosystems requires incorporating scientific information and the knowledge and views of interested parties into the decision-making process. Estimating the provision of ecosystem services under alternative management schemes offers a systematic way to incorporate biogeophysical and socioeconomic information and the views of individuals and groups in the policy and management process. Employing ecosystem services as a common language to improve the process of ecosystem-based management presents both benefits and difficulties. Benefits include a transparent method for assessing trade-offs associated with management alternatives, a common set of facts and common currency on which to base negotiations, and improved communication among groups with competing interests or differing worldviews. Yet challenges to this approach remain, including predicting how human interventions will affect ecosystems, how such changes will affect the provision of ecosystem services, and how changes in service provision will affect the welfare of different groups in society. In a case study from Puget Sound, Washington, we illustrate the potential of applying ecosystem services as a common language for ecosystem-based management.
PCM-Based Durable Write Cache for Fast Disk I/O
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, Zhuo; Wang, Bin; Carpenter, Patrick
2012-01-01
Flash based solid-state devices (FSSDs) have been adopted within the memory hierarchy to improve the performance of hard disk drive (HDD) based storage system. However, with the fast development of storage-class memories, new storage technologies with better performance and higher write endurance than FSSDs are emerging, e.g., phase-change memory (PCM). Understanding how to leverage these state-of-the-art storage technologies for modern computing systems is important to solve challenging data intensive computing problems. In this paper, we propose to leverage PCM for a hybrid PCM-HDD storage architecture. We identify the limitations of traditional LRU caching algorithms for PCM-based caches, and develop amore » novel hash-based write caching scheme called HALO to improve random write performance of hard disks. To address the limited durability of PCM devices and solve the degraded spatial locality in traditional wear-leveling techniques, we further propose novel PCM management algorithms that provide effective wear-leveling while maximizing access parallelism. We have evaluated this PCM-based hybrid storage architecture using applications with a diverse set of I/O access patterns. Our experimental results demonstrate that the HALO caching scheme leads to an average reduction of 36.8% in execution time compared to the LRU caching scheme, and that the SFC wear leveling extends the lifetime of PCM by a factor of 21.6.« less
Havens: Explicit Reliable Memory Regions for HPC Applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hukerikar, Saurabh; Engelmann, Christian
2016-01-01
Supporting error resilience in future exascale-class supercomputing systems is a critical challenge. Due to transistor scaling trends and increasing memory density, scientific simulations are expected to experience more interruptions caused by transient errors in the system memory. Existing hardware-based detection and recovery techniques will be inadequate to manage the presence of high memory fault rates. In this paper we propose a partial memory protection scheme based on region-based memory management. We define the concept of regions called havens that provide fault protection for program objects. We provide reliability for the regions through a software-based parity protection mechanism. Our approach enablesmore » critical program objects to be placed in these havens. The fault coverage provided by our approach is application agnostic, unlike algorithm-based fault tolerance techniques.« less
Simulation of the Australian Mobilesat signalling scheme
NASA Technical Reports Server (NTRS)
Rahman, Mushfiqur
1990-01-01
The proposed Australian Mobilesat system will provide a range of circuit switched voice/data services using the B-series satellites. The reliability of the signalling scheme between the Network Management Station (NMS) and the mobile terminal (MT) is of critical importance to the performance of the overall system. Simulation results of the performance of the signalling scheme under various channel conditions and coding schemes are presented.
Defence Technology Strategy for the Demands of the 21st Century
2006-10-01
understanding of human capability in the CBM role. Ownership of the intellectual property behind algorithms may be sovereign10, but implementation will...synchronisation schemes. · coding schemes. · modulation techniques. · access schemes. · smart spectrum usage . · low probability of intercept. · implementation...modulation techniques; access schemes; smart spectrum usage ; low probability of intercept Spectrum and bandwidth management · cross layer technologies to
Liu, Jie; Guo, Liang; Jiang, Jiping; Jiang, Dexun; Wang, Peng
2017-01-01
In the emergency management relevant to chemical contingency spills, efficiency emergency rescue can be deeply influenced by a reasonable assignment of the available emergency materials to the related risk sources. In this study, an emergency material scheduling model (EMSM) with time-effective and cost-effective objectives is developed to coordinate both allocation and scheduling of the emergency materials. Meanwhile, an improved genetic algorithm (IGA) which includes a revision operation for EMSM is proposed to identify the emergency material scheduling schemes. Then, scenario analysis is used to evaluate optimal emergency rescue scheme under different emergency pollution conditions associated with different threat degrees based on analytic hierarchy process (AHP) method. The whole framework is then applied to a computational experiment based on south-to-north water transfer project in China. The results demonstrate that the developed method not only could guarantee the implementation of the emergency rescue to satisfy the requirements of chemical contingency spills but also help decision makers identify appropriate emergency material scheduling schemes in a balance between time-effective and cost-effective objectives.
The Effect of Funding Scheme on the Performance of Navy Repair Activities
2005-03-01
and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project... managed to wedge in a thesis review along with his fiscal year end frenzy. The author would also like to thank his wonderful wife, Rita, for the extra...a funding scheme called Navy Working Capital Fund while others in the same region were under the Resource Management System (also referred to as
A Resource Management Tool for Implementing Strategic Direction in an Academic Department
ERIC Educational Resources Information Center
Ringwood, John V.; Devitt, Frank; Doherty, Sean; Farrell, Ronan; Lawlor, Bob; McLoone, Sean C.; McLoone, Seamus F.; Rogers, Alan; Villing, Rudi; Ward, Tomas
2005-01-01
This paper reports on a load balancing system for an academic department, which can be used as an implementation mechanism for strategic planning. In essence, it consists of weighting each activity within the department and performing workload allocation based on this transparent scheme. The experience to date has been very positive, in terms of…
ERIC Educational Resources Information Center
Visser, Alderik
2010-01-01
Some bilingual secondary schools in the Netherlands have introduced or are introducing the International Baccalaureate (IB) Middle Years Programme (MYP).The implementation of this international scheme at (semi-) public national Dutch schools proves anything but unproblematic. Based on a series of questionnaires filled out by school managers and…
Adaptive Packet Combining Scheme in Three State Channel Model
NASA Astrophysics Data System (ADS)
Saring, Yang; Bulo, Yaka; Bhunia, Chandan Tilak
2018-01-01
The two popular techniques of packet combining based error correction schemes are: Packet Combining (PC) scheme and Aggressive Packet Combining (APC) scheme. PC scheme and APC scheme have their own merits and demerits; PC scheme has better throughput than APC scheme, but suffers from higher packet error rate than APC scheme. The wireless channel state changes all the time. Because of this random and time varying nature of wireless channel, individual application of SR ARQ scheme, PC scheme and APC scheme can't give desired levels of throughput. Better throughput can be achieved if appropriate transmission scheme is used based on the condition of channel. Based on this approach, adaptive packet combining scheme has been proposed to achieve better throughput. The proposed scheme adapts to the channel condition to carry out transmission using PC scheme, APC scheme and SR ARQ scheme to achieve better throughput. Experimentally, it was observed that the error correction capability and throughput of the proposed scheme was significantly better than that of SR ARQ scheme, PC scheme and APC scheme.
Xiao, Nanzi; Long, Qian; Tang, Xiaojun; Tang, Shenglan
2014-01-01
Paralleled with the rapid socio-economic development and demographic transition, an epidemic of non-communicable chronic diseases (NCDs) has emerged in China over the past three decades, resulting in increased disease and economic burdens. Over the past decade, with a political commitment of implementing universal health coverage, China has strengthened its primary healthcare system and increased investment in public health interventions. A community-based approach to address NCDs has been acknowledged and recognized as one of the most cost-effective solutions. Community-based strategies include: financial and health administrative support; social mobilization; community health education and promotion; and the use of community health centers in NCD detection, diagnosis, treatment, and patient management. Although China has made good progress in developing and implementing these strategies and policies for NCD prevention and control, many challenges remain. There are a lack of appropriately qualified health professionals at grass-roots health facilities; it is difficult to retain professionals at that level; there is insufficient public funding for NCD care and management; and NCD patients are economically burdened due to limited benefit packages covering NCD treatment offered by health insurance schemes. To tackle these challenges we propose developing appropriate human resource policies to attract greater numbers of qualified health professionals at the primary healthcare level; adjusting the service benefit packages to encourage the use of community-based health services; and increase government investment in public health interventions, as well as investing more on health insurance schemes.
NASA Astrophysics Data System (ADS)
Khawaja, Taimoor Saleem
A high-belief low-overhead Prognostics and Health Management (PHM) system is desired for online real-time monitoring of complex non-linear systems operating in a complex (possibly non-Gaussian) noise environment. This thesis presents a Bayesian Least Squares Support Vector Machine (LS-SVM) based framework for fault diagnosis and failure prognosis in nonlinear non-Gaussian systems. The methodology assumes the availability of real-time process measurements, definition of a set of fault indicators and the existence of empirical knowledge (or historical data) to characterize both nominal and abnormal operating conditions. An efficient yet powerful Least Squares Support Vector Machine (LS-SVM) algorithm, set within a Bayesian Inference framework, not only allows for the development of real-time algorithms for diagnosis and prognosis but also provides a solid theoretical framework to address key concepts related to classification for diagnosis and regression modeling for prognosis. SVM machines are founded on the principle of Structural Risk Minimization (SRM) which tends to find a good trade-off between low empirical risk and small capacity. The key features in SVM are the use of non-linear kernels, the absence of local minima, the sparseness of the solution and the capacity control obtained by optimizing the margin. The Bayesian Inference framework linked with LS-SVMs allows a probabilistic interpretation of the results for diagnosis and prognosis. Additional levels of inference provide the much coveted features of adaptability and tunability of the modeling parameters. The two main modules considered in this research are fault diagnosis and failure prognosis. With the goal of designing an efficient and reliable fault diagnosis scheme, a novel Anomaly Detector is suggested based on the LS-SVM machines. The proposed scheme uses only baseline data to construct a 1-class LS-SVM machine which, when presented with online data is able to distinguish between normal behavior and any abnormal or novel data during real-time operation. The results of the scheme are interpreted as a posterior probability of health (1 - probability of fault). As shown through two case studies in Chapter 3, the scheme is well suited for diagnosing imminent faults in dynamical non-linear systems. Finally, the failure prognosis scheme is based on an incremental weighted Bayesian LS-SVR machine. It is particularly suited for online deployment given the incremental nature of the algorithm and the quick optimization problem solved in the LS-SVR algorithm. By way of kernelization and a Gaussian Mixture Modeling (GMM) scheme, the algorithm can estimate "possibly" non-Gaussian posterior distributions for complex non-linear systems. An efficient regression scheme associated with the more rigorous core algorithm allows for long-term predictions, fault growth estimation with confidence bounds and remaining useful life (RUL) estimation after a fault is detected. The leading contributions of this thesis are (a) the development of a novel Bayesian Anomaly Detector for efficient and reliable Fault Detection and Identification (FDI) based on Least Squares Support Vector Machines, (b) the development of a data-driven real-time architecture for long-term Failure Prognosis using Least Squares Support Vector Machines, (c) Uncertainty representation and management using Bayesian Inference for posterior distribution estimation and hyper-parameter tuning, and finally (d) the statistical characterization of the performance of diagnosis and prognosis algorithms in order to relate the efficiency and reliability of the proposed schemes.
NASA Astrophysics Data System (ADS)
Kim, Seong-Whan; Suthaharan, Shan; Lee, Heung-Kyu; Rao, K. R.
2001-01-01
Quality of Service (QoS)-guarantee in real-time communication for multimedia applications is significantly important. An architectural framework for multimedia networks based on substreams or flows is effectively exploited for combining source and channel coding for multimedia data. But the existing frame by frame approach which includes Moving Pictures Expert Group (MPEG) cannot be neglected because it is a standard. In this paper, first, we designed an MPEG transcoder which converts an MPEG coded stream into variable rate packet sequences to be used for our joint source/channel coding (JSCC) scheme. Second, we designed a classification scheme to partition the packet stream into multiple substreams which have their own QoS requirements. Finally, we designed a management (reservation and scheduling) scheme for substreams to support better perceptual video quality such as the bound of end-to-end jitter. We have shown that our JSCC scheme is better than two other two popular techniques by simulation and real video experiments on the TCP/IP environment.
Control of parallel manipulators using force feedback
NASA Technical Reports Server (NTRS)
Nanua, Prabjot
1994-01-01
Two control schemes are compared for parallel robotic mechanisms actuated by hydraulic cylinders. One scheme, the 'rate based scheme', uses the position and rate information only for feedback. The second scheme, the 'force based scheme' feeds back the force information also. The force control scheme is shown to improve the response over the rate control one. It is a simple constant gain control scheme better suited to parallel mechanisms. The force control scheme can be easily modified for the dynamic forces on the end effector. This paper presents the results of a computer simulation of both the rate and force control schemes. The gains in the force based scheme can be individually adjusted in all three directions, whereas the adjustment in just one direction of the rate based scheme directly affects the other two directions.
CD-based image archival and management on a hybrid radiology intranet.
Cox, R D; Henri, C J; Bret, P M
1997-08-01
This article describes the design and implementation of a low-cost image archival and management solution on a radiology network consisting of UNIX, IBM personal computer-compatible (IBM, Purchase, NY) and Macintosh (Apple Computer, Cupertino, CA) workstations. The picture archiving and communications system (PACS) is modular, scaleable and conforms to the Digital Imaging and Communications in Medicine (DICOM) 3.0 standard for image transfer, storage and retrieval. Image data is made available on soft-copy reporting workstations by a work-flow management scheme and on desktop computers through a World Wide Web (WWW) interface. Data archival is based on recordable compact disc (CD) technology and is automated. The project has allowed the radiology department to eliminate the use of film in magnetic resonance (MR) imaging, computed tomography (CT) and ultrasonography.
Zeng, X T; Tong, Y F; Cui, L; Kong, X M; Sheng, Y N; Chen, L; Li, Y P
2017-07-15
In recent years, increscent emissions in the city of Beijing due to expanded population, accelerated industrialization and inter-regional pollutant transportation have led to hazardous atmospheric pollution issues. Although a number of anthropogenic control measures have been put into use, frequent/severe haze events have still challenged regional governments. In this study, a hybrid population-production-pollution nexus model (PPP) is proposed for air pollution management and air quality planning (AMP) with the aim to coordinate human activities and environmental protection. A fuzzy-stochastic mixed quadratic programming method (FSQ) is developed and introduced into a PPP for tackling atmospheric pollution issues with uncertainties. Based on the contribution of an index of population-production-pollution, a hybrid PPP-based AMP model that considers employment structure, industrial layout pattern, production mode, pollutant purification efficiency and a pollution mitigation scheme have been applied in Beijing. Results of the adjustment of employment structure, pollution mitigation scheme, and green gross domestic product under various environmental regulation scenarios are obtained and analyzed. This study can facilitate the identification of optimized policies for alleviating population-production-emission conflict in the study region, as well as ameliorating the hazardous air pollution crisis at an urban level. Copyright © 2017 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Bullimore, Blaise
2014-10-01
Management of anthropogenic activities that cause pressure on estuarine wildlife and biodiversity is beset by a wide range of challenges. Some, such as the differing environmental and socio-economic objectives and conflicting views and priorities, are common to many estuaries; others are site specific. The Carmarthen Bay and Estuaries European Marine Site encompasses four estuaries of European wildlife and conservation importance and considerable socio-economic value. The estuaries and their wildlife are subject to a range of pressures and threats and the statutory authorities responsible for management in and adjacent to the Site have developed a management scheme to address these. Preparation of the management scheme included an assessment of human activities known to occur in and adjacent to the Site for their potential to cause a threat to the designated habitats and species features, and identified actions the management authorities need to take to minimise or eliminate pressures and threats. To deliver the scheme the partner authorities need to accept the requirement for management actions and work together to achieve them. The Welsh Government also needs to work with these authorities because it is responsible for management of many of the most important pressure-causing activities. However, the absence of statutory obligations for partnership working has proved an impediment to successful management.
Key management schemes using routing information frames in secure wireless sensor networks
NASA Astrophysics Data System (ADS)
Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.
2017-01-01
The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.
NASA Astrophysics Data System (ADS)
Lobanova, Anastasia; Liersch, Stefan; Tàbara, J. David; Koch, Hagen; Hattermann, Fred F.; Krysanova, Valentina
2017-05-01
Conventional water management strategies, that serve solely socio-economic demands and neglect changing natural conditions of the river basins, face significant challenges in governing complex human-hydrological systems, especially in the areas with constrained water availability. In this study we assess the possibility to harmonize the inter-sectoral water allocation scheme within a highly altered human-hydrological system under reduction in water availability, triggered by projected climate change applying scenario-based approach. The Tagus River Basin headwaters, with significant disproportion in the water resources allocation between the environmental and socio-economic targets were taken as a perfect example of such system out of balance. We propose three different water allocation strategies for this region, including two conventional schemes and one imposing shift to sustainable water management and environmental restoration of the river. We combine in one integrated modelling framework the eco-hydrological process-based Soil and Water Integrated Model (SWIM), coupled with the conceptual reservoir and water allocation modules driven by the latest bias-corrected climate projections for the region and investigate possible water allocation scenarios in the region under constrained water availability in the future. Our results show that the socio-economic demands have to be re-considered and lowered under any water allocation strategy, as the climate impacts may significantly reduce water availability in the future. Further, we show that a shift to sustainable water management strategy and river restoration is possible even under reduced water availability. Finally, our results suggest that the adaptation of complex human-hydrological systems to climate change and a shift to a more sustainable water management are likely to be parts of one joint strategy to cope with climate change impacts.
NASA Astrophysics Data System (ADS)
Sun, Xinyao; Wang, Xue; Wu, Jiangwei; Liu, Youda
2014-05-01
Cyber physical systems(CPS) recently emerge as a new technology which can provide promising approaches to demand side management(DSM), an important capability in industrial power systems. Meanwhile, the manufacturing center is a typical industrial power subsystem with dozens of high energy consumption devices which have complex physical dynamics. DSM, integrated with CPS, is an effective methodology for solving energy optimization problems in manufacturing center. This paper presents a prediction-based manufacturing center self-adaptive energy optimization method for demand side management in cyber physical systems. To gain prior knowledge of DSM operating results, a sparse Bayesian learning based componential forecasting method is introduced to predict 24-hour electric load levels for specific industrial areas in China. From this data, a pricing strategy is designed based on short-term load forecasting results. To minimize total energy costs while guaranteeing manufacturing center service quality, an adaptive demand side energy optimization algorithm is presented. The proposed scheme is tested in a machining center energy optimization experiment. An AMI sensing system is then used to measure the demand side energy consumption of the manufacturing center. Based on the data collected from the sensing system, the load prediction-based energy optimization scheme is implemented. By employing both the PSO and the CPSO method, the problem of DSM in the manufacturing center is solved. The results of the experiment show the self-adaptive CPSO energy optimization method enhances optimization by 5% compared with the traditional PSO optimization method.
Predictive momentum management for the Space Station
NASA Technical Reports Server (NTRS)
Hatis, P. D.
1986-01-01
Space station control moment gyro momentum management is addressed by posing a deterministic optimization problem with a performance index that includes station external torque loading, gyro control torque demand, and excursions from desired reference attitudes. It is shown that a simple analytic desired attitude solution exists for all axes with pitch prescription decoupled, but roll and yaw coupled. Continuous gyro desaturation is shown to fit neatly into the scheme. Example results for pitch axis control of the NASA power tower Space Station are shown based on predictive attitude prescription. Control effector loading is shown to be reduced by this method when compared to more conventional momentum management techniques.
The research and implementation of PDM systems based on the .NET platform
NASA Astrophysics Data System (ADS)
Gao, Hong-li; Jia, Ying-lian; Yang, Ji-long; Jiang, Wei
2005-12-01
A new kind of PDM system scheme based on the .NET platform for solving application problems of the current PDM system applied in an enterprise is described. The key technologies of this system, such as .NET, Accessing Data, information processing, Web, ect., were discussed. The 3-tier architecture of a PDM system based on the C/S and B/S mixed mode was presented. In this system, all users share the same Database Server in order to ensure the coherence and safety of client data. ADO.NET leverages the power of XML to provide disconnected access to data, which frees the connection to be used by other clients. Using this approach, the system performance was improved. Moreover, the important function modules in a PDM system such as project management, product structure management and Document Management module were developed and realized.
Security-Enhanced Autonomous Network Management
NASA Technical Reports Server (NTRS)
Zeng, Hui
2015-01-01
Ensuring reliable communication in next-generation space networks requires a novel network management system to support greater levels of autonomy and greater awareness of the environment and assets. Intelligent Automation, Inc., has developed a security-enhanced autonomous network management (SEANM) approach for space networks through cross-layer negotiation and network monitoring, analysis, and adaptation. The underlying technology is bundle-based delay/disruption-tolerant networking (DTN). The SEANM scheme allows a system to adaptively reconfigure its network elements based on awareness of network conditions, policies, and mission requirements. Although SEANM is generically applicable to any radio network, for validation purposes it has been prototyped and evaluated on two specific networks: a commercial off-the-shelf hardware test-bed using Institute of Electrical Engineers (IEEE) 802.11 Wi-Fi devices and a military hardware test-bed using AN/PRC-154 Rifleman Radio platforms. Testing has demonstrated that SEANM provides autonomous network management resulting in reliable communications in delay/disruptive-prone environments.
Multi-stage robust scheme for citrus identification from high resolution airborne images
NASA Astrophysics Data System (ADS)
Amorós-López, Julia; Izquierdo Verdiguier, Emma; Gómez-Chova, Luis; Muñoz-Marí, Jordi; Zoilo Rodríguez-Barreiro, Jorge; Camps-Valls, Gustavo; Calpe-Maravilla, Javier
2008-10-01
Identification of land cover types is one of the most critical activities in remote sensing. Nowadays, managing land resources by using remote sensing techniques is becoming a common procedure to speed up the process while reducing costs. However, data analysis procedures should satisfy the accuracy figures demanded by institutions and governments for further administrative actions. This paper presents a methodological scheme to update the citrus Geographical Information Systems (GIS) of the Comunidad Valenciana autonomous region, Spain). The proposed approach introduces a multi-stage automatic scheme to reduce visual photointerpretation and ground validation tasks. First, an object-oriented feature extraction process is carried out for each cadastral parcel from very high spatial resolution (VHR) images (0.5m) acquired in the visible and near infrared. Next, several automatic classifiers (decision trees, multilayer perceptron, and support vector machines) are trained and combined to improve the final accuracy of the results. The proposed strategy fulfills the high accuracy demanded by policy makers by means of combining automatic classification methods with visual photointerpretation available resources. A level of confidence based on the agreement between classifiers allows us an effective management by fixing the quantity of parcels to be reviewed. The proposed methodology can be applied to similar problems and applications.
Smartphone-based secure authenticated session sharing in Internet of Personal Things
NASA Astrophysics Data System (ADS)
Krishnan, Ram; Ninglekhu, Jiwan
2015-03-01
In the context of password-based authentication, a user can only memorize limited number of usernames and passwords. They are generally referred to as user-credentials. Longer character length of passwords further adds complication in mastering them. The expansion of the Internet and our growing dependency on it, has made it almost impossible for us to handle the big pool of user-credentials. Using simple, same or similar passwords is considered a poor practice, as it can easily be compromised by password cracking tools and social engineering attacks. Therefore, a robust and painless technique to manage personal credentials for websites is desirable. In this paper, a novel technique for user-credentials management via a smart mobile device such as a smartphone in a local network is proposed. We present a secure user-credential management scheme in which user's account login (username) and password associated with websites domain name is saved into the mobile device's database using a mobile application. We develop a custom browser extension application for client and use it to import user's credentials linked with the corresponding website from the mobile device via the local Wi-Fi network connection. The browser extension imports and identifies the authentication credentials and pushes them into the target TextBox locations in the webpage, ready for the user to execute. This scheme is suitably demonstrated between two personal devices in a local network.
NASA Astrophysics Data System (ADS)
Susanto, Arif; Mulyono, Nur Budi
2018-02-01
The changes of environmental management system standards into the latest version, i.e. ISO 14001:2015, may cause a change on a data and information need in decision making and achieving the objectives in the organization coverage. Information management is the organization's responsibility to ensure that effectiveness and efficiency start from its creating, storing, processing and distribution processes to support operations and effective decision making activity in environmental performance management. The objective of this research was to set up an information management program and to adopt the technology as the supporting component of the program which was done by PTFI Concentrating Division so that it could be in line with the desirable organization objective in environmental management based on ISO 14001:2015 environmental management system standards. Materials and methods used covered technical aspects in information management, i.e. with web-based application development by using usage centered design. The result of this research showed that the use of Single Sign On gave ease to its user to interact further on the use of the environmental management system. Developing a web-based through creating entity relationship diagram (ERD) and information extraction by conducting information extraction which focuses on attributes, keys, determination of constraints. While creating ERD is obtained from relational database scheme from a number of database from environmental performances in Concentrating Division.
A Hardware-Supported Algorithm for Self-Managed and Choreographed Task Execution in Sensor Networks.
Bordel, Borja; Miguel, Carlos; Alcarria, Ramón; Robles, Tomás
2018-03-07
Nowadays, sensor networks are composed of a great number of tiny resource-constraint nodes, whose management is increasingly more complex. In fact, although collaborative or choreographic task execution schemes are which fit in the most perfect way with the nature of sensor networks, they are rarely implemented because of the high resource consumption of these algorithms (especially if networks include many resource-constrained devices). On the contrary, hierarchical networks are usually designed, in whose cusp it is included a heavy orchestrator with a remarkable processing power, being able to implement any necessary management solution. However, although this orchestration approach solves most practical management problems of sensor networks, a great amount of the operation time is wasted while nodes request the orchestrator to address a conflict and they obtain the required instructions to operate. Therefore, in this paper it is proposed a new mechanism for self-managed and choreographed task execution in sensor networks. The proposed solution considers only a lightweight gateway instead of traditional heavy orchestrators and a hardware-supported algorithm, which consume a negligible amount of resources in sensor nodes. The gateway avoids the congestion of the entire sensor network and the hardware-supported algorithm enables a choreographed task execution scheme, so no particular node is overloaded. The performance of the proposed solution is evaluated through numerical and electronic ModelSim-based simulations.
A Hardware-Supported Algorithm for Self-Managed and Choreographed Task Execution in Sensor Networks
2018-01-01
Nowadays, sensor networks are composed of a great number of tiny resource-constraint nodes, whose management is increasingly more complex. In fact, although collaborative or choreographic task execution schemes are which fit in the most perfect way with the nature of sensor networks, they are rarely implemented because of the high resource consumption of these algorithms (especially if networks include many resource-constrained devices). On the contrary, hierarchical networks are usually designed, in whose cusp it is included a heavy orchestrator with a remarkable processing power, being able to implement any necessary management solution. However, although this orchestration approach solves most practical management problems of sensor networks, a great amount of the operation time is wasted while nodes request the orchestrator to address a conflict and they obtain the required instructions to operate. Therefore, in this paper it is proposed a new mechanism for self-managed and choreographed task execution in sensor networks. The proposed solution considers only a lightweight gateway instead of traditional heavy orchestrators and a hardware-supported algorithm, which consume a negligible amount of resources in sensor nodes. The gateway avoids the congestion of the entire sensor network and the hardware-supported algorithm enables a choreographed task execution scheme, so no particular node is overloaded. The performance of the proposed solution is evaluated through numerical and electronic ModelSim-based simulations. PMID:29518986
2012-01-01
The purpose of this paper is to analyze the German diagnosis related groups (G-DRG) cost accounting scheme by assessing its resource allocation at hospital level and its tariff calculation at national level. First, the paper reviews and assesses the three steps in the G-DRG resource allocation scheme at hospital level: (1) the groundwork; (2) cost-center accounting; and (3) patient-level costing. Second, the paper reviews and assesses the three steps in G-DRG national tariff calculation: (1) plausibility checks; (2) inlier calculation; and (3) the “one hospital” approach. The assessment is based on the two main goals of G-DRG introduction: improving transparency and efficiency. A further empirical assessment attests high costing quality. The G-DRG cost accounting scheme shows high system quality in resource allocation at hospital level, with limitations concerning a managerially relevant full cost approach and limitations in terms of advanced activity-based costing at patient-level. However, the scheme has serious flaws in national tariff calculation: inlier calculation is normative, and the “one hospital” model causes cost bias, adjustment and representativeness issues. The G-DRG system was designed for reimbursement calculation, but developed to a standard with strategic management implications, generalized by the idea of adapting a hospital’s cost structures to DRG revenues. This combination causes problems in actual hospital financing, although resource allocation is advanced at hospital level. PMID:22935314
Vogl, Matthias
2012-08-30
The purpose of this paper is to analyze the German diagnosis related groups (G-DRG) cost accounting scheme by assessing its resource allocation at hospital level and its tariff calculation at national level. First, the paper reviews and assesses the three steps in the G-DRG resource allocation scheme at hospital level: (1) the groundwork; (2) cost-center accounting; and (3) patient-level costing. Second, the paper reviews and assesses the three steps in G-DRG national tariff calculation: (1) plausibility checks; (2) inlier calculation; and (3) the "one hospital" approach. The assessment is based on the two main goals of G-DRG introduction: improving transparency and efficiency. A further empirical assessment attests high costing quality. The G-DRG cost accounting scheme shows high system quality in resource allocation at hospital level, with limitations concerning a managerially relevant full cost approach and limitations in terms of advanced activity-based costing at patient-level. However, the scheme has serious flaws in national tariff calculation: inlier calculation is normative, and the "one hospital" model causes cost bias, adjustment and representativeness issues. The G-DRG system was designed for reimbursement calculation, but developed to a standard with strategic management implications, generalized by the idea of adapting a hospital's cost structures to DRG revenues. This combination causes problems in actual hospital financing, although resource allocation is advanced at hospital level.
