Science.gov

Sample records for masterless charge-control scheme

  1. Modular Battery Charge Controller

    NASA Technical Reports Server (NTRS)

    Button, Robert; Gonzalez, Marcelo

    2009-01-01

    A new approach to masterless, distributed, digital-charge control for batteries requiring charge control has been developed and implemented. This approach is required in battery chemistries that need cell-level charge control for safety and is characterized by the use of one controller per cell, resulting in redundant sensors for critical components, such as voltage, temperature, and current. The charge controllers in a given battery interact in a masterless fashion for the purpose of cell balancing, charge control, and state-of-charge estimation. This makes the battery system invariably fault-tolerant. The solution to the single-fault failure, due to the use of a single charge controller (CC), was solved by implementing one CC per cell and linking them via an isolated communication bus [e.g., controller area network (CAN)] in a masterless fashion so that the failure of one or more CCs will not impact the remaining functional CCs. Each micro-controller-based CC digitizes the cell voltage (V(sub cell)), two cell temperatures, and the voltage across the switch (V); the latter variable is used in conjunction with V(sub cell) to estimate the bypass current for a given bypass resistor. Furthermore, CC1 digitizes the battery current (I1) and battery voltage (V(sub batt) and CC5 digitizes a second battery current (I2). As a result, redundant readings are taken for temperature, battery current, and battery voltage through the summation of the individual cell voltages given that each CC knows the voltage of the other cells. For the purpose of cell balancing, each CC periodically and independently transmits its cell voltage and stores the received cell voltage of the other cells in an array. The position in the array depends on the identifier (ID) of the transmitting CC. After eight cell voltage receptions, the array is checked to see if one or more cells did not transmit. If one or more transmissions are missing, the missing cell(s) is (are) eliminated from cell

  2. Charge Control Investigation of Rechargeable Lithium Cells

    NASA Technical Reports Server (NTRS)

    Otzinger, B.; Somoano, R.

    1984-01-01

    An ambient temperature rechargeable Li-TiS2 cell was cycled under conditions which simulate aerospace applications. A novel charge/discharge state-of-charge control scheme was used, together with tapered current charging, to overcome deleterious effects associated with end-of-charge and end-of-discharge voltages. The study indicates that Li-TiS2 cells hold promise for eventual synchronous satellite-type applications. Problem areas associated with performance degradation and reconditioning effects are identified.

  3. Lithium-Ion Cell Charge Control Unit

    NASA Technical Reports Server (NTRS)

    Reid, Concha; Button, Robert; Manzo, Michelle; McKissock, Barbara; Miller, Thomas; Gemeiner, Russel; Bennett, William; Hand, Evan

    2006-01-01

    Life-test data of Lithium-Ion battery cells is critical in order to establish their performance capabilities for NASA missions and Exploration goals. Lithium-ion cells have the potential to replace rechargeable alkaline cells in aerospace applications, but they require a more complex charging scheme than is typically required for alkaline cells. To address these requirements in our Lithium-Ion Cell Test Verification Program, a Lithium-Ion Cell Charge Control Unit was developed by NASA Glenn Research Center (GRC). This unit gives researchers the ability to test cells together as a pack, while allowing each cell to charge individually. This allows the inherent cell-to-cell variations to be addressed on a series string of cells and results in a substantial reduction in test costs as compared to individual cell testing. The Naval Surface Warfare Center at Crane, Indiana developed a power reduction scheme that works in conjunction with the Lithium-Ion Cell Charge Control Unit. This scheme minimizes the power dissipation required by the circuitry to prolong circuit life and improve its reliability.

  4. Long Duration Balloon Charge Controller Stack Integration

    NASA Astrophysics Data System (ADS)

    Clifford, Kyle

    NASA and the Columbia Scientific Balloon Facility are interested in updating the design of the charge controller on their long duration balloon (LDB) in order to enable the charge controllers to be directly interfaced via RS232 serial communication by a ground testing computers and the balloon's flight computer without the need to have an external electronics stack. The design involves creating a board that will interface with the existing boards in the charge controller in order to receive telemetry from and send commands to those boards, and interface with a computer through serial communication. The inputs to the board are digital status inputs indicating things like whether the photovoltaic panels are connected or disconnected; and analog inputs with information such as the battery voltage and temperature. The outputs of the board are 100ms duration command pulses that will switch relays that do things like connect the photovoltaic panels. The main component of this design is a PIC microcontroller which translates the outputs of the existing charge controller into serial data when interrogated by a ground testing or flight computer. Other components involved in the design are an AD7888 12-bit analog to digital converter, a MAX3232 serial transceiver, various other ICs, capacitors, resistors, and connectors.

  5. Charge-Control Unit for Testing Lithium-Ion Cells

    NASA Technical Reports Server (NTRS)

    Reid, Concha M.; Mazo, Michelle A.; Button, Robert M.

    2008-01-01

    A charge-control unit was developed as part of a program to validate Li-ion cells packaged together in batteries for aerospace use. The lithium-ion cell charge-control unit will be useful to anyone who performs testing of battery cells for aerospace and non-aerospace uses and to anyone who manufacturers battery test equipment. This technology reduces the quantity of costly power supplies and independent channels that are needed for test programs in which multiple cells are tested. Battery test equipment manufacturers can integrate the technology into their battery test equipment as a method to manage charging of multiple cells in series. The unit manages a complex scheme that is required for charging Li-ion cells electrically connected in series. The unit makes it possible to evaluate cells together as a pack using a single primary test channel, while also making it possible to charge each cell individually. Hence, inherent cell-to-cell variations in a series string of cells can be addressed, and yet the cost of testing is reduced substantially below the cost of testing each cell as a separate entity. The unit consists of electronic circuits and thermal-management devices housed in a common package. It also includes isolated annunciators to signal when the cells are being actively bypassed. These annunciators can be used by external charge managers or can be connected in series to signal that all cells have reached maximum charge. The charge-control circuitry for each cell amounts to regulator circuitry and is powered by that cell, eliminating the need for an external power source or controller. A 110-VAC source of electricity is required to power the thermal-management portion of the unit. A small direct-current source can be used to supply power for an annunciator signal, if desired.

  6. Thermal study of battery charge control by temperature derivative reduction

    NASA Astrophysics Data System (ADS)

    Halkjaerjacobsen, P.; Schmidt, K. A.; Otto, S.; Dudley, G. J.; Spruijt, H. J. N.

    1989-08-01

    A battery charge control technique, invented at ESTEC in 1983, which relies upon the changes in the battery cell temperature time derivative which accompany the onset of overcharge is described. A thermally realistic portion of a typical flight battery is constructed and tested in parallel with detailed thermal modeling in order to develop the technique further. Comparisons between thermal model and test results are presented and show satisfactory agreement. Optimum positions for the temperature sensors within the battery are identified, taking into account sensitivity to cell temperature changes as well as to thermal perturbations due to external effects.

  7. Charge-controlled magnetism in colloidal doped semiconductor nanocrystals

    NASA Astrophysics Data System (ADS)

    Gamelin, Daniel

    2010-03-01

    Electrical control over the magnetic states of doped semiconductor nanostructures could enable new spin-based information processing technologies, but the relatively weak interactions between dopants and charge carriers have so far suggested that such gated magnetism will be limited to cryogenic temperatures. This talk will describe the observation of a large, reversible, room-temperature magnetic response to charge injection in free-standing colloidal ZnO nanocrystals doped with Mn(II) ions. Injected electrons are found to delocalize throughout the entire nanocrystal, and to activate new ferromagnetic Mn(II)-Mn(II) exchange interactions that are strong enough to overcome antiferromagnetic coupling between nearest-neighbor Mn(II) ions, making the full magnetic moments of all dopants observable upon charging. Removal of the electron causes the system to revert to its original form, allowing reversible charge-controlled manipulation of room-temperature nanocrystal magnetism. The physical properties of these charged, doped nanocrystals are directly analogous to those of bound magnetic poltroons (BMPs) postulated to underlie high-temperature ferromagnetic ordering in the bulk forms of this and related diluted magnetic oxides. This discovery of charge-controlled magnetism in free-standing colloidal nanocrystals that is large, reversible, and stable at room temperature presents new opportunities for fundamental studies and raises interesting possibilities for the development of spin-based information processing technologies from solution-processable semiconductor nanostructures. Related references: Ochsenbein, S. T.; Feng, Y.; Whitaker, K. M.; Badaeva, E.; Liu, W. K.; Li, X.; Gamelin, D. R., Nature Nanotechnology, 4, 681 (2009); Liu, W. K.; Whitaker, K. M.; Kittilstved, K. R.; Gamelin, D. R., J. Am. Chem. Soc., 128, 3910 (2006).

  8. UV-LED-based charge control for LISA

    NASA Astrophysics Data System (ADS)

    Olatunde, Taiwo; Shelley, Ryan; Chilton, Andrew; Ciani, Giacomo; Mueller, Guido; Conklin, John

    2014-03-01

    The test masses inside the LISA gravitational reference sensors (GRS) must maintain almost pure geodesic motion for gravitational waves to be successfully detected. The residual accelerations have to stay below 3fm/s2/rtHz at all frequencies between 0.1 and 3 mHz. One of the well known noise sources is associated with the charges on the test masses which couple to stray electrical potentials and external electro-magnetic fields. The LISA pathfinder (LPF) will use Hg-discharge lamps emitting mostly around 253 nm to discharge the test masses via photoemission in its 2015/16 flight. A future LISA mission launched around 2030 will likely replace the lamps with newer UV-LEDs. UV-LEDs have a lower mass, a better power efficiency, and are smaller than their Hg counterparts. Furthermore, the latest generation produces light at 240 nm, with energy well above the work function of pure gold. I will describe a preliminary design for effective charge control through photoelectric effect by using these LEDs. The effectiveness of this method is verified by taking Quantum Efficiency (QE) measurements which relate the number of electrons emitted to the number of photons incident on the Au test mass surface. This presentation addresses our initial results and future plans which includes implementation and testing in the UF torsion pendulum and space-qualification in a small satellite mission which will launch in the summer of 2014, through a collaboration with Stanford, KACST, and NASA Ames Research Center.

  9. A digital controlled solar array regulator employing the charge control

    SciTech Connect

    Cho, Y.J.; Cho, B.H.

    1997-12-31

    A microprocessor controlled SAR system is presented. The inner analog loops employing the charge current control scheme continuously regulate the solar array output power according to the reference value generated by the ECU. The ECU consists of the peak power tracking and the battery charge current regulation algorithm. Modeling, analysis and a design procedure of the inner loops and the system loop are presented taking into account of interaction between the inner analog loops and the outer digital loops. Utilizing the inherent characteristics of the inner voltage and current loop, the system dynamic performance and stability can be optimized up to the speed limit of the microprocessor.

  10. Amp-hour counting charge control for photovoltaic hybrid power systems

    SciTech Connect

    Hund, T.D.; Thompson, B.

    1997-10-01

    An amp-hour counting battery charge control algorithm has been defined and tested using the Digital Solar Technologies MPR-9400 microprocessor based photovoltaic hybrid charge controller. This work included extensive laboratory and field testing of the charge algorithm on vented lead-antimony and valve regulated lead-acid batteries. The test results have shown that with proper setup amp-hour counting charge control is more effective than conventional voltage regulated sub-array shedding in returning the lead-acid battery to a high state of charge.

  11. Battery charging control methods, electric vehicle charging methods, battery charging apparatuses and rechargeable battery systems

    DOEpatents

    Tuffner, Francis K.; Kintner-Meyer, Michael C. W.; Hammerstrom, Donald J.; Pratt, Richard M.

    2012-05-22

    Battery charging control methods, electric vehicle charging methods, battery charging apparatuses and rechargeable battery systems. According to one aspect, a battery charging control method includes accessing information regarding a presence of at least one of a surplus and a deficiency of electrical energy upon an electrical power distribution system at a plurality of different moments in time, and using the information, controlling an adjustment of an amount of the electrical energy provided from the electrical power distribution system to a rechargeable battery to charge the rechargeable battery.

  12. Spacecraft charging control by thermal, field emission with lanthanum-hexaboride emitters

    NASA Technical Reports Server (NTRS)

    Morris, J. F.

    1978-01-01

    Thermal, field emitters of lanthanum (or perhaps cerium) hexaboride (LaB6) with temperature variability up to about 1500K are suggested for spacecraft charging control. Such emitters operate at much lower voltages with considerably more control and add plasma-diagnostic versatility. These gains should outweigh the additional complexity of providing heat for the LaB6 thermal, field emitter.

  13. Experiments in charge control at geosynchronous orbit - ATS-5 and ATS-6

    NASA Technical Reports Server (NTRS)

    Olsen, R. C.

    1985-01-01

    In connection with existing theoretical concepts, it was difficult to explain the negative potentials found in sunlight, first on Applied Technology Satellite-5 (ATS-5) and then on ATS-6. The problem became important when an association between spacecraft charging and anomalies in spacecraft behavior was observed. A study of daylight charging phenomena on ATS-6 was conducted, and an investigation was performed with the objective to determine effective methods of charge control, taking into account the feasibility to utilize the ATS-5 and ATS-6 ion engines as current sources. In the present paper, data and analysis for the ion engine experiments on ATS-5 and ATS-6 are presented. It is shown that electron emission from a satellite with insulating surfaces is not an effective method of charge control because the increase in differential charging which results limits the effectiveness of electron emitters and increases the possibility of electrostatic discharges between surfaces at different potentials.

  14. Battery and charge controller evaluations in small stand-alone PV systems

    NASA Astrophysics Data System (ADS)

    Woodworth, J. R.; Thomas, M. G.; Stevens, J. W.; Dunlop, J. L.; Swamy, M. R.; Demetrius, L.; Harrington, S. R.

    1994-12-01

    We report the results of two separate long-term tests of batteries and charge controllers in small stand-alone PV systems. In these experiments, seven complete systems were tested for two years at each of two locations: Sandia National Laboratories in Albuquerque and the Florida Solar Energy Center in Cape Canaveral, Florida. Each system contained a PV array, flooded-lead-acid battery, a charge controller and a resistive load. Performance of the systems was strongly influenced by the difference in solar irradiance at the two sites, with some batteries at Sandia exceeding manufacturer's predictions for cycle life. System performance was strongly correlated with regulation reconnect voltage (R(sup 2) correlation coefficient = 0.95) but only weakly correlated with regulation voltage. We will also discuss details of system performance, battery lifetime and battery water consumption.

  15. Beam-plasma concepts for wafer charging control during ion implantation

    SciTech Connect

    Current, M.I.; Vella, M.C.; Lukaszek, W.

    1996-12-31

    With the development of quantitative measures of current-voltage characteristics (CHARM{reg_sign}-2) and a beam-plasma model for charge flows to and from the wafer surface, a more comprehensive view of wafer charging has emerged. A beam-plasma model has been developed which describes both positive and negative current-voltage characteristics of the beam plasma. A quantitative description has been achieved for a variety of charge control systems; including dense and dilute plasma flows, electron showers as well as for photoresist outgassing effects.

  16. Photovoltaic battery & charge controller market & applications survey. An evaluation of the photovoltaic system market for 1995

    SciTech Connect

    Hammond, R.L.; Turpin, J.F.; Corey, G.P.

    1996-12-01

    Under the sponsorship of the Department of Energy, Office of Utility Technologies, the Battery Analysis and Evaluation Department and the Photovoltaic System Assistance Center of Sandia National Laboratories (SNL) initiated a U.S. industry-wide PV Energy Storage System Survey. Arizona State University (ASU) was contracted by SNL in June 1995 to conduct the survey. The survey included three separate segments tailored to: (a) PV system integrators, (b) battery manufacturers, and (c) PV charge controller manufacturers. The overall purpose of the survey was to: (a) quantify the market for batteries shipped with (or for) PV systems in 1995, (b) quantify the PV market segments by battery type and application for PV batteries, (c) characterize and quantify the charge controllers used in PV systems, (d) characterize the operating environment for energy storage components in PV systems, and (e) estimate the PV battery market for the year 2000. All three segments of the survey were mailed in January 1996. This report discusses the purpose, methodology, results, and conclusions of the survey.

  17. Carbon nanotube-based charge-controlled speed-regulating nanoclutch

    NASA Astrophysics Data System (ADS)

    Zhang, Zhong-Qiang; Ye, Hong-Fei; Liu, Zhen; Ding, Jian-Ning; Cheng, Guang-Gui; Ling, Zhi-Yong; Zheng, Yong-Gang; Wang, Lei; Wang, Jin-Bao

    2012-06-01

    In this paper, a carbon nanotube-based charge-controlled speed-regulating nanoclutch (CNT-CC-SRNC), composed of an inner carbon nanotube (CNT), an outer CNT, and the water confined between the two CNT walls, is proposed by utilizing electrowetting-induced improvement of the friction at the interfaces between water and CNT walls. As the inner CNT is the driving axle, molecular dynamics simulation results demonstrate that CNT-CC-SRNC is in the disengaged state for the uncharged CNTs, whereas water confined in the two charged CNT walls can transmit the torque from the inner tube to the outer tube. Importantly, the proposed CNT-CC-SRNC can perform stepless speed-regulating function through changing the magnitude of the charge assigned on CNT atoms.

  18. Charge control experiments on a CH-53E helicopter in a dusty environment

    NASA Technical Reports Server (NTRS)

    Moore, C. B.; Jones, J. J.; Hunyady, S. J.