NASA Technical Reports Server (NTRS)
Coffin, T.
1986-01-01
A dynamic pressure data base and data base management system developed to characterize the Space Shuttle Main Engine (SSME) dynamic pressure environment is described. The data base represents dynamic pressure measurements obtained during single engine hot firing tesets of the SSME. Software is provided to permit statistical evaluation of selected measurements under specified operating conditions. An interpolation scheme is also included to estimate spectral trends with SSME power level. Flow dynamic environments in high performance rocket engines are discussed.
NASA Technical Reports Server (NTRS)
Coffin, T.
1986-01-01
A dynamic pressure data base and data base management system developed to characterize the Space Shuttle Main Engine (SSME) dynamic pressure environment is reported. The data base represents dynamic pressure measurements obtained during single engine hot firing tests of the SSME. Software is provided to permit statistical evaluation of selected measurements under specified operating conditions. An interpolation scheme is included to estimate spectral trends with SSME power level. Flow Dynamic Environments in High Performance Rocket Engines are described.
Borghi, Josephine; Maluka, Stephen; Kuwawenaruwa, August; Makawia, Suzan; Tantau, Juma; Mtei, Gemini; Ally, Mariam; Macha, Jane
2013-06-13
The National Health Insurance Fund (NHIF), a compulsory formal sector scheme took over the management of the Community Health Fund (CHF), a voluntary informal sector scheme, in 2009. This study assesses the origins of the reform, its effect on management and reporting structures, financial flow adequacy, reform communication and acceptability to key stakeholders, and initial progress towards universal coverage. The study relied on national data sources and an in-depth collective case study of a rural and an urban district to assess awareness and acceptability of the reform, and fund availability and use relative to need in a sample of facilities. The reform was driven by a national desire to expand coverage and increase access to services. Despite initial delays, the CHF has been embedded within the NHIF organisational structure, bringing more intensive and qualified supervision closer to the district. National CHF membership has more than doubled. However, awareness of the reform was limited below the district level due to the reform's top-down nature. The reform was generally acceptable to key stakeholders, who expected that benefits between schemes would be harmonised.The reform was unable to institute changes to the CHF design or district management structures because it has so far been unable to change CHF legislation which also limits facility capacity to use CHF revenue. Further, revenue generated is currently insufficient to offset treatment and administration costs, and the reform did not improve the revenue to cost ratio. Administrative costs are also likely to have increased as a result of the reform. Informal sector schemes can benefit from merger with formal sector schemes through improved data systems, supervision, and management support. However, effects will be maximised if legal frameworks can be harmonised early on and a reduction in administrative costs is not guaranteed.
Lloyd, G C
1996-01-01
Contends that as techniques to motivate, empower and reward staff become ever more sophisticated and expensive, one of the most obvious, though overlooked, ways of tapping the creativity of employees is the suggestion scheme. A staff suggestion scheme may well be dismissed as a simplistic and outdated vehicle by proponents of modern management methods, but to its owners it can be like a classic model--needing just a little care and attention in order for it to run smoothly and at a very low cost. Proposes that readers should spare some time to consider introducing a suggestion scheme as an entry level initiative and a precursor to more sophisticated, elaborate and costly change management mechanisms.
New User Support in the University Network with DACS Scheme
ERIC Educational Resources Information Center
Odagiri, Kazuya; Yaegashi, Rihito; Tadauchi, Masaharu; Ishii, Naohiro
2007-01-01
Purpose: The purpose of this paper is to propose and examine the new user support in university network. Design/methodology/approach: The new user support is realized by use of DACS (Destination Addressing Control System) Scheme which manages a whole network system through communication control on a client computer. This DACS Scheme has been…
Communication Optimizations for a Wireless Distributed Prognostic Framework
NASA Technical Reports Server (NTRS)
Saha, Sankalita; Saha, Bhaskar; Goebel, Kai
2009-01-01
Distributed architecture for prognostics is an essential step in prognostic research in order to enable feasible real-time system health management. Communication overhead is an important design problem for such systems. In this paper we focus on communication issues faced in the distributed implementation of an important class of algorithms for prognostics - particle filters. In spite of being computation and memory intensive, particle filters lend well to distributed implementation except for one significant step - resampling. We propose new resampling scheme called parameterized resampling that attempts to reduce communication between collaborating nodes in a distributed wireless sensor network. Analysis and comparison with relevant resampling schemes is also presented. A battery health management system is used as a target application. A new resampling scheme for distributed implementation of particle filters has been discussed in this paper. Analysis and comparison of this new scheme with existing resampling schemes in the context for minimizing communication overhead have also been discussed. Our proposed new resampling scheme performs significantly better compared to other schemes by attempting to reduce both the communication message length as well as number total communication messages exchanged while not compromising prediction accuracy and precision. Future work will explore the effects of the new resampling scheme in the overall computational performance of the whole system as well as full implementation of the new schemes on the Sun SPOT devices. Exploring different network architectures for efficient communication is an importance future research direction as well.
An agent-based model for water management and planning in the Lake Naivasha basin, Kenya
NASA Astrophysics Data System (ADS)
van Oel, Pieter; Mulatu, Dawit; Odongo, Vincent; Onyando, Japheth; Becht, Robert; van der Veen, Anne
2013-04-01
A variety of human and natural processes influence the ecological and economic state of the Lake Naivasha basin. The ecological wealth and recent economic developments in the area are strongly connected to Lake Naivasha which supports a rich variety of flora, mammal and bird species. Many human activities depend on clean freshwater from the lake whereas recently the freshwater availability of good quality is seriously influenced by water abstractions and the use of fertilizers in agriculture. Management alternatives include those aiming at limiting water abstractions and fertilizer use. A possible way to achieve reduced use of water and fertilizers is the introduction of Payment for Environmental Services (PES) schemes. As the Lake Naivasha basin and its population have experienced increasing pressures various disputes and disagreements have arisen about the processes responsible for the problems experienced, and the effectively of management alternatives. Beside conflicts of interest and disagreements on responsibilities there are serious factual disagreements. To share scientific knowledge on the effects of the socio-ecological system processes on the Lake Naivasha basin, tools may be used that expose information at temporal and spatial scales that are meaningful to stakeholders. In this study we use a spatially-explicit agent-based modelling (ABM) approach to depict the interactions between socio-economic and natural subsystems for supporting a more sustainable governance of the river basin resources. Agents consider alternative livelihood strategies and decide to go for the one they perceive as likely to be most profitable. Agents may predict and sense the availability of resources and also can observe economic performance achieved by neighbouring agents. Results are presented at the basin and subbasin level to provide relevant knowledge to Water Resources Users Associations which are important collective forums for water management through which PES schemes are managed.
NASA Technical Reports Server (NTRS)
Baldwin, Rod
1994-01-01
In recent years there have been immense pressures to enact changes on the air traffic control organizations of most states. In addition, many of these states are or have been subject to great political, sociological and economic changes. Consequently, any new schemes must be considered within the context of national or even international changes. Europe has its own special problems, and many of these are particularly pertinent when considering human factors certification programs. Although these problems must also be considered in the wider context of change, it is usually very difficult to identify which forces are pressing in support of human factors aspects and which forces are resisting change. There are a large number of aspects which must be taken into account if human factors certification programs are to be successfully implemented. Certification programs would be new ventures, and like many new ventures it will be essential to ensure that managers have the skills, commitment and experience to manage the programs effectively. However, they must always be aware of the content and the degree of certainty to which the human factors principles can be applied - as Debons and Horne have carefully described. It will be essential to avoid the well known pitfalls which occur in the implementation of performance appraisal schemes. While most appraisal schemes are usually extremely well thought out, they often do not produce good results because they are not implemented properly and staff therefore do not have faith in them. If the manager does not have the commitment and interest in his/her staff as human beings, then the schemes will not be effective. Thus, one aspect of considering human factors certification schemes is within the context of a managed organization. This paper outlines some of the management factors which need to be considered for the air traffic control services. Many of the points received attention during the plenary sessions while others were covered by the working groups when the question arose of how various aspects of human factors certification programs would be managed. Management and organizational issues will certainly need to be included in any frame of reference by those who may be involved in developing certification programs.
Genetic algorithms with memory- and elitism-based immigrants in dynamic environments.
Yang, Shengxiang
2008-01-01
In recent years the genetic algorithm community has shown a growing interest in studying dynamic optimization problems. Several approaches have been devised. The random immigrants and memory schemes are two major ones. The random immigrants scheme addresses dynamic environments by maintaining the population diversity while the memory scheme aims to adapt genetic algorithms quickly to new environments by reusing historical information. This paper investigates a hybrid memory and random immigrants scheme, called memory-based immigrants, and a hybrid elitism and random immigrants scheme, called elitism-based immigrants, for genetic algorithms in dynamic environments. In these schemes, the best individual from memory or the elite from the previous generation is retrieved as the base to create immigrants into the population by mutation. This way, not only can diversity be maintained but it is done more efficiently to adapt genetic algorithms to the current environment. Based on a series of systematically constructed dynamic problems, experiments are carried out to compare genetic algorithms with the memory-based and elitism-based immigrants schemes against genetic algorithms with traditional memory and random immigrants schemes and a hybrid memory and multi-population scheme. The sensitivity analysis regarding some key parameters is also carried out. Experimental results show that the memory-based and elitism-based immigrants schemes efficiently improve the performance of genetic algorithms in dynamic environments.
Hu, X H; Li, Y P; Huang, G H; Zhuang, X W; Ding, X W
2016-05-01
In this study, a Bayesian-based two-stage inexact optimization (BTIO) method is developed for supporting water quality management through coupling Bayesian analysis with interval two-stage stochastic programming (ITSP). The BTIO method is capable of addressing uncertainties caused by insufficient inputs in water quality model as well as uncertainties expressed as probabilistic distributions and interval numbers. The BTIO method is applied to a real case of water quality management for the Xiangxi River basin in the Three Gorges Reservoir region to seek optimal water quality management schemes under various uncertainties. Interval solutions for production patterns under a range of probabilistic water quality constraints have been generated. Results obtained demonstrate compromises between the system benefit and the system failure risk due to inherent uncertainties that exist in various system components. Moreover, information about pollutant emission is accomplished, which would help managers to adjust production patterns of regional industry and local policies considering interactions of water quality requirement, economic benefit, and industry structure.
Modelling tools for managing Induced RiverBank Filtration MAR schemes
NASA Astrophysics Data System (ADS)
De Filippis, Giovanna; Barbagli, Alessio; Marchina, Chiara; Borsi, Iacopo; Mazzanti, Giorgio; Nardi, Marco; Vienken, Thomas; Bonari, Enrico; Rossetto, Rudy
2017-04-01
Induced RiverBank Filtration (IRBF) is a widely used technique in Managed Aquifer Recharge (MAR) schemes, when aquifers are hydraulically connected with surface water bodies, with proven positive effects on quality and quantity of groundwater. IRBF allows abstraction of a large volume of water, avoiding large decrease in groundwater heads. Moreover, thanks to the filtration process through the soil, the concentration of chemical species in surface water can be reduced, thus becoming an excellent resource for the production of drinking water. Within the FP7 MARSOL project (demonstrating Managed Aquifer Recharge as a SOLution to water scarcity and drought; http://www.marsol.eu/), the Sant'Alessio IRBF (Lucca, Italy) was used to demonstrate the feasibility and technical and economic benefits of managing IRBF schemes (Rossetto et al., 2015a). The Sant'Alessio IRBF along the Serchio river allows to abstract an overall amount of about 0.5 m3/s providing drinking water for 300000 people of the coastal Tuscany (mainly to the town of Lucca, Pisa and Livorno). The supplied water is made available by enhancing river bank infiltration into a high yield (10-2 m2/s transmissivity) sandy-gravelly aquifer by rising the river head and using ten vertical wells along the river embankment. A Decision Support System, consisting in connected measurements from an advanced monitoring network and modelling tools was set up to manage the IRBF. The modelling system is based on spatially distributed and physically based coupled ground-/surface-water flow and solute transport models integrated in the FREEWAT platform (developed within the H2020 FREEWAT project - FREE and Open Source Software Tools for WATer Resource Management; Rossetto et al., 2015b), an open source and public domain GIS-integrated modelling environment for the simulation of the hydrological cycle. The platform aims at improving water resource management by simplifying the application of EU water-related Directives and at facilitating the use of modeling environments and GIS tools for storage, management and visualization of large spatial datasets. The groundwater flow and solute transport model was built using FREEWAT, where MODFLOW-2005 and MT3DMS are integrated. The aquifer of the Sant'Alessio plain was discretized using square cells 100 m2 wide and two model layers, a silty-sandy superficial cover and the sandy-gravelly aquifer. Hydraulic connection with the Serchio river and exploitation of the aquifer through the Sant'Alessio well field were simulated. The aquifer model layer was further refined to simulate advection, dispersion, sorption and degradation of contaminants within the river. The objectives are: (i) estimating induced infiltration rates and travel times, (ii) optimizing groundwater exploitation in complex well field schemes, (iii) preventing pollution events, (iv) estimating time for remedial actions. Acknowledgements This paper is presented within the framework of the projects FP7 MARSOL and H2020 FREEWAT. The MARSOL project has received funding from the European Union's Seventh Framework Programme for Research, Technological Development and Demonstration under grant agreement no 619120. The FREEWAT project has received funding from the European Union's HORIZON 2020
ReTrust: attack-resistant and lightweight trust management for medical sensor networks.
He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Vasilakos, Athanasios V
2012-07-01
Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users during their everyday lives, at health sites, without restricting their freedom. Establishing trust among distributed network entities has been recognized as a powerful tool to improve the security and performance of distributed networks such as mobile ad hoc networks and sensor networks. However, most existing trust systems are not well suited for MSNs due to the unique operational and security requirements of MSNs. Moreover, similar to most security schemes, trust management methods themselves can be vulnerable to attacks. Unfortunately, this issue is often ignored in existing trust systems. In this paper, we identify the security and performance challenges facing a sensor network for wireless medical monitoring and suggest it should follow a two-tier architecture. Based on such an architecture, we develop an attack-resistant and lightweight trust management scheme named ReTrust. This paper also reports the experimental results of the Collection Tree Protocol using our proposed system in a network of TelosB motes, which show that ReTrust not only can efficiently detect malicious/faulty behaviors, but can also significantly improve the network performance in practice.
Towards a Competency-based Vision for Construction Safety Education
NASA Astrophysics Data System (ADS)
Pedro, Akeem; Hai Chien, Pham; Park, Chan Sik
2018-04-01
Accidents still prevail in the construction industry, resulting in injuries and fatalities all over the world. Educational programs in construction should deliver safety knowledge and skills to students who will become responsible for ensuring safe construction work environments in the future. However, there is a gap between the competencies current pedagogical approaches target, and those required for safety in practice. This study contributes to addressing this issue in three steps. Firstly, a vision for competency-based construction safety education is conceived. Building upon this, a research scheme to achieve the vision is developed, and the first step of the scheme is initiated in this study. The critical competencies required for safety education are investigated through analyses of literature, and confirmed through surveys with construction and safety management professionals. Results from the study would be useful in establishing and orienting education programs towards current industry safety needs and requirements
KeyWare: an open wireless distributed computing environment
NASA Astrophysics Data System (ADS)
Shpantzer, Isaac; Schoenfeld, Larry; Grindahl, Merv; Kelman, Vladimir
1995-12-01
Deployment of distributed applications in the wireless domain lack equivalent tools, methodologies, architectures, and network management that exist in LAN based applications. A wireless distributed computing environment (KeyWareTM) based on intelligent agents within a multiple client multiple server scheme was developed to resolve this problem. KeyWare renders concurrent application services to wireline and wireless client nodes encapsulated in multiple paradigms such as message delivery, database access, e-mail, and file transfer. These services and paradigms are optimized to cope with temporal and spatial radio coverage, high latency, limited throughput and transmission costs. A unified network management paradigm for both wireless and wireline facilitates seamless extensions of LAN- based management tools to include wireless nodes. A set of object oriented tools and methodologies enables direct asynchronous invocation of agent-based services supplemented by tool-sets matched to supported KeyWare paradigms. The open architecture embodiment of KeyWare enables a wide selection of client node computing platforms, operating systems, transport protocols, radio modems and infrastructures while maintaining application portability.
Tanigaki, Nobuhiro; Ishida, Yoshihiro; Osada, Morihiro
2015-03-01
This study evaluates municipal solid waste co-gasification technology and a new solid waste management scheme, which can minimize final landfill amounts and maximize material recycled from waste. This new scheme is considered for a region where bottom ash and incombustibles are landfilled or not allowed to be recycled due to their toxic heavy metal concentration. Waste is processed with incombustible residues and an incineration bottom ash discharged from existent conventional incinerators, using a gasification and melting technology (the Direct Melting System). The inert materials, contained in municipal solid waste, incombustibles and bottom ash, are recycled as slag and metal in this process as well as energy recovery. Based on this new waste management scheme with a co-gasification system, a case study of municipal solid waste co-gasification was evaluated and compared with other technical solutions, such as conventional incineration, incineration with an ash melting facility under certain boundary conditions. From a technical point of view, co-gasification produced high quality slag with few harmful heavy metals, which was recycled completely without requiring any further post-treatment such as aging. As a consequence, the co-gasification system had an economical advantage over other systems because of its material recovery and minimization of the final landfill amount. Sensitivity analyses of landfill cost, power price and inert materials in waste were also conducted. The higher the landfill costs, the greater the advantage of the co-gasification system has. The co-gasification was beneficial for landfill cost in the range of 80 Euro per ton or more. Higher power prices led to lower operation cost in each case. The inert contents in processed waste had a significant influence on the operating cost. These results indicate that co-gasification of bottom ash and incombustibles with municipal solid waste contributes to minimizing the final landfill amount and has great possibilities maximizing material recovery and energy recovery from waste. Copyright © 2014 Elsevier Ltd. All rights reserved.
Trubey, R J; Chestnutt, I G
2013-03-01
This study used Q-sort methodology to determine the views of staff involved in a national school-based daily toothbrushing programme. Q-methodology is a mixed-method approach in which participants are asked to sort a collection of statements according to degree of agreement with them. Factor analysis identified subgroups of like-minded participants and revealed areas of consensus and disagreement. 24 Community Dental Service staff managing or delivering the toothbrushing programme were asked to rank 49 statements derived from previous qualitative interviews. Varimax rotation produced a three-factor solution with five/six participants loading significantly into each group. Groups divided largely according to staff role: Factor 1, mainly support workers (assistants with no oral-health background); Factor 2, managers; and factor 3, oral health educators (dental nurses with teaching qualifications). As staff new to the area of oral-health, the views of support workers were of particular interest. Unlike others, this group saw Designed to Smile as a unique health promotion scheme and wanted to involve as many children as possible, regardless of oral-disease risk. Managers' perceptions of issues affecting the establishment of the programme differed from those staff in day-to-day contact with the 515 schools in which the toothbrushing took place. This study used a long established but little used technique to ascertain the commonality of views of staff These data may be of value not only in managing the current programme, but for anyone who may be considering developing such a toothbrushing scheme.
A Third-Party E-Payment Protocol Based on Quantum Group Blind Signature
NASA Astrophysics Data System (ADS)
Zhang, Jian-Zhong; Yang, Yuan-Yuan; Xie, Shu-Cui
2017-09-01
A third-party E-payment protocol based on quantum group blind signature is proposed in this paper. Our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. To achieve that, quantum key distribution, one-time pad and quantum group blind signature are adopted in our scheme. Furthermore, if there were a dispute, the manager Trent can identify who tells a lie.
NASA Astrophysics Data System (ADS)
Uvarova, Svetlana; Vlasenko, Vyacheslav; Bukreev, Anatoly; Myshovskaya, Ludmila; Kuzina, Olga
2018-03-01
This article is based on the analysis of modern condition and dynamics of innovational development of high-rise buildings construction. A number of cardinal organizational and economic changes in management at the macro and meso-levels is taken into the account. Principal scheme of development of the methodology of formation of perspective innovation politics in high-ruse buildings construction based on inculcation of modern methods of strategic control of innovational activity is suggested in this article.
Power Terminal Communication Access Network Monitoring System Scheme Based on Design Patterns
NASA Astrophysics Data System (ADS)
Yan, Shengchao; Wu, Desheng; Zhu, Jiang
2018-01-01
In order to realize patterns design for terminal communication monitoring system, this paper introduces manager-workers, tasks-workers design patterns, based on common design patterns such as factory method, chain of responsibility, facade. Using these patterns, the communication monitoring system which combines module-groups like networking communication, business data processing and the peripheral support has been designed successfully. Using these patterns makes this system have great flexibility and scalability and improves the degree of systematic pattern design structure.
Design and application of BIM based digital sand table for construction management
NASA Astrophysics Data System (ADS)
Fuquan, JI; Jianqiang, LI; Weijia, LIU
2018-05-01
This paper explores the design and application of BIM based digital sand table for construction management. Aiming at the demands and features of construction management plan for bridge and tunnel engineering, the key functional features of digital sand table should include three-dimensional GIS, model navigation, virtual simulation, information layers, and data exchange, etc. That involving the technology of 3D visualization and 4D virtual simulation of BIM, breakdown structure of BIM model and project data, multi-dimensional information layers, and multi-source data acquisition and interaction. Totally, the digital sand table is a visual and virtual engineering information integrated terminal, under the unified data standard system. Also, the applications shall contain visual constructing scheme, virtual constructing schedule, and monitoring of construction, etc. Finally, the applicability of several basic software to the digital sand table is analyzed.
End-User Tools Towards AN Efficient Electricity Consumption: the Dynamic Smart Grid
NASA Astrophysics Data System (ADS)
Kamel, Fouad; Kist, Alexander A.
2010-06-01
Growing uncontrolled electrical demands have caused increased supply requirements. This causes volatile electrical markets and has detrimental unsustainable environmental impacts. The market is presently characterized by regular daily peak demand conditions associated with high electricity prices. A demand-side response system can limit peak demands to an acceptable level. The proposed scheme is based on energy demand and price information which is available online. An online server is used to communicate the information of electricity suppliers to users, who are able to use the information to manage and control their own demand. A configurable, intelligent switching system is used to control local loads during peak events and mange the loads at other times as necessary. The aim is to shift end user loads towards periods where energy demand and therefore also prices are at the lowest. As a result, this will flatten the load profile and avoiding load peeks which are costly for suppliers. The scheme is an endeavour towards achieving a dynamic smart grid demand-side-response environment using information-based communication and computer-controlled switching. Diffusing the scheme shall lead to improved electrical supply services and controlled energy consumption and prices.
Jenkins, K; Surminski, S; Hall, J; Crick, F
2017-10-01
Climate change and increasing urbanization are projected to result in an increase in surface water flooding and consequential damages in the future. In this paper, we present insights from a novel Agent Based Model (ABM), applied to a London case study of surface water flood risk, designed to assess the interplay between different adaptation options; how risk reduction could be achieved by homeowners and government; and the role of flood insurance and the new flood insurance pool, Flood Re, in the context of climate change. The analysis highlights that while combined investment in property-level flood protection and sustainable urban drainage systems reduce surface water flood risk, the benefits can be outweighed by continued development in high risk areas and the effects of climate change. In our simulations, Flood Re is beneficial in its function to provide affordable insurance, even under climate change. However, the scheme does face increasing financial pressure due to rising surface water flood damages. If the intended transition to risk-based pricing is to take place then a determined and coordinated strategy will be needed to manage flood risk, which utilises insurance incentives, limits new development, and supports resilience measures. Our modelling approach and findings are highly relevant for the ongoing regulatory and political approval process for Flood Re as well as for wider discussions on the potential of insurance schemes to incentivise flood risk management and climate adaptation in the UK and internationally. Copyright © 2017 Elsevier B.V. All rights reserved.
Water resources management in karst aquifers - concepts and modeling approaches
NASA Astrophysics Data System (ADS)
Sauter, M.; Schmidt, S.; Abusaada, M.; Reimann, T.; Liedl, R.; Kordilla, J.; Geyer, T.
2011-12-01
Water resources management schemes generally imply the availability of a spectrum of various sources of water with a variability of quantity and quality in space and time, and the availability and suitability of storage facilities to cover various demands of water consumers on quantity and quality. Aquifers are generally regarded as suitable reservoirs since large volumes of water can be stored in the subsurface, water is protected from contamination and evaporation and the underground passage assists in the removal of at least some groundwater contaminants. Favorable aquifer properties include high vertical hydraulic conductivities for infiltration, large storage coefficients and not too large hydraulic gradients / conductivities. The latter factors determine the degree of discharge, i.e. loss of groundwater. Considering the above criteria, fractured and karstified aquifers appear to not really fulfill the respective conditions for storage reservoirs. Although infiltration capacity is relatively high, due to low storativity and high hydraulic conductivities, the small quantity of water stored is rapidly discharged. However, for a number of specific conditions, even karst aquifers are suitable for groundwater management schemes. They can be subdivided into active and passive management strategies. Active management options include strategies such as overpumping, i.e. the depletion of the karst water resources below the spring outflow level, the construction of subsurface dams to prevent rapid discharge. Passive management options include the optimal use of the discharging groundwater under natural discharge conditions. System models that include the superposition of the effect of the different compartments soil zone, epikarst, vadose and phreatic zone assist in the optimal usage of the available groundwater resources, while taking into account the different water reservoirs. The elaboration and implementation of groundwater protection schemes employing well established vulnerability assessment techniques ascertain the respective groundwater quality. In this paper a systematic overview is provided on karst groundwater management schemes illustrating the specific conditions allowing active or passive management in the first place as well as the employment of various types of adapted models for the design of the different management schemes. Examples are provided from karst systems in Israel/Palestine, where a large 4000sqkm basin is being managed as a whole, the South of France, where the Lez groundwater development scheme illustrates the optimal use of overpumping from the conduit system, providing additional water for the City of Montpellier during dry summers and at the same time increasing recharge and assisting in the mitigation of flooding during high winter discharge conditions. Overpumping could be an option in many Mediterranean karst catchments since karst conduit development occurred well below today's spring discharge level. Other examples include the construction of subsurface dams for hydropower generation in the Dinaric karst and reduction of discharge. Problems of leakage and general feasibility are discussed.
You, Siming; Wang, Wei; Dai, Yanjun; Tong, Yen Wah; Wang, Chi-Hwa
2016-10-01
The compositions of food wastes and their co-gasification producer gas were compared with the existing data of sewage sludge. Results showed that food wastes are more favorable than sewage sludge for co-gasification based on residue generation and energy output. Two decentralized gasification-based schemes were proposed to dispose of the sewage sludge and food wastes in Singapore. Monte Carlo simulation-based cost-benefit analysis was conducted to compare the proposed schemes with the existing incineration-based scheme. It was found that the gasification-based schemes are financially superior to the incineration-based scheme based on the data of net present value (NPV), benefit-cost ratio (BCR), and internal rate of return (IRR). Sensitivity analysis was conducted to suggest effective measures to improve the economics of the schemes. Copyright © 2016 Elsevier Ltd. All rights reserved.
Matsuoka, Sadatoshi; Obara, Hiromi; Nagai, Mari; Murakami, Hitoshi; Chan Lon, Rasmey
2014-07-01
Though Cambodia made impressive gains in immunization coverage between the years 2000 and 2005, it recognized several health system challenges to greater coverage of immunization and sustainability. The Global Alliance for Vaccines and Immunization (GAVI) opened a Health System Strengthening (HSS) funding window in 2006. To address the health system challenges, Cambodia has been receiving the GAVI HSS fund since October 2007. The major component of the support is performance-based financing (PBF) for maternal, neonatal and child health (MNCH) services. To examine the impact of the PBF scheme on MNCH services and administrative management in rural Cambodia. Quantitative and qualitative studies were conducted in Kroch Chhmar Operational District (OD), Cambodia. Quantitative analyses were conducted on the trends of the numbers of MNCH services. A brief analysis was conducted using qualitative data. After the commencement of the PBF support, the volume of MNCH services was significantly boosted. In addition, strengthened financial and operational management was observed in the study area. However, the quality of the MNCH services was not ensured. Technical assistance, rather than the PBF scheme, was perceived by stakeholders to play a vital role in increasing the quality of the services. To improve the quality of the health services provided, it is better to include indicators on the quality of care in the PBF scheme. Mutual co-operation between PBF models and technical assistance may ensure better service quality while boosting the quantity. A robust but feasible data validation mechanism should be in place, as a PBF could incentivize inaccurate reporting. The capacity for financial management should be strengthened in PBF recipient ODs. To address the broader aspects of MNCH, a balanced input of resources and strengthening of all six building blocks of a health system are necessary. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine © The Author 2013; all rights reserved.
Towards Stochastic Optimization-Based Electric Vehicle Penetration in a Novel Archipelago Microgrid.
Yang, Qingyu; An, Dou; Yu, Wei; Tan, Zhengan; Yang, Xinyu
2016-06-17
Due to the advantage of avoiding upstream disturbance and voltage fluctuation from a power transmission system, Islanded Micro-Grids (IMG) have attracted much attention. In this paper, we first propose a novel self-sufficient Cyber-Physical System (CPS) supported by Internet of Things (IoT) techniques, namely "archipelago micro-grid (MG)", which integrates the power grid and sensor networks to make the grid operation effective and is comprised of multiple MGs while disconnected with the utility grid. The Electric Vehicles (EVs) are used to replace a portion of Conventional Vehicles (CVs) to reduce CO 2 emission and operation cost. Nonetheless, the intermittent nature and uncertainty of Renewable Energy Sources (RESs) remain a challenging issue in managing energy resources in the system. To address these issues, we formalize the optimal EV penetration problem as a two-stage Stochastic Optimal Penetration (SOP) model, which aims to minimize the emission and operation cost in the system. Uncertainties coming from RESs (e.g., wind, solar, and load demand) are considered in the stochastic model and random parameters to represent those uncertainties are captured by the Monte Carlo-based method. To enable the reasonable deployment of EVs in each MGs, we develop two scheduling schemes, namely Unlimited Coordinated Scheme (UCS) and Limited Coordinated Scheme (LCS), respectively. An extensive simulation study based on a modified 9 bus system with three MGs has been carried out to show the effectiveness of our proposed schemes. The evaluation data indicates that our proposed strategy can reduce both the environmental pollution created by CO 2 emissions and operation costs in UCS and LCS.
Towards Stochastic Optimization-Based Electric Vehicle Penetration in a Novel Archipelago Microgrid
Yang, Qingyu; An, Dou; Yu, Wei; Tan, Zhengan; Yang, Xinyu
2016-01-01
Due to the advantage of avoiding upstream disturbance and voltage fluctuation from a power transmission system, Islanded Micro-Grids (IMG) have attracted much attention. In this paper, we first propose a novel self-sufficient Cyber-Physical System (CPS) supported by Internet of Things (IoT) techniques, namely “archipelago micro-grid (MG)”, which integrates the power grid and sensor networks to make the grid operation effective and is comprised of multiple MGs while disconnected with the utility grid. The Electric Vehicles (EVs) are used to replace a portion of Conventional Vehicles (CVs) to reduce CO2 emission and operation cost. Nonetheless, the intermittent nature and uncertainty of Renewable Energy Sources (RESs) remain a challenging issue in managing energy resources in the system. To address these issues, we formalize the optimal EV penetration problem as a two-stage Stochastic Optimal Penetration (SOP) model, which aims to minimize the emission and operation cost in the system. Uncertainties coming from RESs (e.g., wind, solar, and load demand) are considered in the stochastic model and random parameters to represent those uncertainties are captured by the Monte Carlo-based method. To enable the reasonable deployment of EVs in each MGs, we develop two scheduling schemes, namely Unlimited Coordinated Scheme (UCS) and Limited Coordinated Scheme (LCS), respectively. An extensive simulation study based on a modified 9 bus system with three MGs has been carried out to show the effectiveness of our proposed schemes. The evaluation data indicates that our proposed strategy can reduce both the environmental pollution created by CO2 emissions and operation costs in UCS and LCS. PMID:27322281
2015-03-01
2.5.5 Availability Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 2.6 Simulation Environments...routing scheme can prove problematic. Two prominent proactive protocols, 7 Destination-Sequenced Distance-Vector (DSDV) and Optimized Link State...distributed file management systems such as Tahoe- LAFS as part of its replication scheme . Altman and De Pellegrini [4] examine the impact of FEC and
Remote access and automation of SPring-8 MX beamlines
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ueno, Go, E-mail: ueno@spring8.or.jp; Hikima, Takaaki; Yamashita, Keitaro
At SPring-8 MX beamlines, a remote access system has been developed and started user operation in 2010. The system has been developed based on an automated data collection and data management architecture utilized for the confirmed scheme of SPring-8 mail-in data collection. Currently, further improvement to the remote access and automation which covers data processing and analysis are being developed.
Dynamic Tasking of Networked Sensors Using Covariance Information
2010-09-01
has been created under an effort called TASMAN (Tasking Autonomous Sensors in a Multiple Application Network). One of the first studies utilizing this...environment was focused on a novel resource management approach, namely covariance-based tasking. Under this scheme, the state error covariance of...resident space objects (RSO), sensor characteristics, and sensor- target geometry were used to determine the effectiveness of future observations in
Multi-agent systems and their applications
Xie, Jing; Liu, Chen-Ching
2017-07-14
The number of distributed energy components and devices continues to increase globally. As a result, distributed control schemes are desirable for managing and utilizing these devices, together with the large amount of data. In recent years, agent-based technology becomes a powerful tool for engineering applications. As a computational paradigm, multi agent systems (MASs) provide a good solution for distributed control. Here in this paper, MASs and applications are discussed. A state-of-the-art literature survey is conducted on the system architecture, consensus algorithm, and multi-agent platform, framework, and simulator. In addition, a distributed under-frequency load shedding (UFLS) scheme is proposed using themore » MAS. Simulation results for a case study are presented. The future of MASs is discussed in the conclusion.« less
Multi-agent systems and their applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Xie, Jing; Liu, Chen-Ching
The number of distributed energy components and devices continues to increase globally. As a result, distributed control schemes are desirable for managing and utilizing these devices, together with the large amount of data. In recent years, agent-based technology becomes a powerful tool for engineering applications. As a computational paradigm, multi agent systems (MASs) provide a good solution for distributed control. Here in this paper, MASs and applications are discussed. A state-of-the-art literature survey is conducted on the system architecture, consensus algorithm, and multi-agent platform, framework, and simulator. In addition, a distributed under-frequency load shedding (UFLS) scheme is proposed using themore » MAS. Simulation results for a case study are presented. The future of MASs is discussed in the conclusion.« less
A problem of optimal control and observation for distributed homogeneous multi-agent system
NASA Astrophysics Data System (ADS)
Kruglikov, Sergey V.
2017-12-01
The paper considers the implementation of a algorithm for controlling a distributed complex of several mobile multi-robots. The concept of a unified information space of the controlling system is applied. The presented information and mathematical models of participants and obstacles, as real agents, and goals and scenarios, as virtual agents, create the base forming the algorithmic and software background for computer decision support system. The controlling scheme assumes the indirect management of the robotic team on the basis of optimal control and observation problem predicting intellectual behavior in a dynamic, hostile environment. A basic content problem is a compound cargo transportation by a group of participants in the case of a distributed control scheme in the terrain with multiple obstacles.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dahlen, Lisa, E-mail: lisa.dahlen@ltu.s; Lagerkvist, Anders
2010-01-15
Householders' response to weight-based billing for the collection of household waste was investigated with the aim of providing decision support for waste management policies. Three questions were addressed: How much and what kind of information on weight-based billing is discernible in generic Swedish waste collection statistics? Why do local authorities implement weight-based billing, and how do they perceive the results? and, Which strengths and weaknesses of weight-based billing have been observed on the local level? The study showed that municipalities with pay-by-weight schemes collected 20% less household waste per capita than other municipalities. Surprisingly, no part of this difference couldmore » be explained by higher recycling rates. Nevertheless, the majority of waste management professionals were convinced that recycling had increased as a result of the billing system. A number of contradicting strengths and weaknesses of weight-based billing were revealed.« less
Can health insurance improve access to quality care for the Indian poor?
Michielsen, Joris; Criel, Bart; Devadasan, Narayanan; Soors, Werner; Wouters, Edwin; Meulemans, Herman
2011-08-01
Recently, the Indian government launched health insurance schemes for the poor both to protect them from high health spending and to improve access to high-quality health services. This article aims to review the potentials of health insurance interventions in order to improve access to quality care in India based on experiences of community health insurance schemes. PubMed, Ovid MEDLINE (R), All EBM Reviews, CSA Sociological Abstracts, CSA Social Service Abstracts, EconLit, Science Direct, the ISI Web of Knowledge, Social Science Research Network and databases of research centers were searched up to September 2010. An Internet search was executed. One thousand hundred and thirty-three papers were assessed for inclusion and exclusion criteria. Twenty-five papers were selected providing information on eight schemes. A realist review was performed using Hirschman's exit-voice theory: mechanisms to improve exit strategies (financial assets and infrastructure) and strengthen patient's long voice route (quality management) and short voice route (patient pressure). All schemes use a mix of measures to improve exit strategies and the long voice route. Most mechanisms are not effective in reality. Schemes that focus on the patients' bargaining position at the patient-provider interface seem to improve access to quality care. Top-down health insurance interventions with focus on exit strategies will not work out fully in the Indian context. Government must actively facilitate the potential of CHI schemes to emancipate the target group so that they may transform from mere passive beneficiaries into active participants in their health.
Coordinated single-phase control scheme for voltage unbalance reduction in low voltage network.
Pullaguram, Deepak; Mishra, Sukumar; Senroy, Nilanjan
2017-08-13
Low voltage (LV) distribution systems are typically unbalanced in nature due to unbalanced loading and unsymmetrical line configuration. This situation is further aggravated by single-phase power injections. A coordinated control scheme is proposed for single-phase sources, to reduce voltage unbalance. A consensus-based coordination is achieved using a multi-agent system, where each agent estimates the averaged global voltage and current magnitudes of individual phases in the LV network. These estimated values are used to modify the reference power of individual single-phase sources, to ensure system-wide balanced voltages and proper power sharing among sources connected to the same phase. Further, the high X / R ratio of the filter, used in the inverter of the single-phase source, enables control of reactive power, to minimize voltage unbalance locally. The proposed scheme is validated by simulating a LV distribution network with multiple single-phase sources subjected to various perturbations.This article is part of the themed issue 'Energy management: flexibility, risk and optimization'. © 2017 The Author(s).
Avrin, D E; Andriole, K P; Yin, L; Gould, R G; Arenson, R L
2001-03-01
A hierarchical storage management (HSM) scheme for cost-effective on-line archival of image data using lossy compression is described. This HSM scheme also provides an off-site tape backup mechanism and disaster recovery. The full-resolution image data are viewed originally for primary diagnosis, then losslessly compressed and sent off site to a tape backup archive. In addition, the original data are wavelet lossy compressed (at approximately 25:1 for computed radiography, 10:1 for computed tomography, and 5:1 for magnetic resonance) and stored on a large RAID device for maximum cost-effective, on-line storage and immediate retrieval of images for review and comparison. This HSM scheme provides a solution to 4 problems in image archiving, namely cost-effective on-line storage, disaster recovery of data, off-site tape backup for the legal record, and maximum intermediate storage and retrieval through the use of on-site lossy compression.
Djordjevic, Ivan B; Xu, Lei; Wang, Ting
2008-09-15
We present two PMD compensation schemes suitable for use in multilevel (M>or=2) block-coded modulation schemes with coherent detection. The first scheme is based on a BLAST-type polarization-interference cancellation scheme, and the second scheme is based on iterative polarization cancellation. Both schemes use the LDPC codes as channel codes. The proposed PMD compensations schemes are evaluated by employing coded-OFDM and coherent detection. When used in combination with girth-10 LDPC codes those schemes outperform polarization-time coding based OFDM by 1 dB at BER of 10(-9), and provide two times higher spectral efficiency. The proposed schemes perform comparable and are able to compensate even 1200 ps of differential group delay with negligible penalty.
Orbiter/Space lab momentum management for POP orientations
NASA Technical Reports Server (NTRS)
Cox, J. W.
1974-01-01
An angular momentum management scheme applicable to the orbiter/spacelab is described. The basis of the scheme is to periodically maneuver the vehicle through a small angle thereby using the gravity gradient torque to dump momentum from the control moment gyro (CMG) control system. The orbiter is operated with its principal vehicle axis perpendicular to the orbital plane. Numerous case runs were conducted on the hybrid simulation and representative cases are included.
NASA Astrophysics Data System (ADS)
Chow, Sherman S. M.
Traceable signature scheme extends a group signature scheme with an enhanced anonymity management mechanism. The group manager can compute a tracing trapdoor which enables anyone to test if a signature is signed by a given misbehaving user, while the only way to do so for group signatures requires revealing the signer of all signatures. Nevertheless, it is not tracing in a strict sense. For all existing schemes, T tracing agents need to recollect all N' signatures ever produced and perform RN' “checks” for R revoked users. This involves a high volume of transfer and computations. Increasing T increases the degree of parallelism for tracing but also the probability of “missing” some signatures in case some of the agents are dishonest.
Report on Pairing-based Cryptography.
Moody, Dustin; Peralta, Rene; Perlner, Ray; Regenscheid, Andrew; Roginsky, Allen; Chen, Lily
2015-01-01
This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST's position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings. This includes topics such as pairing-friendly elliptic curves and how to compute various pairings. It includes a brief introduction to existing identity-based encryption (IBE) schemes and other cryptographic schemes using pairing technology. The report provides a complete study of the current status of standard activities on pairing-based cryptographic schemes. It explores different application scenarios for pairing-based cryptography schemes. As an important aspect of adopting pairing-based schemes, the report also considers the challenges inherent in validation testing of cryptographic algorithms and modules. Based on the study, the report suggests an approach for including pairing-based cryptography schemes in the NIST cryptographic toolkit. The report also outlines several questions that will require further study if this approach is followed.
Report on Pairing-based Cryptography
Moody, Dustin; Peralta, Rene; Perlner, Ray; Regenscheid, Andrew; Roginsky, Allen; Chen, Lily
2015-01-01
This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST’s position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings. This includes topics such as pairing-friendly elliptic curves and how to compute various pairings. It includes a brief introduction to existing identity-based encryption (IBE) schemes and other cryptographic schemes using pairing technology. The report provides a complete study of the current status of standard activities on pairing-based cryptographic schemes. It explores different application scenarios for pairing-based cryptography schemes. As an important aspect of adopting pairing-based schemes, the report also considers the challenges inherent in validation testing of cryptographic algorithms and modules. Based on the study, the report suggests an approach for including pairing-based cryptography schemes in the NIST cryptographic toolkit. The report also outlines several questions that will require further study if this approach is followed. PMID:26958435
Wang, Liangmin
2018-01-01
Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node’s transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical. PMID:29538314
Sohail, Muhammad; Wang, Liangmin
2018-03-14
Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node's transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical.
A novel quantum group signature scheme without using entangled states
NASA Astrophysics Data System (ADS)
Xu, Guang-Bao; Zhang, Ke-Jia
2015-07-01
In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.
Vali, Faisal; Hong, Robert
2007-10-11
With the evolution of AJAX, ruby on rails, advanced dynamic XHTML technologies and the advent of powerful user interface libraries for javascript (EXT, Yahoo User Interface Library), developers now have the ability to provide truly rich interfaces within web browsers, with reasonable effort and without third-party plugins. We designed and developed an example of such a solution. The User Interface allows radiation oncology practices to intuitively manage different dose fractionation schemes by helping estimate total dose to irradiated organs.
Veselka, Walter; Rentch, James S; Grafton, William N; Kordek, Walter S; Anderson, James T
2010-11-01
Bioassessment methods for wetlands, and other bodies of water, have been developed worldwide to measure and quantify changes in "biological integrity." These assessments are based on a classification system, meant to ensure appropriate comparisons between wetland types. Using a local site-specific disturbance gradient, we built vegetation indices of biological integrity (Veg-IBIs) based on two commonly used wetland classification systems in the USA: One based on vegetative structure and the other based on a wetland's position in a landscape and sources of water. The resulting class-specific Veg-IBIs were comprised of 1-5 metrics that varied in their sensitivity to the disturbance gradient (R2=0.14-0.65). Moreover, the sensitivity to the disturbance gradient increased as metrics from each of the two classification schemes were combined (added). Using this information to monitor natural and created wetlands will help natural resource managers track changes in biological integrity of wetlands in response to anthropogenic disturbance and allows the use of vegetative communities to set ecological performance standards for mitigation banks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tanigaki, Nobuhiro, E-mail: tanigaki.nobuhiro@eng.nssmc.com; Ishida, Yoshihiro; Osada, Morihiro
Highlights: • A new waste management scheme and the effects of co-gasification of MSW were assessed. • A co-gasification system was compared with other conventional systems. • The co-gasification system can produce slag and metal with high-quality. • The co-gasification system showed an economic advantage when bottom ash is landfilled. • The sensitive analyses indicate an economic advantage when the landfill cost is high. - Abstract: This study evaluates municipal solid waste co-gasification technology and a new solid waste management scheme, which can minimize final landfill amounts and maximize material recycled from waste. This new scheme is considered for amore » region where bottom ash and incombustibles are landfilled or not allowed to be recycled due to their toxic heavy metal concentration. Waste is processed with incombustible residues and an incineration bottom ash discharged from existent conventional incinerators, using a gasification and melting technology (the Direct Melting System). The inert materials, contained in municipal solid waste, incombustibles and bottom ash, are recycled as slag and metal in this process as well as energy recovery. Based on this new waste management scheme with a co-gasification system, a case study of municipal solid waste co-gasification was evaluated and compared with other technical solutions, such as conventional incineration, incineration with an ash melting facility under certain boundary conditions. From a technical point of view, co-gasification produced high quality slag with few harmful heavy metals, which was recycled completely without requiring any further post-treatment such as aging. As a consequence, the co-gasification system had an economical advantage over other systems because of its material recovery and minimization of the final landfill amount. Sensitivity analyses of landfill cost, power price and inert materials in waste were also conducted. The higher the landfill costs, the greater the advantage of the co-gasification system has. The co-gasification was beneficial for landfill cost in the range of 80 Euro per ton or more. Higher power prices led to lower operation cost in each case. The inert contents in processed waste had a significant influence on the operating cost. These results indicate that co-gasification of bottom ash and incombustibles with municipal solid waste contributes to minimizing the final landfill amount and has great possibilities maximizing material recovery and energy recovery from waste.« less
CREST v2.1 Refined by a Distributed Linear Reservoir Routing Scheme
NASA Astrophysics Data System (ADS)
Shen, X.; Hong, Y.; Zhang, K.; Hao, Z.; Wang, D.
2014-12-01
Hydrologic modeling is important in water resources management, and flooding disaster warning and management. Routing scheme is among the most important components of a hydrologic model. In this study, we replace the lumped LRR (linear reservoir routing) scheme used in previous versions of the distributed hydrological model, CREST (coupled routing and excess storage) by a newly proposed distributed LRR method, which is theoretically more suitable for distributed hydrological models. Consequently, we have effectively solved the problems of: 1) low values of channel flow in daily simulation, 2) discontinuous flow value along the river network during flood events and 3) irrational model parameters. The CREST model equipped with both the routing schemes have been tested in the Gan River basin. The distributed LRR scheme has been confirmed to outperform the lumped counterpart by two comparisons, hydrograph validation and visual speculation of the continuity of stream flow along the river: 1) The CREST v2.1 (version 2.1) with the implementation of the distributed LRR achieved excellent result of [NSCE(Nash coefficient), CC (correlation coefficient), bias] =[0.897, 0.947 -1.57%] while the original CREST v2.0 produced only negative NSCE, close to zero CC and large bias. 2) CREST v2.1 produced more naturally smooth river flow pattern along the river network while v2.0 simulated bumping and discontinuous discharge along the mainstream. Moreover, we further observe that by using the distributed LRR method, 1) all model parameters fell within their reasonable region after an automatic optimization; 2) CREST forced by satellite-based precipitation and PET products produces a reasonably well result, i.e., (NSCE, CC, bias) = (0.756, 0.871, -0.669%) in the case study, although there is still room to improve regarding their low spatial resolution and underestimation of the heavy rainfall events in the satellite products.
Lee, Tian-Fu; Liu, Chuan-Ming
2013-06-01
A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.
Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming
2016-01-01
With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks.
NASA Astrophysics Data System (ADS)
Sánchez Reparaz, Maite; de Vente, Joris; Famba, Sebastiao; Rougier, Jean-Emmanuel; Ángel Sánchez-Monedero, Miguel; Barberá, Gonzalo G.
2015-04-01
Integrated water and nutrient management are key factors to increase productivity and to reduce the yield gap in irrigated systems in Sub-Saharan Africa. These two elements are affected by an ensemble of abiotic, biotic, management and socio-economic factors that need to be taken into account to reduce the yield gap, as well as farmers' perceptions and knowledge. In the framework of the project European Union and African Union cooperative research to increase Food production in irrigated farming systems in Africa (EAU4Food project) we are carrying out a participatory innovation process in Chókwè irrigation scheme (Mozambique) based on stakeholders engagement, to test new practices for soil fertility management that can increase yields reducing costs. Through a method combining interviews with three farmers' associations and other relevant stakeholders and soil sampling from the interviewed farmers' plots with the organization of Communities of Practices, we tried to capture how soil fertility is managed by farmers, the constraints they find as well as their perceptions about soil resources. This information was the basis to design and conduct a participatory innovation process where compost made with rice straw and manure is being tested by a farmers' association. Most important limitations of the method are also evaluated. Our results show that socio-economic characteristics of farmers condition how they manage soil fertility and their perceptions. The difficulties they face to adopt new practices for soil fertility management, mainly related to economic resources limitations, labour availability, knowledge time or farm structure, require a systemic understanding that takes into account abiotic, biotic, management and socio-economic factors and their implication as active stakeholders in all phases of the innovation process.
NASA Astrophysics Data System (ADS)
Liu, Y.; Tao, F.; Luo, Y.; Ma, J.
2013-12-01
Appropriate irrigation and nitrogen fertilization, along with suitable crop management strategies, are essential prerequisites for optimum yields in agricultural systems. This research attempts to provide a scientific basis for sustainable agricultural production management for the North China Plain and other semi-arid regions. Based on a series of 72 treatments over 2003-2008, an optimized water and nitrogen scheme for winter wheat/summer maize cropping system was developed. Integrated systems incorporating 120 mm of water with 80 kg N ha-1 N fertilizer were used to simulate winter wheat yields in Hebei and 120 mm of water with 120 kg N ha-1 were used to simulate winter wheat yields in Shandong and Henan provinces in 2000-2007. Similarly, integrated treatments of 40 kg N ha-1 N fertilizer were used to simulate summer maize yields in Hebei, and 80 kg N ha-1 was used to simulate summer maize yields in Shandong and Henan provinces in 2000-2007. Under the optimized scheme, 341.74 107 mm ha-1 of water and 575.79 104 Mg of urea fertilizer could be saved per year under the wheat/maize rotation system. Despite slight drops in the yields of wheat and maize in some areas, water and fertilizer saving has tremendous long-term eco-environmental benefits.
ID-based encryption scheme with revocation
NASA Astrophysics Data System (ADS)
Othman, Hafizul Azrie; Ismail, Eddie Shahril
2017-04-01
In 2015, Meshram proposed an efficient ID-based cryptographic encryption based on the difficulty of solving discrete logarithm and integer-factoring problems. The scheme was pairing free and claimed to be secure against adaptive chosen plaintext attacks (CPA). Later, Tan et al. proved that the scheme was insecure by presenting a method to recover the secret master key and to obtain prime factorization of modulo n. In this paper, we propose a new pairing-free ID-based encryption scheme with revocation based on Meshram's ID-based encryption scheme, which is also secure against Tan et al.'s attacks.
NASA Astrophysics Data System (ADS)
Kust, German; Andreeva, Olga
2015-04-01
A number of new concepts and paradigms appeared during last decades, such as sustainable land management (SLM), climate change (CC) adaptation, environmental services, ecosystem health, and others. All of these initiatives still not having the common scientific platform although some agreements in terminology were reached, schemes of links and feedback loops created, and some models developed. Nevertheless, in spite of all these scientific achievements, the land related issues are still not in the focus of CC adaptation and mitigation. The last did not grow much beyond the "greenhouse gases" (GHG) concept, which makes land degradation as the "forgotten side of climate change" The possible decision to integrate concepts of climate and desertification/land degradation could be consideration of the "GHG" approach providing global solution, and "land" approach providing local solution covering other "locally manifesting" issues of global importance (biodiversity conservation, food security, disasters and risks, etc.) to serve as a central concept among those. SLM concept is a land-based approach, which includes the concepts of both ecosystem-based approach (EbA) and community-based approach (CbA). SLM can serve as in integral CC adaptation strategy, being based on the statement "the more healthy and resilient the system is, the less vulnerable and more adaptive it will be to any external changes and forces, including climate" The biggest scientific issue is the methods to evaluate the SLM and results of the SLM investments. We suggest using the approach based on the understanding of the balance or equilibrium of the land and nature components as the major sign of the sustainable system. Prom this point of view it is easier to understand the state of the ecosystem stress, size of the "health", range of adaptive capacity, drivers of degradation and SLM nature, as well as the extended land use, and the concept of environmental land management as the improved SLM approach. A number of case studies justify the schemes developed to explain this approach.
A secure biometrics-based authentication scheme for telecare medicine information systems.
Yan, Xiaopeng; Li, Weiheng; Li, Ping; Wang, Jiantao; Hao, Xinhong; Gong, Peng
2013-10-01
The telecare medicine information system (TMIS) allows patients and doctors to access medical services or medical information at remote sites. Therefore, it could bring us very big convenient. To safeguard patients' privacy, authentication schemes for the TMIS attracted wide attention. Recently, Tan proposed an efficient biometrics-based authentication scheme for the TMIS and claimed their scheme could withstand various attacks. However, in this paper, we point out that Tan's scheme is vulnerable to the Denial-of-Service attack. To enhance security, we also propose an improved scheme based on Tan's work. Security and performance analysis shows our scheme not only could overcome weakness in Tan's scheme but also has better performance.
Zhang, Nan; McNeil, Edward; Assanangkornchai, Sawitri; Fan, Yancun
2016-01-01
Background: In clinical practice, the physician’s treatment decision making is influenced by many factors besides the patient’s clinical conditions and is the fundamental cause of healthcare inequity and discrimination in healthcare settings. Type 2 diabetes mellitus (T2DM) is a chronic disease with high prevalence, long average length of stay and high hospitalization rate. Although the treatment of T2DM is well guideline driven, there is a large body of evidence showing the existence of treatment disparities. More empirical studies from the provider side are needed to determine if non-clinical factors influence physician’s treatment choices. Objective: To determine the hospital and patient influencing factors of treatment schemes given to T2DM inpatients in Inner Mongolia, China. Methods: A cross-sectional, hospital-based survey using a cluster sampling technique was conducted in three tertiary hospitals and three county hospitals in Inner Mongolia, China. Treatment schemes were categorized as lifestyle management, oral therapy or insulin therapy according to the national guideline. Socio-demographic characteristics and variables related to severity of disease at the individual level and hospital level were collected. Weighted multinomial logistic regression models were used to determine influencing factors of treatment schemes. Results: Regardless of patients’ clinical conditions and health insurance types, both hospital and patient level variables were associated with treatment schemes. Males were more likely to be given oral therapy (RRR=1.72, 95% CI=1.06-2.81) and insulin therapy (RRR=1.94, 95% CI=1.29-2.91) compared to females who were given lifestyle management more frequently. Compared to the western region, hospitals in the central regions of Inner Mongolia were less likely to prescribe T2DM patients oral therapy (RRR = 0.18, 95% CI=0.05-0.61) and insulin therapy (RRR = 0.20, 95% CI=0.06-0.67) than lifestyle management. Compared with non-reformed tertiary hospitals, reformed tertiary hospitals and county hospitals were less likely to give T2DM patients oral therapy (RRR = 0.07 and 0.1 respectively) and insulin therapy (RRR = 0.11 and 0.17 respectively). Conclusion: Gender was the only socio-demographic factors associated with treatment scheme for T2DM patients. Hospitals from different regions have different T2DM treatment patterns. Implementation of reform was shown to be associated with controlling medication use for T2DM inpatients. Further studies are needed to investigate the causes of unreasonable treatment disparities so that policies can be generated accordingly. PMID:27429746
Li, Qi; Chen, Li-ding; Qi, Xin; Zhang, Xin-yu; Ma, Yan; Fu, Bo-jie
2007-01-01
Guanting Reservoir, one of the drinking water supply sources of Beijing, suffers from water eutrophication. It is mainly supplied by Guishui River. Thus, to investigate the reasons of phosphorus (P) loss and improve the P management strategies in Guishui River watershed are important for the safety of drinking water in this region. In this study, a Revised Field P Ranking Scheme (PRS) was developed to reflect the field vulnerability of P loss at the field scale based on the Field PRS. In this new scheme, six factors are included, and each one was assigned a relative weight and a determination method. The affecting factors were classified into transport factors and source factors, and, the standards of environmental quality on surface water and soil erosion classification and degradation of the China were used in this scheme. By the new scheme, thirty-four fields in the Guishui River were categorized as "low", "medium" or "high" potential for P loss into the runoff. The results showed that the P loss risks of orchard and vegetable fields were higher than that of corn and soybean fields. The source factors were the main factors to affect P loss from the study area. In the study area, controlling P input and improving P usage efficiency are critical to decrease P loss. Based on the results, it was suggested that more attention should be paid on the fields of vegetable and orchard since they have extremely high usage rate of P and high soil test of P. Compared with P surplus by field measurements, the Revised Field PRS was more suitable for reflecting the characteristics of fields, and had higher potential capacity to identify critical source areas of P loss than PRS.