    1991-01-01

    Charge control tests were carried out on a ground based, Marine Corps helicopter to determine if control of the electric fields acting on the engine exhaust gases could be used to reduce the electrification of the helicopter when it operated in a dusty atmosphere. The test aircraft was flown to a dusty, unpaved area and was then isolated electrically from the earth. When the helicopter engines were operated at ground idle with the rotor locked, the isolated aircraft charged positively, as had been observed previously. However, when the rotor brake was released and the turning rotor created a downdraft that raised dust clouds, the aircraft always became charged more positively, to potentials ranging form +30 to +45 kV. The dust clouds raised by the rotor downwash invariably carried negative space charges with concentrations of up to -100 nC/cu m and caused surface electric fields with strengths of up to 10 kV/m immediately down wind of the aircraft. The natural charging of the helicopter operating in these dust clouds was successfully opposed by control of the electric fields acting on the hot, electrically conductive exhaust gases. The control was achieved by placing electrostatic shield around the exhausts.

  19. A pulse-width modulated, high reliability charge controller for small photovoltaic systems

    SciTech Connect

    Gerken, K.; Welsh, D.

    1997-02-01

    This report presents the results of a development effort to design, test and begin production of a new class of small photovoltaic (PV) charge controllers. Sandia National Laboratories provided technical support, test data and financial support through a Balance-of-System Development contract. One of the objectives of the development was to increase user confidence in small PV systems by improving the reliability and operating life of the system controllers. Another equally important objective was to improve the economics of small PV systems by extending the battery lifetimes. Using new technology and advanced manufacturing techniques, these objectives were accomplished. Because small stand-alone PV systems account for over one third of all PV modules shipped, the positive impact of improving the reliability and economics of PV systems in this market segment will be felt throughout the industry. The results of verification testing of the new product are also included in this report. The initial design goals and specifications were very aggressive, but the extensive testing demonstrates that all the goals were achieved. Production of the product started in May at a rate of 2,000 units per month. Over 40 Morningstar distributors (5 US and 35 overseas) have taken delivery in the first 2 months of shipments. Initial customer reactions to the new controller have been very favorable.

  20. Economic Value of LFC Substitution by Charge Control for Plug-in Hybrid Electric Vehicles

    NASA Astrophysics Data System (ADS)

    Takagi, Masaaki; Iwafune, Yumiko; Yamamoto, Hiromi; Yamaji, Kenji; Okano, Kunihiko; Hiwatari, Ryouji; Ikeya, Tomohiko

    There are lots of global warming countermeasures. In the power sector, nuclear power plants play an important role because they do not produce CO2 emissions during production of electricity. However, if the generation share of nuclear is too high at nighttime, it becomes difficult to keep enough capacity of Load Frequency Control (LFC) because nuclear power plants do not change the output (i.e., without load following operation) in Japan. On the other hand, in the transport sector, Plug-in Hybrid Electric Vehicle (PHEV) is being developed as an environmentally friendly vehicle. The electric energy of PHEV is charged mainly during nighttime when the electricity price is low. Therefore, we have proposed a charging power control of PHEVs to compensate LFC capacity in nighttime. In this study, we evaluated the economic value of charging power control by using an optimal generation planning model, and obtained the following results. Charging power control is effective in reduction of CO2 emissions and enhancement of economic efficiency of power system. Particularly, even in the low market share of PHEVs, the charge control has a high economic value because it substitutes nuclear power plant, base-load provider with low fuel cost, for LNG-CC, LEC provider with high fuel cost.

  1. Identification procedures for the charge-controlled nonlinear noise model of microwave electron devices

    NASA Astrophysics Data System (ADS)

    Filicori, Fabio; Traverso, Pier Andrea; Florian, Corrado; Borgarino, Mattia

    2004-05-01

    The basic features of the recently proposed Charge-Controlled Non-linear Noise (CCNN) model for the prediction of low-to-high-frequency noise up-conversion in electron devices under large-signal RF operation are synthetically presented. It is shown that the different noise generation phenomena within the device can be described by four equivalent noise sources, which are connected at the ports of a "noiseless" device model and are non-linearly controlled by the time-varying instantaneous values of the intrinsic device voltages. For the empirical identification of the voltage-controlled equivalent noise sources, different possible characterization procedures, based not only on conventional low-frequency noise data, but also on different types of noise measurements carried out under large-signal RF operating conditions are discussed. As an example of application, the measurement-based identification of the CCNN model for a GaInP heterojunction bipolar microwave transistor is presented. Preliminary validation results show that the proposed model can describe with adequate accuracy not only the low-frequency noise of the HBT, but also its phase-noise performance in a prototype VCO implemented by using the same monolithic GaAs technology.

  2. Integrated-Optic Wavelength Multiplexer In Glass Fabricated By A Charge Controlled Ion Exchange

    NASA Astrophysics Data System (ADS)

    Klein, R.; Jestel, D.; Lilienhof, H. J.; Rottman, F.; Voges, E.

    1989-02-01

    Integrated-optic wavelength division multiplexing (WDM) is commonly used in communication systems. These WDM-devices are also well suited to build up optical fiber networks for both intensity and interferometric sensor types. The operation principle of our wavelength division multiplexing devise is based on the wavelength dependent two-mode interference in a two-moded waveguide, which is coupled adiabatically to the single-mode input and output strip waveguides. The single-mode input and output waveguides are connected via two Y-branches ( "'kJ- 1° branching angle ) with a two-moded intersection region. The ratio of the light powers in the single-mode output waveguides depends on wavelength . The two-mode interference within the two-moded center waveguide leads to an almost wavelength periodic transmission caracteristic . Dual-channel multiplexers/demultiplexers were fabricated by a charge controlled field assisted pottasium exchange in B-270 glass (Desag). The devices have a typical channel separation of 30 - 40 nm and a far-end crosstalk attenuation of better than 16 dB. The operation wavelength regions of the fabricated devices are 0.6 - 0.8 µm and 1.3 - 1.6 µm, respectively.

  3. System dynamic model and charging control of lead-acid battery for stand-alone solar PV system

    SciTech Connect

    Huang, B.J.; Hsu, P.C.; Wu, M.S.; Ho, P.Y.

    2010-05-15

    The lead-acid battery which is widely used in stand-alone solar system is easily damaged by a poor charging control which causes overcharging. The battery charging control is thus usually designed to stop charging after the overcharge point. This will reduce the storage energy capacity and reduce the service time in electricity supply. The design of charging control system however requires a good understanding of the system dynamic behaviour of the battery first. In the present study, a first-order system dynamics model of lead-acid battery at different operating points near the overcharge voltage was derived experimentally, from which a charging control system based on PI algorithm was developed using PWM charging technique. The feedback control system for battery charging after the overcharge point (14 V) was designed to compromise between the set-point response and the disturbance rejection. The experimental results show that the control system can suppress the battery voltage overshoot within 0.1 V when the solar irradiation is suddenly changed from 337 to 843 W/m{sup 2}. A long-term outdoor test for a solar LED lighting system shows that the battery voltage never exceeded 14.1 V for the set point 14 V and the control system can prevent the battery from overcharging. The test result also indicates that the control system is able to increase the charged energy by 78%, as compared to the case that the charging stops after the overcharge point (14 V). (author)

  4. A decentralized charging control strategy for plug-in electric vehicles to mitigate wind farm intermittency and enhance frequency regulation

    NASA Astrophysics Data System (ADS)

    Luo, Xiao; Xia, Shiwei; Chan, Ka Wing

    2014-02-01

    This paper proposes a decentralized charging control strategy for a large population of plug-in electric vehicles (PEVs) to neutralize wind power fluctuations so as to improve the regulation of system frequency. Without relying on a central control entity, each PEV autonomously adjusts its charging or discharging power in response to a communal virtual price signal and based on its own urgency level of charging. Simulation results show that under the proposed charging control, the aggregate PEV power can effectively neutralize wind power fluctuations in real-time while differential allocation of neutralization duties among the PEVs can be realized to meet the PEV users' charging requirements. Also, harmful wind-induced cyclic operations in thermal units can be mitigated. As shown in economic analysis, the proposed strategy can create cost saving opportunities for both PEV users and utility.

  5. Space-charge-controlled field emission model of current conduction through Al2O3 films

    NASA Astrophysics Data System (ADS)

    Hiraiwa, Atsushi; Matsumura, Daisuke; Kawarada, Hiroshi

    2016-02-01

    This study proposes a model for current conduction in metal-insulator-semiconductor (MIS) capacitors, assuming the presence of two sheets of charge in the insulator, and derives analytical formulae of field emission (FE) currents under both negative and positive bias. Since it is affected by the space charge in the insulator, this particular FE differs from the conventional FE and is accordingly named the space-charge-controlled (SCC) FE. The gate insulator of this study was a stack of atomic-layer-deposition Al2O3 and underlying chemical SiO2 formed on Si substrates. The current-voltage (I-V) characteristics simulated using the SCC-FE formulae quantitatively reproduced the experimental results obtained by measuring Au- and Al-gated Al2O3/SiO2 MIS capacitors under both biases. The two sheets of charge in the Al2O3 films were estimated to be positive and located at a depth of greater than 4 nm from the Al2O3/SiO2 interface and less than 2 nm from the gate. The density of the former is approximately 1 × 1013 cm-2 in units of electronic charge, regardless of the type of capacitor. The latter forms a sheet of dipoles together with image charges in the gate and hence causes potential jumps of 0.4 V and 1.1 V in the Au- and Al-gated capacitors, respectively. Within a margin of error, this sheet of dipoles is ideally located at the gate/Al2O3 interface and effectively reduces the work function of the gate by the magnitude of the potential jumps mentioned above. These facts indicate that the currents in the Al2O3/SiO2 MIS capacitors are enhanced as compared to those in ideal capacitors and that the currents in the Al-gated capacitors under negative bias (electron emission from the gate) are more markedly enhanced than those in the Au-gated capacitors. The larger number of gate-side dipoles in the Al-gated capacitors is possibly caused by the reaction between the Al and Al2O3, and therefore gate materials that do not react with underlying gate insulators should be chosen

  6. Performance of Li-Ion Cells Under Battery Voltage Charge Control

    NASA Technical Reports Server (NTRS)

    Rao, Gopalakrishna M.; Vaidyanathan, Hari; Day, John H. (Technical Monitor)

    2001-01-01

    A study consisting of electrochemical characterization and Low-Earth-Orbit (LEO) cycling of Li-Ion cells from three vendors was initiated in 1999 to determine the cycling performance and to infuse the new technology in the future NASA missions. The 8-cell batteries included in this evaluation are prismatic cells manufactured by Mine Safety Appliances Company (MSA), cylindrical cells manufactured by SAFT and prismatic cells manufactured by Yardney Technical Products, Inc. (YTP). The three batteries were cycle tested in the LEO regime at 40% depth of discharge, and under a charge control technique that consists of battery voltage clamp with a current taper. The initial testing was conducted at 20 C; however, the batteries were cycled also intermittently at low temperatures. YTP 20 Ah cells consisted of mixed-oxide (Co and Ni) positive, graphitic carbon negative, LIPF6 salt mixed with organic carbonate solvents. The battery voltage clamp was 32 V. The low temperature cycling tests started after 4575 cycles at 20 C. The cells were not capable of cycling. at low temperature since the charge acceptance at battery level was poor. There was a cell in the battery that showed too high an end-of-charge (EOC) voltage thereby limiting the ability to charge the rest of the cells in the battery. The battery has completed 6714 cycles. SAFT 12 Ah cells consisted of mixed-oxide (Co and NO positive, graphitic carbon negative, LiPF6 salt mixed with organic carbonate solvents. The battery voltage clamp was for 30.8 V. The low temperature cycling tests started after 4594 cycles at 20 C. A cell that showed low end of discharge (EOD) and EOC voltages and three other cells that showed higher EOC voltages limited the charge acceptance at the selected voltage limit during charge. The cells were capable of cycling at 10 C and 0 C but the charge voltage limit had to be increased to 34.3 V (4.3 V per cell). The low temperature cycling may have induced poor chargeability since the voltage had to

  7. The effect of a charge control layer on the electroluminescent characteristic of blue and white organic light-emitting diodes.

    PubMed

    Lee, Dong Hyung; Lee, Seok Jae; Koo, Ja-Ryong; Lee, Ho Won; Shin, Hyun Su; Lee, Song Eun; Kim, Woo Young; Lee, Kum Hee; Yoon, Seung Soo; Kim, Young Kwan

    2014-08-01

    We investigated blue fluorescent organic light-emitting diode (OLED) with a charge control layer (CCL) to produce high efficiency and improve the half-decay lifetime. Three types of devices (device A, B, and C) were fabricated following the number of CCLs within the emitting layer (EML), maintaining the thickness of whole EML. The CCL and host material, 2-methyl-9,10-di(2-naphthyl)anthracene, which has a bipolar property, was able to control the carrier movement with ease inside the EML. Device B demonstrated a maximum luminous efficiency (LE) and external quantum efficiency (EQE) of 9.19 cd/A and 5.78%, respectively. It also showed that the enhancement of the half-decay lifetime, measured at an initial luminance of 1,000 cd/m2, was 1.5 times longer than that of the conventional structure. A hybrid white OLED (WOLED) was also fabricated using a phosphorescent red emitter, bis(2-phenylquinoline)-acetylacetonate iridium III doped in 4,4'-N,N'-dicarbazolyl-biphenyl. The property of the hybrid WOLED with CCL showed a maximum LE and an EQE of 13.46 cd/A and 8.32%, respectively. It also showed white emission with Commission International de L'Éclairage coordinates of (x = 0.41, y = 0.33) at 10 V. PMID:25936005

  8. Tabled Execution in Scheme

    SciTech Connect

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  9. The NEC Link Scheme

    ERIC Educational Resources Information Center

    Noakes, Peter

    1976-01-01

    Describes the operation of the National Electronics Council (NEC) Link Scheme for schools in Great Britain. The service is intended to provide technical assistance, information concerning surplus equipment, and guest speakers for school aspiring professional electronic counsel. (CP)

  10. Compact Spreader Schemes

    SciTech Connect

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  11. Compact spreader schemes

    NASA Astrophysics Data System (ADS)

    Placidi, M.; Jung, J.-Y.; Ratti, A.; Sun, C.

    2014-12-01

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  12. Check-Digit Schemes.

    ERIC Educational Resources Information Center

    Wheeler, Mary L.

    1994-01-01

    Discusses the study of identification codes and check-digit schemes as a way to show students a practical application of mathematics and introduce them to coding theory. Examples include postal service money orders, parcel tracking numbers, ISBN codes, bank identification numbers, and UPC codes. (MKR)

  13. Beyond Scheme F

    SciTech Connect

    Elliott, C.J.; Fisher, H.; Pepin, J.; Gillmann, R.

    1996-07-01

    Traffic classification techniques were evaluated using data from a 1993 investigation of the traffic flow patterns on I-20 in Georgia. First we improved the data by sifting through the data base, checking against the original video for questionable events and removing and/or repairing questionable events. We used this data base to critique the performance quantitatively of a classification method known as Scheme F. As a context for improving the approach, we show in this paper that scheme F can be represented as a McCullogh-Pitts neural network, oar as an equivalent decomposition of the plane. We found that Scheme F, among other things, severely misrepresents the number of vehicles in Class 3 by labeling them as Class 2. After discussing the basic classification problem in terms of what is measured, and what is the desired prediction goal, we set forth desirable characteristics of the classification scheme and describe a recurrent neural network system that partitions the high dimensional space up into bins for each axle separation. the collection of bin numbers, one for each of the axle separations, specifies a region in the axle space called a hyper-bin. All the vehicles counted that have the same set of in numbers are in the same hyper-bin. The probability of the occurrence of a particular class in that hyper- bin is the relative frequency with which that class occurs in that set of bin numbers. This type of algorithm produces classification results that are much more balanced and uniform with respect to Classes 2 and 3 and Class 10. In particular, the cancellation of errors of classification that occurs is for many applications the ideal classification scenario. The neural network results are presented in the form of a primary classification network and a reclassification network, the performance matrices for which are presented.

  14. SEMICONDUCTOR DEVICES: Analytical charge control model for AlGaN/GaN MIS-HFETs including an undepleted barrier layer

    NASA Astrophysics Data System (ADS)

    Shenghui, Lu; Jiangfeng, Du; Qian, Luo; Qi, Yu; Wei, Zhou; Jianxin, Xia; Mohua, Yang

    2010-09-01

    An analytical charge control model considering the insulator/AlGaN interface charge and undepleted Al-GaN barrier layer is presented for AlGaN/GaN metal-insulator-semiconductor heterostructure field effect transistors (MIS-HFETs) over the entire operation range of gate voltage. The whole process of charge control is analyzed in detail and partitioned into four regions: I—full depletion, II—partial depletion, III—neutral region and IV—electron accumulation at the insulator/AlGaN interface. The results show that two-dimensional electron gas (2DEG) saturates at the boundary of region II/III and the gate voltage should not exceed the 2DEG saturation voltage in order to keep the channel in control. In addition, the span of region II accounts for about 50% of the range of gate voltage before 2DEG saturates. The good agreement of the calculated transfer characteristic with the measured data confirms the validity of the proposed model.

  15. Use of the Charge/Discharge (C/D) ratio to aument voltage limit (V sub T) charge control in the ERBS spacecraft

    NASA Technical Reports Server (NTRS)

    Halpert, G.

    1982-01-01

    A 50-ampere hour nickel cadmium cell test pack was operated in a power profile simulating the orbit of the Earth Radiation Budget Satellite (ERBS). The objective was to determine the ability of the temperature compensated voltage limit (V sub T) charge control system to maintain energy balance in the half sine wave-type current profile expected of this mission. The four-cell pack (50 E) was tested at the Naval Weapons Support Center (NWSC) at Crane, Indiana. The ERBS evaluation test consisted of two distinct operating sequences, each having a specific purpose. The first phase was a parametric test involving the effect of V sub T level, temperature, and Beta angle on the charge/discharge (C/D) ratio, an indicator of the amount of overcharge. The second phase of testing made use of the C/D ratio limit to augment the V sub T charge limit control. When the C/D limit was reached, the current was switched from the taper mode to a C/67 (0.75 A) trickle charge. The use of an ampere hour integrator limiting the overcharge to a C/67 rate provided a fine tuning of the charge control technique which eliminated the sensitivity problems noted in the initial operating sequence.

  16. ESCAP mobile training scheme.

    PubMed

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries. PMID:12265562

  17. New LNG process scheme

    SciTech Connect

    Foglietta, J.H.

    1999-07-01

    A new LNG cycle has been developed for base load liquefaction facilities. This new design offers a different technical and economical solution comparing in efficiency with the classical technologies. The new LNG scheme could offer attractive business opportunities to oil and gas companies that are trying to find paths to monetize gas sources more effectively; particularly for remote or offshore locations where smaller scale LNG facilities might be applicable. This design offers also an alternative route to classic LNG projects, as well as alternative fuel sources. Conceived to offer simplicity and access to industry standard equipment, This design is a hybrid result of combining a standard refrigeration system and turboexpander technology.

  18. Plotting and Scheming

    NASA Technical Reports Server (NTRS)

    2004-01-01

    [figure removed for brevity, see original site] Figure 1 [figure removed for brevity, see original site] Figure 2 Click for larger view

    These two graphics are planning tools used by Mars Exploration Rover engineers to plot and scheme the perfect location to place the rock abrasion tool on the rock collection dubbed 'El Capitan' near Opportunity's landing site. 'El Capitan' is located within a larger outcrop nicknamed 'Opportunity Ledge.'

    The rover visualization team from NASA Ames Research Center, Moffett Field, Calif., initiated the graphics by putting two panoramic camera images of the 'El Capitan' area into their three-dimensional model. The rock abrasion tool team from Honeybee Robotics then used the visualization tool to help target and orient their instrument on the safest and most scientifically interesting locations. The blue circle represents one of two current targets of interest, chosen because of its size, lack of dust, and most of all its distinct and intriguing geologic features. To see the second target location, see the image titled 'Plotting and Scheming.'

    The rock abrasion tool is sensitive to the shape and texture of a rock, and must safely sit within the 'footprint' indicated by the blue circles. The rock area must be large enough to fit the contact sensor and grounding mechanism within the area of the outer blue circle, and the rock must be smooth enough to get an even grind within the abrasion area of the inner blue circle. If the rock abrasion tool were not grounded by its support mechanism or if the surface were uneven, it could 'run away' from its target. The rock abrasion tool is location on the rover's instrument deployment device, or arm.

    Over the next few martian days, or sols, the rover team will use these and newer, similar graphics created with more recent, higher-resolution panoramic camera images and super-spectral data from the miniature thermal emission spectrometer. These data will be used to pick the best

  19. Three order increase in scanning speed of space charge-controlled KTN deflector by eliminating electric field induced phase transition in nanodisordered KTN.

    PubMed

    Zhu, Wenbin; Chao, Ju-Hung; Chen, Chang-Jiang; Yin, Shizhuo; Hoffman, Robert C

    2016-01-01

    In this paper, we report a three orders-of-magnitude increase in the speed of a space-charge-controlled KTN beam deflector achieved by eliminating the electric field-induced phase transition (EFIPT) in a nanodisordered KTN crystal. Previously, to maximize the electro-optic effect, a KTN beam deflector was operated at a temperature slightly above the Curie temperature. The electric field could cause the KTN to undergo a phase transition from the paraelectric phase to the ferroelectric phase at this temperature, which causes the deflector to operate in the linear electro-optic regime. Since the deflection angle of the deflector is proportional to the space charge distribution but not the magnitude of the applied electric field, the scanning speed of the beam deflector is limited by the electron mobility within the KTN crystal. To overcome this speed limitation caused by the EFIPT, we propose to operate the deflector at a temperature above the critical end point. This results in a significant increase in the scanning speed from the microsecond to nanosecond regime, which represents a major technological advance in the field of fast speed beam scanners. This can be highly beneficial for many applications including high-speed imaging, broadband optical communications, and ultrafast laser display and printing. PMID:27610923

  20. Three order increase in scanning speed of space charge-controlled KTN deflector by eliminating electric field induced phase transition in nanodisordered KTN.

    PubMed

    Zhu, Wenbin; Chao, Ju-Hung; Chen, Chang-Jiang; Yin, Shizhuo; Hoffman, Robert C

    2016-01-01

    In this paper, we report a three orders-of-magnitude increase in the speed of a space-charge-controlled KTN beam deflector achieved by eliminating the electric field-induced phase transition (EFIPT) in a nanodisordered KTN crystal. Previously, to maximize the electro-optic effect, a KTN beam deflector was operated at a temperature slightly above the Curie temperature. The electric field could cause the KTN to undergo a phase transition from the paraelectric phase to the ferroelectric phase at this temperature, which causes the deflector to operate in the linear electro-optic regime. Since the deflection angle of the deflector is proportional to the space charge distribution but not the magnitude of the applied electric field, the scanning speed of the beam deflector is limited by the electron mobility within the KTN crystal. To overcome this speed limitation caused by the EFIPT, we propose to operate the deflector at a temperature above the critical end point. This results in a significant increase in the scanning speed from the microsecond to nanosecond regime, which represents a major technological advance in the field of fast speed beam scanners. This can be highly beneficial for many applications including high-speed imaging, broadband optical communications, and ultrafast laser display and printing.

  1. Three order increase in scanning speed of space charge-controlled KTN deflector by eliminating electric field induced phase transition in nanodisordered KTN

    PubMed Central

    Zhu, Wenbin; Chao, Ju-Hung; Chen, Chang-Jiang; Yin, Shizhuo; Hoffman, Robert C.

    2016-01-01

    In this paper, we report a three orders-of-magnitude increase in the speed of a space-charge-controlled KTN beam deflector achieved by eliminating the electric field-induced phase transition (EFIPT) in a nanodisordered KTN crystal. Previously, to maximize the electro-optic effect, a KTN beam deflector was operated at a temperature slightly above the Curie temperature. The electric field could cause the KTN to undergo a phase transition from the paraelectric phase to the ferroelectric phase at this temperature, which causes the deflector to operate in the linear electro-optic regime. Since the deflection angle of the deflector is proportional to the space charge distribution but not the magnitude of the applied electric field, the scanning speed of the beam deflector is limited by the electron mobility within the KTN crystal. To overcome this speed limitation caused by the EFIPT, we propose to operate the deflector at a temperature above the critical end point. This results in a significant increase in the scanning speed from the microsecond to nanosecond regime, which represents a major technological advance in the field of fast speed beam scanners. This can be highly beneficial for many applications including high-speed imaging, broadband optical communications, and ultrafast laser display and printing. PMID:27610923

  2. Three order increase in scanning speed of space charge-controlled KTN deflector by eliminating electric field induced phase transition in nanodisordered KTN

    NASA Astrophysics Data System (ADS)

    Zhu, Wenbin; Chao, Ju-Hung; Chen, Chang-Jiang; Yin, Shizhuo; Hoffman, Robert C.

    2016-09-01

    In this paper, we report a three orders-of-magnitude increase in the speed of a space-charge-controlled KTN beam deflector achieved by eliminating the electric field-induced phase transition (EFIPT) in a nanodisordered KTN crystal. Previously, to maximize the electro-optic effect, a KTN beam deflector was operated at a temperature slightly above the Curie temperature. The electric field could cause the KTN to undergo a phase transition from the paraelectric phase to the ferroelectric phase at this temperature, which causes the deflector to operate in the linear electro-optic regime. Since the deflection angle of the deflector is proportional to the space charge distribution but not the magnitude of the applied electric field, the scanning speed of the beam deflector is limited by the electron mobility within the KTN crystal. To overcome this speed limitation caused by the EFIPT, we propose to operate the deflector at a temperature above the critical end point. This results in a significant increase in the scanning speed from the microsecond to nanosecond regime, which represents a major technological advance in the field of fast speed beam scanners. This can be highly beneficial for many applications including high-speed imaging, broadband optical communications, and ultrafast laser display and printing.

  3. Classification schemes for arteriovenous malformations.

    PubMed

    Davies, Jason M; Kim, Helen; Young, William L; Lawton, Michael T

    2012-01-01

    The wide variety of arteriovenous malformation (AVM) anatomy, size, location, and clinical presentation makes patient selection for surgery a difficult process. Neurosurgeons have identified key factors that determine the risks of surgery and then devised classification schemes that integrate these factors, predict surgical results, and help select patients for surgery. These classification schemes have value because they transform complex decisions into simpler algorithms. In this review, the important grading schemes that have contributed to management of patients with brain AVMs are described, and our current approach to patient selection is outlined.

  4. Relaxation schemes for Chebyshev spectral multigrid methods

    NASA Technical Reports Server (NTRS)

    Kang, Yimin; Fulton, Scott R.

    1993-01-01

    Two relaxation schemes for Chebyshev spectral multigrid methods are presented for elliptic equations with Dirichlet boundary conditions. The first scheme is a pointwise-preconditioned Richardson relaxation scheme and the second is a line relaxation scheme. The line relaxation scheme provides an efficient and relatively simple approach for solving two-dimensional spectral equations. Numerical examples and comparisons with other methods are given.

  5. High resolution schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Harten, A.

    1983-01-01

    A class of new explicit second order accurate finite difference schemes for the computation of weak solutions of hyperbolic conservation laws is presented. These highly nonlinear schemes are obtained by applying a nonoscillatory first order accurate scheme to an appropriately modified flux function. The so-derived second order accurate schemes achieve high resolution while preserving the robustness of the original nonoscillatory first order accurate scheme. Numerical experiments are presented to demonstrate the performance of these new schemes.

  6. Energy partitioning schemes: a dilemma.

    PubMed

    Mayer, I

    2007-01-01

    Two closely related energy partitioning schemes, in which the total energy is presented as a sum of atomic and diatomic contributions by using the "atomic decomposition of identity", are compared on the example of N,N-dimethylformamide, a simple but chemically rich molecule. Both schemes account for different intramolecular interactions, for instance they identify the weak C-H...O intramolecular interactions, but give completely different numbers. (The energy decomposition scheme based on the virial theorem is also considered.) The comparison of the two schemes resulted in a dilemma which is especially striking when these schemes are applied for molecules distorted from their equilibrium structures: one either gets numbers which are "on the chemical scale" and have quite appealing values at the equilibrium molecular geometries, but exhibiting a counter-intuitive distance dependence (the two-center energy components increase in absolute value with the increase of the interatomic distances)--or numbers with too large absolute values but "correct" distance behaviour. The problem is connected with the quick decay of the diatomic kinetic energy components.

  7. Nonlinear secret image sharing scheme.

    PubMed

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  8. Nonlinear secret image sharing scheme.

    PubMed

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively. PMID:25140334

  9. Energy partitioning schemes: a dilemma.

    PubMed

    Mayer, I

    2007-01-01

    Two closely related energy partitioning schemes, in which the total energy is presented as a sum of atomic and diatomic contributions by using the "atomic decomposition of identity", are compared on the example of N,N-dimethylformamide, a simple but chemically rich molecule. Both schemes account for different intramolecular interactions, for instance they identify the weak C-H...O intramolecular interactions, but give completely different numbers. (The energy decomposition scheme based on the virial theorem is also considered.) The comparison of the two schemes resulted in a dilemma which is especially striking when these schemes are applied for molecules distorted from their equilibrium structures: one either gets numbers which are "on the chemical scale" and have quite appealing values at the equilibrium molecular geometries, but exhibiting a counter-intuitive distance dependence (the two-center energy components increase in absolute value with the increase of the interatomic distances)--or numbers with too large absolute values but "correct" distance behaviour. The problem is connected with the quick decay of the diatomic kinetic energy components. PMID:17328441

  10. Nonlinear Secret Image Sharing Scheme

    PubMed Central

    Shin, Sang-Ho; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2⁡m⌉ bit-per-pixel (bpp), respectively. PMID:25140334

  11. Invisibly Sanitizable Digital Signature Scheme

    NASA Astrophysics Data System (ADS)

    Miyazaki, Kunihiko; Hanaoka, Goichiro; Imai, Hideki

    A digital signature does not allow any alteration of the document to which it is attached. Appropriate alteration of some signed documents, however, should be allowed because there are security requirements other than the integrity of the document. In the disclosure of official information, for example, sensitive information such as personal information or national secrets is masked when an official document is sanitized so that its nonsensitive information can be disclosed when it is requested by a citizen. If this disclosure is done digitally by using the current digital signature schemes, the citizen cannot verify the disclosed information because it has been altered to prevent the leakage of sensitive information. The confidentiality of official information is thus incompatible with the integrity of that information, and this is called the digital document sanitizing problem. Conventional solutions such as content extraction signatures and digitally signed document sanitizing schemes with disclosure condition control can either let the sanitizer assign disclosure conditions or hide the number of sanitized portions. The digitally signed document sanitizing scheme we propose here is based on the aggregate signature derived from bilinear maps and can do both. Moreover, the proposed scheme can sanitize a signed document invisibly, that is, no one can distinguish whether the signed document has been sanitized or not.

  12. Upwind Compact Finite Difference Schemes

    NASA Astrophysics Data System (ADS)

    Christie, I.

    1985-07-01

    It was shown by Ciment, Leventhal, and Weinberg ( J. Comput. Phys.28 (1978), 135) that the standard compact finite difference scheme may break down in convection dominated problems. An upwinding of the method, which maintains the fourth order accuracy, is suggested and favorable numerical results are found for a number of test problems.

  13. On symmetric and upwind TVD schemes

    NASA Technical Reports Server (NTRS)

    Yee, H. C.

    1985-01-01

    A class of explicit and implicit total variation diminishing (TVD) schemes for the compressible Euler and Navier-Stokes equations was developed. They do not generate spurious oscillations across shocks and contact discontinuities. In general, shocks can be captured within 1 to 2 grid points. For the inviscid case, these schemes are divided into upwind TVD schemes and symmetric (nonupwind) TVD schemes. The upwind TVD scheme is based on the second-order TVD scheme. The symmetric TVD scheme is a generalization of Roe's and Davis' TVD Lax-Wendroff scheme. The performance of these schemes on some viscous and inviscid airfoil steady-state calculations is investigated. The symmetric and upwind TVD schemes are compared.

  14. Subranging scheme for SQUID sensors

    NASA Technical Reports Server (NTRS)

    Penanen, Konstantin I. (Inventor)

    2008-01-01

    A readout scheme for measuring the output from a SQUID-based sensor-array using an improved subranging architecture that includes multiple resolution channels (such as a coarse resolution channel and a fine resolution channel). The scheme employs a flux sensing circuit with a sensing coil connected in series to multiple input coils, each input coil being coupled to a corresponding SQUID detection circuit having a high-resolution SQUID device with independent linearizing feedback. A two-resolution configuration (course and fine) is illustrated with a primary SQUID detection circuit for generating a fine readout, and a secondary SQUID detection circuit for generating a course readout, both having feedback current coupled to the respective SQUID devices via feedback/modulation coils. The primary and secondary SQUID detection circuits function and derive independent feedback. Thus, the SQUID devices may be monitored independently of each other (and read simultaneously) to dramatically increase slew rates and dynamic range.

  15. Stable maps and Quot schemes

    NASA Astrophysics Data System (ADS)

    Popa, Mihnea; Roth, Mike

    2003-06-01

    In this paper we study the relationship between two different compactifications of the space of vector bundle quotients of an arbitrary vector bundle on a curve. One is Grothendieck's Quot scheme, while the other is a moduli space of stable maps to the relative Grassmannian. We establish an essentially optimal upper bound on the dimension of the two compactifications. Based on that, we prove that for an arbitrary vector bundle, the Quot schemes of quotients of large degree are irreducible and generically smooth. We precisely describe all the vector bundles for which the same thing holds in the case of the moduli spaces of stable maps. We show that there are in general no natural morphisms between the two compactifications. Finally, as an application, we obtain new cases of a conjecture on effective base point freeness for pluritheta linear series on moduli spaces of vector bundles.

  16. A biometric signcryption scheme without bilinear pairing

    NASA Astrophysics Data System (ADS)

    Wang, Mingwen; Ren, Zhiyuan; Cai, Jun; Zheng, Wentao

    2013-03-01

    How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis's fuzzy extractor method and Liu's original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.

  17. TVD schemes for open channel flow

    NASA Astrophysics Data System (ADS)

    Delis, A. I.; Skeels, C. P.