Carlson, Josh J; Sullivan, Sean D; Garrison, Louis P; Neumann, Peter J; Veenstra, David L
2010-08-01
To identify, categorize and examine performance-based health outcomes reimbursement schemes for medical technology. We performed a review of performance-based health outcomes reimbursement schemes over the past 10 years (7/98-010/09) using publicly available databases, web and grey literature searches, and input from healthcare reimbursement experts. We developed a taxonomy of scheme types by inductively organizing the schemes identified according to the timing, execution, and health outcomes measured in the schemes. Our search yielded 34 coverage with evidence development schemes, 10 conditional treatment continuation schemes, and 14 performance-linked reimbursement schemes. The majority of schemes are in Europe and Australia, with an increasing number in Canada and the U.S. These schemes have the potential to alter the reimbursement and pricing landscape for medical technology, but significant challenges, including high transaction costs and insufficient information systems, may limit their long-term impact. Future studies regarding experiences and outcomes of implemented schemes are necessary. Copyright 2010 Elsevier Ireland Ltd. All rights reserved.
Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia
2018-05-17
Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.
Vehicle-specific emissions modeling based upon on-road measurements.
Frey, H Christopher; Zhang, Kaishan; Rouphail, Nagui M
2010-05-01
Vehicle-specific microscale fuel use and emissions rate models are developed based upon real-world hot-stabilized tailpipe measurements made using a portable emissions measurement system. Consecutive averaging periods of one to three multiples of the response time are used to compare two semiempirical physically based modeling schemes. One scheme is based on internally observable variables (IOVs), such as engine speed and manifold absolute pressure, while the other is based on externally observable variables (EOVs), such as speed, acceleration, and road grade. For NO, HC, and CO emission rates, the average R(2) ranged from 0.41 to 0.66 for the former and from 0.17 to 0.30 for the latter. The EOV models have R(2) for CO(2) of 0.43 to 0.79 versus 0.99 for the IOV models. The models are sensitive to episodic events in driving cycles such as high acceleration. Intervehicle and fleet average modeling approaches are compared; the former account for microscale variations that might be useful for some types of assessments. EOV-based models have practical value for traffic management or simulation applications since IOVs usually are not available or not used for emission estimation.
Towards building high performance medical image management system for clinical trials
NASA Astrophysics Data System (ADS)
Wang, Fusheng; Lee, Rubao; Zhang, Xiaodong; Saltz, Joel
2011-03-01
Medical image based biomarkers are being established for therapeutic cancer clinical trials, where image assessment is among the essential tasks. Large scale image assessment is often performed by a large group of experts by retrieving images from a centralized image repository to workstations to markup and annotate images. In such environment, it is critical to provide a high performance image management system that supports efficient concurrent image retrievals in a distributed environment. There are several major challenges: high throughput of large scale image data over the Internet from the server for multiple concurrent client users, efficient communication protocols for transporting data, and effective management of versioning of data for audit trails. We study the major bottlenecks for such a system, propose and evaluate a solution by using a hybrid image storage with solid state drives and hard disk drives, RESTfulWeb Services based protocols for exchanging image data, and a database based versioning scheme for efficient archive of image revision history. Our experiments show promising results of our methods, and our work provides a guideline for building enterprise level high performance medical image management systems.
Cho, Chulhee; Choi, Jae-Young; Jeong, Jongpil; Chung, Tai-Myoung
2017-01-01
Lately, we see that Internet of things (IoT) is introduced in medical services for global connection among patients, sensors, and all nearby things. The principal purpose of this global connection is to provide context awareness for the purpose of bringing convenience to a patient's life and more effectively implementing clinical processes. In health care, monitoring of biosignals of a patient has to be continuously performed while the patient moves inside and outside the hospital. Also, to monitor the accurate location and biosignals of the patient, appropriate mobility management is necessary to maintain connection between the patient and the hospital network. In this paper, a binding update scheme on PMIPv6, which reduces signal traffic during location updates by Virtual LMA (VLMA) on the top original Local Mobility Anchor (LMA) Domain, is proposed to reduce the total cost. If a Mobile Node (MN) moves to a Mobile Access Gateway (MAG)-located boundary of an adjacent LMA domain, the MN changes itself into a virtual mode, and this movement will be assumed to be a part of the VLMA domain. In the proposed scheme, MAGs eliminate global binding updates for MNs between LMA domains and significantly reduce the packet loss and latency by eliminating the handoff between LMAs. In conclusion, the performance analysis results show that the proposed scheme improves performance significantly versus PMIPv6 and HMIPv6 in terms of the binding update rate per user and average handoff latency.
Raymond, Christopher M; Brown, Gregory
2011-10-01
This study presents a method for assessing conservation opportunity on private land based on landholders' socio-economic, behavioral, and farm characteristics. These characteristics include age, gender, education, level of off-farm income, farm size, proportion of remnant native vegetation on-farm, and ecological value of native vegetation on-farm. A sample of landholders who own greater than 2 ha of land in the South Australian Murray-Darling Basin region were sent a mail-based survey about their values and preferences for environmental management (N = 659, 52% response). Cross-tabulations and ANOVA statistical analysis techniques were used to compare the socio-economic attributes across three landholder classes: disengaged, moderately engaged, and highly engaged in native vegetation planting. Results indicate that highly engaged landholders were more likely to be female, formally educated, hobby farmers who managed small parcels of land and have high off-farm incomes, whereas disengaged landholders held significantly stronger farming connections (more farming experience, family have lived on the farm for more generations). Spatial analysis revealed area-specific differences in conservation opportunity and conservation priority. In some areas, properties of high ecological value were managed by highly engaged landholders, but nearby properties of high value were managed by moderately engaged or disengaged landholders. Environmental managers therefore cannot assume areas of high conservation priority will be areas of high conservation opportunity. At the regional scale, the potential for revegetation seems most promising within the moderately engaged landholder group considering the vast amount of land managed by this group in areas of high ecological value, particularly within the less represented Mallee and Coorong and Rangelands sub-regions. We suggest that incentive schemes which purchase conservation need to be targeted at disengaged landholders; mentoring schemes led by commercial farmers highly engaged in native vegetation planting should be directed at moderately engaged landholders, and; awards programs which acknowledge conservation successes should be targeted at highly engaged landholders. Copyright © 2011 Elsevier Ltd. All rights reserved.
Barriers of access to care in a managed competition model: lessons from Colombia.
Vargas, Ingrid; Vázquez, María Luisa; Mogollón-Pérez, Amparo Susana; Unger, Jean-Pierre
2010-10-29
The health sector reform in Colombia, initiated by Law 100 (1993) that introduced a managed competition model, is generally presented as a successful experience of improving access to care through a health insurance regulated market. The study's objective is to improve our understanding of the factors influencing access to the continuum of care in the Colombian managed competition model, from the social actors' point of view. An exploratory, descriptive-interpretative qualitative study was carried out, based on case studies of four healthcare networks in rural and urban areas. Individual semi-structured interviews were conducted to a three stage theoretical sample: I) cases, II) providers and III) informants: insured and uninsured users (35), health professionals (51), administrative personnel (20), and providers' (18) and insurers' (10) managers. Narrative content analysis was conducted; segmented by cases, informant's groups and themes. Access, particularly to secondary care, is perceived as complex due to four groups of obstacles with synergetic effects: segmented insurance design with insufficient services covered; insurers' managed care and purchasing mechanisms; providers' networks structural and organizational limitations; and, poor living conditions. Insurers' and providers' values based on economic profit permeate all factors. Variations became apparent between the two geographical areas and insurance schemes. In the urban areas barriers related to market functioning predominate, whereas in the rural areas structural deficiencies in health services are linked to insufficient public funding. While financial obstacles are dominant in the subsidized regime, in the contributory scheme supply shortage prevails, related to insufficient private investment. The results show how in the Colombian healthcare system structural and organizational barriers to care access, that are common in developing countries, are widened by both the insurers' use of mechanisms that limit the utilization and the public healthcare providers' change of behavior in a competition environment. They provide evidence to question the promotion of the managed competition model in low and middle-income countries.
Barriers of access to care in a managed competition model: lessons from Colombia
2010-01-01
Background The health sector reform in Colombia, initiated by Law 100 (1993) that introduced a managed competition model, is generally presented as a successful experience of improving access to care through a health insurance regulated market. The study's objective is to improve our understanding of the factors influencing access to the continuum of care in the Colombian managed competition model, from the social actors' point of view. Methods An exploratory, descriptive-interpretative qualitative study was carried out, based on case studies of four healthcare networks in rural and urban areas. Individual semi-structured interviews were conducted to a three stage theoretical sample: I) cases, II) providers and III) informants: insured and uninsured users (35), health professionals (51), administrative personnel (20), and providers' (18) and insurers' (10) managers. Narrative content analysis was conducted; segmented by cases, informant's groups and themes. Results Access, particularly to secondary care, is perceived as complex due to four groups of obstacles with synergetic effects: segmented insurance design with insufficient services covered; insurers' managed care and purchasing mechanisms; providers' networks structural and organizational limitations; and, poor living conditions. Insurers' and providers' values based on economic profit permeate all factors. Variations became apparent between the two geographical areas and insurance schemes. In the urban areas barriers related to market functioning predominate, whereas in the rural areas structural deficiencies in health services are linked to insufficient public funding. While financial obstacles are dominant in the subsidized regime, in the contributory scheme supply shortage prevails, related to insufficient private investment. Conclusions The results show how in the Colombian healthcare system structural and organizational barriers to care access, that are common in developing countries, are widened by both the insurers' use of mechanisms that limit the utilization and the public healthcare providers' change of behavior in a competition environment. They provide evidence to question the promotion of the managed competition model in low and middle-income countries. PMID:21034481
NASA Technical Reports Server (NTRS)
Davarian, Faramaz; Shambayati, Shervin; Slobin, Stephen
2004-01-01
During the last 40 years, deep space radio communication systems have experienced a move toward shorter wavelengths. In the 1960s a transition from L- to S-band occurred which was followed by a transition from S- to X-band in the 1970s. Both these transitions provided deep space links with wider bandwidths and improved radio metrics capability. Now, in the 2000s, a new change is taking place, namely a move to the Ka-band region of the radio frequency spectrum. Ka-band will soon replace X-band as the frequency of choice for deep space communications providing ample spectrum for the high data rate requirements of future missions. The low-noise receivers of deep space networks have a great need for link management techniques that can mitigate weather effects. In this paper, three approaches for managing Ka-band Earth-space links are investigated. The first approach uses aggregate annual statistics, the second one uses monthly statistics, and the third is based on the short-term forecasting of the local weather. An example of weather forecasting for Ka-band link performance prediction is presented. Furthermore, spacecraft commanding schemes suitable for Ka-band link management are investigated. Theses schemes will be demonstrated using NASA's Mars Reconnaissance Orbiter (MRO) spacecraft in the 2007 to 2008 time period, and the demonstration findings will be reported in a future publication.
Mucha, S; Komen, H
2016-08-01
This study compares two genetic management scenarios for species kept in herds, such as deer. The simulations were designed so that their results can be extended to a wide range of zoo populations. In the first scenario, the simulated populations of size 3 × 20, 6 × 40 or 20 × 60 (herds × animals in herd) were managed with a rotational mating (RM) scheme in which 10%, 20% or 50% of males were selected for breeding and moved between herds in a circular fashion. The second scenario was based on optimal contribution theory (OC). OC requires an accurate pedigree to calculate kinship; males were selected and assigned numbers of offspring to minimize kinship in the next generation. RM was efficient in restriction of inbreeding and produced results comparable with OC. However, RM can result in genetic adaptation of the population to the zoo environment, in particular when 20% or less males are selected for rotation and selection of animals is not random. Lowest rates of inbreeding were obtained by combining OC with rotation of males as in the RM scheme. RM is easy to implement in practice and does not require pedigree data. When full pedigree is available, OC management is preferable. © 2015 Blackwell Verlag GmbH.
Sustainable management for the eastern Mediterranean coast of Turkey.
Berberoglu, Süha
2003-03-01
The objective of this article is to propose a program for the integrated coastal zone management that is required to stimulate and guide sustainable development of the Mediterranean coastal zone of Turkey. Improved data collection, quality control, analysis, and data management will provide a firm basis for future scientific understanding of the East Mediterranean coast of Turkey and will support long-term management. Various innovative procedures were proposed for a promising ecosystem-based approach to manage coastal wetlands in the Mediterranean: remote data acquisition with new technologies; environmental quality monitoring program that will provide a baseline for monitoring; linking a Geographic Information System (GIS) with natural resource management decision routines in the context of operational wetlands, fisheries, tourism management system; environmental sensitivity analysis to ensure that permitted developments are environmentally sustainable; and use of natural species to restore the wetlands and coastal dunes and sustain the system processes. The proposed management scheme will benefit the scientific community in the Mediterranean and the management/planning community in Eastern Turkey.
Mishra, Dheerendra
2015-03-01
Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian
2015-06-01
The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.
Niu, Gang; Jiang, Junjie; Youn, Byeng D; Pecht, Michael
2018-01-01
Autonomous vehicles are playing an increasingly importance in support of a wide variety of critical events. This paper presents a novel autonomous health management scheme on rail vehicles driven by permanent magnet synchronous motors (PMSMs). Firstly, the PMSMs are modeled based on first principle to deduce the initial profile of pneumatic braking (p-braking) force, then which is utilized for real-time demagnetization monitoring and degradation prognosis through similarity-based theory and generate prognosis-enhanced p-braking force strategy for final optimal control. A case study is conducted to demonstrate the feasibility and benefit of using the real-time prognostics and health management (PHM) information in vehicle 'drive-brake' control automatically. The results show that accurate demagnetization monitoring, degradation prognosis, and real-time capability for control optimization can be obtained, which can effectively relieve brake shoe wear. Copyright © 2018 ISA. Published by Elsevier Ltd. All rights reserved.
Alternative indicators for measuring hospital productivity.
Serway, G D; Strum, D W; Haug, W F
1987-08-01
This article explores the premise that the appropriateness and usefulness of typical hospital productivity measures have been affected by three changes in delivery: Organizational restructuring and other definition and data source changes that make full-time equivalent employee (FTE) measurements ambiguous. Transition to prospective payment (diagnosis-related groups). Increase in capitation (prepaid, at risk) programs. The effects of these changes on productivity management indicate the need for alternative productivity indicators. Several productivity measures that complement these changes in internal operations and the external hospital business environment are presented. These are based on an analysis of four hospitals within a multihospital system, and an illustration and interpretation of an array of measures, based on ten months of actual data, is provided. In conclusion, the recommendation is made for hospital management to collect an expanded set of productivity measures and review them in light of changing expense and revenue management schemes inherent in new payment modes.
User Access Management Based on Network Pricing for Social Network Applications
Ma, Xingmin; Gu, Qing
2018-01-01
Social applications play a very important role in people’s lives, as users communicate with each other through social networks on a daily basis. This presents a challenge: How does one receive high-quality service from social networks at a low cost? Users can access different kinds of wireless networks from various locations. This paper proposes a user access management strategy based on network pricing such that networks can increase its income and improve service quality. Firstly, network price is treated as an optimizing access parameter, and an unascertained membership algorithm is used to make pricing decisions. Secondly, network price is adjusted dynamically in real time according to network load. Finally, selecting a network is managed and controlled in terms of the market economy. Simulation results show that the proposed scheme can effectively balance network load, reduce network congestion, improve the user's quality of service (QoS) requirements, and increase the network’s income. PMID:29495252
Auditing Rational Adversaries to Provably Manage Risks
2012-05-23
series of white papers on accountability-based privacy governance in which one recommendation is that organisations should have in place policies and...that this state of affairs raises is how to design effective audit and punishment schemes. This paper articulates a desirable property and presents an...In this section, we provide an overview of our model using a motivating scenario that will serve as a running example for this paper . Consider a
An Approach to Information Management for AIR7000 with Metadata and Ontologies
2009-10-01
metadata. We then propose an approach based on Semantic Technologies including the Resource Description Framework (RDF) and Upper Ontologies, for the...mandating specific metadata schemas can result in interoperability problems. For example, many standards within the ADO mandate the use of XML for metadata...such problems, we propose an archi- tecture in which different metadata schemes can inter operate. By using RDF (Resource Description Framework ) as a
A Microbial Assessment Scheme to measure microbial performance of Food Safety Management Systems.
Jacxsens, L; Kussaga, J; Luning, P A; Van der Spiegel, M; Devlieghere, F; Uyttendaele, M
2009-08-31
A Food Safety Management System (FSMS) implemented in a food processing industry is based on Good Hygienic Practices (GHP), Hazard Analysis Critical Control Point (HACCP) principles and should address both food safety control and assurance activities in order to guarantee food safety. One of the most emerging challenges is to assess the performance of a present FSMS. The objective of this work is to explain the development of a Microbial Assessment Scheme (MAS) as a tool for a systematic analysis of microbial counts in order to assess the current microbial performance of an implemented FSMS. It is assumed that low numbers of microorganisms and small variations in microbial counts indicate an effective FSMS. The MAS is a procedure that defines the identification of critical sampling locations, the selection of microbiological parameters, the assessment of sampling frequency, the selection of sampling method and method of analysis, and finally data processing and interpretation. Based on the MAS assessment, microbial safety level profiles can be derived, indicating which microorganisms and to what extent they contribute to food safety for a specific food processing company. The MAS concept is illustrated with a case study in the pork processing industry, where ready-to-eat meat products are produced (cured, cooked ham and cured, dried bacon).
NASA Astrophysics Data System (ADS)
Resdiansyah; O. K Rahmat, R. A.; Ismail, A.
2018-03-01
Green transportation refers to a sustainable transport that gives the least impact in terms of social and environmental but at the same time is able to supply energy sources globally that includes non-motorized transport strategies deployment to promote healthy lifestyles, also known as Mobility Management Scheme (MMS). As construction of road infrastructure cannot help solve the problem of congestion, past research has shown that MMS is an effective measure to mitigate congestion and to achieve green transportation. MMS consists of different strategies and policies that subdivided into categories according to how they are able to influence travel behaviour. Appropriate selection of mobility strategies will ensure its effectiveness in mitigating congestion problems. Nevertheless, determining appropriate strategies requires human expert and depends on a number of success factors. This research has successfully developed a computer clone system based on human expert, called E-MMS. The process of knowledge acquisition for MMS strategies and the next following process to selection of strategy has been encode in a knowledge-based system using a shell expert system. The newly developed computer cloning system was successfully verified, validated and evaluated (VV&E) by comparing the result output with the real transportation expert recommendation in which the findings suggested Introduction
The fault monitoring and diagnosis knowledge-based system for space power systems: AMPERES, phase 1
NASA Technical Reports Server (NTRS)
Lee, S. C.
1989-01-01
The objective is to develop a real time fault monitoring and diagnosis knowledge-based system (KBS) for space power systems which can save costly operational manpower and can achieve more reliable space power system operation. The proposed KBS was developed using the Autonomously Managed Power System (AMPS) test facility currently installed at NASA Marshall Space Flight Center (MSFC), but the basic approach taken for this project could be applicable for other space power systems. The proposed KBS is entitled Autonomously Managed Power-System Extendible Real-time Expert System (AMPERES). In Phase 1 the emphasis was put on the design of the overall KBS, the identification of the basic research required, the initial performance of the research, and the development of a prototype KBS. In Phase 2, emphasis is put on the completion of the research initiated in Phase 1, and the enhancement of the prototype KBS developed in Phase 1. This enhancement is intended to achieve a working real time KBS incorporated with the NASA space power system test facilities. Three major research areas were identified and progress was made in each area. These areas are real time data acquisition and its supporting data structure; sensor value validations; development of inference scheme for effective fault monitoring and diagnosis, and its supporting knowledge representation scheme.
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps.
Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han; Lin, Tsung-Hung
2017-01-01
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes.
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps
Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han
2017-01-01
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes. PMID:28759615
Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming
2016-01-01
With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.’s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks. PMID:26866606
Paschalidou, A K; Kassomenos, P A
2016-01-01
Wildfire management is closely linked to robust forecasts of changes in wildfire risk related to meteorological conditions. This link can be bridged either through fire weather indices or through statistical techniques that directly relate atmospheric patterns to wildfire activity. In the present work the COST-733 classification schemes are applied in order to link wildfires in Greece with synoptic circulation patterns. The analysis reveals that the majority of wildfire events can be explained by a small number of specific synoptic circulations, hence reflecting the synoptic climatology of wildfires. All 8 classification schemes used, prove that the most fire-dangerous conditions in Greece are characterized by a combination of high atmospheric pressure systems located N to NW of Greece, coupled with lower pressures located over the very Eastern part of the Mediterranean, an atmospheric pressure pattern closely linked to the local Etesian winds over the Aegean Sea. During these events, the atmospheric pressure has been reported to be anomalously high, while anomalously low 500hPa geopotential heights and negative total water column anomalies were also observed. Among the various classification schemes used, the 2 Principal Component Analysis-based classifications, namely the PCT and the PXE, as well as the Leader Algorithm classification LND proved to be the best options, in terms of being capable to isolate the vast amount of fire events in a small number of classes with increased frequency of occurrence. It is estimated that these 3 schemes, in combination with medium-range to seasonal climate forecasts, could be used by wildfire risk managers to provide increased wildfire prediction accuracy. Copyright © 2015 Elsevier B.V. All rights reserved.
Multiple-use Management of Irrigation Systems: Technical Constraints and Challenges
NASA Astrophysics Data System (ADS)
Gowing, J.; Li, Q.; Mayilswami, C.; Gunawardhana, K.
It is now widely recognised that many irrigation systems, originally planned only for irrigation supply, are de facto multiple-use systems. However, the importance of non- irrigation uses (such as bathing, laundry, livestock watering and fishing), to the liveli- hoods of the rural poor has generally been ignored. This has significant implications for irrigation engineers, water resources managers and other decision-makers. An im- proved understanding of competition and complementarity between these uses and irrigation demands is essential for effective multiple-use management of irrigation systems.This paper presents a study of multiple-use management, where the focus is on integrating aquaculture within irrigation systems with and without secondary storage. The Lower Bhavani scheme in South India and Mahaweli System H in Sri- Lanka were selected as representative smallholder irrigation schemes: - The Lower Bhavani scheme comprises a 200km contour canal serving a command area of 78,500ha. Apart from the main dam, there are no storage structures within the irriga- tion system. - Mahaweli System H comprises a command area of 43,000ha served by three main canals. The feature of particular interest in this scheme is the large number of secondary storage structures (known locally as tanks), which are in- tegrated within the canal network. It is apparent from these two sites and from studies elsewhere that non-irrigation uses are important to the livelihoods of the local peo- ple, but these uses are largely opportunistic. The failure to give explicit recognition to non-irrigation uses has important implications for assessments of economic per- formance and water productivity of irrigation systems. However, any attempt to give proper recognition to these alternative uses also has implication for irrigation project management. This paper describes a detailed study of water management in the two irrigation systems. The method of investigation involves in-depth studies in selected distributary commands combined with longitudinal studies based on available long- term data from the full command. The reliability and duration of flows and/or storages represent a constraint to effective integration of aquaculture within the case-study sys- tems. Although fish production is non-consumptive and can be seen as a complemen- tary use of irrigation water, the challenge is to devise operating procedures that will 1 guarantee reliability and duration of flows and/or storages for fish production without increasing total water-use within the system. This is a particular problem during the rainy season when irrigation demand fluctuates widely and rapidly. The problem is ex- acerbated by deficient information systems, which constrain the scope for responsive management in these extensive canal systems. 2
Investigation of Spray Cooling Schemes for Dynamic Thermal Management
NASA Astrophysics Data System (ADS)
Yata, Vishnu Vardhan Reddy
This study aims to investigate variable flow and intermittent flow spray cooling characteristics for efficiency improvement in active two-phase thermal management systems. Variable flow spray cooling scheme requires control of pump input voltage (or speed), while intermittent flow spray cooling scheme requires control of solenoid valve duty cycle and frequency. Several testing scenarios representing dynamic heat load conditions are implemented to characterize the overall performance of variable flow and intermittent flow spray cooling cases in comparison with the reference, steady flow spray cooling case with constant flowrate, continuous spray cooling. Tests are conducted on a small-scale, closed loop spray cooling system featuring a pressure atomized spray nozzle. HFE-7100 dielectric liquid is selected as the working fluid. Two types of test samples are prepared on 10 mm x 10 mm x 2 mm copper substrates with matching size thick film resistors attached onto the opposite side, to generate heat and simulate high heat flux electronic devices. The test samples include: (i) plain, smooth surface, and (ii) microporous surface featuring 100 ?m thick copper-based coating prepared by dual stage electroplating technique. Experimental conditions involve HFE-7100 at atmospheric pressure and 30°C and 10°C subcooling. Steady flow spray cooling tests are conducted at flow rates of 2-5 ml/cm2.s, by controlling the heat flux in increasing steps, and recording the corresponding steady-state temperatures to obtain cooling curves in the form of surface superheat vs. heat flux. Variable flow and intermittent flow spray cooling tests are done at selected flowrate and subcooling conditions to investigate the effects of dynamic flow conditions on maintaining the target surface temperatures defined based on reference steady flow spray cooling performance.
NASA Astrophysics Data System (ADS)
Ram Prabhakar, J.; Ragavan, K.
2013-07-01
This article proposes new power management based current control strategy for integrated wind-solar-hydro system equipped with battery storage mechanism. In this control technique, an indirect estimation of load current is done, through energy balance model, DC-link voltage control and droop control. This system features simpler energy management strategy and necessitates few power electronic converters, thereby minimizing the cost of the system. The generation-demand (G-D) management diagram is formulated based on the stochastic weather conditions and demand, which would likely moderate the gap between both. The features of management strategy deploying energy balance model include (1) regulating DC-link voltage within specified tolerances, (2) isolated operation without relying on external electric power transmission network, (3) indirect current control of hydro turbine driven induction generator and (4) seamless transition between grid-connected and off-grid operation modes. Furthermore, structuring of the hybrid system with appropriate selection of control variables enables power sharing among each energy conversion systems and battery storage mechanism. By addressing these intricacies, it is viable to regulate the frequency and voltage of the remote network at load end. The performance of the proposed composite scheme is demonstrated through time-domain simulation in MATLAB/Simulink environment.
Sekhar, P C; Mishra, S
2016-08-01
This paper proposes a novel, smart energy management scheme for a microgrid, consisting of a diesel generator and power electronic converter interfaced renewable energy-based generators, such as photovoltaic (PV) and fuel cell, for frequency regulation without any storage. In the proposed strategy, output of the PV is controlled in coordination with other generators using neurofuzzy controller, either only for transient frequency regulation or for both transient and steady-state frequency regulation, depending on the load demand, thereby eliminating the huge storage requirements. The option of demand response control is also explored along with the generation control. For accurate and quick tracking of maximum power point and its associated reserve power from the PV generator, this paper also proposes a novel adaptive-predictor-corrector-based tracking mechanism.
Key management and encryption under the bounded storage model.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Draelos, Timothy John; Neumann, William Douglas; Lanzone, Andrew J.
2005-11-01
There are several engineering obstacles that need to be solved before key management and encryption under the bounded storage model can be realized. One of the critical obstacles hindering its adoption is the construction of a scheme that achieves reliable communication in the event that timing synchronization errors occur. One of the main accomplishments of this project was the development of a new scheme that solves this problem. We show in general that there exist message encoding techniques under the bounded storage model that provide an arbitrarily small probability of transmission error. We compute the maximum capacity of this channelmore » using the unsynchronized key-expansion as side-channel information at the decoder and provide tight lower bounds for a particular class of key-expansion functions that are pseudo-invariant to timing errors. Using our results in combination with Dziembowski et al. [11] encryption scheme we can construct a scheme that solves the timing synchronization error problem. In addition to this work we conducted a detailed case study of current and future storage technologies. We analyzed the cost, capacity, and storage data rate of various technologies, so that precise security parameters can be developed for bounded storage encryption schemes. This will provide an invaluable tool for developing these schemes in practice.« less
Kovács, Eszter; Kelemen, Eszter; Kiss, Gabriella; Kalóczkai, Ágnes; Fabók, Veronika; Mihók, Barbara; Megyesi, Boldizsár; Pataki, György; Bodorkós, Barbara; Balázs, Bálint; Bela, Györgyi; Margóczi, Katalin; Roboz, Ágnes; Molnár, Dániel
2017-12-15
Stakeholder participation in nature conservation policies and especially in the management of protected areas has gained importance in the last decades. These changes are underlined by democratic principles and the perceived contribution of stakeholder involvement to the effectiveness of conservation management. Evaluating participatory processes is essential to learn about the past and thus increase the quality of future processes. The evaluation can be useful for the organisations responsible for planning and management, stakeholders and policy makers as well. The present paper shows the results of a systematic evaluation of 25 participatory processes related to the development of management plans for Natura 2000 sites in Hungary between 2007 and 2015. A conceptual framework was developed to evaluate the process and outcome of participatory management planning processes. Criteria were based on the scientific literature on public participation and tailored to conservation-related management planning and stakeholder involvement. Evaluated processes were grouped in three cases based on their time range and financial sources. Overall, the analysed processes scored at a medium level, showing better performance in the process criteria than in the outcome criteria. The best case scored significantly higher in four criteria compared to the other cases: representativeness, resource availability for facilitation, new, creative ideas and impact on the plan. The main factors behind the success were (1) embeddedness of the planning process in a larger project, where the plan was a tool for conservation, (2) carrying out only one process at a time, (3) previous experience of facilitators and planners with participatory planning and (4) the opportunity and capacity to propose a payment scheme as an incentive. But even this case received low scores in some criteria: conflict resolution, early involvement and well defined goals. Based on the results we suggest that more data is needed to evaluate the implementation of the plans and, in many cases, the impact of the process on the plan. Performance can be improved with the assistance of policy makers by further developing guidelines, harmonising payment schemes with the conservation measures of the plans and providing training on conflict resolution. The evaluation framework proved to be suitable for the assessment of a large set of conservation related management planning processes, but it also had some limitations, e.g. concerning the incorporation of stakeholders' views in the evaluation. Copyright © 2017 Elsevier Ltd. All rights reserved.