    1998-04-01

    The Saint Venant equations for modelling flow in open channels are solved in this paper, using a variety of total variation diminishing (TVD) schemes. The performance of second- and third-order-accurate TVD schemes is investigated for the computation of free-surface flows, in predicting dam-breaks and extreme flow conditions created by the river bed topography. Convergence of the schemes is quantified by comparing error norms between subsequent iterations. Automatically calculated time steps and entropy corrections allow high CFL numbers and smooth transition between different conditions. In order to compare different approaches with TVD schemes, the most accurate of each type was chosen. All four schemes chosen proved acceptably accurate. However, there are important differences between the schemes in the occurrence of clipping, overshooting and oscillating behaviour and in the highest CFL numbers allowed by a scheme. These variations in behaviour stem from the different orders and inherent properties of the four schemes.

  18. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    NASA Technical Reports Server (NTRS)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  19. Pay scheme preferences and health policy objectives.

    PubMed

    Abelsen, Birgit

    2011-04-01

    This paper studies the preferences among healthcare workers towards pay schemes involving different levels of risk. It identifies which pay scheme individuals would prefer for themselves, and which they think is best in furthering health policy objectives. The paper adds, methodologically, a way of defining pay schemes that include different levels of risk. A questionnaire was mailed to a random sample of 1111 dentists. Respondents provided information about their current and preferred pay schemes, and indicated which pay scheme, in their opinion, would best further overall health policy objectives. A total of 504 dentists (45%) returned the questionnaire, and there was no indication of systematic non-response bias. All public dentists had a current pay scheme based on a fixed salary and the majority of individuals preferred a pay scheme with more income risk. Their preferred pay schemes coincided with the ones believed to further stabilise healthcare personnel. The predominant current pay scheme among private dentists was based solely on individual output, and the majority of respondents preferred this pay scheme. In addition, their preferred pay schemes coincided with the ones believed to further efficiency objectives. Both public and private dentists believed that pay schemes, furthering efficiency objectives, had to include more performance-related pay than the ones believed to further stability and quality objectives. PMID:20565995

  20. Quantum Signature Scheme with Weak Arbitrator

    NASA Astrophysics Data System (ADS)

    Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian

    2012-07-01

    In this paper, we propose one quantum signature scheme with a weak arbitrator to sign classical messages. This scheme can preserve the merits in the original arbitrated scheme with some entanglement resources, and provide a higher efficiency in transmission and reduction the complexity of implementation. The arbitrator is costless and only involved in the disagreement case.

  1. On symmetric and upwind TVD schemes

    NASA Technical Reports Server (NTRS)

    Yee, H. C.

    1986-01-01

    The performance of the upwind and symmetric total variation diminishing (TVD) schemes in viscous and inviscid airfoil steady-state calculations is considered, and the extension of the implicit second-order-accurate TVD scheme for hyperbolic systems of conservative laws in curvilinear coordinates is discussed. For two-dimensional steady-state applications, schemes are implemented in a conservative noniterative alternating direction implicit form, and results illustrate that the algorithm produces a fairly good solution for an RAE2822 airfoil calculation. The study demonstrates that the symmetric TVD scheme is as accurate as the upwind TVD scheme, while requiring less computational effort than it.

  2. Construction of weighted upwind compact scheme

    NASA Astrophysics Data System (ADS)

    Wang, Zhengjie

    Enormous endeavor has been devoted in spatial high order high resolution schemes in more than twenty five years previously, like total variation diminishing (TVD), essentially non-oscillatory scheme, weighted essentially non-oscillatory scheme for finite difference, and Discontinuous Galerkin methods for finite element and the finite volume. In this dissertation, a high order finite difference Weighted Upwind Compact Scheme has been constructed by dissipation and dispersion analysis. Secondly, a new method to construct global weights has been tested. Thirdly, a methodology to compromise dissipation and dispersion in constructing Weighted Upwind Compact Scheme has been derived. Finally, several numerical test cases have been shown.

  3. High-Order Energy Stable WENO Schemes

    NASA Technical Reports Server (NTRS)

    Yamaleev, Nail K.; Carpenter, Mark H.

    2008-01-01

    A new third-order Energy Stable Weighted Essentially NonOscillatory (ESWENO) finite difference scheme for scalar and vector linear hyperbolic equations with piecewise continuous initial conditions is developed. The new scheme is proven to be stable in the energy norm for both continuous and discontinuous solutions. In contrast to the existing high-resolution shock-capturing schemes, no assumption that the reconstruction should be total variation bounded (TVB) is explicitly required to prove stability of the new scheme. A rigorous truncation error analysis is presented showing that the accuracy of the 3rd-order ESWENO scheme is drastically improved if the tuning parameters of the weight functions satisfy certain criteria. Numerical results show that the new ESWENO scheme is stable and significantly outperforms the conventional third-order WENO finite difference scheme of Jiang and Shu in terms of accuracy, while providing essentially nonoscillatory solutions near strong discontinuities.

  4. Matroids and quantum-secret-sharing schemes

    SciTech Connect

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-05-15

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  5. High resolution TVD schemes for interface tracking

    NASA Astrophysics Data System (ADS)

    Nandi, K.; Walker, S. P.; Date, A. W.

    2016-06-01

    A first order upwind difference scheme (UDS) is routinely adopted for representing convection terms in a discretised space. UDS provides stable solutions. However it also introduces false diffusion in situations in which the flow direction is oblique relative to the numerical grid or when the cell-Peclet number is large. In order to predict sharp interface, higher order upwind schemes are preferred because of they reduce numerical dissipation. In interfacial flows, density and viscosity vary sharply in space. Representation of convective terms by Total variation diminishing (TVD) schemes ensures reduced smearing without impairing convergence property. TVD schemes develop formulae for interpolation of a cell-face value of the transported variable. If the interpolated value is bounded by the neighbouring nodal values then the scheme is `Bounded'. However, not all TVD schemes possess this property of `Boundedness'. The Normalised Variable Diagram (NVD) defines a domain within which the TVD scheme is bounded. Thus by combining the features of both TVD schemes and ensuring that they fall with the defined area of NVD, the convergence as well as the boundedness of a computational scheme can be ensured. In this paper, six different higher order schemes are considered some which are TVD bounded or unbounded, to solve the well known interface tracking problem of Rayleigh-Taylor Instability. To the best of our knowledge, a comparison of combined TVD/NVD principles in the case of interface tracking problems has not been reported in published literature.

  6. Sequential Feedback Scheme Outperforms the Parallel Scheme for Hamiltonian Parameter Estimation

    NASA Astrophysics Data System (ADS)

    Yuan, Haidong

    2016-10-01

    Measurement and estimation of parameters are essential for science and engineering, where the main quest is to find the highest achievable precision with the given resources and design schemes to attain it. Two schemes, the sequential feedback scheme and the parallel scheme, are usually studied in the quantum parameter estimation. While the sequential feedback scheme represents the most general scheme, it remains unknown whether it can outperform the parallel scheme for any quantum estimation tasks. In this Letter, we show that the sequential feedback scheme has a threefold improvement over the parallel scheme for Hamiltonian parameter estimations on two-dimensional systems, and an order of O (d +1 ) improvement for Hamiltonian parameter estimation on d -dimensional systems. We also show that, contrary to the conventional belief, it is possible to simultaneously achieve the highest precision for estimating all three components of a magnetic field, which sets a benchmark on the local precision limit for the estimation of a magnetic field.

  7. How can conceptual schemes change teaching?

    NASA Astrophysics Data System (ADS)

    Wickman, Per-Olof

    2012-03-01

    Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.

  8. Curvilinear bicubic spline fit interpolation scheme

    NASA Technical Reports Server (NTRS)

    Chi, C.

    1973-01-01

    Modification of the rectangular bicubic spline fit interpolation scheme so as to make it suitable for use with a polar grid pattern. In the proposed modified scheme the interpolation function is expressed in terms of the radial length and the arc length, and the shape of the patch, which is a wedge or a truncated wedge, is taken into account implicitly. Examples are presented in which the proposed interpolation scheme was used to reproduce the equations of a hemisphere.

  9. Quantum Authentication Scheme Based on Entanglement Swapping

    NASA Astrophysics Data System (ADS)

    Penghao, Niu; Yuan, Chen; Chong, Li

    2016-01-01

    Based on the entanglement swapping, a quantum authentication scheme with a trusted- party is proposed in this paper. With this scheme, two users can perform mutual identity authentication to confirm each other's validity. In addition, the scheme is proved to be secure under circumstances where a malicious attacker is capable of monitoring the classical and quantum channels and has the power to forge all information on the public channel.

  10. Simulation of the Australian Mobilesat signalling scheme

    NASA Technical Reports Server (NTRS)

    Rahman, Mushfiqur

    1990-01-01

    The proposed Australian Mobilesat system will provide a range of circuit switched voice/data services using the B-series satellites. The reliability of the signalling scheme between the Network Management Station (NMS) and the mobile terminal (MT) is of critical importance to the performance of the overall system. Simulation results of the performance of the signalling scheme under various channel conditions and coding schemes are presented.

  11. On Tenth Order Central Spatial Schemes

    SciTech Connect

    Sjogreen, B; Yee, H C

    2007-05-14

    This paper explores the performance of the tenth-order central spatial scheme and derives the accompanying energy-norm stable summation-by-parts (SBP) boundary operators. The objective is to employ the resulting tenth-order spatial differencing with the stable SBP boundary operators as a base scheme in the framework of adaptive numerical dissipation control in high order multistep filter schemes of Yee et al. (1999), Yee and Sj{umlt o}green (2002, 2005, 2006, 2007), and Sj{umlt o}green and Yee (2004). These schemes were designed for multiscale turbulence flows including strong shock waves and combustion.

  12. On central-difference and upwind schemes

    NASA Technical Reports Server (NTRS)

    Swanson, R. C.; Turkel, Eli

    1990-01-01

    A class of numerical dissipation models for central-difference schemes constructed with second- and fourth-difference terms is considered. The notion of matrix dissipation associated with upwind schemes is used to establish improved shock capturing capability for these models. In addition, conditions are given that guarantee that such dissipation models produce a Total Variation Diminishing (TVD) scheme. Appropriate switches for this type of model to ensure satisfaction of the TVD property are presented. Significant improvements in the accuracy of a central-difference scheme are demonstrated by computing both inviscid and viscous transonic airfoil flows.

  13. Direct Eulerian MUSCL scheme for gas dynamics

    SciTech Connect

    Colella, P.

    1985-01-01

    The authors present a second order extension of Godunov's method for gas dynamics in Eulerian coordinates patterned after van Leer's MUSCL scheme for gas dynamics in Lagrangian coordinates. The present method performs the Eulerian calculation in a single step by solving Riemann problems and characteristic equations for the fluxes in the Eulerian frame. The authors also make several modifications in the formulation of MUSCL, applicable to both this scheme and to the original Lagrangian scheme, all aimed at making a more robust and accurate scheme. The authors present the results of test calculations in one and two space variables. 12 references, 5 figures.

  14. Modeling Students' Mathematics Using Steffe's Fraction Schemes

    ERIC Educational Resources Information Center

    Norton, Anderson H.; McCloskey, Andrea V.

    2008-01-01

    Each year, more teachers learn about the successful intervention program known as Math Recovery (USMRC 2008; Wright 2003). The program uses Steffe's whole-number schemes to model, understand, and support children's development of whole-number reasoning. Readers are probably less familiar with Steffe's fraction schemes, which have proven similarly…

  15. Finite volume renormalization scheme for fermionic operators

    SciTech Connect

    Monahan, Christopher; Orginos, Kostas

    2013-11-01

    We propose a new finite volume renormalization scheme. Our scheme is based on the Gradient Flow applied to both fermion and gauge fields and, much like the Schr\\"odinger functional method, allows for a nonperturbative determination of the scale dependence of operators using a step-scaling approach. We give some preliminary results for the pseudo-scalar density in the quenched approximation.

  16. An Accounting Scheme for Personality Study.

    ERIC Educational Resources Information Center

    Dillon, James J.; Feldman, S. Shirley

    Realizing the importance of human personality variables in comprehensive educational assessment structures, Operation PEP sought to develop a tool to assess specific human personality characteristics. The resulting accounting scheme is divided into three chapters: (1) an outline and definition of relevant terminology, (2) a scheme to account for…

  17. A novel key management scheme using biometrics

    NASA Astrophysics Data System (ADS)

    Sui, Yan; Yang, Kai; Du, Yingzi; Orr, Scott; Zou, Xukai

    2010-04-01

    Key management is one of the most important issues in cryptographic systems. Several important challenges in such a context are represented by secure and efficient key generation, key distribution, as well as key revocation. Addressing such challenges requires a comprehensive solution which is robust, secure and efficient. Compared to traditional key management schemes, key management using biometrics requires the presence of the user, which can reduce fraud and protect the key better. In this paper, we propose a novel key management scheme using iris based biometrics. Our newly proposed scheme outperforms traditional key management schemes as well as some existing key-binding biometric schemes in terms of security, diversity and/or efficiency.

  18. The basic function scheme of polynomial type

    SciTech Connect

    WU, Wang-yi; Lin, Guang

    2009-12-01

    A new numerical method---Basic Function Method is proposed. This method can directly discrete differential operator on unstructured grids. By using the expansion of basic function to approach the exact function, the central and upwind schemes of derivative are constructed. By using the second-order polynomial as basic function and applying the technique of flux splitting method and the combination of central and upwind schemes to suppress the non-physical fluctuation near the shock wave, the second-order basic function scheme of polynomial type for solving inviscid compressible flow numerically is constructed in this paper. Several numerical results of many typical examples for two dimensional inviscid compressible transonic and supersonic steady flow illustrate that it is a new scheme with high accuracy and high resolution for shock wave. Especially, combining with the adaptive remeshing technique, the satisfactory results can be obtained by these schemes.

  19. Efficient DSMC collision-partner selection schemes.

    SciTech Connect

    Gallis, Michail A.; Torczynski, John Robert

    2010-07-01

    The effect of collision-partner selection schemes on the accuracy and the efficiency of the Direct Simulation Monte Carlo (DSMC) method of Bird is investigated. Several schemes to reduce the total discretization error as a function of the mean collision separation and the mean collision time are examined. These include the historically first sub-cell scheme, the more recent nearest-neighbor scheme, and various near-neighbor schemes, which are evaluated for their effect on the thermal conductivity for Fourier flow. Their convergence characteristics as a function of spatial and temporal discretization and the number of simulators per cell are compared to the convergence characteristics of the sophisticated and standard DSMC algorithms. Improved performance is obtained if the population from which possible collision partners are selected is an appropriate fraction of the population of the cell.

  20. Two level scheme solvers for nuclear spectroscopy

    NASA Astrophysics Data System (ADS)

    Jansson, Kaj; DiJulio, Douglas; Cederkäll, Joakim

    2011-10-01

    A program for building level schemes from γ-spectroscopy coincidence data has been developed. The scheme builder was equipped with two different algorithms: a statistical one based on the Metropolis method and a more logical one, called REMP (REcurse, Merge and Permute), developed from scratch. These two methods are compared both on ideal cases and on experimental γ-ray data sets. The REMP algorithm is based on coincidences and transition energies. Using correct and complete coincidence data, it has solved approximately half a million schemes without failures. Also, for incomplete data and data with minor errors, the algorithm produces consistent sub-schemes when it is not possible to obtain a complete scheme from the provided data.

  1. Efficient DSMC collision-partner selection schemes.

    SciTech Connect

    Gallis, Michail A.; Torczynski, John Robert

    2010-05-01

    The effect of collision-partner selection schemes on the accuracy and the efficiency of the Direct Simulation Monte Carlo (DSMC) method of Bird is investigated. Several schemes to reduce the total discretization error as a function of the mean collision separation and the mean collision time are examined. These include the historically first sub-cell scheme, the more recent nearest-neighbor scheme, and various near-neighbor schemes, which are evaluated for their effect on the thermal conductivity for Fourier flow. Their convergence characteristics as a function of spatial and temporal discretization and the number of simulators per cell are compared to the convergence characteristics of the sophisticated and standard DSMC algorithms. Improved performance is obtained if the population from which possible collision partners are selected is an appropriate fraction of the population of the cell.

  2. Symmetric weak ternary quantum homomorphic encryption schemes

    NASA Astrophysics Data System (ADS)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  3. A Real Quantum Designated Verifier Signature Scheme

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2015-09-01

    The effectiveness of most quantum signature schemes reported in the literature can be verified by a designated person, however, those quantum signature schemes aren't the real traditional designated verifier signature schemes, because the designated person hasn't the capability to efficiently simulate a signature which is indistinguishable from a signer, which cannot satisfy the requirements in some special environments such as E-voting, call for tenders and software licensing. For solving this problem, a real quantum designated verifier signature scheme is proposed in this paper. According to the property of unitary transformation and quantum one-way function, only a verifier designated by a signer can verify the "validity of a signature" and the designated verifier cannot prove to a third party that the signature was produced by the signer or by himself through a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Analysis results show that this new scheme satisfies the main security requirements of designated verifier signature scheme and the major attack strategies.

  4. A nonconservative scheme for isentropic gas dynamics

    SciTech Connect

    Chen, Gui-Qiang |; Liu, Jian-Guo

    1994-05-01

    In this paper, we construct a second-order nonconservative for the system of isentropic gas dynamics to capture the physical invariant regions for preventing negative density, to treat the vacuum singularity, and to control the local entropy from dramatically increasing near shock waves. The main difference in the construction of the scheme discussed here is that we use piecewise linear functions to approximate the Riemann invariants w and z instead of the physical variables {rho} and m. Our scheme is a natural extension of the schemes for scalar conservation laws and it can be numerical implemented easily because the system is diagonalized in this coordinate system. Another advantage of using Riemann invariants is that the Hessian matrix of any weak entropy has no singularity in the Riemann invariant plane w-z, whereas the Hessian matrices of the weak entropies have singularity at the vacuum points in the physical plane p-m. We prove that this scheme converges to an entropy solution for the Cauchy problem with L{sup {infinity}} initial data. By convergence here we mean that there is a subsequent convergence to a generalized solution satisfying the entrophy condition. As long as the entropy solution is unique, the whole sequence converges to a physical solution. This shows that this kind of scheme is quite reliable from theoretical view of point. In addition to being interested in the scheme itself, we wish to provide an approach to rigorously analyze nonconservative finite difference schemes.

  5. Towards an "All Speed" Unstructured Upwind Scheme

    NASA Technical Reports Server (NTRS)

    Loh, Ching Y.; Jorgenson, Philip C.E.

    2009-01-01

    In the authors previous studies [1], a time-accurate, upwind finite volume method (ETAU scheme) for computing compressible flows on unstructured grids was proposed. The scheme is second order accurate in space and time and yields high resolution in the presence of discontinuities. The scheme features a multidimensional limiter and multidimensional numerical dissipation. These help to stabilize the numerical process and to overcome the annoying pathological behaviors of upwind schemes. In the present paper, it will be further shown that such multidimensional treatments also lead to a nearly all-speed or Mach number insensitive upwind scheme. For flows at very high Mach number, e.g., 10, local numerical instabilities or the pathological behaviors are suppressed, while for flows at very low Mach number, e.g., 0.02, computation can be directly carried out without invoking preconditioning. For flows in different Mach number regimes, i.e., low, medium, and high Mach numbers, one only needs to adjust one or two parameters in the scheme. Several examples with low and high Mach numbers are demonstrated in this paper. Thus, the ETAU scheme is applicable to a broad spectrum of flow regimes ranging from high supersonic to low subsonic, appropriate for both CFD (computational fluid dynamics) and CAA (computational aeroacoustics).

  6. A Spatial Domain Quantum Watermarking Scheme

    NASA Astrophysics Data System (ADS)

    Wei, Zhan-Hong; Chen, Xiu-Bo; Xu, Shu-Jiang; Niu, Xin-Xin; Yang, Yi-Xian

    2016-07-01

    This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. Supported by the National Natural Science Foundation of China under Grant Nos. 61272514, 61170272, 61373131, 61121061, 61411146001, the program for New Century Excellent Talents under Grant No. NCET-13-0681, the National Development Foundation for Cryptological Research (Grant No. MMJJ201401012) and the Fok Ying Tung Education Foundation under Grant No. 131067, and the Shandong Provincial Natural Science Foundation of China under Grant No. ZR2013FM025

  7. A diagonally inverted LU implicit multigrid scheme

    NASA Technical Reports Server (NTRS)

    Yokota, Jeffrey W.; Caughey, David A.; Chima, Rodrick V.

    1988-01-01

    A new Diagonally Inverted LU Implicit scheme is developed within the framework of the multigrid method for the 3-D unsteady Euler equations. The matrix systems that are to be inverted in the LU scheme are treated by local diagonalizing transformations that decouple them into systems of scalar equations. Unlike the Diagonalized ADI method, the time accuracy of the LU scheme is not reduced since the diagonalization procedure does not destroy time conservation. Even more importantly, this diagonalization significantly reduces the computational effort required to solve the LU approximation and therefore transforms it into a more efficient method of numerically solving the 3-D Euler equations.

  8. Palmprint based multidimensional fuzzy vault scheme.

    PubMed

    Liu, Hailun; Sun, Dongmei; Xiong, Ke; Qiu, Zhengding

    2014-01-01

    Fuzzy vault scheme (FVS) is one of the most popular biometric cryptosystems for biometric template protection. However, error correcting code (ECC) proposed in FVS is not appropriate to deal with real-valued biometric intraclass variances. In this paper, we propose a multidimensional fuzzy vault scheme (MDFVS) in which a general subspace error-tolerant mechanism is designed and embedded into FVS to handle intraclass variances. Palmprint is one of the most important biometrics; to protect palmprint templates; a palmprint based MDFVS implementation is also presented. Experimental results show that the proposed scheme not only can deal with intraclass variances effectively but also could maintain the accuracy and meanwhile enhance security. PMID:24892094

  9. The GEMPAK Barnes objective analysis scheme

    NASA Technical Reports Server (NTRS)

    Koch, S. E.; Desjardins, M.; Kocin, P. J.

    1981-01-01

    GEMPAK, an interactive computer software system developed for the purpose of assimilating, analyzing, and displaying various conventional and satellite meteorological data types is discussed. The objective map analysis scheme possesses certain characteristics that allowed it to be adapted to meet the analysis needs GEMPAK. Those characteristics and the specific adaptation of the scheme to GEMPAK are described. A step-by-step guide for using the GEMPAK Barnes scheme on an interactive computer (in real time) to analyze various types of meteorological datasets is also presented.

  10. Renormalization schemes: Where do we stand

    SciTech Connect

    Ward, B.F.L.

    1989-07-01

    We consider the status of the current approaches to the application of the renormalization program to the standard SU/sub 2L/ /times/ U/sub 1/ theory from the standpoint of the interplay of the scheme chosen for such an application and the attendant high-precision tests of the respective loop effects. We thus review the available schemes and discuss their theoretical relationships. We also show how such schemes stand in numerical relation to one another in the context of high-precision Z/sup 0/ physics, as an illustration. 15 refs., 2 figs., 2 tabs.

  11. Practical scheme for error control using feedback

    SciTech Connect

    Sarovar, Mohan; Milburn, Gerard J.; Ahn, Charlene; Jacobs, Kurt

    2004-05-01

    We describe a scheme for quantum-error correction that employs feedback and weak measurement rather than the standard tools of projective measurement and fast controlled unitary gates. The advantage of this scheme over previous protocols [for example, Ahn et al. Phys. Rev. A 65, 042301 (2001)], is that it requires little side processing while remaining robust to measurement inefficiency, and is therefore considerably more practical. We evaluate the performance of our scheme by simulating the correction of bit flips. We also consider implementation in a solid-state quantum-computation architecture and estimate the maximal error rate that could be corrected with current technology.

  12. A classification scheme for chimera states

    NASA Astrophysics Data System (ADS)

    Kemeth, Felix P.; Haugland, Sindre W.; Schmidt, Lennart; Kevrekidis, Ioannis G.; Krischer, Katharina

    2016-09-01

    We present a universal characterization scheme for chimera states applicable to both numerical and experimental data sets. The scheme is based on two correlation measures that enable a meaningful definition of chimera states as well as their classification into three categories: stationary, turbulent, and breathing. In addition, these categories can be further subdivided according to the time-stationarity of these two measures. We demonstrate that this approach is both consistent with previously recognized chimera states and enables us to classify states as chimeras which have not been categorized as such before. Furthermore, the scheme allows for a qualitative and quantitative comparison of experimental chimeras with chimeras obtained through numerical simulations.

  13. Improved Quantum Signature Scheme with Weak Arbitrator

    NASA Astrophysics Data System (ADS)

    Su, Qi; Li, Wen-Min

    2013-09-01

    In this paper, we find a man-in-the-middle attack on the quantum signature scheme with a weak arbitrator (Luo et al., Int. J. Theor. Phys., 51:2135, 2012). In that scheme, the authors proposed a quantum signature based on quantum one way function which contains both verifying the signer phase and verifying the signed message phase. However, after our analysis we will show that Eve can adopt different strategies in respective phases to forge the signature without being detected. Then we present an improved scheme to increase the security.

  14. TVD finite difference schemes and artificial viscosity

    NASA Technical Reports Server (NTRS)

    Davis, S. F.

    1984-01-01

    The total variation diminishing (TVD) finite difference scheme can be interpreted as a Lax-Wendroff scheme plus an upwind weighted artificial dissipation term. If a particular flux limiter is chosen and the requirement for upwind weighting is removed, an artificial dissipation term which is based on the theory of TVD schemes is obtained which does not contain any problem dependent parameters and which can be added to existing MacCormack method codes. Numerical experiments to examine the performance of this new method are discussed.

  15. Optimal Symmetric Ternary Quantum Encryption Schemes

    NASA Astrophysics Data System (ADS)

    Wang, Yu-qi; She, Kun; Huang, Ru-fen; Ouyang, Zhong

    2016-07-01

    In this paper, we present two definitions of the orthogonality and orthogonal rate of an encryption operator, and we provide a verification process for the former. Then, four improved ternary quantum encryption schemes are constructed. Compared with Scheme 1 (see Section 2.3), these four schemes demonstrate significant improvements in term of calculation and execution efficiency. Especially, under the premise of the orthogonal rate ɛ as secure parameter, Scheme 3 (see Section 4.1) shows the highest level of security among them. Through custom interpolation functions, the ternary secret key source, which is composed of the digits 0, 1 and 2, is constructed. Finally, we discuss the security of both the ternary encryption operator and the secret key source, and both of them show a high level of security and high performance in execution efficiency.

  16. ONU Power Saving Scheme for EPON System

    NASA Astrophysics Data System (ADS)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  17. A robust coding scheme for packet video

    NASA Technical Reports Server (NTRS)

    Chen, Y. C.; Sayood, Khalid; Nelson, D. J.

    1991-01-01

    We present a layered packet video coding algorithm based on a progressive transmission scheme. The algorithm provides good compression and can handle significant packet loss with graceful degradation in the reconstruction sequence. Simulation results for various conditions are presented.

  18. A robust coding scheme for packet video

    NASA Technical Reports Server (NTRS)

    Chen, Yun-Chung; Sayood, Khalid; Nelson, Don J.

    1992-01-01

    A layered packet video coding algorithm based on a progressive transmission scheme is presented. The algorithm provides good compression and can handle significant packet loss with graceful degradation in the reconstruction sequence. Simulation results for various conditions are presented.

  19. Secure Wake-Up Scheme for WBANs

    NASA Astrophysics Data System (ADS)

    Liu, Jing-Wei; Ameen, Moshaddique Al; Kwak, Kyung-Sup

    Network life time and hence device life time is one of the fundamental metrics in wireless body area networks (WBAN). To prolong it, especially those of implanted sensors, each node must conserve its energy as much as possible. While a variety of wake-up/sleep mechanisms have been proposed, the wake-up radio potentially serves as a vehicle to introduce vulnerabilities and attacks to WBAN, eventually resulting in its malfunctions. In this paper, we propose a novel secure wake-up scheme, in which a wake-up authentication code (WAC) is employed to ensure that a BAN Node (BN) is woken up by the correct BAN Network Controller (BNC) rather than unintended users or malicious attackers. The scheme is thus particularly implemented by a two-radio architecture. We show that our scheme provides higher security while consuming less energy than the existing schemes.

  20. Consistency of homogenization schemes in linear poroelasticity

    NASA Astrophysics Data System (ADS)

    Pichler, Bernhard; Dormieux, Luc

    2008-08-01

    In view of extending classical micromechanics of poroelasticity to the non-saturated regime, one has to deal with different pore stresses which may be affected by the size and the shape of the pores. Introducing the macrostrain and these pore stresses as loading parameters, the macrostress of a representative volume element of a porous material can be derived by means of Levin's theorem or by means of the direct formulation of the stress average rule, respectively. A consistency requirement for a given homogenization scheme is obtained from the condition that the two approaches should yield identical results. Classical approaches (Mori-Tanaka scheme, self-consistent scheme) are shown to be only conditionally consistent. In contrast, the Ponte Castañeda-Willis scheme proves to provide consistent descriptions both of porous matrix-inclusion composites and of porous polycrystals. To cite this article: B. Pichler, L. Dormieux, C. R. Mecanique 336 (2008).

  1. High-Order Energy Stable WENO Schemes

    NASA Technical Reports Server (NTRS)

    Yamaleev, Nail K.; Carpenter, Mark H.

    2009-01-01

    A third-order Energy Stable Weighted Essentially Non-Oscillatory (ESWENO) finite difference scheme developed by Yamaleev and Carpenter was proven to be stable in the energy norm for both continuous and discontinuous solutions of systems of linear hyperbolic equations. Herein, a systematic approach is presented that enables 'energy stable' modifications for existing WENO schemes of any order. The technique is demonstrated by developing a one-parameter family of fifth-order upwind-biased ESWENO schemes; ESWENO schemes up to eighth order are presented in the appendix. New weight functions are also developed that provide (1) formal consistency, (2) much faster convergence for smooth solutions with an arbitrary number of vanishing derivatives, and (3) improved resolution near strong discontinuities.

  2. A positive finite-difference advection scheme

    SciTech Connect

    Hundsdorfer, W.; Koren, B.; Loon, M. van

    1995-03-01

    This paper examines a class of explicit finite-difference advection schemes derived along the method of lines. An important application field is large-scale atmospheric transport. The paper therefore focuses on the demand of positivity. For the spatial discretization, attention is confined to conservative schemes using five points per direction. The fourth-order central scheme and the family of {kappa}-schemes, comprising the second-order central, the second-order upwind, and the third-order upwind biased, are studied. Positivity is enforced through flux limiting. It is concluded that the limited third-order upwind discretization is the best candidate from the four examined. For the time integration attention is confined to a number of explicit Runge-Kutta methods of orders two to four. With regard to the demand of positivity, these integration methods turn out to behave almost equally and no best method could be identified. 16 refs., 4 figs., 4 tabs.

  3. Renormalization scheme dependence with renormalization group summation

    NASA Astrophysics Data System (ADS)

    McKeon, D. G. C.

    2015-08-01

    We consider all perturbative radiative corrections to the total e+e- annihilation cross section Re+e- showing how the renormalization group (RG) equation associated with the radiatively induced mass scale μ can be used to sum the logarithmic contributions in two ways. First of all, one can sum leading-log, next-to-leading-log, etc., contributions to Re+e- using in turn the one-loop, two-loop, etc., contributions to the RG function β . A second summation shows how all logarithmic corrections to Re+e- can be expressed entirely in terms of the log-independent contributions when one employs the full β -function. Next, using Stevenson's characterization of any choice of renormalization scheme by the use of the contributions to the β -function arising beyond two-loop order, we examine the RG scheme dependence in Re+e- when using the second way of summing logarithms. The renormalization scheme invariants that arise are then related to the renormalization scheme invariants found by Stevenson. We next consider two choices of the renormalization scheme, one which can be used to express Re+e- solely in terms of two powers of a running coupling, and the second which can be used to express Re+e- as an infinite series in the two-loop running coupling (i.e., a Lambert W -function). In both cases, Re+e- is expressed solely in terms of renormalization scheme invariant parameters that are to be computed by a perturbative evaluation of Re+e-. We then establish how in general the coupling constant arising in one renormalization scheme can be expressed as a power series of the coupling arising in any other scheme. We then establish how, by using a different renormalization mass scale at each order of perturbation theory, all renormalization scheme dependence can be absorbed into these mass scales when one uses the second way of summing logarithmic corrections to Re+e-. We then employ the approach to renormalization scheme dependency that we have applied to Re+e- to a RG summed

  4. A comparison of ENO and TVD schemes

    NASA Technical Reports Server (NTRS)

    Chang, Shih-Hung; Liou, Meng-Sing

    1988-01-01

    The numerical performance of a second-order upwind-based TVD scheme is compared with that of a uniform second-order ENO scheme on shock capturing. The cases considered include flows with Mach numbers of 2.9, 5.0, and 10.0. For cases with Mach numbers of 5.0 and 10.0, the computed ENO results are inferior to the corresponding TVD results.

  5. Signature scheme based on bilinear pairs

    NASA Astrophysics Data System (ADS)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  6. A modified scheme for biotyping Gardnerella vaginalis.

    PubMed

    Benito, R; Vazquez, J A; Berron, S; Fenoll, A; Saez-Neito, J A

    1986-06-01

    A scheme is proposed for biotyping Gardnerella vaginalis, based on detection of hippurate hydrolysis, beta-galactosidase (ONPG) and lipase, and fermentation of arabinose, galactose and xylose. Seventeen biotypes were found among 197 strains from asymptomatic women and patients with bacterial vaginosis (non-specific vaginitis). The distribution of biotypes was similar in both populations but some biotypes were found more frequently in patients. The proposed scheme is compared with those previously described.

  7. Binary Schemes of Vapor Bubble Growth

    NASA Astrophysics Data System (ADS)

    Zudin, Yu. B.

    2015-05-01

    A problem on spherically symmetric growth of a vapor bubble in an infi nite volume of a uniformly superheated liquid is considered. A description of the limiting schemes of bubble growth is presented. A binary inertial-thermal bubble growth scheme characterized by such specifi c features as the "three quarters" growth law and the effect of "pressure blocking" in a vapor phase is considered.

  8. Composite centered schemes for multidimensional conservation laws

    SciTech Connect

    Liska, R.; Wendroff, B.

    1998-05-08

    The oscillations of a centered second order finite difference scheme and the excessive diffusion of a first order centered scheme can be overcome by global composition of the two, that is by performing cycles consisting of several time steps of the second order method followed by one step of the diffusive method. The authors show the effectiveness of this approach on some test problems in two and three dimensions.

  9. Dynamic Restarting Schemes for Eigenvalue Problems

    SciTech Connect

    Wu, Kesheng; Simon, Horst D.