An efficient and provable secure revocable identity-based encryption scheme.
Wang, Changji; Li, Yuan; Xia, Xiaonan; Zheng, Kangjia
2014-01-01
Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE) has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters' identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters.
Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling
2016-01-01
Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model. PMID:27898703
Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling
2016-01-01
Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model.
2013-01-01
Background The National Health Insurance Fund (NHIF), a compulsory formal sector scheme took over the management of the Community Health Fund (CHF), a voluntary informal sector scheme, in 2009. This study assesses the origins of the reform, its effect on management and reporting structures, financial flow adequacy, reform communication and acceptability to key stakeholders, and initial progress towards universal coverage. Methods The study relied on national data sources and an in-depth collective case study of a rural and an urban district to assess awareness and acceptability of the reform, and fund availability and use relative to need in a sample of facilities. Results The reform was driven by a national desire to expand coverage and increase access to services. Despite initial delays, the CHF has been embedded within the NHIF organisational structure, bringing more intensive and qualified supervision closer to the district. National CHF membership has more than doubled. However, awareness of the reform was limited below the district level due to the reform’s top-down nature. The reform was generally acceptable to key stakeholders, who expected that benefits between schemes would be harmonised. The reform was unable to institute changes to the CHF design or district management structures because it has so far been unable to change CHF legislation which also limits facility capacity to use CHF revenue. Further, revenue generated is currently insufficient to offset treatment and administration costs, and the reform did not improve the revenue to cost ratio. Administrative costs are also likely to have increased as a result of the reform. Conclusion Informal sector schemes can benefit from merger with formal sector schemes through improved data systems, supervision, and management support. However, effects will be maximised if legal frameworks can be harmonised early on and a reduction in administrative costs is not guaranteed. PMID:23763711
Hydrological challenges to groundwater trading: Lessons from south-west Western Australia
NASA Astrophysics Data System (ADS)
Skurray, James H.; Roberts, E. J.; Pannell, David J.
2012-01-01
SummaryPerth, Western Australia (pop. 1.6 m) derives 60% of its public water supply from the Gnangara groundwater system (GGS). Horticulture, domestic self-supply, and municipal parks are other major consumers of GGS groundwater. The system supports important wetlands and groundwater-dependent ecosystems. Underlying approximately 2200 km 2 of the Swan Coastal Plain, the GGS comprises several aquifer levels with partial interconnectivity. Supplies of GGS groundwater are under unprecedented stress, due to reduced recharge and increases in extraction. Stored reserves in the superficial aquifer fell by 700 GL between 1979 and 2008. Over a similar period, annual extraction for public supply increased by more than 350% from the system overall. Some management areas are over-allocated by as much as 69%. One potential policy response is a trading scheme for groundwater use. There has been only limited trading between GGS irrigators. Design and implementation of a robust groundwater trading scheme faces hydrological and/or hydro-economic challenges, among others. Groundwater trading involves transfers of the right to extract water. The resulting potential for spatial (and temporal) redistribution of the impacts of extraction requires management. Impacts at the respective selling and buying locations may differ in scale and nature. Negative externalities from groundwater trading may be uncertain as well as not monetarily compensable. An ideal groundwater trading scheme would ensure that marginal costs from trades do not exceed marginal benefits, incorporating future effects and impacts on third-parties. If this condition could be met, all transactions would result in constant or improved overall welfare. This paper examines issues that could reduce public welfare if groundwater trading is not subject to well-designed governance arrangements that are appropriate to meeting the above condition. It also outlines some opportunities to address key risks within the design of a groundwater trading scheme. We present a number of challenges, focusing on those with hydrological bases and/or information requirements. These include the appropriate hydrological definition of the boundaries of a trading area, the establishment and defining of sustainable yield and consumptive pool, and the estimation of effects of extractions on ecosystems and human users. We suggest several possible design tools. A combination of sustainable extraction limits, trading rules, management areas, and/or exchange rates may enable a trading scheme to address the above goals.
NASA Astrophysics Data System (ADS)
Akhbari, M.
2015-12-01
Water, energy, and food are closely bound in consumption and production patterns. To increase resource efficiency and productivity in a sustainable fashion, co-management of water, energy, and food resources is becoming inevitable. These co-management schemes require implementation of nexus-based approaches, which takes the interconnections of water, energy, and food systems into account and considers that development in one area may have major effects on others. While society, economy and environment are the action areas to implement a nexus approach, finance, governance, infrastructure and technology can create solutions. Existing obstacles in the action areas and challenges associated with creating solutions increase the complexities to develop nexus-based approaches and complicate their implementation. This study, identifies existing social, economic, and environmental obstacles, financial demands and constraints, shortcomings in governance, and infrastructure problems in the United States as the main challenges that need to be overcome. Then, it will be discussed how advanced technology could be employed to facilitate implementation of nexus-based approaches, followed by providing some recommendations to enable institutions to employ new technology, overcome existing obstacles, and address challenges in order to implement nexus-based management approaches.
A provably-secure ECC-based authentication scheme for wireless sensor networks.
Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho
2014-11-06
A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho
2014-01-01
A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009
A soft-hard combination-based cooperative spectrum sensing scheme for cognitive radio networks.
Do, Nhu Tri; An, Beongku
2015-02-13
In this paper we propose a soft-hard combination scheme, called SHC scheme, for cooperative spectrum sensing in cognitive radio networks. The SHC scheme deploys a cluster based network in which Likelihood Ratio Test (LRT)-based soft combination is applied at each cluster, and weighted decision fusion rule-based hard combination is utilized at the fusion center. The novelties of the SHC scheme are as follows: the structure of the SHC scheme reduces the complexity of cooperative detection which is an inherent limitation of soft combination schemes. By using the LRT, we can detect primary signals in a low signal-to-noise ratio regime (around an average of -15 dB). In addition, the computational complexity of the LRT is reduced since we derive the closed-form expression of the probability density function of LRT value. The SHC scheme also takes into account the different effects of large scale fading on different users in the wide area network. The simulation results show that the SHC scheme not only provides the better sensing performance compared to the conventional hard combination schemes, but also reduces sensing overhead in terms of reporting time compared to the conventional soft combination scheme using the LRT.
A Novel Passive Tracking Scheme Exploiting Geometric and Intercept Theorems
Zhou, Biao; Sun, Chao; Ahn, Deockhyeon; Kim, Youngok
2018-01-01
Passive tracking aims to track targets without assistant devices, that is, device-free targets. Passive tracking based on Radio Frequency (RF) Tomography in wireless sensor networks has recently been addressed as an emerging field. The passive tracking scheme using geometric theorems (GTs) is one of the most popular RF Tomography schemes, because the GT-based method can effectively mitigate the demand for a high density of wireless nodes. In the GT-based tracking scheme, the tracking scenario is considered as a two-dimensional geometric topology and then geometric theorems are applied to estimate crossing points (CPs) of the device-free target on line-of-sight links (LOSLs), which reveal the target’s trajectory information in a discrete form. In this paper, we review existing GT-based tracking schemes, and then propose a novel passive tracking scheme by exploiting the Intercept Theorem (IT). To create an IT-based CP estimation scheme available in the noisy non-parallel LOSL situation, we develop the equal-ratio traverse (ERT) method. Finally, we analyze properties of three GT-based tracking algorithms and the performance of these schemes is evaluated experimentally under various trajectories, node densities, and noisy topologies. Analysis of experimental results shows that tracking schemes exploiting geometric theorems can achieve remarkable positioning accuracy even under rather a low density of wireless nodes. Moreover, the proposed IT scheme can provide generally finer tracking accuracy under even lower node density and noisier topologies, in comparison to other schemes. PMID:29562621
Design of on-board parallel computer on nano-satellite
NASA Astrophysics Data System (ADS)
You, Zheng; Tian, Hexiang; Yu, Shijie; Meng, Li
2007-11-01
This paper provides one scheme of the on-board parallel computer system designed for the Nano-satellite. Based on the development request that the Nano-satellite should have a small volume, low weight, low power cost, and intelligence, this scheme gets rid of the traditional one-computer system and dual-computer system with endeavor to improve the dependability, capability and intelligence simultaneously. According to the method of integration design, it employs the parallel computer system with shared memory as the main structure, connects the telemetric system, attitude control system, and the payload system by the intelligent bus, designs the management which can deal with the static tasks and dynamic task-scheduling, protect and recover the on-site status and so forth in light of the parallel algorithms, and establishes the fault diagnosis, restoration and system restructure mechanism. It accomplishes an on-board parallel computer system with high dependability, capability and intelligence, a flexible management on hardware resources, an excellent software system, and a high ability in extension, which satisfies with the conception and the tendency of the integration electronic design sufficiently.
NASA Astrophysics Data System (ADS)
Mu, Lingxia; Yu, Xiang; Zhang, Y. M.; Li, Ping; Wang, Xinmin
2018-02-01
A terminal area energy management (TAEM) guidance system for an unpowered reusable launch vehicle (RLV) is proposed in this paper. The mathematical model representing the RLV gliding motion is provided, followed by a transformation of extracting the required dynamics for reference profile generation. Reference longitudinal profiles are conceived based on the capability of maximum dive and maximum glide that a RLV can perform. The trajectory is obtained by iterating the motion equations at each node of altitude, where the angle of attack and the flight-path angle are regarded as regulating variables. An onboard ground-track predictor is constructed to generate the current range-to-go and lateral commands online. Although the longitudinal profile generation requires pre-processing using the RLV aerodynamics, the ground-track prediction can be executed online. This makes the guidance scheme adaptable to abnormal conditions. Finally, the guidance law is designed to track the reference commands. Numerical simulations demonstrate that the proposed guidance scheme is capable of guiding the RLV to the desired touchdown conditions.
Application of risk management techniques for the remediation of an old mining site in Greece.
Panagopoulos, I; Karayannis, A; Adam, K; Aravossis, K
2009-05-01
This article summarizes the project and risk management of a remediation/reclamation project in Lavrion, Greece. In Thoricos the disposal of mining and metallurgical wastes in the past resulted in the contamination with heavy metals and acid mine drainage. The objective of this reclamation project was to transform this coastal zone from a contaminated site to an area suitable for recreation purposes. A separate risk assessment study was performed to provide the basis of determining the relevant environmental contamination and to rate the alternative remedial schemes involved. The study used both existing data available from comprehensive studies, as well as newly collected field data. For considering environmental risk, the isolation and minimization of risk option was selected, and a reclamation scheme, based on environmental criteria, was applied which was comprised of in situ neutralization, stabilization and cover of the potentially acid generating wastes and contaminated soils with a low permeability geochemical barrier. Additional measures were specifically applied in the areas where highly sulphidic wastes existed constituting active acid generation sources, which included the encapsulation of wastes in HDPE liners installed on clay layers.
NASA Astrophysics Data System (ADS)
Makowski, Christopher
The coastal (terrestrial) and benthic environments along the southeast Florida continental shelf show a unique biophysical succession of marine features from a highly urbanized, developed coastal region in the north (i.e. northern Miami-Dade County) to a protective marine sanctuary in the southeast (i.e. Florida Keys National Marine Sanctuary). However, the establishment of a standard bio-geomorphological classification scheme for this area of coastal and benthic environments is lacking. The purpose of this study was to test the hypothesis and answer the research question of whether new parameters of integrating geomorphological components with dominant biological covers could be developed and applied across multiple remote sensing platforms for an innovative way to identify, interpret, and classify diverse coastal and benthic environments along the southeast Florida continental shelf. An ordered manageable hierarchical classification scheme was developed to incorporate the categories of Physiographic Realm, Morphodynamic Zone, Geoform, Landform, Dominant Surface Sediment, and Dominant Biological Cover. Six different remote sensing platforms (i.e. five multi-spectral satellite image sensors and one high-resolution aerial orthoimagery) were acquired, delineated according to the new classification scheme, and compared to determine optimal formats for classifying the study area. Cognitive digital classification at a nominal scale of 1:6000 proved to be more accurate than autoclassification programs and therefore used to differentiate coastal marine environments based on spectral reflectance characteristics, such as color, tone, saturation, pattern, and texture of the seafloor topology. In addition, attribute tables were created in conjugation with interpretations to quantify and compare the spatial relationships between classificatory units. IKONOS-2 satellite imagery was determined to be the optimal platform for applying the hierarchical classification scheme. However, each remote sensing platform had beneficial properties depending on research goals, logistical restrictions, and financial support. This study concluded that a new hierarchical comprehensive classification scheme for identifying coastal marine environments along the southeast Florida continental shelf could be achieved by integrating geomorphological features with biological coverages. This newly developed scheme, which can be applied across multiple remote sensing platforms with GIS software, establishes an innovative classification protocol to be used in future research studies.
V-DRASTIC: Using visualization to engage policymakers in groundwater vulnerability assessment
NASA Astrophysics Data System (ADS)
Bojórquez-Tapia, Luis A.; Cruz-Bello, Gustavo M.; Luna-González, Laura; Juárez, Lourdes; Ortiz-Pérez, Mario A.
2009-06-01
SummaryGroundwater vulnerability mapping is increasingly being used to design aquifer protection and management strategies. This paper presents a dynamic visualization method to groundwater vulnerability mapping. This method—called V-DRASTIC—extends the capacities of DRASTIC, an overlay/index technique that has been applied worldwide to evaluate the condition of hydrogeological factors and determine groundwater vulnerability at regional scales. V-DRASTIC is based upon psychophysics' principles (a theory that describes the people's response to a stimulus) to generate alternative groundwater vulnerability categorization schemes. These are used as inputs in a fuzzy pattern recognition procedure to enable planners, decision makers and stakeholders identify which scheme conveys meaningful information regarding groundwater vulnerability across a territory. V-DRASTIC was applied in the groundwater vulnerability assessment of two urban watersheds in Mexico.
Sodzi-Tettey, S; Aikins, M; Awoonor-Williams, J K; Agyepong, I A
2012-12-01
In 2004, Ghana started implementing a National Health Insurance Scheme (NHIS) to remove cost as a barrier to quality healthcare. Providers were initially paid by fee - for - service. In May 2008, this changed to paying providers by a combination of Ghana - Diagnostic Related Groupings (G-DRGs) for services and fee - for - service for medicines through the claims process. The study evaluated the claims management processes for two District MHIS in the Upper East Region of Ghana. Retrospective review of secondary claims data (2008) and a prospective observation of claims management (2009) were undertaken. Qualitative and quantitative approaches were used for primary data collection using interview guides and checklists. The reimbursements rates and value of rejected claims were calculated and compared for both districts using the z test. The null hypothesis was that no differences existed in parameters measured. Claims processes in both districts were similar and predominantly manual. There were administrative capacity, technical, human resource and working environment challenges contributing to delays in claims submission by providers and vetting and payment by schemes. Both Schemes rejected less than 1% of all claims submitted. Significant differences were observed between the Total Reimbursement Rates (TRR) and the Total Timely Reimbursement Rates (TTRR) for both schemes. For TRR, 89% and 86% were recorded for Kassena Nankana and Builsa Schemes respectively while for TTRR, 45% and 28% were recorded respectively. Ghana's NHIS needs to reform its provider payment and claims submission and processing systems to ensure simpler and faster processes. Computerization and investment to improve the capacity to administer for both purchasers and providers will be key in any reform.
Design of housing file box of fire academy based on RFID
NASA Astrophysics Data System (ADS)
Li, Huaiyi
2018-04-01
This paper presents a design scheme of intelligent file box based on RFID. The advantages of RFID file box and traditional file box are compared and analyzed, and the feasibility of RFID file box design is analyzed based on the actual situation of our university. After introducing the shape and structure design of the intelligent file box, the paper discusses the working process of the file box, and explains in detail the internal communication principle of the RFID file box and the realization of the control system. The application of the RFID based file box will greatly improve the efficiency of our school's archives management.
Approach to spatial information security based on digital certificate
NASA Astrophysics Data System (ADS)
Cong, Shengri; Zhang, Kai; Chen, Baowen
2005-11-01
With the development of the online applications of geographic information systems (GIS) and the spatial information services, the spatial information security becomes more important. This work introduced digital certificates and authorization schemes into GIS to protect the crucial spatial information combining the techniques of the role-based access control (RBAC), the public key infrastructure (PKI) and the privilege management infrastructure (PMI). We investigated the spatial information granularity suited for sensitivity marking and digital certificate model that fits the need of GIS security based on the semantics analysis of spatial information. It implements a secure, flexible, fine-grained data access based on public technologies in GIS in the world.
An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity
Kumari, Saru
2013-01-01
The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability. PMID:24350272
An improved biometrics-based remote user authentication scheme with user anonymity.
Khan, Muhammad Khurram; Kumari, Saru
2013-01-01
The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.
Provably secure identity-based identification and signature schemes from code assumptions
Zhao, Yiming
2017-01-01
Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure. PMID:28809940
Provably secure identity-based identification and signature schemes from code assumptions.
Song, Bo; Zhao, Yiming
2017-01-01
Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure.
NASA Astrophysics Data System (ADS)
Moissinac, Henri; Maitre, Henri; Bloch, Isabelle
1995-11-01
An image interpretation method is presented for the automatic processing of aerial pictures of a urban landscape. In order to improve the picture analysis, some a priori knowledge extracted from a geographic map is introduced. A coherent graph-based model of the city is built, starting with the road network. A global uncertainty management scheme has been designed in order to evaluate the final confidence we can have in the final results. This model and the uncertainty management tend to reflect the hierarchy of the available data and the interpretation levels. The symbolic relationships linking the different kinds of elements are taken into account while propagating and combining the confidence measures along the interpretation process.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Soko, W.A.; Biaecka, B.
1998-12-31
In this paper the solution to waste problems in the paint industry is presented by describing their combustion in a fluidized bed boiler as a part of the waste management system in the paint factory. Based on the Cleaner Production idea and concept of integration of design process with a future exploitation of equipment, some modifications of the waste management scheme in the factory are discussed to reduce the quantity of toxic wastes. To verify this concept combustion tests of paint production wastes and cocombustion of paint wastes with coal in an adopted industrial boiler were done. Results of thesemore » tests are presented in the paper.« less
NASA Astrophysics Data System (ADS)
Boonyaritdachochai, Panida; Boonchuay, Chanwit; Ongsakul, Weerakorn
2010-06-01
This paper proposes an optimal power redispatching approach for congestion management in deregulated electricity market. Generator sensitivity is considered to indicate the redispatched generators. It can reduce the number of participating generators. The power adjustment cost and total redispatched power are minimized by particle swarm optimization with time varying acceleration coefficients (PSO-TVAC). The IEEE 30-bus and IEEE 118-bus systems are used to illustrate the proposed approach. Test results show that the proposed optimization scheme provides the lowest adjustment cost and redispatched power compared to the other schemes. The proposed approach is useful for the system operator to manage the transmission congestion.
NASA Astrophysics Data System (ADS)
Driben, R.; Meier, T.
2014-04-01
Dispersion management of periodically alternating fiber sections with opposite signs of two leading dispersion terms is applied for the regeneration of self-accelerating truncated Airy pulses. It is demonstrated that for such a dispersion management scheme, the direction of the acceleration of the pulse is reversed twice within each period. In this scheme the system features light hot spots in the center of each fiber section, where the energy of the light pulse is tightly focused in a short temporal slot. Comprehensive numerical studies demonstrate a long-lasting propagation also under the influence of a strong fiber Kerr nonlinearity.
Frische, Tobias; Bachmann, Jean; Frein, Daniel; Juffernholz, Tanja; Kehrer, Anja; Klein, Anita; Maack, Gerd; Stock, Frauke; Stolzenberg, Hans-Christian; Thierbach, Claudia; Walter-Rohde, Susanne
2013-12-16
A discussion paper was developed by a panel of experts of the German Federal Environment Agency (UBA) contributing to the on-going debate on the identification, assessment and management of endocrine disruptors with a view to protect wildlife according to the EU substance legislation (plant protection products, biocides, industrial chemicals). Based on a critical synthesis of the state-of-the-art regarding regulatory requirements, testing methods, assessment schemes, decision-making criteria and risk management options, we advise an appropriate and consistent implementation of this important subject into existing chemicals legislation in Europe. Our proposal for a balanced risk management of endocrine disruptors essentially advocates transparent regulatory decision making based on a scientifically robust weight of evidence approach and an adequate risk management consistent across different legislations. With respect to the latter, a more explicit consideration of the principle of proportionality of regulatory decision making and socio-economic benefits in the on-going debate is further encouraged. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Assessing the groundwater recharge under various irrigation schemes in Central Taiwan
NASA Astrophysics Data System (ADS)
Chen, Shih-Kai; Jang, Cheng-Shin; Lin, Zih-Ciao; Tsai, Cheng-Bin
2014-05-01
The flooded paddy fields can be considered as a major source of groundwater recharge in Central Taiwan. The risk of rice production has increased notably due to climate change in this area. To respond to agricultural water shortage caused by climate change without affecting rice yield in the future, the application of water-saving irrigation is the substantial resolution. The System of Rice Intensification (SRI) was developed as a set of insights and practices used in growing irrigated rice. Based on the water-saving irrigation practice of SRI, impacts of the new methodology on the reducing of groundwater recharge were assessed in central Taiwan. The three-dimensional finite element groundwater model (FEMWATER) with the variable boundary condition analog functions, was applied in simulating groundwater recharge under different irrigation schemes. According to local climatic and environmental characteristics associated with SRI methodology, the change of infiltration rate was evaluated and compared with the traditional irrigation schemes, including continuous irrigation and rotational irrigation scheme. The simulation results showed that the average infiltration rate in the rice growing season decreased when applying the SRI methodology, and the total groundwater recharge amount of SRI with a 5-day irrigation interval reduced 12% and 9% compared with continuous irrigation (6cm constant ponding water depth) and rotational scheme (5-day irrigation interval with 6 cm initial ponding water depth), respectively. The results could be used as basis for planning long-term adaptive water resource management strategies to climate change in Central Taiwan. Keywords: SRI, Irrigation schemes, Groundwater recharge, Infiltration
Multiobjective hyper heuristic scheme for system design and optimization
NASA Astrophysics Data System (ADS)
Rafique, Amer Farhan
2012-11-01
As system design is becoming more and more multifaceted, integrated, and complex, the traditional single objective optimization trends of optimal design are becoming less and less efficient and effective. Single objective optimization methods present a unique optimal solution whereas multiobjective methods present pareto front. The foremost intent is to predict a reasonable distributed pareto-optimal solution set independent of the problem instance through multiobjective scheme. Other objective of application of intended approach is to improve the worthiness of outputs of the complex engineering system design process at the conceptual design phase. The process is automated in order to provide the system designer with the leverage of the possibility of studying and analyzing a large multiple of possible solutions in a short time. This article presents Multiobjective Hyper Heuristic Optimization Scheme based on low level meta-heuristics developed for the application in engineering system design. Herein, we present a stochastic function to manage meta-heuristics (low-level) to augment surety of global optimum solution. Generic Algorithm, Simulated Annealing and Swarm Intelligence are used as low-level meta-heuristics in this study. Performance of the proposed scheme is investigated through a comprehensive empirical analysis yielding acceptable results. One of the primary motives for performing multiobjective optimization is that the current engineering systems require simultaneous optimization of conflicting and multiple. Random decision making makes the implementation of this scheme attractive and easy. Injecting feasible solutions significantly alters the search direction and also adds diversity of population resulting in accomplishment of pre-defined goals set in the proposed scheme.
Mishra, Dheerendra; Srinivas, Jangirala; Mukhopadhyay, Sourav
2014-10-01
Advancement in network technology provides new ways to utilize telecare medicine information systems (TMIS) for patient care. Although TMIS usually faces various attacks as the services are provided over the public network. Recently, Jiang et al. proposed a chaotic map-based remote user authentication scheme for TMIS. Their scheme has the merits of low cost and session key agreement using Chaos theory. It enhances the security of the system by resisting various attacks. In this paper, we analyze the security of Jiang et al.'s scheme and demonstrate that their scheme is vulnerable to denial of service attack. Moreover, we demonstrate flaws in password change phase of their scheme. Further, our aim is to propose a new chaos map-based anonymous user authentication scheme for TMIS to overcome the weaknesses of Jiang et al.'s scheme, while also retaining the original merits of their scheme. We also show that our scheme is secure against various known attacks including the attacks found in Jiang et al.'s scheme. The proposed scheme is comparable in terms of the communication and computational overheads with Jiang et al.'s scheme and other related existing schemes. Moreover, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.
What evidence do we have to replace in-hospital implantable cardioverter defibrillator follow-up?
Brugada, P
2006-01-01
Due to the increasing number of patients with an implantable cardioverter defibrillator (ICD), new options for ICD patient follow-up management are required. Patients with ICD indication according to the guidelines received an ICD with Home Monitoring technology. The devices enabled the transmission of the relevant episode, therapy, and system integrity data. Patients were followed for 12 months with routine controls every 3 months. The physician analyzed the Home Monitoring data before the routine follow-up visit (FU) and gave a forecast on the necessity of the pending FU, which was compared with the evaluation after the FU. Based on the derived forecast reliability, a patient management scheme was developed and its impact on patient safety was assessed retrospectively. A total of 271 patients were enrolled (40 f, mean age 62+/-12 years, mean LVEF 39+/-15%, 65% ischemic heart disease, 20% cardiomyopathy) and followed for 339+/-109 days. Of 908 pairs of Home Monitoring data and FU data evaluation, 129 there were false negative results for 92 patients. Safety concerns from false negative forecasts can be minimized with a patient management scheme containing the following elements: 1) never skip the first routine FU; 2) never skip a routine FU for a patient having already shown pacing threshold problems; 3) perform FU following hospitalizations; 4) perform FU following episode detection by the ICD; and 5) perform a routine FU if the patient reports symptoms. The retrospective analysis showed, that if the patients had been managed using this scheme, 503 of 1079 routine FU could have been skipped with only one safety concern, a three month delay in the detection of silent paroxysmal atrial fibrillation in one patient. Home Monitoring in ICD therapy over 12 months is feasible. The data transmitted relevantly contribute to a remarkable reduction of follow-up burden and enable the individualization of routine follow-up.
A Comparison of Global Indexing Schemes to Facilitate Earth Science Data Management
NASA Astrophysics Data System (ADS)
Griessbaum, N.; Frew, J.; Rilee, M. L.; Kuo, K. S.
2017-12-01
Recent advances in database technology have led to systems optimized for managing petabyte-scale multidimensional arrays. These array databases are a good fit for subsets of the Earth's surface that can be projected into a rectangular coordinate system with acceptable geometric fidelity. However, for global analyses, array databases must address the same distortions and discontinuities that apply to map projections in general. The array database SciDB supports enormous databases spread across thousands of computing nodes. Additionally, the following SciDB characteristics are particularly germane to the coordinate system problem: SciDB efficiently stores and manipulates sparse (i.e. mostly empty) arrays. SciDB arrays have 64-bit indexes. SciDB supports user-defined data types, functions, and operators. We have implemented two geospatial indexing schemes in SciDB. The simplest uses two array dimensions to represent longitude and latitude. For representation as 64-bit integers, the coordinates are multiplied by a scale factor large enough to yield an appropriate Earth surface resolution (e.g., a scale factor of 100,000 yields a resolution of approximately 1m at the equator). Aside from the longitudinal discontinuity, the principal disadvantage of this scheme is its fixed scale factor. The second scheme uses a single array dimension to represent the bit-codes for locations in a hierarchical triangular mesh (HTM) coordinate system. A HTM maps the Earth's surface onto an octahedron, and then recursively subdivides each triangular face to the desired resolution. Earth surface locations are represented as the concatenation of an octahedron face code and a quadtree code within the face. Unlike our integerized lat-lon scheme, the HTM allow for objects of different size (e.g., pixels with differing resolutions) to be represented in the same indexing scheme. We present an evaluation of the relative utility of these two schemes for managing and analyzing MODIS swath data.
Research to Assembly Scheme for Satellite Deck Based on Robot Flexibility Control Principle
NASA Astrophysics Data System (ADS)
Guo, Tao; Hu, Ruiqin; Xiao, Zhengyi; Zhao, Jingjing; Fang, Zhikai
2018-03-01
Deck assembly is critical quality control point in final satellite assembly process, and cable extrusion and structure collision problems in assembly process will affect development quality and progress of satellite directly. Aimed at problems existing in deck assembly process, assembly project scheme for satellite deck based on robot flexibility control principle is proposed in this paper. Scheme is introduced firstly; secondly, key technologies on end force perception and flexible docking control in the scheme are studied; then, implementation process of assembly scheme for satellite deck is described in detail; finally, actual application case of assembly scheme is given. Result shows that compared with traditional assembly scheme, assembly scheme for satellite deck based on robot flexibility control principle has obvious advantages in work efficiency, reliability and universality aspects etc.
A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.
Wang, Shangping; Ye, Jian; Zhang, Yaling
2018-01-01
Ciphertext-policy attribute-based encryption (CP-ABE) scheme is a new type of data encryption primitive, which is very suitable for data cloud storage for its fine-grained access control. Keyword-based searchable encryption scheme enables users to quickly find interesting data stored in the cloud server without revealing any information of the searched keywords. In this work, we provide a keyword searchable attribute-based encryption scheme with attribute update for cloud storage, which is a combination of attribute-based encryption scheme and keyword searchable encryption scheme. The new scheme supports the user's attribute update, especially in our new scheme when a user's attribute need to be updated, only the user's secret key related with the attribute need to be updated, while other user's secret key and the ciphertexts related with this attribute need not to be updated with the help of the cloud server. In addition, we outsource the operation with high computation cost to cloud server to reduce the user's computational burden. Moreover, our scheme is proven to be semantic security against chosen ciphertext-policy and chosen plaintext attack in the general bilinear group model. And our scheme is also proven to be semantic security against chosen keyword attack under bilinear Diffie-Hellman (BDH) assumption.
A keyword searchable attribute-based encryption scheme with attribute update for cloud storage
Wang, Shangping; Zhang, Yaling
2018-01-01
Ciphertext-policy attribute-based encryption (CP-ABE) scheme is a new type of data encryption primitive, which is very suitable for data cloud storage for its fine-grained access control. Keyword-based searchable encryption scheme enables users to quickly find interesting data stored in the cloud server without revealing any information of the searched keywords. In this work, we provide a keyword searchable attribute-based encryption scheme with attribute update for cloud storage, which is a combination of attribute-based encryption scheme and keyword searchable encryption scheme. The new scheme supports the user's attribute update, especially in our new scheme when a user's attribute need to be updated, only the user's secret key related with the attribute need to be updated, while other user's secret key and the ciphertexts related with this attribute need not to be updated with the help of the cloud server. In addition, we outsource the operation with high computation cost to cloud server to reduce the user's computational burden. Moreover, our scheme is proven to be semantic security against chosen ciphertext-policy and chosen plaintext attack in the general bilinear group model. And our scheme is also proven to be semantic security against chosen keyword attack under bilinear Diffie-Hellman (BDH) assumption. PMID:29795577
Guo, Hua; Zheng, Yandong; Zhang, Xiyong; Li, Zhoujun
2016-01-01
In resource-constrained wireless networks, resources such as storage space and communication bandwidth are limited. To guarantee secure communication in resource-constrained wireless networks, group keys should be distributed to users. The self-healing group key distribution (SGKD) scheme is a promising cryptographic tool, which can be used to distribute and update the group key for the secure group communication over unreliable wireless networks. Among all known SGKD schemes, exponential arithmetic based SGKD (E-SGKD) schemes reduce the storage overhead to constant, thus is suitable for the the resource-constrained wireless networks. In this paper, we provide a new mechanism to achieve E-SGKD schemes with backward secrecy. We first propose a basic E-SGKD scheme based on a known polynomial-based SGKD, where it has optimal storage overhead while having no backward secrecy. To obtain the backward secrecy and reduce the communication overhead, we introduce a novel approach for message broadcasting and self-healing. Compared with other E-SGKD schemes, our new E-SGKD scheme has the optimal storage overhead, high communication efficiency and satisfactory security. The simulation results in Zigbee-based networks show that the proposed scheme is suitable for the resource-restrained wireless networks. Finally, we show the application of our proposed scheme. PMID:27136550
Management's Ecstasy and Disparity Over Job Enrichment
ERIC Educational Resources Information Center
King, Albert S.
1976-01-01
A case study analyzing job enrichment schemes and manager expectations of increased productivity is presented. It was found that it was the managers' expectations of increased productivity, not the reorganization of work, that led to higher productivity. (EC)
Fuzzy-PI-based centralised control of semi-isolated FP-SEPIC/ZETA BDC in a PV/battery hybrid system
NASA Astrophysics Data System (ADS)
Mahendran, Venmathi; Ramabadran, Ramaprabha
2016-11-01
Multiport converters with centralised controller have been most commonly used in stand-alone photovoltaic (PV)/battery hybrid system to supply the load smoothly without any disturbances. This study presents the performance analysis of four-port SEPIC/ZETA bidirectional converter (FP-SEPIC/ZETA BDC) using various types of centralised control schemes like Fuzzy tuned proportional integral controller (Fuzzy-PI), fuzzy logic controller (FLC) and conventional proportional integral (PI) controller. The proposed FP-SEPIC/ZETA BDC with various control strategy is derived for simultaneous power management of a PV source using distributed maximum power point tracking (DMPPT) algorithm, a rechargeable battery, and a load by means of centralised controller. The steady state and the dynamic response of the FP-SEPIC/ZETA BDC are analysed using three different types of controllers under line and load regulation. The Fuzzy-PI-based control scheme improves the dynamic response of the system when compared with the FLC and the conventional PI controller. The power balance between the ports is achieved by pseudorandom carrier modulation scheme. The response of the FP-SEPIC/ZETA BDC is also validated experimentally using hardware prototype model of 500 W system. The effectiveness of the control strategy is validated using simulation and experimental results.
Need for evaluative methodologies in land use, regional resource and waste management planning
DOE Office of Scientific and Technical Information (OSTI.GOV)
Croke, E. J.
The transfer of planning methodology from the research community to the practitioner very frequently takes the form of analytical and evaluative techniques and procedures. In the end, these become operational in the form of data acquisition, management and display systems, computational schemes that are codified in the form of manuals and handbooks, and computer simulation models. The complexity of the socioeconomic and physical processes that govern environmental resource and waste management have reinforced the need for computer assisted, scientifically sophisticated planning models that are fully operational, dependent on an attainable data base and accessible in terms of the resources normallymore » available to practitioners of regional resource management, waste management, and land use planning. A variety of models and procedures that attempt to meet one or more of the needs of these practitioners are discussed.« less
The monitoring and managing application of cloud computing based on Internet of Things.
Luo, Shiliang; Ren, Bin
2016-07-01
Cloud computing and the Internet of Things are the two hot points in the Internet application field. The application of the two new technologies is in hot discussion and research, but quite less on the field of medical monitoring and managing application. Thus, in this paper, we study and analyze the application of cloud computing and the Internet of Things on the medical field. And we manage to make a combination of the two techniques in the medical monitoring and managing field. The model architecture for remote monitoring cloud platform of healthcare information (RMCPHI) was established firstly. Then the RMCPHI architecture was analyzed. Finally an efficient PSOSAA algorithm was proposed for the medical monitoring and managing application of cloud computing. Simulation results showed that our proposed scheme can improve the efficiency about 50%. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Health Monitoring and Management for Manufacturing Workers in Adverse Working Conditions.
Xu, Xiaoya; Zhong, Miao; Wan, Jiafu; Yi, Minglun; Gao, Tiancheng
2016-10-01
In adverse working conditions, environmental parameters such as metallic dust, noise, and environmental temperature, directly affect the health condition of manufacturing workers. It is therefore important to implement health monitoring and management based on important physiological parameters (e.g., heart rate, blood pressure, and body temperature). In recent years, new technologies, such as body area networks, cloud computing, and smart clothing, have allowed the improvement of the quality of services. In this article, we first give five-layer architecture for health monitoring and management of manufacturing workers. Then, we analyze the system implementation process, including environmental data processing, physical condition monitoring and system services and management, and present the corresponding algorithms. Finally, we carry out an evaluation and analysis from the perspective of insurance and compensation for manufacturing workers in adverse working conditions. The proposed scheme will contribute to the improvement of workplace conditions, realize health monitoring and management, and protect the interests of manufacturing workers.
La Rocca, Antonella; Hoholm, Thomas
2017-02-17
In Norway, a government reform has recently been introduced to enhance coordination between primary and secondary care. This paper examines the effects of two newly introduced measures to improve the coordination: an ICT-based communication tool/standard and an economic incentive scheme. This qualitative study is based primarily on 27 open-ended interviews. We interviewed nine employees at a hospital (the focal actor), 17 employees from seven different municipalities, and a representative of a Regional Health Authority. ICT-based communication is perceived to facilitate information exchange between primary and secondary care, thus positively affecting coordination. However, the economic incentive scheme appears to have the opposite effect by creating tensions between the two organizations and accentuating power asymmetry in favor of secondary care. The inter-organizational nature of coordination in health care makes it crucial for policymakers and management of care organizations to conceive incentives and instruments that work jointly across organizations rather than at only one of the health care organizations involved. Such an approach is likely to favor a more symmetrical pattern of collaboration between primary and secondary care.
A Systems Approach to the Aeromedical Aircraft Routing Problem Using a Computer-Based Model.
1988-01-01
subscriber) and immediate (dynamic) service requests are generated . The DOD system is similar in many respects to urban paratransit systems for the...desired destination. This required us to develop effective service criteria,2 rules for ’storino’ patients overnight at enroute locations, and schemes ...a planning subsystem has to deal with the generation of plans for the system. ... The management sets the component goals, allocates the resources,and
1983-11-03
capability. An intelligent library management system will be supported by knowledge-based techniques. In fact, until a formal specification of library...from artificial intelligence and information science 2 might also be useful, for example automatic indexing and cataloging schemes, methods for fast...Artificial Intelligence 5:1045-1058, 1977. [Burstall & Goguen 801 Burstall, R. M., and Goguen, J. A. The Semantics of Clear, a Specification Language. In
Efficient Trajectory Options Allocation for the Collaborative Trajectory Options Program
NASA Technical Reports Server (NTRS)
Rodionova, Olga; Arneson, Heather; Sridhar, Banavar; Evans, Antony
2017-01-01
The Collaborative Trajectory Options Program (CTOP) is a Traffic Management Initiative (TMI) intended to control the air traffic flow rates at multiple specified Flow Constrained Areas (FCAs), where demand exceeds capacity. CTOP allows flight operators to submit the desired Trajectory Options Set (TOS) for each affected flight with associated Relative Trajectory Cost (RTC) for each option. CTOP then creates a feasible schedule that complies with capacity constraints by assigning affected flights with routes and departure delays in such a way as to minimize the total cost while maintaining equity across flight operators. The current version of CTOP implements a Ration-by-Schedule (RBS) scheme, which assigns the best available options to flights based on a First-Scheduled-First-Served heuristic. In the present study, an alternative flight scheduling approach is developed based on linear optimization. Results suggest that such an approach can significantly reduce flight delays, in the deterministic case, while maintaining equity as defined using a Max-Min fairness scheme.
Hausdorf, Steffen; Baitalow, Felix; Seidel, Jürgen; Mertens, Florian O R L
2007-05-24
Gaseous species emitted during the zinc oxide/zinc hydroxide 1,4-benzenedicarboxylate metal organic framework synthesis (MOF-5, MOF-69c) have been used to investigate the reaction scheme that leads to the framework creation. Changes of the gas-phase composition over time indicate that the decomposition of the solvent diethylformamide occurs at least via two competing reaction pathways that can be linked to the reaction's overall water and pH management. From isotope exchange experiments, we deduce that one of the decomposition pathways leads to the removal of water from the reaction mixture, which sets the conditions when the synthesis of an oxide-based (MOF-5) instead of an hydroxide-based MOF (MOF-69c) occurs. A quantitative account of most reactants and byproducts before and after the MOF-5/MOF-69c synthesis is presented. From the investigation of the reaction intermediates and byproducts, we derive a proposal of a basic reaction scheme for the standard synthesis zinc oxide carboxylate MOFs.
Delayed lead perforation: a disturbing trend.
Khan, Mohammed N; Joseph, George; Khaykin, Yaariv; Ziada, Khaled M; Wilkoff, Bruce L
2005-03-01
Delayed lead perforation (occurring more than 1 month after implantation) is a rare complication. Its pathophysiology and optimal management are currently unclear. Three cases of delayed lead perforation (6-10 month) were identified in patients with low-profile active fixation leads. All cases presented in a subacute fashion with pleuritic chest pain with confirmatory chest x-ray and device interrogation. Given the potential complications of a perforated lead, all cases had the lead extracted under TEE observation with cardiac surgery backup in the operating room. All patients tolerated extraction without complication. Based on these cases, we recommend a management scheme for patients who present with delayed lead perforation.
An improved biometrics-based authentication scheme for telecare medical information systems.
Guo, Dianli; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping
2015-03-01
Telecare medical information system (TMIS) offers healthcare delivery services and patients can acquire their desired medical services conveniently through public networks. The protection of patients' privacy and data confidentiality are significant. Very recently, Mishra et al. proposed a biometrics-based authentication scheme for telecare medical information system. Their scheme can protect user privacy and is believed to resist a range of network attacks. In this paper, we analyze Mishra et al.'s scheme and identify that their scheme is insecure to against known session key attack and impersonation attack. Thereby, we present a modified biometrics-based authentication scheme for TMIS to eliminate the aforementioned faults. Besides, we demonstrate the completeness of the proposed scheme through BAN-logic. Compared to the related schemes, our protocol can provide stronger security and it is more practical.
NASA Astrophysics Data System (ADS)
Saeb Gilani, T.; Villringer, C.; Zhang, E.; Gundlach, H.; Buchmann, J.; Schrader, S.; Laufer, J.
2018-02-01
Tomographic photoacoustic (PA) images acquired using a Fabry-Perot (FP) based scanner offer high resolution and image fidelity but can result in long acquisition times due to the need for raster scanning. To reduce the acquisition times, a parallelised camera-based PA signal detection scheme is developed. The scheme is based on using a sCMOScamera and FPI sensors with high homogeneity of optical thickness. PA signals were acquired using the camera-based setup and the signal to noise ratio (SNR) was measured. A comparison of the SNR of PA signal detected using 1) a photodiode in a conventional raster scanning detection scheme and 2) a sCMOS camera in parallelised detection scheme is made. The results show that the parallelised interrogation scheme has the potential to provide high speed PA imaging.
NASA Astrophysics Data System (ADS)
Guo, Kai; Xie, Yongjie; Ye, Hu; Zhang, Song; Li, Yunfei
2018-04-01
Due to the uncertainty of stratospheric airship's shape and the security problem caused by the uncertainty, surface reconstruction and surface deformation monitoring of airship was conducted based on laser scanning technology and a √3-subdivision scheme based on Shepard interpolation was developed. Then, comparison was conducted between our subdivision scheme and the original √3-subdivision scheme. The result shows our subdivision scheme could reduce the shrinkage of surface and the number of narrow triangles. In addition, our subdivision scheme could keep the sharp features. So, surface reconstruction and surface deformation monitoring of airship could be conducted precisely by our subdivision scheme.
Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia
2018-01-01
Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation. PMID:29772840
Global magnetohydrodynamic simulations on multiple GPUs
NASA Astrophysics Data System (ADS)
Wong, Un-Hong; Wong, Hon-Cheng; Ma, Yonghui
2014-01-01
Global magnetohydrodynamic (MHD) models play the major role in investigating the solar wind-magnetosphere interaction. However, the huge computation requirement in global MHD simulations is also the main problem that needs to be solved. With the recent development of modern graphics processing units (GPUs) and the Compute Unified Device Architecture (CUDA), it is possible to perform global MHD simulations in a more efficient manner. In this paper, we present a global magnetohydrodynamic (MHD) simulator on multiple GPUs using CUDA 4.0 with GPUDirect 2.0. Our implementation is based on the modified leapfrog scheme, which is a combination of the leapfrog scheme and the two-step Lax-Wendroff scheme. GPUDirect 2.0 is used in our implementation to drive multiple GPUs. All data transferring and kernel processing are managed with CUDA 4.0 API instead of using MPI or OpenMP. Performance measurements are made on a multi-GPU system with eight NVIDIA Tesla M2050 (Fermi architecture) graphics cards. These measurements show that our multi-GPU implementation achieves a peak performance of 97.36 GFLOPS in double precision.
Pathways to increase consumer trust in meat as a safe and wholesome food.
Gellynck, Xavier; Verbeke, Wim; Vermeire, Bert
2006-09-01
This paper focuses on the effect of information about meat safety and wholesomeness on consumer trust based on several studies with data collected in Belgium. The research is grounded in the observation that despite the abundant rise of information through labelling, traceability systems and quality assurance schemes, the effect on consumer trust in meat as a safe and wholesome product is only limited. The overload and complexity of information on food products results in misunderstanding and misinterpretation. Functional traceability attributes such as organisational efficiency and chain monitoring are considered to be highly important but not as a basis for market segmentation. However, process traceability attributes such as origin and production method are of interest for particular market segments as a response to meat quality concerns. Quality assurance schemes and associated labels have a poor impact on consumers' perception. It is argued that the high interest of retailers in such schemes is driven by procurement management efficiency rather than safety or overall quality. Future research could concentrate on the distribution of costs and benefits associated with meat quality initiatives among the chain participants.
Walton, Anna; Kestler, Edgar; Dettinger, Julia C; Zelek, Sarah; Holme, Francesca; Walker, Dilys
2016-03-01
To assess the effect of a low-technology simulation-based training scheme for obstetric and perinatal emergency management (PRONTO; Programa de Rescate Obstétrico y Neonatal: Tratamiento Óptimo y Oportuno) on non-emergency delivery practices at primary level clinics in Guatemala. A paired cross-sectional birth observation study was conducted with a convenience sample of 18 clinics (nine pairs of intervention and control clinics) from June 28 to August 7, 2013. Outcomes included implementation of practices known to decrease maternal and/or neonatal mortality and improve patient care. Overall, 25 and 17 births occurred in intervention and control clinics, respectively. Active management of the third stage of labor was appropriately performed by 20 (83%) of 24 intervention teams versus 7 (50%) of 14 control teams (P=0.015). Intervention teams implemented more practices to decrease neonatal mortality than did control teams (P<0.001). Intervention teams ensured patient privacy in 23 (92%) of 25 births versus 11 (65%) of 17 births for control teams (P=0.014). All 15 applicable intervention teams kept patients informed versus 6 (55%) of 11 control teams (P=0.001). Differences were also noted in teamwork; in particular, skill-based tools were used more often at intervention sites than control sites (P=0.012). Use of PRONTO enhanced non-emergency delivery care by increasing evidence-based practice, patient-centered care, and teamwork. Copyright © 2015 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.
Zhu, Hongfei; Tan, Yu-An; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang
2018-05-22
With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people's lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks
Zhu, Hongfei; Tan, Yu-an; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang
2018-01-01
With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people’s lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size. PMID:29789475
NASA Astrophysics Data System (ADS)
McSharry, Patrick; Mitchell, Andrew; Anderson, Rebecca
2010-05-01
Decision-makers in both public and private organisations depend on accurate data and scientific understanding to adequately address climate change and the impact of extreme events. The financial impacts of catastrophes on populations and infrastructure can be offset through effective risk transfer mechanisms, structured to reflect the specific perils and levels of exposure to be covered. Optimal strategies depend on the likely socio-econonomic impact, the institutional framework, the overall objectives of the covers placed and the level of both the frequency and severity of loss potential expected. The diversity of approaches across different countries has been documented by the Spanish "Consorcio de Compensación de Seguros". We discuss why international public/private partnerships are necessary for addressing the risk of natural catastrophes. International initiatives such as the Global Earthquake Model (GEM) and the World Forum of Catastrophe Programmes (WFCP) can provide effective guidelines for constructing natural catastrophe schemes. The World Bank has been instrumental in the creation of many of the existing schemes such as the Turkish Catastrophe Insurance Pool, the Caribbean Catastrophe Risk Insurance Facility and the Mongolian Index-Based Livestock Insurance Program. We review existing schemes and report on best practice in relation to providing protection against natural catastrophe perils. The suitability of catastrophe modelling approaches to support schemes across the world are discussed and we identify opportunities to improve risk assessment for such schemes through transparent frameworks for quantifying, pricing, sharing and financing catastrophe risk on a local and global basis.
A DDS-Based Energy Management Framework for Small Microgrid Operation and Control
Youssef, Tarek A.; El Hariri, Mohamad; Elsayed, Ahmed T.; ...
2017-09-26
The smart grid is seen as a power system with realtime communication and control capabilities between the consumer and the utility. This modern platform facilitates the optimization in energy usage based on several factors including environmental, price preferences, and system technical issues. In this paper a real-time energy management system (EMS) for microgrids or nanogrids was developed. The developed system involves an online optimization scheme to adapt its parameters based on previous, current, and forecasted future system states. The communication requirements for all EMS modules were analyzed and are all integrated over a data distribution service (DDS) Ethernet network withmore » appropriate quality of service (QoS) profiles. In conclusion, the developed EMS was emulated with actual residential energy consumption and irradiance data from Miami, Florida and proved its effectiveness in reducing consumers’ bills and achieving flat peak load profiles.« less
Adaptive Numerical Dissipative Control in High Order Schemes for Multi-D Non-Ideal MHD
NASA Technical Reports Server (NTRS)
Yee, H. C.; Sjoegreen, B.
2004-01-01
The goal is to extend our adaptive numerical dissipation control in high order filter schemes and our new divergence-free methods for ideal MHD to non-ideal MHD that include viscosity and resistivity. The key idea consists of automatic detection of different flow features as distinct sensors to signal the appropriate type and amount of numerical dissipation/filter where needed and leave the rest of the region free of numerical dissipation contamination. These scheme-independent detectors are capable of distinguishing shocks/shears, flame sheets, turbulent fluctuations and spurious high-frequency oscillations. The detection algorithm is based on an artificial compression method (ACM) (for shocks/shears), and redundant multi-resolution wavelets (WAV) (for the above types of flow feature). These filter approaches also provide a natural and efficient way for the minimization of Div(B) numerical error. The filter scheme consists of spatially sixth order or higher non-dissipative spatial difference operators as the base scheme for the inviscid flux derivatives. If necessary, a small amount of high order linear dissipation is used to remove spurious high frequency oscillations. For example, an eighth-order centered linear dissipation (AD8) might be included in conjunction with a spatially sixth-order base scheme. The inviscid difference operator is applied twice for the viscous flux derivatives. After the completion of a full time step of the base scheme step, the solution is adaptively filtered by the product of a 'flow detector' and the 'nonlinear dissipative portion' of a high-resolution shock-capturing scheme. In addition, the scheme independent wavelet flow detector can be used in conjunction with spatially compact, spectral or spectral element type of base schemes. The ACM and wavelet filter schemes using the dissipative portion of a second-order shock-capturing scheme with sixth-order spatial central base scheme for both the inviscid and viscous MHD flux derivatives and a fourth-order Runge-Kutta method are denoted.
Functional planning units for the management of an endangered Brazilian titi monkey.
Gouveia, Sidney F; Souza-Alves, João Pedro; de Souza, Bruno B; Beltrão-Mendes, Raone; Jerusalinsky, Leandro; Ferrari, Stephen F
2017-05-01
Conservation practices in the tropics often rely on the data available for a few, better-known species and the adoption of an appropriate spatial scale. By defining a set of landscape units that account for critical aspects of the focal species, the information available on these conservation targets can support regional conservation policies. Here, we define and classify adjacent landscapes, termed planning units, to orientate management decisions within and among these landscapes, which are occupied by an endangered flagship primate species (Coimbra-Filho's titi monkey, Callicebus coimbrai) from eastern Brazil. We use landscape boundaries (highways and river systems), and a high-resolution map of forest remnants to identify continuous and manageable landscapes. We employed functional landscape metrics based on the species' dispersal ability and home range size to characterize and classify these landscapes. We classified planning units by scoring them according to a suite of selected metrics through a Principal Component Analysis. We propose 31 planning units, containing one to six C. coimbrai populations, most with low values of habitat availability, functional connectivity and carrying capacity, and a high degree of degradation. Due to this poor landscape configuration, basic management practices are recommendable. However, additional aspects of the landscapes and the populations they contain (e.g., matrix type and genetic variability) should improve the scheme, which will require a closer integration of research aims with socio-political strategies. Even so, our scheme should prove useful for the combination of information on conservation targets (i.e., focal species) with management strategies on an administrative scale. © 2017 Wiley Periodicals, Inc.
Choi, Jae-Young; Jeong, Jongpil; Chung, Tai-Myoung
2017-01-01
Lately, we see that Internet of things (IoT) is introduced in medical services for global connection among patients, sensors, and all nearby things. The principal purpose of this global connection is to provide context awareness for the purpose of bringing convenience to a patient’s life and more effectively implementing clinical processes. In health care, monitoring of biosignals of a patient has to be continuously performed while the patient moves inside and outside the hospital. Also, to monitor the accurate location and biosignals of the patient, appropriate mobility management is necessary to maintain connection between the patient and the hospital network. In this paper, a binding update scheme on PMIPv6, which reduces signal traffic during location updates by Virtual LMA (VLMA) on the top original Local Mobility Anchor (LMA) Domain, is proposed to reduce the total cost. If a Mobile Node (MN) moves to a Mobile Access Gateway (MAG)-located boundary of an adjacent LMA domain, the MN changes itself into a virtual mode, and this movement will be assumed to be a part of the VLMA domain. In the proposed scheme, MAGs eliminate global binding updates for MNs between LMA domains and significantly reduce the packet loss and latency by eliminating the handoff between LMAs. In conclusion, the performance analysis results show that the proposed scheme improves performance significantly versus PMIPv6 and HMIPv6 in terms of the binding update rate per user and average handoff latency. PMID:28129355
Error function attack of chaos synchronization based encryption schemes.
Wang, Xingang; Zhan, Meng; Lai, C-H; Gang, Hu
2004-03-01
Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the error function attack is presented systematically and used to evaluate system security. We define a quantitative measure (quality factor) of the effective applicability of a chaos encryption scheme, which takes into account the security, the encryption speed, and the robustness against channel noise. A comparison is made of several encryption schemes and it is found that a scheme based on one-way coupled chaotic map lattices performs outstandingly well, as judged from quality factor. Copyright 2004 American Institute of Physics.
Study of Design Knowledge Capture (DKC) schemes implemented in magnetic bearing applications
NASA Technical Reports Server (NTRS)
1990-01-01
A design knowledge capture (DKC) scheme was implemented using frame-based techniques. The objective of such a system is to capture not only the knowledge which describes a design, but also that which explains how the design decisions were reached. These knowledge types were labelled definitive and explanatory, respectively. Examination of the design process helped determine what knowledge to retain and at what stage that knowledge is used. A discussion of frames resulted in the recognition of their value to knowledge representation and organization. The FORMS frame system was used as a basis for further development, and for examples using magnetic bearing design. The specific contributions made by this research include: determination that frame-based systems provide a useful methodology for management and application of design knowledge; definition of specific user interface requirements, (this consists of a window-based browser); specification of syntax for DKC commands; and demonstration of the feasibility of DKC by applications to existing designs. It was determined that design knowledge capture could become an extremely valuable engineering tool for complicated, long-life systems, but that further work was needed, particularly the development of a graphic, window-based interface.
Schlorhaufer, C; Behrends, M; Diekhaus, G; Keberle, M; Weidemann, J
2012-12-01
Due to the time factor in polytraumatized patients all relevant pathologies in a polytrauma computed tomography (CT) scan have to be read and communicated very quickly. During radiology residency acquisition of effective reading schemes based on typical polytrauma pathologies is very important. Thus, an online tutorial for the structured diagnosis of polytrauma CT was developed. Based on current multimedia theories like the cognitive load theory a didactic concept was developed. As a web-environment the learning management system ILIAS was chosen. CT data sets were converted into online scrollable QuickTime movies. Audiovisual tutorial movies with guided image analyses by a consultant radiologist were recorded. The polytrauma tutorial consists of chapterized text content and embedded interactive scrollable CT data sets. Selected trauma pathologies are demonstrated to the user by guiding tutor movies. Basic reading schemes are communicated with the help of detailed commented movies of normal data sets. Common and important pathologies could be explored in a self-directed manner. Ambitious didactic concepts can be supported by a web based application on the basis of cognitive load theory and currently available software tools. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
My career - from a youth training scheme to practice manager.