    1999-03-10

    In studies of restarted Davidson method, a dynamic thick-restart scheme was found to be excellent in improving the overall effectiveness of the eigen value method. This paper extends the study of the dynamic thick-restart scheme to the Lanczos method for symmetric eigen value problems and systematically explore a range of heuristics and strategies. We conduct a series of numerical tests to determine their relative strength and weakness on a class of electronic structure calculation problems.

  10. Asynchronous Communication Scheme For Hypercube Computer

    NASA Technical Reports Server (NTRS)

    Madan, Herb S.

    1988-01-01

    Scheme devised for asynchronous-message communication system for Mark III hypercube concurrent-processor network. Network consists of up to 1,024 processing elements connected electrically as though were at corners of 10-dimensional cube. Each node contains two Motorola 68020 processors along with Motorola 68881 floating-point processor utilizing up to 4 megabytes of shared dynamic random-access memory. Scheme intended to support applications requiring passage of both polled or solicited and unsolicited messages.

  11. On nonstandard finite difference schemes in biosciences

    NASA Astrophysics Data System (ADS)

    Anguelov, R.; Dumont, Y.; Lubuma, J. M.-S.

    2012-10-01

    We design, analyze and implement nonstandard finite difference (NSFD) schemes for some differential models in biosciences. The NSFD schemes are reliable in three directions. They are topologically dynamically consistent for onedimensional models. They can replicate the global asymptotic stability of the disease-free equilibrium of the MSEIR model in epidemiology whenever the basic reproduction number is less than 1. They preserve the positivity and boundedness property of solutions of advection-reaction and reaction-diffusion equations.

  12. FRESCO: flexible alignment with rectangle scoring schemes.

    PubMed

    Dalca, A V; Brudno, M

    2008-01-01

    While the popular DNA sequence alignment tools incorporate powerful heuristics to allow for fast and accurate alignment of DNA, most of them still optimize the classical Needleman Wunsch scoring scheme. The development of novel scoring schemes is often hampered by the difficulty of finding an optimizing algorithm for each non-trivial scheme. In this paper we define the broad class of rectangle scoring schemes, and describe an algorithm and tool that can align two sequences with an arbitrary rectangle scoring scheme in polynomial time. Rectangle scoring schemes encompass some of the popular alignment scoring metrics currently in use, as well as many other functions. We investigate a novel scoring function based on minimizing the expected number of random diagonals observed with the given scores and show that it rivals the LAGAN and Clustal-W aligners, without using any biological or evolutionary parameters. The FRESCO program, freely available at http://compbio.cs.toronto.edu/fresco, gives bioinformatics researchers the ability to quickly compare the performance of other complex scoring formulas without having to implement new algorithms to optimize them.

  13. Simplification of the unified gas kinetic scheme.

    PubMed

    Chen, Songze; Guo, Zhaoli; Xu, Kun

    2016-08-01

    The unified gas kinetic scheme (UGKS) is an asymptotic preserving (AP) scheme for kinetic equations. It is superior for transition flow simulation and has been validated in the past years. However, compared to the well-known discrete ordinate method (DOM), which is a classical numerical method solving the kinetic equations, the UGKS needs more computational resources. In this study, we propose a simplification of the unified gas kinetic scheme. It allows almost identical numerical cost as the DOM, but predicts numerical results as accurate as the UGKS. In the simplified scheme, the numerical flux for the velocity distribution function and the numerical flux for the macroscopic conservative quantities are evaluated separately. The equilibrium part of the UGKS flux is calculated by analytical solution instead of the numerical quadrature in velocity space. The simplification is equivalent to a flux hybridization of the gas kinetic scheme for the Navier-Stokes (NS) equations and the conventional discrete ordinate method. Several simplification strategies are tested, through which we can identify the key ingredient of the Navier-Stokes asymptotic preserving property. Numerical tests show that, as long as the collision effect is built into the macroscopic numerical flux, the numerical scheme is Navier-Stokes asymptotic preserving, regardless the accuracy of the microscopic numerical flux for the velocity distribution function. PMID:27627418

  14. Simplification of the unified gas kinetic scheme

    NASA Astrophysics Data System (ADS)

    Chen, Songze; Guo, Zhaoli; Xu, Kun

    2016-08-01

    The unified gas kinetic scheme (UGKS) is an asymptotic preserving (AP) scheme for kinetic equations. It is superior for transition flow simulation and has been validated in the past years. However, compared to the well-known discrete ordinate method (DOM), which is a classical numerical method solving the kinetic equations, the UGKS needs more computational resources. In this study, we propose a simplification of the unified gas kinetic scheme. It allows almost identical numerical cost as the DOM, but predicts numerical results as accurate as the UGKS. In the simplified scheme, the numerical flux for the velocity distribution function and the numerical flux for the macroscopic conservative quantities are evaluated separately. The equilibrium part of the UGKS flux is calculated by analytical solution instead of the numerical quadrature in velocity space. The simplification is equivalent to a flux hybridization of the gas kinetic scheme for the Navier-Stokes (NS) equations and the conventional discrete ordinate method. Several simplification strategies are tested, through which we can identify the key ingredient of the Navier-Stokes asymptotic preserving property. Numerical tests show that, as long as the collision effect is built into the macroscopic numerical flux, the numerical scheme is Navier-Stokes asymptotic preserving, regardless the accuracy of the microscopic numerical flux for the velocity distribution function.

  15. Filtered schemes for Hamilton-Jacobi equations: A simple construction of convergent accurate difference schemes

    NASA Astrophysics Data System (ADS)

    Oberman, Adam M.; Salvador, Tiago

    2015-03-01

    We build a simple and general class of finite difference schemes for first order Hamilton-Jacobi (HJ) Partial Differential Equations. These filtered schemes are convergent to the unique viscosity solution of the equation. The schemes are accurate: we implement second, third and fourth order accurate schemes in one dimension and second order accurate schemes in two dimensions, indicating how to build higher order ones. They are also explicit, which means they can be solved using the fast sweeping method. The accuracy of the method is validated with computational results for the eikonal equation and other HJ equations in one and two dimensions, using filtered schemes made from standard centered differences, higher order upwinding and ENO interpolation.

  16. Combining image-processing and image compression schemes

    NASA Technical Reports Server (NTRS)

    Greenspan, H.; Lee, M.-C.

    1995-01-01

    An investigation into the combining of image-processing schemes, specifically an image enhancement scheme, with existing compression schemes is discussed. Results are presented on the pyramid coding scheme, the subband coding scheme, and progressive transmission. Encouraging results are demonstrated for the combination of image enhancement and pyramid image coding schemes, especially at low bit rates. Adding the enhancement scheme to progressive image transmission allows enhanced visual perception at low resolutions. In addition, further progressing of the transmitted images, such as edge detection schemes, can gain from the added image resolution via the enhancement.

  17. An efficient authentication scheme for telecare medicine information systems.

    PubMed

    Zhu, Zhian

    2012-12-01

    To ensure patients' privacy, such as telephone number, medical record number, health information, etc., authentication schemes for telecare medicine information systems (TMIS) have been studied widely. Recently, Wei et al. proposed an efficient authentication scheme for TMIS. They claimed their scheme could resist various attacks. However, in this paper, we will show their scheme is vulnerable to an off-line password guessing attack when user's smart card is lost. To improve the security, we propose a new authentication scheme for TMIS. The analysis shows our scheme could overcome the weaknesses in Wei et al.'s scheme and has better performance than their scheme. PMID:22527784

  18. Establishing a Proficiency Testing Scheme for Drinking Water Radiochemistry

    SciTech Connect

    Brookman, Brian

    2008-08-14

    As part of its international water proficiency testing (PT) scheme, 'Aquacheck', the LGC Proficiency Testing Group has established a new water radiochemistry PT scheme. The PT scheme is aimed at laboratories who undertake radiochemical analysis on drinking water samples as part of an environmental monitoring programme. Following a scheme design and feasibility study, the new scheme was established to monitor the laboratory performance of participants undertaking the determination of gross alpha, gross beta and tritium activity. Three rounds of the new water radiochemistry PT scheme are now complete. This paper explains the process of establishing such a scheme, reviews the results so far, and addresses future development of the scheme.

  19. A classification scheme for risk assessment methods.

    SciTech Connect

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In Section 2 we provide context for this report

  20. A flexible gridding scheme for reservoir simulation

    SciTech Connect

    Verma, S.

    1995-12-31

    This paper describes a new control volume based finite difference scheme for petroleum reservoir simulation which can be used with unstructured grids. The numerical scheme to model fluid flow is shown to be easily used for Voronoi grids in 2D. It can also be used with certain geometrical limitations for 3D Voronoi grids. The scheme can be used without any significant limitations for triangle or tetrahedron based grids where control volumes are constructed around their vertices. It assumes uniform properties inside such control volumes. Full, anisotropic and asymmetric permeability tensor can be easily handled with the proposed method. The permeability tensor can vary from block to block. Thus it will be of great value in modeling fluid flow in reservoirs where principal directions of permeability varies between beds or within a bed. The paper also presents an analysis of some of the published flexible gridding schemes which use a control volume type algebraic approximation and demonstrate the advantages of the method presented here. The technique for grid construction is also discussed. Test results presented here demonstrate the need for proper representation of reservoir geometry to predict the correct flow behavior. The gridding scheme described in this paper achieves that purpose.

  1. Geophysical Inversion through Hierarchical Genetic Algorithm Scheme

    NASA Astrophysics Data System (ADS)

    Furman, Alex; Huisman, Johan A.

    2010-05-01

    Geophysical investigation is a powerful tool that allows non-invasive and non-destructive mapping of subsurface states and properties. However, non-uniqueness associated with the inversion process halts these methods from becoming of more quantitative use. One major direction researchers are going is constraining the inverse problem by hydrological observations and models. An alternative to the commonly used direct inversion methods are global optimization schemes (such as genetic algorithms and Monte Carlo Markov Chain methods). However, the major limitation here is the desired high resolution of the tomographic image, which leads to a large number of parameters and an unreasonably high computational effort when using global optimization schemes. One way to overcome these problems is to combine the advantages of both direct and global inversion methods through hierarchical inversion. That is, starting the inversion with relatively coarse resolution of parameters, achieving good inversion using one of the two inversion schemes (global or direct), and then refining the resolution and applying a combination of global and direct inversion schemes for the whole domain or locally. In this work we explore through synthetic case studies the option of using a global optimization scheme for inversion of electrical resistivity tomography data through hierarchical refinement of the model resolution.

  2. Identification Schemes from Key Encapsulation Mechanisms

    NASA Astrophysics Data System (ADS)

    Anada, Hiroaki; Arita, Seiko

    We propose a generic conversion from a key encapsulation mechanism (KEM) to an identification (ID) scheme. The conversion derives the security for ID schemes against concurrent man-in-the-middle (cMiM) attacks from the security for KEMs against adaptive chosen ciphertext attacks on one-wayness (one-way-CCA2). Then, regarding the derivation as a design principle of ID schemes, we develop a series of concrete one-way-CCA2 secure KEMs. We start with El Gamal KEM and prove it secure against non-adaptive chosen ciphertext attacks on one-wayness (one-way-CCA1) in the standard model. Then, we apply a tag framework with the algebraic trick of Boneh and Boyen to make it one-way-CCA2 secure based on the Gap-CDH assumption. Next, we apply the CHK transformation or a target collision resistant hash function to exit the tag framework. And finally, as it is better to rely on the CDH assumption rather than the Gap-CDH assumption, we apply the Twin DH technique of Cash, Kiltz and Shoup. The application is not “black box” and we do it by making the Twin DH technique compatible with the algebraic trick. The ID schemes obtained from our KEMs show the highest performance in both computational amount and message length compared with previously known ID schemes secure against concurrent man-in-the-middle attacks.

  3. The Nonlinear Characteristic scheme in X-Y geometries

    SciTech Connect

    Walters, W.F.; Wareing, T.A.

    1994-08-01

    The Nonlinear Characteristic (NC) scheme for solving the discrete-ordinates form of the transport equation has recently been introduced and used to analyze one-dimensional slab transport problems. The purpose of this paper is to determine the accuracy and positivity of the NC scheme as extended to solve two-dimensional X-Y problems. We compare the results obtained using the NC scheme to those obtained using the Bilinear Discontinuous (BLD) scheme, the Bilinear Nodal (BLN) scheme, Linear Characteristic scheme, and the Diamond Difference with Fixup (DD/F) scheme. As was found in one-dimensional applications, the NC scheme is strictly positive and as accurate or more accurate than the other schemes for all meshes examined. The accuracy of the NC scheme for coarse meshes is particularity outstanding compared to that of the other schemes.

  4. Dropout--Mertonian or reproduction scheme?

    PubMed

    Horowitz, T R

    1992-01-01

    This article reports on dropouts in four schools in Israel. Two main research questions were addressed: (1) Is it possible to identify a potential dropout through examination of his/her attitudes and competence before the actual act of leaving school? (2) Is there a difference between dropouts and persistent students in different educational settings (academic, vocational, agricultural, and comprehensive high schools)? Significant differences were found in the attitudes of persistent students and dropouts even before the act of dropping out occurred. In the vocational, comprehensive, and agricultural schools, the dropouts scored more positively on the self-estrangement, meaninglessness, and misfeasance scales. In the academic school, the dropouts scored positively on the anxiety scale. Results were interpreted in light of the Mertonian scheme of ends and means as well as the reproduction scheme. The Mertonian scheme was deemed more applicable.

  5. Campylobacter biotyping scheme of epidemiological value.

    PubMed Central

    Bolton, F J; Holt, A V; Hutchinson, D N

    1984-01-01

    A biotyping scheme has been developed which utilises 12 tests, including growth at 28 degrees C, hippurate hydrolysis, and 10 resistotyping tests. These tests are arranged in groups of three, and by assigning a numerical value to each positive test a four figure code is produced for each strain. The order of the tests is such that campylobacters are both speciated and biotyped . This scheme recognises Campylobacter jejuni, C coli, "C laridis ," C fetus fetus, and C fetus subspecies venerealis. The reproducibility of the biotyping technique and the stability of the biotype code have been determined by testing campylobacter reference strains. The routine application of the scheme has also been evaluated by biotyping 1000 recent campylobacter isolates, and the epidemiological value has been confirmed by testing serotyped isolates from several milk borne outbreaks. PMID:6373839

  6. A compositional classification scheme for meteoritic chondrules

    NASA Technical Reports Server (NTRS)

    Sears, Derek W. G.; Jie, LU; Benoit, Paul H.; Dehart, John M.; Lofgren, Gary E.

    1992-01-01

    A compositionally based classification scheme for chondrules is proposed that will help in systematizing the wealth of data available and disentangling the effects of nebular and subsequent processes. The classification is not by texture or the composition of a single phase, or a mixture of these two, but rather is a comprehensive, systematic approach which uses the composition of the two main chondrule components. This scheme is applicable to over 95 percent of the chondrules and is easily applied using an electron microprobe. It stresses the original diversity of the chondrules and the complex yet facile way in which they respond to parent-body metamorphism. Results using this classification scheme suggest that arguments against an important role of chondrules in determining the compositional trends of the chondrites have been premature.

  7. Cooling scheme for turbine hot parts

    DOEpatents

    Hultgren, Kent Goran; Owen, Brian Charles; Dowman, Steven Wayne; Nordlund, Raymond Scott; Smith, Ricky Lee

    2000-01-01

    A closed-loop cooling scheme for cooling stationary combustion turbine components, such as vanes, ring segments and transitions, is provided. The cooling scheme comprises: (1) an annular coolant inlet chamber, situated between the cylinder and blade ring of a turbine, for housing coolant before being distributed to the turbine components; (2) an annular coolant exhaust chamber, situated between the cylinder and the blade ring and proximate the annular coolant inlet chamber, for collecting coolant exhaust from the turbine components; (3) a coolant inlet conduit for supplying the coolant to said coolant inlet chamber; (4) a coolant exhaust conduit for directing coolant from said coolant exhaust chamber; and (5) a piping arrangement for distributing the coolant to and directing coolant exhaust from the turbine components. In preferred embodiments of the invention, the cooling scheme further comprises static seals for sealing the blade ring to the cylinder and flexible joints for attaching the blade ring to the turbine components.

  8. Upwind and symmetric shock-capturing schemes

    NASA Technical Reports Server (NTRS)

    Yee, H. C.

    1987-01-01

    The development of numerical methods for hyperbolic conservation laws has been a rapidly growing area for the last ten years. Many of the fundamental concepts and state-of-the-art developments can only be found in meeting proceedings or internal reports. This review paper attempts to give an overview and a unified formulation of a class of shock-capturing methods. Special emphasis is on the construction of the basic nonlinear scalar second-order schemes and the methods of extending these nonlinear scalar schemes to nonlinear systems via the extact Riemann solver, approximate Riemann solvers, and flux-vector splitting approaches. Generalization of these methods to efficiently include real gases and large systems of nonequilibrium flows is discussed. The performance of some of these schemes is illustrated by numerical examples for one-, two- and three-dimensional gas dynamics problems.

  9. Compression scheme for geophysical electromagnetic inversions

    NASA Astrophysics Data System (ADS)

    Abubakar, A.