Rickard, Renay
2017-04-01
Renay Rickard is practice manager of Kernow Veterinary Group in Cornwall. Her entry to the veterinary profession was as a veterinary nurse, but her role evolved into a management one as the practice grew into a group. She is president of the Veterinary Practice Management Association. British Veterinary Association.
An, Younghwa
2012-01-01
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.
An, Younghwa
2012-01-01
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887
Primary Medical Care Provider Accreditation (PMCPA): pilot evaluation
Campbell, Stephen M; Chauhan, Umesh; Lester, Helen
2010-01-01
Background While practice-level or team accreditation is not new to primary care in the UK and there are organisational indicators in the Quality and Outcomes Framework (QOF) organisational domain, there is no universal system of accreditation of the quality of organisational aspects of care in the UK. Aim To describe the development, content and piloting of version 1 of the Primary Medical Care Provider Accreditation (PMCPA) scheme, which includes 112 separate criteria across six domains: health inequalities and health promotion; provider management; premises, records, equipment, and medicines management; provider teams; learning organisation; and patient experience/involvement, and to present the results from the pilot service evaluation focusing on the achievement of the 30 core criteria and feedback from practice staff. Design of study Observational service evaluation using evidence uploaded onto an extranet system in support of 30 core summative pilot PMCPA accreditation criteria. Setting Thirty-six nationally representative practices across England, between June and December 2008. Method Study population: interviews with GPs, practice managers, nurses and other relevant staff from the participating practices were conducted, audiotaped, transcribed, and analysed using a thematic approach. For each practice, the number of core criteria that had received either a‘good’or‘satisfactory’rating from a RCGP-trained assessment team, was counted and expressed as a percentage. Results Thirty-two practices completed the scheme, with nine practices passing 100% of core criteria (range: 27–100%). There were no statistical differences in achievement between practices of different sizes and in different localities. Practice feedback highlighted seven key issues: (1) overall view of PMCPA; (2) the role of accreditation; (3) different motivations for taking part; (4) practice managers dominated the workload associated with implementing the scheme; (5) facilitators for implementation; (6) patient benefit — relevance of PMCPA to quality improvement; (7) recommendations for improving the scheme. Conclusion Version 1 of PMCPA has been piloted as a primary care accreditation scheme and shown to be relevant to different types of practice. The scheme is undergoing revision in accordance with the findings from the pilot and ongoing consultation.
Lee, Tian-Fu
2013-12-01
A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.
Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.
He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk
2014-10-01
The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.
Searchable attribute-based encryption scheme with attribute revocation in cloud storage.
Wang, Shangping; Zhao, Duqiao; Zhang, Yaling
2017-01-01
Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data, and attribute revocation is the extension of the attribute-based encryption, and the keyword search is an indispensable part for cloud storage. The combination of both has an important application in the cloud storage. In this paper, we construct a searchable attribute-based encryption scheme with attribute revocation in cloud storage, the keyword search in our scheme is attribute based with access control, when the search succeeds, the cloud server returns the corresponding cipher text to user and the user can decrypt the cipher text definitely. Besides, our scheme supports multiple keywords search, which makes the scheme more practical. Under the assumption of decisional bilinear Diffie-Hellman exponent (q-BDHE) and decisional Diffie-Hellman (DDH) in the selective security model, we prove that our scheme is secure.
Simple scheme to implement decoy-state reference-frame-independent quantum key distribution
NASA Astrophysics Data System (ADS)
Zhang, Chunmei; Zhu, Jianrong; Wang, Qin
2018-06-01
We propose a simple scheme to implement decoy-state reference-frame-independent quantum key distribution (RFI-QKD), where signal states are prepared in Z, X, and Y bases, decoy states are prepared in X and Y bases, and vacuum states are set to no bases. Different from the original decoy-state RFI-QKD scheme whose decoy states are prepared in Z, X and Y bases, in our scheme decoy states are only prepared in X and Y bases, which avoids the redundancy of decoy states in Z basis, saves the random number consumption, simplifies the encoding device of practical RFI-QKD systems, and makes the most of the finite pulses in a short time. Numerical simulations show that, considering the finite size effect with reasonable number of pulses in practical scenarios, our simple decoy-state RFI-QKD scheme exhibits at least comparable or even better performance than that of the original decoy-state RFI-QKD scheme. Especially, in terms of the resistance to the relative rotation of reference frames, our proposed scheme behaves much better than the original scheme, which has great potential to be adopted in current QKD systems.
Research on Three-phase Four-wire Inverter
NASA Astrophysics Data System (ADS)
Xin, W. D.; Li, X. K.; Huang, G. Z.; Fan, X. C.; Gong, X. J.; Sun, L.; Wang, J.; Zhu, D. W.
2017-05-01
The concept of Voltage Source Converter (VSC) based hybrid AC and DC distribution system architecture is proposed, which can solve the traditional AC distribution power quality problems and respond to the request of DC distribution development. At first, a novel VSC system structure combining the four-leg based three-phase four-wire with LC filter is adopted, using the overall coordination control scheme of the AC current tracking compensation based grid-interfaced VSC. In the end, the 75 kW simulation experimental system is designed and tested to verify the performance of the proposed VSC under DC distribution, distributed DC sources conditions, as well as power quality management of AC distribution.
Mishra, Dheerendra; Mukhopadhyay, Sourav; Chaturvedi, Ankita; Kumari, Saru; Khan, Muhammad Khurram
2014-06-01
Remote user authentication is desirable for a Telecare Medicine Information System (TMIS) for the safety, security and integrity of transmitted data over the public channel. In 2013, Tan presented a biometric based remote user authentication scheme and claimed that his scheme is secure. Recently, Yan et al. demonstrated some drawbacks in Tan's scheme and proposed an improved scheme to erase the drawbacks of Tan's scheme. We analyze Yan et al.'s scheme and identify that their scheme is vulnerable to off-line password guessing attack, and does not protect anonymity. Moreover, in their scheme, login and password change phases are inefficient to identify the correctness of input where inefficiency in password change phase can cause denial of service attack. Further, we design an improved scheme for TMIS with the aim to eliminate the drawbacks of Yan et al.'s scheme.
Cross stratum resources protection in fog-computing-based radio over fiber networks for 5G services
NASA Astrophysics Data System (ADS)
Guo, Shaoyong; Shao, Sujie; Wang, Yao; Yang, Hui
2017-09-01
In order to meet the requirement of internet of things (IoT) and 5G, the cloud radio access network is a paradigm which converges all base stations computational resources into a cloud baseband unit (BBU) pool, while the distributed radio frequency signals are collected by remote radio head (RRH). A precondition for centralized processing in the BBU pool is an interconnection fronthaul network with high capacity and low delay. However, it has become more complex and frequent in the interaction between RRH and BBU and resource scheduling among BBUs in cloud. Cloud radio over fiber network has been proposed in our previous work already. In order to overcome the complexity and latency, in this paper, we first present a novel cross stratum resources protection (CSRP) architecture in fog-computing-based radio over fiber networks (F-RoFN) for 5G services. Additionally, a cross stratum protection (CSP) scheme considering the network survivability is introduced in the proposed architecture. The CSRP with CSP scheme can effectively pull the remote processing resource locally to implement the cooperative radio resource management, enhance the responsiveness and resilience to the dynamic end-to-end 5G service demands, and globally optimize optical network, wireless and fog resources. The feasibility and efficiency of the proposed architecture with CSP scheme are verified on our software defined networking testbed in terms of service latency, transmission success rate, resource occupation rate and blocking probability.
Artificial intelligent techniques for optimizing water allocation in a reservoir watershed
NASA Astrophysics Data System (ADS)
Chang, Fi-John; Chang, Li-Chiu; Wang, Yu-Chung
2014-05-01
This study proposes a systematical water allocation scheme that integrates system analysis with artificial intelligence techniques for reservoir operation in consideration of the great uncertainty upon hydrometeorology for mitigating droughts impacts on public and irrigation sectors. The AI techniques mainly include a genetic algorithm and adaptive-network based fuzzy inference system (ANFIS). We first derive evaluation diagrams through systematic interactive evaluations on long-term hydrological data to provide a clear simulation perspective of all possible drought conditions tagged with their corresponding water shortages; then search the optimal reservoir operating histogram using genetic algorithm (GA) based on given demands and hydrological conditions that can be recognized as the optimal base of input-output training patterns for modelling; and finally build a suitable water allocation scheme through constructing an adaptive neuro-fuzzy inference system (ANFIS) model with a learning of the mechanism between designed inputs (water discount rates and hydrological conditions) and outputs (two scenarios: simulated and optimized water deficiency levels). The effectiveness of the proposed approach is tested on the operation of the Shihmen Reservoir in northern Taiwan for the first paddy crop in the study area to assess the water allocation mechanism during drought periods. We demonstrate that the proposed water allocation scheme significantly and substantially avails water managers of reliably determining a suitable discount rate on water supply for both irrigation and public sectors, and thus can reduce the drought risk and the compensation amount induced by making restrictions on agricultural use water.
Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho
2016-03-01
Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties.
Mishra, Raghavendra; Barnwal, Amit Kumar
2015-05-01
The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.
Security Encryption Scheme for Communication of Web Based Control Systems
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
Enabling search over encrypted multimedia databases
NASA Astrophysics Data System (ADS)
Lu, Wenjun; Swaminathan, Ashwin; Varna, Avinash L.; Wu, Min
2009-02-01
Performing information retrieval tasks while preserving data confidentiality is a desirable capability when a database is stored on a server maintained by a third-party service provider. This paper addresses the problem of enabling content-based retrieval over encrypted multimedia databases. Search indexes, along with multimedia documents, are first encrypted by the content owner and then stored onto the server. Through jointly applying cryptographic techniques, such as order preserving encryption and randomized hash functions, with image processing and information retrieval techniques, secure indexing schemes are designed to provide both privacy protection and rank-ordered search capability. Retrieval results on an encrypted color image database and security analysis of the secure indexing schemes under different attack models show that data confidentiality can be preserved while retaining very good retrieval performance. This work has promising applications in secure multimedia management.
An approach to combining heuristic and qualitative reasoning in an expert system
NASA Technical Reports Server (NTRS)
Jiang, Wei-Si; Han, Chia Yung; Tsai, Lian Cheng; Wee, William G.
1988-01-01
An approach to combining the heuristic reasoning from shallow knowledge and the qualitative reasoning from deep knowledge is described. The shallow knowledge is represented in production rules and under the direct control of the inference engine. The deep knowledge is represented in frames, which may be put in a relational DataBase Management System. This approach takes advantage of both reasoning schemes and results in improved efficiency as well as expanded problem solving ability.
Flood Impact Modelling and Natural Flood Management
NASA Astrophysics Data System (ADS)
Owen, Gareth; Quinn, Paul; ODonnell, Greg
2016-04-01
Local implementation of Natural Flood Management methods are now being proposed in many flood schemes. In principal it offers a cost effective solution to a number of catchment based problem as NFM tackles both flood risk and WFD issues. However within larger catchments there is the issue of which subcatchments to target first and how much NFM to implement. If each catchment has its own configuration of subcatchment and rivers how can the issues of flood synchronisation and strategic investment be addressed? In this study we will show two key aspects to resolving these issues. Firstly, a multi-scale network water level recorder is placed throughout the system to capture the flow concentration and travel time operating in the catchment being studied. The second is a Flood Impact Model (FIM), which is a subcatchment based model that can generate runoff in any location using any hydrological model. The key aspect to the model is that it has a function to represent the impact of NFM in any subcatchment and the ability to route that flood wave to the outfall. This function allows a realistic representation of the synchronisation issues for that catchment. By running the model in interactive mode the user can define an appropriate scheme that minimises or removes the risk of synchornisation and gives confidence that the NFM investment is having a good level of impact downstream in large flood events.
Towards a framework of nuclear competencies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ghitescu, P.
For the countries considering the introduction of a nuclear energy program, the management of human resources should be a part of the wider integrated management system in order to ensure long term safe and reliable operation. Nuclear energy strategy and approaches to human resources development should take into consideration such fundamental aspects as: development and implementation of a workforce plan, required competencies and qualifications, prerequisites for staffing a nuclear energy program, needed training programs and training facilities, qualification and training requirements. Development of common instruments that respond to the above needs and vision has lead to a new concept ofmore » European Credit System for Vocational Education and Training. The European Credit System for Vocational Education and Training (ECVET) is based on definition of 'learning outcomes ' in terms of knowledge, skills and competence, and on identification of portfolios of learning outcomes that allow an individual to prove competencies in a coherent manner. ECVET proposes a common understanding of basic definitions of education and training as well as of the new proposed concepts and it should be recognized by all employers in the EU. In this context, a number of 'Euratom Fission Training Schemes' (EFTS) have been launched in specific areas where a shortage of skilled professionals has been identified. In these schemes the competence building is the result of traditional education plus life-long learning, non-traditional learning, and other forms of educational experiences, relying, in particular, on border-less mobility to get acquainted with various sectors. Each particular Training Scheme should follow a similar path for the achievement of the designed learning outcomes (knowledge, skills, and attitudes). This path to the Training Scheme consists of different activities regarding: definition of training scheme learning outcomes and modules, assessment of prerequisites and student selection, student interview for development of individual training plan, start of the training activities under a specific training scheme. The introduction and recognition of ECVET will lead to a common taxonomy of competencies, and will provide also information about qualifications and units in numerical form, enabling mutual recognition of a training scheme. The description of the learning outcomes to be achieved for qualifying to a specific job profile may follow the analysis phase of the systematic approach to training (SAT). This would ensure a common tool, already used by all trainers. All these steps contribute to establishing of a framework of nuclear competencies recognized and accepted throughout member states. (authors)« less
2014-01-01
Background Although the benefits of physical activity (PA) on to prevent and manage non-communicable diseases are well known, strategies to help increase the levels of PA among different populations are limited. Exercise-referral schemes have emerged as one effective approach to promote PA; however, there is uncertainty about the feasibility and effectiveness of these schemes in settings outside high-income countries. This study will examine the effectiveness of a scheme to refer hypertensive patients identified in Primary Health Care facilities (PHCU) of the Mexican social security institution to a group PA program offered in the same institution. Methods and design We will describe the methods of a cluster randomized trial study designed to evaluate the effectiveness of an exercise referral scheme to increasing physical activity in hypertensive patients compared to a non-referral scheme. Four PHCU were selected for the study; the PHCU will take part as the unit of randomization and sedentary hypertensive patients as the unit of assessment. 2 PHCU of control group (GC) will provide information to hypertensive patients about physical activity benefits and ways to increase it safely. 2 PHCU of intervention group (IG) will refer patients to sports facilities at the same institution, to follow a group-based PA program developed to increase the PA levels with a designed based on the Transtheoretical Model and Social Cognitive Theory. To evaluate the effects of the intervention as well as short-term maintenance of the intervention’s effects, PA will be assessed at baseline, at 24 and 32 weeks of follow-up. The main outcome will be the difference before and after intervention in the percentage of participants meeting recommended levels of PA between and within intervention and control groups. PA will be measured through self-report and with objective measure by accelerometer. Discussion This study will allow us to evaluate a multidisciplinary effort to link the primary care and community-based areas of the same health care system. Our findings will provide important information about the feasibility and effectiveness of an exercise-referral scheme and will be useful for decision-making about the implementation of strategies for increasing PA among hypertensive and other clinical populations in Mexico and Latin America. Trial registration Clinicaltrials.gov Identifier: NCT01910935. Date of registration: 07/05/2013. PMID:25011612
Color encryption scheme based on adapted quantum logistic map
NASA Astrophysics Data System (ADS)
Zaghloul, Alaa; Zhang, Tiejun; Amin, Mohamed; Abd El-Latif, Ahmed A.
2014-04-01
This paper presents a new color image encryption scheme based on quantum chaotic system. In this scheme, a new encryption scheme is accomplished by generating an intermediate chaotic key stream with the help of quantum chaotic logistic map. Then, each pixel is encrypted by the cipher value of the previous pixel and the adapted quantum logistic map. The results show that the proposed scheme has adequate security for the confidentiality of color images.
Energy Management of Smart Distribution Systems
NASA Astrophysics Data System (ADS)
Ansari, Bananeh
Electric power distribution systems interface the end-users of electricity with the power grid. Traditional distribution systems are operated in a centralized fashion with the distribution system owner or operator being the only decision maker. The management and control architecture of distribution systems needs to gradually transform to accommodate the emerging smart grid technologies, distributed energy resources, and active electricity end-users or prosumers. The content of this document concerns with developing multi-task multi-objective energy management schemes for: 1) commercial/large residential prosumers, and 2) distribution system operator of a smart distribution system. The first part of this document describes a method of distributed energy management of multiple commercial/ large residential prosumers. These prosumers not only consume electricity, but also generate electricity using their roof-top solar photovoltaics systems. When photovoltaics generation is larger than local consumption, excess electricity will be fed into the distribution system, creating a voltage rise along the feeder. Distribution system operator cannot tolerate a significant voltage rise. ES can help the prosumers manage their electricity exchanges with the distribution system such that minimal voltage fluctuation occurs. The proposed distributed energy management scheme sizes and schedules each prosumer's ES to reduce the electricity bill and mitigate voltage rise along the feeder. The second part of this document focuses on emergency energy management and resilience assessment of a distribution system. The developed emergency energy management system uses available resources and redundancy to restore the distribution system's functionality fully or partially. The success of the restoration maneuver depends on how resilient the distribution system is. Engineering resilience terminology is used to evaluate the resilience of distribution system. The proposed emergency energy management scheme together with resilience assessment increases the distribution system operator's preparedness for emergency events.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng
2015-11-01
To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.
A Practical and Secure Coercion-Resistant Scheme for Internet Voting
NASA Astrophysics Data System (ADS)
Araújo, Roberto; Foulle, Sébastien; Traoré, Jacques
Juels, Catalano, and Jakobsson (JCJ) proposed at WPES 2005 the first voting scheme that considers real-world threats and that is more realistic for Internet elections. Their scheme, though, has a quadratic work factor and thereby is not efficient for large scale elections. Based on the work of JCJ, Smith proposed an efficient scheme that has a linear work factor. In this paper we first show that Smith's scheme is insecure. Then we present a new coercion-resistant election scheme with a linear work factor that overcomes the flaw of Smith's proposal. Our solution is based on the group signature scheme of Camenisch and Lysyanskaya (Crypto 2004).
Design of Smart-Meter data acquisition device based on Cloud Platform
NASA Astrophysics Data System (ADS)
Chen, Xiangqun; Huang, Rui; Shen, Liman; chen, Hao; Xiong, Dezhi; Xiao, Xiangqi; Liu, Mouhai; Xu, Renheng
2018-05-01
In recent years, the government has attached great importance to ‘Four-Meter Unified’ Project. Under the call of national policy, State Grid is participate in building ‘Four-Meter Unified’ Project actively by making use of electricity information acquisition system. In this paper, a new type Smart-Meter data acquisition device based on Cloud Platform is designed according to the newest series of standards Energy Measure and Management System for Electric, Water, Gas and Heat Meter, and this paper introduces the general scheme, main hardware design and main software design for the Smart-Meter data acquisition device.
Herbert M. Parker: Publications and contributions to radiological and health physics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kathren, R.L.; Baalman, R.W.; Bair, W.J.
For more than a half century, Herbert M. Parker was a leading force in radiological physics. As a scientist, he was codeveloper of a systematic dosimetry scheme for implant therapy and the innovative proposer of radiological units with unambiguous physical and biological bases. He made seminal contributions to the development of scientifically based radiation protection standards and, as an administrator and manager as well as scientist, helped the Hanford Laboratories to achieve preeminance in several areas, including radiation biology, radioactive waste disposal, and environmental radioactivity. This volume brings together, sometimes from obscure sources, his works.
Policy-Based Negotiation Engine for Cross-Domain Interoperability
NASA Technical Reports Server (NTRS)
Vatan, Farrokh; Chow, Edward T.
2012-01-01
A successful policy negotiation scheme for Policy-Based Management (PBM) has been implemented. Policy negotiation is the process of determining the "best" communication policy that all of the parties involved can agree on. Specifically, the problem is how to reconcile the various (and possibly conflicting) communication protocols used by different divisions. The solution must use protocols available to all parties involved, and should attempt to do so in the best way possible. Which protocols are commonly available, and what the definition of "best" is will be dependent on the parties involved and their individual communications priorities.
We compared classification schemes based on watershed storage (wetland + lake area/watershed area) and forest fragmentation with a geographically-based classification scheme for two case studies involving 1) Lake Superior tributaries and 2) watersheds of riverine coastal wetlands...
We compared classification schemes based on watershed storage (wetland + lake area/watershed area) and forest fragmentation with a geographically-based classification scheme for two case studies involving 1)Lake Superior tributaries and 2) watersheds of riverine coastal wetlands ...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zorpas, Antonis A., E-mail: antonis.zorpas@ouc.ac.cy; Lasaridi, Katia, E-mail: klasaridi@hua.gr; Voukkali, Irene
Highlights: • Waste framework directive has set clear waste prevention procedures. • Household Compositional analysis. • Waste management plans. • Zero waste approach. • Waste generation. - Abstract: Waste management planning requires reliable data regarding waste generation, affecting factors on waste generation and forecasts of waste quantities based on facts. In order to decrease the environmental impacts of waste management the choice of prevention plan as well as the treatment method must be based on the features of the waste that are produced in a specific area. Factors such as culture, economic development, climate, and energy sources have an impactmore » on waste composition; composition influences the need of collecting waste more or less frequently of waste collection and disposition. The research question was to discover the main barriers concerning the compositional analysis in Insular Communities under warm climate conditions and the findings from this study enabled the main contents of a waste management plan to be established. These included advice to residents on waste minimisation, liaison with stakeholders and the expansion of kerbside recycling schemes.« less
NASA Astrophysics Data System (ADS)
Yang, Lei; Yan, Hongyong; Liu, Hong
2017-03-01
Implicit staggered-grid finite-difference (ISFD) scheme is competitive for its great accuracy and stability, whereas its coefficients are conventionally determined by the Taylor-series expansion (TE) method, leading to a loss in numerical precision. In this paper, we modify the TE method using the minimax approximation (MA), and propose a new optimal ISFD scheme based on the modified TE (MTE) with MA method. The new ISFD scheme takes the advantage of the TE method that guarantees great accuracy at small wavenumbers, and keeps the property of the MA method that keeps the numerical errors within a limited bound at the same time. Thus, it leads to great accuracy for numerical solution of the wave equations. We derive the optimal ISFD coefficients by applying the new method to the construction of the objective function, and using a Remez algorithm to minimize its maximum. Numerical analysis is made in comparison with the conventional TE-based ISFD scheme, indicating that the MTE-based ISFD scheme with appropriate parameters can widen the wavenumber range with high accuracy, and achieve greater precision than the conventional ISFD scheme. The numerical modeling results also demonstrate that the MTE-based ISFD scheme performs well in elastic wave simulation, and is more efficient than the conventional ISFD scheme for elastic modeling.
The role of agri-environment schemes in conservation and environmental management.
Batáry, Péter; Dicks, Lynn V; Kleijn, David; Sutherland, William J
2015-08-01
Over half of the European landscape is under agricultural management and has been for millennia. Many species and ecosystems of conservation concern in Europe depend on agricultural management and are showing ongoing declines. Agri-environment schemes (AES) are designed partly to address this. They are a major source of nature conservation funding within the European Union (EU) and the highest conservation expenditure in Europe. We reviewed the structure of current AES across Europe. Since a 2003 review questioned the overall effectiveness of AES for biodiversity, there has been a plethora of case studies and meta-analyses examining their effectiveness. Most syntheses demonstrate general increases in farmland biodiversity in response to AES, with the size of the effect depending on the structure and management of the surrounding landscape. This is important in the light of successive EU enlargement and ongoing reforms of AES. We examined the change in effect size over time by merging the data sets of 3 recent meta-analyses and found that schemes implemented after revision of the EU's agri-environmental programs in 2007 were not more effective than schemes implemented before revision. Furthermore, schemes aimed at areas out of production (such as field margins and hedgerows) are more effective at enhancing species richness than those aimed at productive areas (such as arable crops or grasslands). Outstanding research questions include whether AES enhance ecosystem services, whether they are more effective in agriculturally marginal areas than in intensively farmed areas, whether they are more or less cost-effective for farmland biodiversity than protected areas, and how much their effectiveness is influenced by farmer training and advice? The general lesson from the European experience is that AES can be effective for conserving wildlife on farmland, but they are expensive and need to be carefully designed and targeted. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.
Zhang, Luying; Cheng, Xiaoming; Liu, Xiaoyun; Zhu, Kun; Tang, Shenglan; Bogg, Lennart; Dobberschuetz, Karin; Tolhurst, Rachel
2010-01-01
In recent years, the central government in China has been leading the re-establishment of its rural health insurance system, but local government institutions have considerable flexibility in the specific design and management of schemes. Maintaining a reasonable balance of funds is critical to ensure that the schemes are sustainable and effective in offering financial protection to members. This paper explores the financial management of the NCMS in China through a case study of the balance of funds and the factors influencing this, in six counties in two Chinese provinces. The main data source is NCMS management data from each county from 2003 to 2005, supplemented by: a household questionnaire survey, qualitative interviews and focus group discussions with all local stakeholders and policy document analysis. The study found that five out of six counties held a large fund surplus, whilst enrolees obtained only partial financial protection. However, in one county greater risk pooling for enrolees was accompanied by relatively high utilisation levels, resulting in a fund deficit. The opportunities to sustainably increase the financial protection offered to NCMS enrolees are limited by the financial pressures on local government, specific political incentives and low technical capacities at the county level and below. Our analysis suggests that in the short term, efforts should be made to improve the management of the current NCMS design, which should be supported through capacity building for NCMS offices. However, further medium-term initiatives may be required including changes to the design of the schemes. Copyright (c) 2009 John Wiley & Sons, Ltd.
Yessica Rico; Marie-Stephanie Samain
2017-01-01
Investigating how genetic variation is distributed across the landscape is fundamental to inform forest conservation and restoration. Detecting spatial genetic discontinuities has value for defining management units, germplasm collection, and target sites for reforestation; however, inappropriate sampling schemes can misidentify patterns of genetic structure....
A Scheme To Improve the Utilization on Vocational Qualifications in the Labor Market.
ERIC Educational Resources Information Center
Lee, Dong-Im; Kim, Deog-Ki
Korea's labor market was analyzed to inform efforts to develop a scheme to improve the utilization of vocational qualifications. The study examined the different meanings of qualifications in South Korea's labor market and how utilization of qualifications is influenced by factors such as types of human resource management, vocational training…
High-Order Central WENO Schemes for Multi-Dimensional Hamilton-Jacobi Equations
NASA Technical Reports Server (NTRS)
Bryson, Steve; Levy, Doron; Biegel, Bryan (Technical Monitor)
2002-01-01
We present new third- and fifth-order Godunov-type central schemes for approximating solutions of the Hamilton-Jacobi (HJ) equation in an arbitrary number of space dimensions. These are the first central schemes for approximating solutions of the HJ equations with an order of accuracy that is greater than two. In two space dimensions we present two versions for the third-order scheme: one scheme that is based on a genuinely two-dimensional Central WENO reconstruction, and another scheme that is based on a simpler dimension-by-dimension reconstruction. The simpler dimension-by-dimension variant is then extended to a multi-dimensional fifth-order scheme. Our numerical examples in one, two and three space dimensions verify the expected order of accuracy of the schemes.
Fault detection and multiclassifier fusion for unmanned aerial vehicles (UAVs)
NASA Astrophysics Data System (ADS)
Yan, Weizhong
2001-03-01
UAVs demand more accurate fault accommodation for their mission manager and vehicle control system in order to achieve a reliability level that is comparable to that of a pilot aircraft. This paper attempts to apply multi-classifier fusion techniques to achieve the necessary performance of the fault detection function for the Lockheed Martin Skunk Works (LMSW) UAV Mission Manager. Three different classifiers that meet the design requirements of the fault detection of the UAAV are employed. The binary decision outputs from the classifiers are then aggregated using three different classifier fusion schemes, namely, majority vote, weighted majority vote, and Naieve Bayes combination. All of the three schemes are simple and need no retraining. The three fusion schemes (except the majority vote that gives an average performance of the three classifiers) show the classification performance that is better than or equal to that of the best individual. The unavoidable correlation between the classifiers with binary outputs is observed in this study. We conclude that it is the correlation between the classifiers that limits the fusion schemes to achieve an even better performance.
Liu, Hu; Su, Rong-jia; Wu, Min-jie; Zhang, Yi; Qiu, Xiang-jun; Feng, Jian-gang; Xie, Ting; Lu, Shu-liang
2012-06-01
To form a wound information management scheme with objectivity, standardization, and convenience by means of wound information management system. A wound information management system was set up with the acquisition terminal, the defined wound description, the data bank, and related softwares. The efficacy of this system was evaluated in clinical practice. The acquisition terminal was composed of the third generation mobile phone and the software. It was feasible to get access to the wound information, including description, image, and therapeutic plan from the data bank by mobile phone. During 4 months, a collection of a total of 232 wound treatment information was entered, and accordingly standardized data of 38 patients were formed automatically. This system can provide standardized wound information management by standardized techniques of acquisition, transmission, and storage of wound information. It can be used widely in hospitals, especially primary medical institutions. Data resource of the system makes it possible for epidemiological study with large sample size in future.