    2014-12-01

    We have developed a model-compression scheme for improving the efficiency of the regularized Gauss-Newton inversion algorithm for geophysical electromagnetic applications. In this scheme, the unknown model parameters (the conductivity/resistivity distribution) are represented in terms of a basis such as Fourier and wavelet (Haar and Daubechies). By applying a truncation criterion, the model may then be approximated by a reduced number of basis functions, which is usually much less than the number of the model parameters. Further, because the geophysical electromagnetic measurements have low resolution, it is sufficient for inversion to only keep the low-spatial frequency part of the image. This model-compression scheme accelerates the computational time and also reduces the memory usage of the Gauss-Newton method. We are able to significantly reduce the algorithm computational complexity without compromising the quality of the inverted models.

  10. An adaptive Cartesian control scheme for manipulators

    NASA Technical Reports Server (NTRS)

    Seraji, H.

    1987-01-01

    A adaptive control scheme for direct control of manipulator end-effectors to achieve trajectory tracking in Cartesian space is developed. The control structure is obtained from linear multivariable theory and is composed of simple feedforward and feedback controllers and an auxiliary input. The direct adaptation laws are derived from model reference adaptive control theory and are not based on parameter estimation of the robot model. The utilization of feedforward control and the inclusion of auxiliary input are novel features of the present scheme and result in improved dynamic performance over existing adaptive control schemes. The adaptive controller does not require the complex mathematical model of the robot dynamics or any knowledge of the robot parameters or the payload, and is computationally fast for online implementation with high sampling rates.

  11. Matching multistage schemes to viscous flow

    NASA Astrophysics Data System (ADS)

    Kleb, William Leonard

    A method to accelerate convergence to steady state by explicit time-marching schemes for the compressible Navier-Stokes equations is presented. The combination of cell-Reynolds-number-based multistage time stepping and local preconditioning makes solving steady-state viscous flow problems competitive with the convergence rates typically associated with implicit methods, without the associated memory penalty. Initially, various methods are investigated to extend the range of multistage schemes to diffusion-dominated cases. It is determined that the Chebyshev polynomials are well suited to serve as amplification factors for these schemes; however, creating a method that can bridge the continuum from convection-dominated to diffusion-dominated regimes proves troublesome, until the Manteuffel family of polynomials is uncovered. This transformation provides a smooth transition between the two extremes; and armed with this information, sets of multistage coefficients are created for a given spatial discretization as a function of cell Reynolds number according to various design criteria. As part of this process, a precise definition for the numerical time step is hammered out, something which up to this time, has been set via algebraic arguments only. Next are numerical tests of these sets of variable multistage coefficients. To isolate the effects of the variable multistage coefficients, the test case chosen is very simple: circular advection-diffusion. The numerical results support the analytical analysis by demonstrating an order of magnitude improvement in convergence rate for single-grid relaxation and a factor of three for multigrid relaxation. Building upon the success of the scalar case, preconditioning is applied to make the Navier-Stokes system of equations behave more nearly as a single scalar equation. Then, by applying the variable multistage coefficient scheme to a typical boundary-layer flow problem, the results affirm the benefits of local preconditioning

  12. An Improved Bulk Microphysical Scheme for Studying Precipitation Processes: Comparisons with Other Schemes

    NASA Technical Reports Server (NTRS)

    Tao, W. K.; Shi, J. J.; Lang, S.; Chen, S.; Hong, S-Y.; Peters-Lidard, C.

    2007-01-01

    Cloud microphysical processes play an important role in non-hydrostatic high-resolution simulations. Over the past decade both research and operational numerical weather prediction models have started using more complex cloud microphysical schemes that were originally developed for high-resolution cloud-resolving models. An improved bulk microphysical parameterization (adopted from the Goddard microphysics schemes) has recently implemented into the Weather Research and Forecasting (WRF) model. This bulk microphysical scheme has three different options --- 2ICE (cloud ice & snow), 3ICE-graupel (cloud ice, snow & graupel) and 3ICE-hail (cloud ice, snow & hail). High-resolution model simulations are conducted to examine the impact of microphysical schemes on two different weather events (a midlatitude linear convective system and an Atlantic hurricane). In addition, this bulk microphysical parameterization is compared with WIRF's three other bulk microphysical schemes.

  13. On the Dynamics of TVD Schemes

    NASA Technical Reports Server (NTRS)

    Yee, H. C.; Sweby, P. K.; Kutler, Paul (Technical Monitor)

    1994-01-01

    The dynamics of a class of TVD schemes for model hyperbolic and parabolic equations is studied numerically using a highly parallel supercomputer (CM-5). The objective is to utilize the highly parallel property of the CM-5 to reveal the reliable time step and entropy parameter ranges, and the degree of compressible flux limiters to avoid slow convergence and the production of nonphysical numerical solutions. We choose to study the nonlinear stability property of TVD schemes numerically since it is otherwise not amenable analytically.

  14. Engineering images designed by fractal subdivision scheme.

    PubMed

    Mustafa, Ghulam; Bari, Mehwish; Jamil, Saba

    2016-01-01

    This paper is concerned with the modeling of engineering images by the fractal properties of 6-point binary interpolating scheme. Association between the fractal behavior of the limit curve/surface and the parameter is obtained. The relationship between the subdivision parameter and the fractal dimension of the limit fractal curve of subdivision fractal is also presented. Numerical examples and visual demonstrations show that 6-point scheme is good choice for the generation of fractals for the modeling of fractal antennas, bearings, garari's and rock etc. PMID:27652066

  15. Security problem on arbitrated quantum signature schemes

    SciTech Connect

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  16. Security problem on arbitrated quantum signature schemes

    NASA Astrophysics Data System (ADS)

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-12-01

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  17. A Trade-off Traitor Tracing Scheme

    NASA Astrophysics Data System (ADS)

    Ohtake, Go; Ogawa, Kazuto; Hanaoka, Goichiro; Imai, Hideki

    There has been a wide-ranging discussion on the issue of content copyright protection in digital content distribution systems. Fiat and Tassa proposed the framework of dynamic traitor tracing. Their framework requires dynamic computation transactions according to the real-time responses of the pirate, and it presumes real-time observation of content redistribution. Therefore, it cannot be simply utilized in an application where such an assumption is not valid. In this paper, we propose a new scheme that provides the advantages of dynamic traitor tracing schemes and also overcomes their problems.

  18. Regularization schemes and the multiplicative anomaly

    NASA Astrophysics Data System (ADS)

    Evans, T. S.

    1999-06-01

    Elizalde, Vanzo, and Zerbini have shown that the effective action of two free Euclidean scalar fields in flat space contains a `multiplicative anomaly' when ζ-function regularization is used. This is related to the Wodzicki residue. I show that there is no anomaly when using a wide range of other regularization schemes and that the anomaly can be removed by an unusual choice of renormalization scales. I define new types of anomalies and show that they have similar properties. Thus multiplicative anomalies encode no novel physics. They merely illustrate some dangerous aspects of ζ-function and Schwinger proper time regularization schemes.

  19. ARQ scheme reinforced with past acknowledgement signals

    NASA Astrophysics Data System (ADS)

    Nakamura, Makoto; Takada, Yasushi

    An ARQ (automatic-repeat-request) scheme that can reduce the influence of backward channel errors for bidirectional data transmission systems is proposed. The main feature of the scheme is that both present and past acknowledgement signals are utilized to decide whether the data signals should be retransmitted or not. Throughput performance is analyzed in both go-back-N and selective-repeat ARQ. A small number of returned past acknowledgement signals are required to improve the throughput efficiency. For an ideal selective-repeat ARQ with an infinite buffer, increasing the number of returned past acknowledgement signals makes the throughput efficiency asymptotically close to the upper bound.

  20. Utilizing Kernelized Advection Schemes in Ocean Models

    NASA Astrophysics Data System (ADS)

    Zadeh, N.; Balaji, V.

    2008-12-01

    There has been a recent effort in the ocean model community to use a set of generic FORTRAN library routines for advection of scalar tracers in the ocean. In a collaborative project called Hybrid Ocean Model Environement (HOME), vastly different advection schemes (space-differencing schemes for advection equation) become available to modelers in the form of subroutine calls (kernels). In this talk we explore the possibility of utilizing ESMF data structures in wrapping these kernels so that they can be readily used in ESMF gridded components.

  1. Student Loans Schemes in Mauritius: Experience, Analysis and Scenarios

    ERIC Educational Resources Information Center

    Mohadeb, Praveen

    2006-01-01

    This study makes a comprehensive review of the situation of student loans schemes in Mauritius, and makes recommendations, based on best practices, for setting up a national scheme that attempts to avoid weaknesses identified in some of the loans schemes of other countries. It suggests that such a scheme would be cost-effective and beneficial both…

  2. How Can Conceptual Schemes Change Teaching?

    ERIC Educational Resources Information Center

    Wickman, Per-Olof

    2012-01-01

    Lundqvist, Almqvist and Ostman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the "epistemological moves",…

  3. A classification scheme for LWR fuel assemblies

    SciTech Connect

    Moore, R.S.; Williamson, D.A.; Notz, K.J.

    1988-11-01

    With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs.

  4. Creating Culturally Sustainable Agri-Environmental Schemes

    ERIC Educational Resources Information Center

    Burton, Rob J. F.; Paragahawewa, Upananda Herath

    2011-01-01

    Evidence is emerging from across Europe that contemporary agri-environmental schemes are having only limited, if any, influence on farmers' long-term attitudes towards the environment. In this theoretical paper we argue that these approaches are not "culturally sustainable," i.e. the actions are not becoming embedded within farming cultures as…

  5. Harmonic generation with multiple wiggler schemes

    SciTech Connect

    Bonifacio, R.; De Salvo, L.; Pierini, P.

    1995-02-01

    In this paper the authors give a simple theoretical description of the basic physics of the single pass high gain free electron laser (FEL), describing in some detail the FEL bunching properties and the harmonic generation technique with a multiple-wiggler scheme or a high gain optical klystron configuration.

  6. Security of Invertible Media Authentication Schemes Revisited

    NASA Astrophysics Data System (ADS)

    Dönigus, Daniel; Endler, Stefan; Fischlin, Marc; Hülsing, Andreas; Jäger, Patrick; Lehmann, Anja; Podrazhansky, Sergey; Schipp, Sebastian; Tews, Erik; Vowe, Sven; Walthart, Matthias; Weidemann, Frederik

    Dittmann, Katzenbeisser, Schallhart and Veith (SEC 2005) introduced the notion of invertible media authentication schemes, embedding authentication data in media objects via invertible watermarks. These invertible watermarks allow to recover the original media object (given a secret encryption key), as required for example in some medical applications where the distortion must be removable.

  7. Sex-roles in Reading Schemes

    ERIC Educational Resources Information Center

    Lobban, Glenys

    1974-01-01

    Author contended that no broad-ranging study of the way sex-roles are presented in British reading schemes exists. In this article he described a preliminary study on sex-role content in readers in order to remedy this lack of information. (Author/RK)

  8. Configuration-Control Scheme Copes With Singularities

    NASA Technical Reports Server (NTRS)

    Seraji, Homayoun; Colbaugh, Richard D.

    1993-01-01

    Improved configuration-control scheme for robotic manipulator having redundant degrees of freedom suppresses large joint velocities near singularities, at expense of small trajectory errors. Provides means to enforce order of priority of tasks assigned to robot. Basic concept of configuration control of redundant robot described in "Increasing The Dexterity Of Redundant Robots" (NPO-17801).

  9. High Order Semi-Lagrangian Advection Scheme

    NASA Astrophysics Data System (ADS)

    Malaga, Carlos; Mandujano, Francisco; Becerra, Julian

    2014-11-01

    In most fluid phenomena, advection plays an important roll. A numerical scheme capable of making quantitative predictions and simulations must compute correctly the advection terms appearing in the equations governing fluid flow. Here we present a high order forward semi-Lagrangian numerical scheme specifically tailored to compute material derivatives. The scheme relies on the geometrical interpretation of material derivatives to compute the time evolution of fields on grids that deform with the material fluid domain, an interpolating procedure of arbitrary order that preserves the moments of the interpolated distributions, and a nonlinear mapping strategy to perform interpolations between undeformed and deformed grids. Additionally, a discontinuity criterion was implemented to deal with discontinuous fields and shocks. Tests of pure advection, shock formation and nonlinear phenomena are presented to show performance and convergence of the scheme. The high computational cost is considerably reduced when implemented on massively parallel architectures found in graphic cards. The authors acknowledge funding from Fondo Sectorial CONACYT-SENER Grant Number 42536 (DGAJ-SPI-34-170412-217).

  10. Cross-ontological analytics for alignment of different classification schemes

    DOEpatents

    Posse, Christian; Sanfilippo, Antonio P; Gopalan, Banu; Riensche, Roderick M; Baddeley, Robert L

    2010-09-28

    Quantification of the similarity between nodes in multiple electronic classification schemes is provided by automatically identifying relationships and similarities between nodes within and across the electronic classification schemes. Quantifying the similarity between a first node in a first electronic classification scheme and a second node in a second electronic classification scheme involves finding a third node in the first electronic classification scheme, wherein a first product value of an inter-scheme similarity value between the second and third nodes and an intra-scheme similarity value between the first and third nodes is a maximum. A fourth node in the second electronic classification scheme can be found, wherein a second product value of an inter-scheme similarity value between the first and fourth nodes and an intra-scheme similarity value between the second and fourth nodes is a maximum. The maximum between the first and second product values represents a measure of similarity between the first and second nodes.

  11. Probabilistic Performance Analysis of Fault Diagnosis Schemes

    NASA Astrophysics Data System (ADS)

    Wheeler, Timothy Josh

    The dissertation explores the problem of rigorously quantifying the performance of a fault diagnosis scheme in terms of probabilistic performance metrics. Typically, when the performance of a fault diagnosis scheme is of utmost importance, physical redundancy is used to create a highly reliable system that is easy to analyze. However, in this dissertation, we provide a general framework that applies to more complex analytically redundant or model-based fault diagnosis schemes. For each fault diagnosis problem in this framework, our performance metrics can be computed accurately in polynomial-time. First, we cast the fault diagnosis problem as a sequence of hypothesis tests. At each time, the performance of a fault diagnosis scheme is quantified by the probability that the scheme has chosen the correct hypothesis. The resulting performance metrics are joint probabilities. Using Bayes rule, we decompose these performance metrics into two parts: marginal probabilities that quantify the reliability of the system and conditional probabilities that quantify the performance of the fault diagnosis scheme. These conditional probabilities are used to draw connections between the fault diagnosis and the fields of medical diagnostic testing, signal detection, and general statistical decision theory. Second, we examine the problem of computing the performance metrics efficiently and accurately. To solve this problem, we examine each portion of the fault diagnosis problem and specify a set of sufficient assumptions that guarantee efficient computation. In particular, we provide a detailed characterization of the class of finite-state Markov chains that lead to tractable fault parameter models. To demonstrate that these assumptions enable efficient computation, we provide pseudocode algorithms and prove that their running time is indeed polynomial. Third, we consider fault diagnosis problems involving uncertain systems. The inclusion of uncertainty enlarges the class of systems

  12. Quantum Walk Schemes for Universal Quantum Computation

    NASA Astrophysics Data System (ADS)

    Underwood, Michael S.

    Random walks are a powerful tool for the efficient implementation of algorithms in classical computation. Their quantum-mechanical analogues, called quantum walks, hold similar promise. Quantum walks provide a model of quantum computation that has recently been shown to be equivalent in power to the standard circuit model. As in the classical case, quantum walks take place on graphs and can undergo discrete or continuous evolution, though quantum evolution is unitary and therefore deterministic until a measurement is made. This thesis considers the usefulness of continuous-time quantum walks to quantum computation from the perspectives of both their fundamental power under various formulations, and their applicability in practical experiments. In one extant scheme, logical gates are effected by scattering processes. The results of an exhaustive search for single-qubit operations in this model are presented. It is shown that the number of distinct operations increases exponentially with the number of vertices in the scattering graph. A catalogue of all graphs on up to nine vertices that implement single-qubit unitaries at a specific set of momenta is included in an appendix. I develop a novel scheme for universal quantum computation called the discontinuous quantum walk, in which a continuous-time quantum walker takes discrete steps of evolution via perfect quantum state transfer through small 'widget' graphs. The discontinuous quantum-walk scheme requires an exponentially sized graph, as do prior discrete and continuous schemes. To eliminate the inefficient vertex resource requirement, a computation scheme based on multiple discontinuous walkers is presented. In this model, n interacting walkers inhabiting a graph with 2n vertices can implement an arbitrary quantum computation on an input of length n, an exponential savings over previous universal quantum walk schemes. This is the first quantum walk scheme that allows for the application of quantum error correction

  13. High-resolution schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Harten, A.

    1982-01-01

    A class of new explicit second order accurate finite difference schemes for the computation of weak solutions of hyperbolic conservation laws is presented. These highly nonlinear schemes are obtained by applying a nonoscillatory first order accurae scheme to an appropriately modified flux function. The so derived second order accurate schemes achieve high resolution while preserving the robustness of the original nonoscillatory first order accurate scheme.

  14. Arbitrated quantum signature scheme based on reusable key

    NASA Astrophysics Data System (ADS)

    Yu, ChaoHua; Guo, GongDe; Lin, Song

    2014-11-01

    An arbitrated quantum signature scheme without using entangled states is proposed. In the scheme, by employing a classical hash function and random numbers, the secret keys of signer and receiver can be reused. It is shown that the proposed scheme is secure against several well-known attacks. Specifically, it can stand against the receiver's disavowal attack. Moreover, compared with previous relevant arbitrated quantum signature schemes, the scheme proposed has the advantage of less transmission complexity.