Wavelength assignment algorithm considering the state of neighborhood links for OBS networks
NASA Astrophysics Data System (ADS)
Tanaka, Yu; Hirota, Yusuke; Tode, Hideki; Murakami, Koso
2005-10-01
Recently, Optical WDM technology is introduced into backbone networks. On the other hand, as the future optical switching scheme, Optical Burst Switching (OBS) systems become a realistic solution. OBS systems do not consider buffering in intermediate nodes. Thus, it is an important issue to avoid overlapping wavelength reservation between partially interfered paths. To solve this problem, so far, the wavelength assignment scheme which has priority management tables has been proposed. This method achieves the reduction of burst blocking probability. However, this priority management table requires huge memory space. In this paper, we propose a wavelength assignment algorithm that reduces both the number of priority management tables and burst blocking probability. To reduce priority management tables, we allocate and manage them for each link. To reduce burst blocking probability, our method announces information about the change of their priorities to intermediate nodes. We evaluate its performance in terms of the burst blocking probability and the reduction rate of priority management tables.
Zorpas, Antonis A; Lasaridi, Katia; Voukkali, Irene; Loizia, Pantelitsa; Chroni, Christina
2015-04-01
Waste management planning requires reliable data regarding waste generation, affecting factors on waste generation and forecasts of waste quantities based on facts. In order to decrease the environmental impacts of waste management the choice of prevention plan as well as the treatment method must be based on the features of the waste that are produced in a specific area. Factors such as culture, economic development, climate, and energy sources have an impact on waste composition; composition influences the need of collecting waste more or less frequently of waste collection and disposition. The research question was to discover the main barriers concerning the compositional analysis in Insular Communities under warm climate conditions and the findings from this study enabled the main contents of a waste management plan to be established. These included advice to residents on waste minimisation, liaison with stakeholders and the expansion of kerbside recycling schemes. Copyright © 2015 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Vandersypen, Klaartje; Keita, Abdoulaye C. T.; Coulibaly, Y.; Raes, D.; Jamin, J.-Y.
2007-06-01
Water Users Associations (WUAs) are all too often considered a panacea for improving water management in irrigation schemes. Where grassroots movements are absent, they are usually imposed on farmers by national governments, NGOs, and international donors, without fully considering existing forms of organization. This also happened in the Office du Niger irrigation scheme in Mali, where after a partial irrigation management transfer, WUAs were created to fill the resulting power vacuum. This paper demonstrates that, despite active efforts to organize farmers in WUAs, informal patterns of decision making remain dominant. Given the shortcomings of these informal patterns, WUAs could provide a much-needed platform for institutionalizing collective action, on the condition that farmers accept them. Therefore WUAs should adopt some crucial characteristics of informal patterns of decision making while avoiding their weaknesses. First, making use of the existing authority of village leadership and the central management can improve the credibility of WUAs. Second, allowing flexibility in procedures and rules can make them more appropriate for dealing with collective action problems that are typically temporary and specific. Last, formalizing the current pattern of conflict management and sanctioning might enhance its sphere of action and tackle the current absence of firm engagement with respect to some informal management decisions. In addition, WUAs should represent and be accountable to all farmers, including those residing outside the village community.
A Quantum Proxy Signature Scheme Based on Genuine Five-qubit Entangled State
NASA Astrophysics Data System (ADS)
Cao, Hai-Jing; Huang, Jun; Yu, Yao-Feng; Jiang, Xiu-Li
2014-09-01
In this paper a very efficient and secure proxy signature scheme is proposed. It is based on controlled quantum teleportation. Genuine five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. Quantum key distribution and one-time pad are adopted in our scheme, which could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.
Das, Ashok Kumar; Bruhadeshwar, Bezawada
2013-10-01
Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.
What makes British general practitioners take part in a quality improvement scheme?
Spooner, A; Chapple, A; Roland, M
2001-07-01
To understand the reasons for the apparent success of a quality improvement scheme designed to produce widespread changes in chronic disease management in primary care. Purposeful sample of 36 primary care staff, managers and specialists. Qualitative analysis of 27 interviews in East Kent Health Authority area, where, over a three-year period, more than three-quarters of general practitioners (GPs) and enrolled in a quality improvement programme which required them to meet challenging chronic disease management targets (PRImary Care Clinical Effectiveness--PRICCE). Major changes in clinical practice appeared to have taken place as a result of participation in PRICCE. The scheme was significantly dependent on leadership from the health authority and on local professional support. Factors that motivated GPs to take part in the project included: a desire to improve patient care; financial incentives; maintenance of professional autonomy in how to reach the targets; maintenance of professional pride; and peer pressure. Good teamworking was essential to successful completion of the project and often improved as a result of taking part. The scheme included a combination of interventions known to be effective in producing professional behavioural change. When managerial vision is aligned to professional values, and combined with a range of interventions known to influence professional behaviour including financial incentives, substantial changes in clinical practice can result. Lessons are drawn for future quality improvement programmes in the National Health Service.
VOP memory management in MPEG-4
NASA Astrophysics Data System (ADS)
Vaithianathan, Karthikeyan; Panchanathan, Sethuraman
2001-03-01
MPEG-4 is a multimedia standard that requires Video Object Planes (VOPs). Generation of VOPs for any kind of video sequence is still a challenging problem that largely remains unsolved. Nevertheless, if this problem is treated by imposing certain constraints, solutions for specific application domains can be found. MPEG-4 applications in mobile devices is one such domain where the opposite goals namely low power and high throughput are required to be met. Efficient memory management plays a major role in reducing the power consumption. Specifically, efficient memory management for VOPs is difficult because the lifetimes of these objects vary and these life times may be overlapping. Varying life times of the objects requires dynamic memory management where memory fragmentation is a key problem that needs to be addressed. In general, memory management systems address this problem by following a combination of strategy, policy and mechanism. For MPEG4 based mobile devices that lack instruction processors, a hardware based memory management solution is necessary. In MPEG4 based mobile devices that have a RISC processor, using a Real time operating system (RTOS) for this memory management task is not expected to be efficient because the strategies and policies used by the ROTS is often tuned for handling memory segments of smaller sizes compared to object sizes. Hence, a memory management scheme specifically tuned for VOPs is important. In this paper, different strategies, policies and mechanisms for memory management are considered and an efficient combination is proposed for the case of VOP memory management along with a hardware architecture, which can handle the proposed combination.
Why do Economic Instruments Fail? The role of Water trading and Pricing at a River Basin Scale
NASA Astrophysics Data System (ADS)
Pérez-Blanco, C. D.; Gomez, C.; Loch, A. J.; Adamson, D. C.
2016-12-01
Water management problems stem from the mismatch between a multitude of individual decisions, on the one hand, and the current and projected status of water resources, on the other. Economics provides valuable information on the incentives that drive individual decisions and can be used to design instruments that address the problem. Yet, proposals from economists regarding instruments like water pricing or trading are mostly based upon basic and general principles of welfare economics that are not straightaway applicable to assets as complex as water. For example, while water markets clearly serve to the parts directly involved in the transaction, the unique characteristics of water often leads to Pareto inefficient allocations that affect the environment and related economic uses. The flaw in this approach lies in the understanding that water prices and water trading schemes may be good or bad on their own (e.g. finding the "right" price). This vision changes radically when we focus on the problem, instead of the instrument. In this case addressing water management challenges is equivalent to making the multitude of decisions people do about water compatible with collective water governance goals such as curbing degradation trends or building water security for the future. These ideas provide both the basis for assessing existing incentives such as pricing and trading schemes and reshaping economic instruments to serve the objectives of an integrated water resources management.
Landslide risk mitigation by means of early warning systems
NASA Astrophysics Data System (ADS)
Calvello, Michele
2017-04-01
Among the many options available to mitigate landslide risk, early warning systems may be used where, in specific circumstances, the risk to life increases above tolerable levels. A coherent framework to classify and analyse landslide early warning systems (LEWS) is herein presented. Once the objectives of an early warning strategy are defined depending on the scale of analysis and the type of landslides to address, the process of designing and managing a LEWS should synergically employ technical and social skills. A classification scheme for the main components of LEWSs is proposed for weather-induced landslides. The scheme is based on a clear distinction among: i) the landslide model, i.e. a functional relationship between weather characteristics and landslide events considering the geotechnical, geomorphological and hydro-geological characterization of the area as well as an adequate monitoring strategy; ii) the warning model, i.e. the landslide model plus procedures to define the warning events and to issue the warnings; iii) the warning system, i.e. the warning model plus warning dissemination procedures, communication and education tools, strategies for community involvement and emergency plans. Each component of a LEWS is related to a number of actors involved with their deployment, operational activities and management. For instance, communication and education, community involvement and emergency plans are all significantly influenced by people's risk perception and by operational aspects system managers need to address in cooperation with scientists.
Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho
2017-04-25
User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.
Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho
2017-01-01
User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.’s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme. PMID:28441331
An improved scheme for Flip-OFDM based on Hartley transform in short-range IM/DD systems.
Zhou, Ji; Qiao, Yaojun; Cai, Zhuo; Ji, Yuefeng
2014-08-25
In this paper, an improved Flip-OFDM scheme is proposed for IM/DD optical systems, where the modulation/demodulation processing takes advantage of the fast Hartley transform (FHT) algorithm. We realize the improved scheme in one symbol period while conventional Flip-OFDM scheme based on fast Fourier transform (FFT) in two consecutive symbol periods. So the complexity of many operations in improved scheme is half of that in conventional scheme, such as CP operation, polarity inversion and symbol delay. Compared to FFT with complex input constellation, the complexity of FHT with real input constellation is halved. The transmission experiment over 50-km SSMF has been realized to verify the feasibility of improved scheme. In conclusion, the improved scheme has the same BER performance with conventional scheme, but great superiority on complexity.
Chain-Based Communication in Cylindrical Underwater Wireless Sensor Networks
Javaid, Nadeem; Jafri, Mohsin Raza; Khan, Zahoor Ali; Alrajeh, Nabil; Imran, Muhammad; Vasilakos, Athanasios
2015-01-01
Appropriate network design is very significant for Underwater Wireless Sensor Networks (UWSNs). Application-oriented UWSNs are planned to achieve certain objectives. Therefore, there is always a demand for efficient data routing schemes, which can fulfill certain requirements of application-oriented UWSNs. These networks can be of any shape, i.e., rectangular, cylindrical or square. In this paper, we propose chain-based routing schemes for application-oriented cylindrical networks and also formulate mathematical models to find a global optimum path for data transmission. In the first scheme, we devise four interconnected chains of sensor nodes to perform data communication. In the second scheme, we propose routing scheme in which two chains of sensor nodes are interconnected, whereas in third scheme single-chain based routing is done in cylindrical networks. After finding local optimum paths in separate chains, we find global optimum paths through their interconnection. Moreover, we develop a computational model for the analysis of end-to-end delay. We compare the performance of the above three proposed schemes with that of Power Efficient Gathering System in Sensor Information Systems (PEGASIS) and Congestion adjusted PEGASIS (C-PEGASIS). Simulation results show that our proposed 4-chain based scheme performs better than the other selected schemes in terms of network lifetime, end-to-end delay, path loss, transmission loss, and packet sending rate. PMID:25658394
Towards Zero Waste in emerging countries - A South African experience
DOE Office of Scientific and Technical Information (OSTI.GOV)
Matete, Ntlibi; Trois, Cristina
2008-07-01
The aim of this paper is to describe the optimisation of Waste Minimisation/Zero Waste strategies into an already established integrated waste management system and to present a Zero Waste model for post-consumer waste for urban communities in South Africa. The research was undertaken towards the fulfilment of the goals of the Polokwane Declaration on Waste Management , which has set as its target the reduction of waste generation and disposal by 50% and 25%, respectively, by 2012 and the development of a plan for Zero Waste by 2022. Two communities, adjacent to the Mariannhill Landfill site in Durban, were selectedmore » as a case study for a comparative analysis of formal and informal settlements. Since the waste generated from these two communities is disposed of at the Mariannhill landfill, the impact of Zero Waste on landfill volumes could be readily assessed. A Zero Waste scheme, based on costs and landfill airspace savings, was proposed for the area. The case study demonstrates that waste minimisation schemes can be introduced into urban areas, in emerging countries, with differing levels of service and that Zero Waste models are appropriate to urban areas in South Africa.« less
Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N
2015-12-01
With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system.
Distribution Locational Real-Time Pricing Based Smart Building Control and Management
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hao, Jun; Dai, Xiaoxiao; Zhang, Yingchen
This paper proposes an real-virtual parallel computing scheme for smart building operations aiming at augmenting overall social welfare. The University of Denver's campus power grid and Ritchie fitness center is used for demonstrating the proposed approach. An artificial virtual system is built in parallel to the real physical system to evaluate the overall social cost of the building operation based on the social science based working productivity model, numerical experiment based building energy consumption model and the power system based real-time pricing mechanism. Through interactive feedback exchanged between the real and virtual system, enlarged social welfare, including monetary cost reductionmore » and energy saving, as well as working productivity improvements, can be achieved.« less
Novakovic, Tanja; Martin, Antony P; Parker, Mark; Ferrario, Alessandra; Vukovic, Simo; Łanda, Krzysztof; Duba, Jaroslav; Dankó, Dávid; Kotsopoulos, Nikolaos; Godman, Brian; Ristic, Jelena; Stefanovic, Danka; Tesic, Danka
2017-12-01
The Pharmacoeconomics Section of the Pharmaceutical Association of Serbia organised a one day international conference on the value of innovation in decision-making in health care in Central and Eastern Europe. The focus of the conference was on reimbursement decisions for medicines using health technology assessment and the use of managed entry agreements (MEAs). The objectives of this conference were firstly to discuss the challenges and opportunities with the use of MEAs in Central and Eastern European countries; secondly the role of patient registries especially with outcome based schemes, and finally new approaches to improve accessibility to new medicines including better managing their entry.
NASA Astrophysics Data System (ADS)
Marcozzi, Michael D.
2008-12-01
We consider theoretical and approximation aspects of the stochastic optimal control of ultradiffusion processes in the context of a prototype model for the selling price of a European call option. Within a continuous-time framework, the dynamic management of a portfolio of assets is effected through continuous or point control, activation costs, and phase delay. The performance index is derived from the unique weak variational solution to the ultraparabolic Hamilton-Jacobi equation; the value function is the optimal realization of the performance index relative to all feasible portfolios. An approximation procedure based upon a temporal box scheme/finite element method is analyzed; numerical examples are presented in order to demonstrate the viability of the approach.
Integrated Workforce Planning Model: A Proof of Concept
NASA Technical Reports Server (NTRS)
Guruvadoo, Eranna K.
2001-01-01
Recently, the Workforce and Diversity Management Office at KSC have launched a major initiative to develop and implement a competency/skill approach to Human Resource management. As the competency/skill dictionary is being elaborated, the need for a competency-based workforce-planning model is recognized. A proof of concept for such a model is presented using a multidimensional data model that can provide the data infrastructure necessary to drive intelligent decision support systems for workforce planing. The components of competency-driven workforce planning model are explained. The data model is presented and several schemes that would support the workforce-planning model are presented. Some directions and recommendations for future work are given.
Adaptive momentum management for large space structures
NASA Technical Reports Server (NTRS)
Hahn, E.
1987-01-01
Momentum management is discussed for a Large Space Structure (LSS) with the structure selected configuration being the Initial Orbital Configuration (IOC) of the dual keel space station. The external forces considered were gravity gradient and aerodynamic torques. The goal of the momentum management scheme developed is to remove the bias components of the external torques and center the cyclic components of the stored angular momentum. The scheme investigated is adaptive to uncertainties of the inertia tensor and requires only approximate knowledge of principle moments of inertia. Computational requirements are minimal and should present no implementation problem in a flight type computer and the method proposed is shown to be effective in the presence of attitude control bandwidths as low as .01 radian/sec.
Adaptive momentum management for the dual keel Space Station
NASA Technical Reports Server (NTRS)
Hopkins, M.; Hahn, E.
1987-01-01
The report discusses momentum management for a large space structure with the structure selected configuration being the Initial Orbital Configuration of the dual-keel Space Station. The external torques considered were gravity gradient and aerodynamic torques. The goal of the momentum management scheme developed is to remove the bias components of the external torques and center the cyclic components of the stored angular momentum. The scheme investigated is adaptive to uncertainties of the inertia tensor and requires only approximate knowledge of principal moments of inertia. Computational requirements are minimal and should present no implementation problem in a flight-type computer. The method proposed is shown to be effective in the presence of attitude control bandwidths as low as 0.01 radian/sec.
Public-key quantum digital signature scheme with one-time pad private-key
NASA Astrophysics Data System (ADS)
Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua
2018-01-01
A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.
Gas-Kinetic Theory Based Flux Splitting Method for Ideal Magnetohydrodynamics
NASA Technical Reports Server (NTRS)
Xu, Kun
1998-01-01
A gas-kinetic solver is developed for the ideal magnetohydrodynamics (MHD) equations. The new scheme is based on the direct splitting of the flux function of the MHD equations with the inclusion of "particle" collisions in the transport process. Consequently, the artificial dissipation in the new scheme is much reduced in comparison with the MHD Flux Vector Splitting Scheme. At the same time, the new scheme is compared with the well-developed Roe-type MHD solver. It is concluded that the kinetic MHD scheme is more robust and efficient than the Roe- type method, and the accuracy is competitive. In this paper the general principle of splitting the macroscopic flux function based on the gas-kinetic theory is presented. The flux construction strategy may shed some light on the possible modification of AUSM- and CUSP-type schemes for the compressible Euler equations, as well as to the development of new schemes for a non-strictly hyperbolic system.
Universal block diagram based modeling and simulation schemes for fractional-order control systems.
Bai, Lu; Xue, Dingyü
2017-05-08
Universal block diagram based schemes are proposed for modeling and simulating the fractional-order control systems in this paper. A fractional operator block in Simulink is designed to evaluate the fractional-order derivative and integral. Based on the block, the fractional-order control systems with zero initial conditions can be modeled conveniently. For modeling the system with nonzero initial conditions, the auxiliary signal is constructed in the compensation scheme. Since the compensation scheme is very complicated, therefore the integrator chain scheme is further proposed to simplify the modeling procedures. The accuracy and effectiveness of the schemes are assessed in the examples, the computation results testify the block diagram scheme is efficient for all Caputo fractional-order ordinary differential equations (FODEs) of any complexity, including the implicit Caputo FODEs. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.
Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay
Hu, Hequn; Liao, Xuewen
2017-01-01
The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device’s messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission (PSST), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. PSST is analyzed for the proposed secure schemes, and the closed form expressions of PSST for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better PSST than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar PSST, the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations. PMID:28869540
Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes
Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C.-W.
2014-01-01
Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions. PMID:25207333
Efficient and provable secure pairing-free security-mediated identity-based identification schemes.
Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W
2014-01-01
Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.
Zhang, Liping; Zhu, Shaohui; Tang, Shanyu
2017-03-01
Telecare medicine information systems (TMIS) provide flexible and convenient e-health care. However, the medical records transmitted in TMIS are exposed to unsecured public networks, so TMIS are more vulnerable to various types of security threats and attacks. To provide privacy protection for TMIS, a secure and efficient authenticated key agreement scheme is urgently needed to protect the sensitive medical data. Recently, Mishra et al. proposed a biometrics-based authenticated key agreement scheme for TMIS by using hash function and nonce, they claimed that their scheme could eliminate the security weaknesses of Yan et al.'s scheme and provide dynamic identity protection and user anonymity. In this paper, however, we demonstrate that Mishra et al.'s scheme suffers from replay attacks, man-in-the-middle attacks and fails to provide perfect forward secrecy. To overcome the weaknesses of Mishra et al.'s scheme, we then propose a three-factor authenticated key agreement scheme to enable the patient to enjoy the remote healthcare services via TMIS with privacy protection. The chaotic map-based cryptography is employed in the proposed scheme to achieve a delicate balance of security and performance. Security analysis demonstrates that the proposed scheme resists various attacks and provides several attractive security properties. Performance evaluation shows that the proposed scheme increases efficiency in comparison with other related schemes.
PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs.
Liu, Anfeng; Dong, Mianxiong; Ota, Kaoru; Long, Jun
2015-12-09
In this paper, a Per-Hop Acknowledgement (PHACK)-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes' ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes.
PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs
Liu, Anfeng; Dong, Mianxiong; Ota, Kaoru; Long, Jun
2015-01-01
In this paper, a Per-Hop Acknowledgement (PHACK)-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes’ ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes. PMID:26690178
Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru
2016-10-01
Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security verification of our scheme using the widely accepted AVISPA tool. High security and extra functionality features allow our proposed scheme to be applicable for telecare medicine information systems which is used for e-health care medical applications. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Tian, Jiyang; Liu, Jia; Wang, Jianhua; Li, Chuanzhe; Yu, Fuliang; Chu, Zhigang
2017-07-01
Mesoscale Numerical Weather Prediction systems can provide rainfall products at high resolutions in space and time, playing an increasingly more important role in water management and flood forecasting. The Weather Research and Forecasting (WRF) model is one of the most popular mesoscale systems and has been extensively used in research and practice. However, for hydrologists, an unsolved question must be addressed before each model application in a different target area. That is, how are the most appropriate combinations of physical parameterisations from the vast WRF library selected to provide the best downscaled rainfall? In this study, the WRF model was applied with 12 designed parameterisation schemes with different combinations of physical parameterisations, including microphysics, radiation, planetary boundary layer (PBL), land-surface model (LSM) and cumulus parameterisations. The selected study areas are two semi-humid and semi-arid catchments located in the Daqinghe River basin, Northern China. The performance of WRF with different parameterisation schemes is tested for simulating eight typical 24-h storm events with different evenness in space and time. In addition to the cumulative rainfall amount, the spatial and temporal patterns of the simulated rainfall are evaluated based on a two-dimensional composed verification statistic. Among the 12 parameterisation schemes, Scheme 4 outperforms the other schemes with the best average performance in simulating rainfall totals and temporal patterns; in contrast, Scheme 6 is generally a good choice for simulations of spatial rainfall distributions. Regarding the individual parameterisations, Single-Moment 6 (WSM6), Yonsei University (YSU), Kain-Fritsch (KF) and Grell-Devenyi (GD) are better choices for microphysics, planetary boundary layers (PBL) and cumulus parameterisations, respectively, in the study area. These findings provide helpful information for WRF rainfall downscaling in semi-humid and semi-arid areas. The methodologies to design and test the combination schemes of parameterisations can also be regarded as a reference for generating ensembles in numerical rainfall predictions using the WRF model.
Multi-stakeholder perspectives of locally commissioned enhanced optometric services
Baker, H; Harper, R A; Edgar, D F; Lawrenson, J G
2016-01-01
Objectives To explore views of all stakeholders (patients, optometrists, general practitioners (GPs), commissioners and ophthalmologists) regarding the operation of community-based enhanced optometric services. Design Qualitative study using mixed methods (patient satisfaction surveys, semi-structured telephone interviews and optometrist focus groups). Setting A minor eye conditions scheme (MECS) and glaucoma referral refinement scheme (GRRS) provided by accredited community optometrists. Participants 189 patients, 25 community optometrists, 4 glaucoma specialist hospital optometrists (GRRS), 5 ophthalmologists, 6 GPs (MECS), 4 commissioners. Results Overall, 99% (GRRS) and 100% (MECS) patients were satisfied with their optometrists’ examination. The vast majority rated the following as ‘very good’; examination duration, optometrists’ listening skills, explanations of tests and management, patient involvement in decision-making, treating the patient with care and concern. 99% of MECS patients would recommend the service. Manchester optometrists were enthusiastic about GRRS, feeling fortunate to practise in a ‘pro-optometry’ area. No major negatives were reported, although both schemes were limited to patients resident within certain postcode areas, and some inappropriate GP referrals occurred (MECS). Communication with hospitals was praised in GRRS but was variable, depending on hospital (MECS). Training for both schemes was valuable and appropriate but should be ongoing. MECS GPs were very supportive, reporting the scheme would reduce secondary care referral numbers, although some MECS patients were referred back to GPs for medication. Ophthalmologists (MECS and GRRS) expressed very positive views and widely acknowledged that these new care pathways would reduce unnecessary referrals and shorten patient waiting times. Commissioners felt both schemes met or exceeded expectations in terms of quality of care, allowing patients to be seen quicker and more efficiently. Conclusions Locally commissioned schemes can be a positive experience for all involved. With appropriate training, clear referral pathways and good communication, community optometrists can offer high-quality services that are highly acceptable to patients, health professionals and commissioners. PMID:27798000
Regolith thermal energy storage for lunar nighttime power
NASA Technical Reports Server (NTRS)
Tillotson, Brian
1992-01-01
A scheme for providing nighttime electric power to a lunar base is described. This scheme stores thermal energy in a pile of regolith. Any such scheme must somehow improve on the poor thermal conductivity of lunar regolith in vacuum. Two previous schemes accomplish this by casting or melting the regolith. The scheme described here wraps the regolith in a gas-tight bag and introduces a light gas to enhance thermal conductivity. This allows the system to be assembled with less energy and equipment than schemes which require melting of regolith. A point design based on the new scheme is presented. Its mass from Earth compares favorably with the mass of a regenerative fuel cell of equal capacity.
NASA Technical Reports Server (NTRS)
Lee, H.-W.; Lam, K. S.; Devries, P. L.; George, T. F.
1980-01-01
A new semiclassical decoupling scheme (the trajectory-based decoupling scheme) is introduced in a computational study of vibrational-to-electronic energy transfer for a simple model system that simulates collinear atom-diatom collisions. The probability of energy transfer (P) is calculated quasiclassically using the new scheme as well as quantum mechanically as a function of the atomic electronic-energy separation (lambda), with overall good agreement between the two sets of results. Classical mechanics with the new decoupling scheme is found to be capable of predicting resonance behavior whereas an earlier decoupling scheme (the coordinate-based decoupling scheme) failed. Interference effects are not exhibited in P vs lambda results.
NASA Astrophysics Data System (ADS)
Ahmed, Rounaq; Srinivasa Pai, P.; Sriram, N. S.; Bhat, Vasudeva
2018-02-01
Vibration Analysis has been extensively used in recent past for gear fault diagnosis. The vibration signals extracted is usually contaminated with noise and may lead to wrong interpretation of results. The denoising of extracted vibration signals helps the fault diagnosis by giving meaningful results. Wavelet Transform (WT) increases signal to noise ratio (SNR), reduces root mean square error (RMSE) and is effective to denoise the gear vibration signals. The extracted signals have to be denoised by selecting a proper denoising scheme in order to prevent the loss of signal information along with noise. An approach has been made in this work to show the effectiveness of Principal Component Analysis (PCA) to denoise gear vibration signal. In this regard three selected wavelet based denoising schemes namely PCA, Empirical Mode Decomposition (EMD), Neighcoeff Coefficient (NC), has been compared with Adaptive Threshold (AT) an extensively used wavelet based denoising scheme for gear vibration signal. The vibration signals acquired from a customized gear test rig were denoised by above mentioned four denoising schemes. The fault identification capability as well as SNR, Kurtosis and RMSE for the four denoising schemes have been compared. Features extracted from the denoised signals have been used to train and test artificial neural network (ANN) models. The performances of the four denoising schemes have been evaluated based on the performance of the ANN models. The best denoising scheme has been identified, based on the classification accuracy results. PCA is effective in all the regards as a best denoising scheme.
Charge Management in LISA Pathfinder: The Continuous Discharging Experiment
NASA Astrophysics Data System (ADS)
Ewing, Becca Elizabeth
2018-01-01
Test mass charging is a significant source of excess force and force noise in LISA Pathfinder (LPF). The planned design scheme for mitigation of charge induced force noise in LISA is a continuous discharge by UV light illumination. We report on analysis of a charge management experiment on-board LPF conducted during December 2016. We discuss the measurement of test mass charging noise with and without continuous UV illumination, in addition to the dynamic response in the continuous discharge scheme. Results of the continuous discharge system will be discussed for their application to operating LISA with lower test mass charge.
Transmission congestion management in the electricity market
NASA Astrophysics Data System (ADS)
Chen, Yue
2018-04-01
In this paper we mainly discuss how to optimize the arrangement to decrease the loss of each line when the power generation side of the system transmission congestion occurs in a safe and economical manner. We respectively set the adjust model if the transmission can be eliminated which can calculate the best scheme and safety margin model when transmission cannot be eliminated which is a multi-objective planning problem. We solve the two models on the condition of the load power demands are 982.4MW and 1052.8 MW by Lingo and get the optimal management scheme.
Novitzki, R.P.
1976-01-01
Other recharge-recycling schemes can also be evaluated. Estimating the recycling efficiency (of recharge ponds, trenches, spreading areas, or irrigated fields) provides a basis for predicting water-level declines, the concentration of conservative ions (conservative in the sense that no reaction other than mixing occurs to change the character of the ion being considered) in the water supply and in the regional ground-water system, and the temperature of the water supply. Hatchery development and management schemes can be chosen to optimize hatchery productivity or minimize operation costs while protecting the ground-water system.