  15. Simple Numerical Schemes for the Korteweg-deVries Equation

    SciTech Connect

    C. J. McKinstrie; M. V. Kozlov

    2000-12-01

    Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves.

  16. Electricity storage using a thermal storage scheme

    SciTech Connect

    White, Alexander

    2015-01-22

    The increasing use of renewable energy technologies for electricity generation, many of which have an unpredictably intermittent nature, will inevitably lead to a greater demand for large-scale electricity storage schemes. For example, the expanding fraction of electricity produced by wind turbines will require either backup or storage capacity to cover extended periods of wind lull. This paper describes a recently proposed storage scheme, referred to here as Pumped Thermal Storage (PTS), and which is based on “sensible heat” storage in large thermal reservoirs. During the charging phase, the system effectively operates as a high temperature-ratio heat pump, extracting heat from a cold reservoir and delivering heat to a hot one. In the discharge phase the processes are reversed and it operates as a heat engine. The round-trip efficiency is limited only by process irreversibilities (as opposed to Second Law limitations on the coefficient of performance and the thermal efficiency of the heat pump and heat engine respectively). PTS is currently being developed in both France and England. In both cases, the schemes operate on the Joule-Brayton (gas turbine) cycle, using argon as the working fluid. However, the French scheme proposes the use of turbomachinery for compression and expansion, whereas for that being developed in England reciprocating devices are proposed. The current paper focuses on the impact of the various process irreversibilities on the thermodynamic round-trip efficiency of the scheme. Consideration is given to compression and expansion losses and pressure losses (in pipe-work, valves and thermal reservoirs); heat transfer related irreversibility in the thermal reservoirs is discussed but not included in the analysis. Results are presented demonstrating how the various loss parameters and operating conditions influence the overall performance.

  17. Information field dynamics for simulation scheme construction

    NASA Astrophysics Data System (ADS)

    Enßlin, Torsten A.

    2013-01-01

    Information field dynamics (IFD) is introduced here as a framework to derive numerical schemes for the simulation of physical and other fields without assuming a particular subgrid structure as many schemes do. IFD constructs an ensemble of nonparametric subgrid field configurations from the combination of the data in computer memory, representing constraints on possible field configurations, and prior assumptions on the subgrid field statistics. Each of these field configurations can formally be evolved to a later moment since any differential operator of the dynamics can act on fields living in continuous space. However, these virtually evolved fields need again a representation by data in computer memory. The maximum entropy principle of information theory guides the construction of updated data sets via entropic matching, optimally representing these field configurations at the later time. The field dynamics thereby become represented by a finite set of evolution equations for the data that can be solved numerically. The subgrid dynamics is thereby treated within auxiliary analytic considerations. The resulting scheme acts solely on the data space. It should provide a more accurate description of the physical field dynamics than simulation schemes constructed ad hoc, due to the more rigorous accounting of subgrid physics and the space discretization process. Assimilation of measurement data into an IFD simulation is conceptually straightforward since measurement and simulation data can just be merged. The IFD approach is illustrated using the example of a coarsely discretized representation of a thermally excited classical Klein-Gordon field. This should pave the way towards the construction of schemes for more complex systems like turbulent hydrodynamics.

  18. Information field dynamics for simulation scheme construction.

    PubMed

    Ensslin, Torsten A

    2013-01-01

    Information field dynamics (IFD) is introduced here as a framework to derive numerical schemes for the simulation of physical and other fields without assuming a particular subgrid structure as many schemes do. IFD constructs an ensemble of nonparametric subgrid field configurations from the combination of the data in computer memory, representing constraints on possible field configurations, and prior assumptions on the subgrid field statistics. Each of these field configurations can formally be evolved to a later moment since any differential operator of the dynamics can act on fields living in continuous space. However, these virtually evolved fields need again a representation by data in computer memory. The maximum entropy principle of information theory guides the construction of updated data sets via entropic matching, optimally representing these field configurations at the later time. The field dynamics thereby become represented by a finite set of evolution equations for the data that can be solved numerically. The subgrid dynamics is thereby treated within auxiliary analytic considerations. The resulting scheme acts solely on the data space. It should provide a more accurate description of the physical field dynamics than simulation schemes constructed ad hoc, due to the more rigorous accounting of subgrid physics and the space discretization process. Assimilation of measurement data into an IFD simulation is conceptually straightforward since measurement and simulation data can just be merged. The IFD approach is illustrated using the example of a coarsely discretized representation of a thermally excited classical Klein-Gordon field. This should pave the way towards the construction of schemes for more complex systems like turbulent hydrodynamics.

  19. Electricity storage using a thermal storage scheme

    NASA Astrophysics Data System (ADS)

    White, Alexander

    2015-01-01

    The increasing use of renewable energy technologies for electricity generation, many of which have an unpredictably intermittent nature, will inevitably lead to a greater demand for large-scale electricity storage schemes. For example, the expanding fraction of electricity produced by wind turbines will require either backup or storage capacity to cover extended periods of wind lull. This paper describes a recently proposed storage scheme, referred to here as Pumped Thermal Storage (PTS), and which is based on "sensible heat" storage in large thermal reservoirs. During the charging phase, the system effectively operates as a high temperature-ratio heat pump, extracting heat from a cold reservoir and delivering heat to a hot one. In the discharge phase the processes are reversed and it operates as a heat engine. The round-trip efficiency is limited only by process irreversibilities (as opposed to Second Law limitations on the coefficient of performance and the thermal efficiency of the heat pump and heat engine respectively). PTS is currently being developed in both France and England. In both cases, the schemes operate on the Joule-Brayton (gas turbine) cycle, using argon as the working fluid. However, the French scheme proposes the use of turbomachinery for compression and expansion, whereas for that being developed in England reciprocating devices are proposed. The current paper focuses on the impact of the various process irreversibilities on the thermodynamic round-trip efficiency of the scheme. Consideration is given to compression and expansion losses and pressure losses (in pipe-work, valves and thermal reservoirs); heat transfer related irreversibility in the thermal reservoirs is discussed but not included in the analysis. Results are presented demonstrating how the various loss parameters and operating conditions influence the overall performance.

  20. Scheme for Quantum Computing Immune to Decoherence

    NASA Technical Reports Server (NTRS)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report

  1. How might a statistical cloud scheme be coupled to a mass-flux convection scheme?

    SciTech Connect

    Klein, Stephen A.; Pincus, Robert; Hannay, Cecile; Xu, Kuan-man

    2004-09-27

    The coupling of statistical cloud schemes with mass-flux convection schemes is addressed. Source terms representing the impact of convection are derived within the framework of prognostic equations for the width and asymmetry of the probability distribution function of total water mixing ratio. The accuracy of these source terms is quantified by examining output from a cloud resolving model simulation of deep convection. Practical suggestions for inclusion of these source terms in large-scale models are offered.

  2. An authentication scheme for secure access to healthcare services.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  3. An authentication scheme for secure access to healthcare services.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS. PMID:23828650

  4. Multiple Access Schemes for Lunar Missions

    NASA Technical Reports Server (NTRS)

    Deutsch, Leslie; Hamkins, Jon; Stocklin, Frank J.

    2010-01-01

    Two years ago, the NASA Coding, Modulation, and Link Protocol (CMLP) study was completed. The study, led by the authors of this paper, recommended codes, modulation schemes, and desired attributes of link protocols for all space communication links in NASA's future space architecture. Portions of the NASA CMLP team were reassembled to resolve one open issue: the use of multiple access (MA) communication from the lunar surface. The CMLP-MA team analyzed and simulated two candidate multiple access schemes that were identified in the original CMLP study: Code Division MA (CDMA) and Frequency Division MA (FDMA) based on a bandwidth-efficient Continuous Phase Modulation (CPM) with a superimposed Pseudo-Noise (PN) ranging signal (CPM/PN). This paper summarizes the results of the analysis and simulation of the CMLP-MA study and describes the final recommendations.

  5. New communication schemes based on adaptive synchronization

    NASA Astrophysics Data System (ADS)

    Yu, Wenwu; Cao, Jinde; Wong, Kwok-Wo; Lü, Jinhu

    2007-09-01

    In this paper, adaptive synchronization with unknown parameters is discussed for a unified chaotic system by using the Lyapunov method and the adaptive control approach. Some communication schemes, including chaotic masking, chaotic modulation, and chaotic shift key strategies, are then proposed based on the modified adaptive method. The transmitted signal is masked by chaotic signal or modulated into the system, which effectively blurs the constructed return map and can resist this return map attack. The driving system with unknown parameters and functions is almost completely unknown to the attackers, so it is more secure to apply this method into the communication. Finally, some simulation examples based on the proposed communication schemes and some cryptanalysis works are also given to verify the theoretical analysis in this paper.

  6. Signal Processing Schemes for Doppler Global Velocimetry

    NASA Technical Reports Server (NTRS)

    Meyers, James F.; Lee, Joseph W.; Cavone, Angelo A.

    1991-01-01

    Two schemes for processing signals obtained from the Doppler global velocimeter are described. The analog approach is a simple, real time method for obtaining an RS-170 video signal containing the normalized intensity image. Pseudo colors are added using a monochromatic frame grabber producing a standard NTSC video signal that can be monitored and/or recorded. The digital approach is more complicated, but maintains the full resolution of the acquisition cameras with the capabilities to correct the signal image for pixel sensitivity variations and to remove of background light. Prototype circuits for each scheme are described and example results from the investigation of the vortical flow field above a 75-degree delta wing presented.

  7. A certification scheme for the boson sampler

    NASA Astrophysics Data System (ADS)

    Liu, Kai; Lund, Austin Peter; Gu, Yong-Jian; Ralph, Timothy Cameron

    2016-09-01

    Boson sampling can provide strong evidence that the computational power of a quantum computer outperforms a classical one via currently feasible linear optics experiments. However, how to identify an actual boson sampling device against any classical computing imposters is an ambiguous problem due to the computational complexity class in which boson sampling lies. The certification protocol based on bosonic bunching fails to rule out the so-called mean-field sampling. We propose a certification scheme to distinguish the boson sampling from the mean-field sampling for any random scattering matrices chosen via the Harr-measure. We numerically analyze our scheme and the influence of imperfect input states caused by non-simultaneous arrival photons.

  8. Trefftz difference schemes on irregular stencils

    SciTech Connect

    Tsukerman, Igor

    2010-04-20

    The recently developed Flexible Local Approximation MEthod (FLAME) produces accurate difference schemes by replacing the usual Taylor expansion with Trefftz functions - local solutions of the underlying differential equation. This paper advances and casts in a general form a significant modification of FLAME proposed recently by Pinheiro and Webb: a least-squares fit instead of the exact match of the approximate solution at the stencil nodes. As a consequence of that, FLAME schemes can now be generated on irregular stencils with the number of nodes substantially greater than the number of approximating functions. The accuracy of the method is preserved but its robustness is improved. For demonstration, the paper presents a number of numerical examples in 2D and 3D: electrostatic (magnetostatic) particle interactions, scattering of electromagnetic (acoustic) waves, and wave propagation in a photonic crystal. The examples explore the role of the grid and stencil size, of the number of approximating functions, and of the irregularity of the stencils.

  9. The Linear Bicharacteristic Scheme for Electromagnetics

    NASA Technical Reports Server (NTRS)

    Beggs, John H.

    2001-01-01

    The upwind leapfrog or Linear Bicharacteristic Scheme (LBS) has previously been implemented and demonstrated on electromagnetic wave propagation problems. This paper extends the Linear Bicharacteristic Scheme for computational electromagnetics to model lossy dielectric and magnetic materials and perfect electrical conductors. This is accomplished by proper implementation of the LBS for homogeneous lossy dielectric and magnetic media and for perfect electrical conductors. Heterogeneous media are modeled through implementation of surface boundary conditions and no special extrapolations or interpolations at dielectric material boundaries are required. Results are presented for one-dimensional model problems on both uniform and nonuniform grids, and the FDTD algorithm is chosen as a convenient reference algorithm for comparison. The results demonstrate that the explicit LBS is a dissipation-free, second-order accurate algorithm which uses a smaller stencil than the FDTD algorithm, yet it has approximately one-third the phase velocity error. The LBS is also more accurate on nonuniform grids.

  10. An improved WENO-Z scheme

    NASA Astrophysics Data System (ADS)

    Acker, F.; B. de R. Borges, R.; Costa, B.

    2016-05-01

    In this article, we show that for a WENO scheme to improve the numerical resolution of smooth waves, increasing to some extent the contribution of the substencils where the solution is less smooth is much more important than improving the accuracy at critical points. WENO-Z, for instance, achieved less dissipative results than classical WENO through the use of a high-order global smoothness measurement, τ, which increased the weights of less-smooth substencils. This time, we present a way of further increasing the relevance of less-smooth substencils by adding a new term to the WENO-Z weights that uses information which is already available in its formula. The improved scheme attains much better resolution at the smooth parts of the solution, while keeping the same numerical stability of the original WENO-Z at shocks and discontinuities.

  11. The Scheme of Beam Synchronization in MEIC

    SciTech Connect

    Zhang, Yuhong; Derbenev, Yaroslav S.; Hutton, Andrew M.

    2013-06-01

    Synchronizing colliding beams at single or multiple collision points is a critical R&D issue in the design of a medium energy electron-ion collider (MEIC) at Jefferson Lab. The path-length variation due to changes in the ion energy, which varies over 20 to 100 GeV, could be more than several times the bunch spacing. The scheme adopted in the present MEIC baseline is centered on varying the number of bunches (i.e., harmonic number) stored in the collider ring. This could provide a set of discrete energies for proton or ions such that the beam synchronization condition is satisfied. To cover the ion energy between these synchronized values, we further propose to vary simultaneously the electron ring circumference and the frequency of the RF systems in both collider rings. We also present in this paper the requirement of frequency tunability of SRF cavities to support the scheme.

  12. Improving the accuracy of central difference schemes

    NASA Technical Reports Server (NTRS)

    Turkel, Eli

    1988-01-01

    General difference approximations to the fluid dynamic equations require an artificial viscosity in order to converge to a steady state. This artificial viscosity serves two purposes. One is to suppress high frequency noise which is not damped by the central differences. The second purpose is to introduce an entropy-like condition so that shocks can be captured. These viscosities need a coefficient to measure the amount of viscosity to be added. In the standard scheme, a scalar coefficient is used based on the spectral radius of the Jacobian of the convective flux. However, this can add too much viscosity to the slower waves. Hence, it is suggested that a matrix viscosity be used. This gives an appropriate viscosity for each wave component. With this matrix valued coefficient, the central difference scheme becomes closer to upwind biased methods.

  13. Local discrimination scheme for some unitary operations

    NASA Astrophysics Data System (ADS)

    Cao, TianQing; Gao, Fei; Tian, GuoJing; Xie, ShuCui; Wen, QiaoYan

    2016-09-01

    It has been shown that for two different multipartite unitary operations U 1 and U 2, when tr( U 1 † U 2) = 0, they can always be perfectly distinguished by local operations and classical communication in the single-run scenario. However, how to find the detailed scheme to complete the local discrimination is still a fascinating problem. In this paper, aiming at some U 1 and U 2 acting on the bipartite and tripartite space respectively, especially for U 1 † U 2 locally unitary equivalent to the high dimensional X-type hermitian unitary matrix V with tr V = 0, we put forward the explicit local distinguishing schemes in the single-run scenario.

  14. Iterated upwind schemes for gas dynamics

    SciTech Connect

    Smolarkiewicz, Piotr K. Szmelter, Joanna

    2009-01-10

    A class of high-resolution schemes established in integration of anelastic equations is extended to fully compressible flows, and documented for unsteady (and steady) problems through a span of Mach numbers from zero to supersonic. The schemes stem from iterated upwind technology of the multidimensional positive definite advection transport algorithm (MPDATA). The derived algorithms employ standard and modified forms of the equations of gas dynamics for conservation of mass, momentum and either total or internal energy as well as potential temperature. Numerical examples from elementary wave propagation, through computational aerodynamics benchmarks, to atmospheric small- and large-amplitude acoustics with intricate wave-flow interactions verify the approach for both structured and unstructured meshes, and demonstrate its flexibility and robustness.

  15. Evolutionary Algorithm for Optimal Vaccination Scheme

    NASA Astrophysics Data System (ADS)

    Parousis-Orthodoxou, K. J.; Vlachos, D. S.

    2014-03-01

    The following work uses the dynamic capabilities of an evolutionary algorithm in order to obtain an optimal immunization strategy in a user specified network. The produced algorithm uses a basic genetic algorithm with crossover and mutation techniques, in order to locate certain nodes in the inputted network. These nodes will be immunized in an SIR epidemic spreading process, and the performance of each immunization scheme, will be evaluated by the level of containment that provides for the spreading of the disease.

  16. The Emergent Universe scheme and tunneling

    SciTech Connect

    Labraña, Pedro

    2014-07-23

    We present an alternative scheme for an Emergent Universe scenario, developed previously in Phys. Rev. D 86, 083524 (2012), where the universe is initially in a static state supported by a scalar field located in a false vacuum. The universe begins to evolve when, by quantum tunneling, the scalar field decays into a state of true vacuum. The Emergent Universe models are interesting since they provide specific examples of non-singular inflationary universes.

  17. Automatic-repeat-request error control schemes

    NASA Technical Reports Server (NTRS)

    Lin, S.; Costello, D. J., Jr.; Miller, M. J.

    1983-01-01

    Error detection incorporated with automatic-repeat-request (ARQ) is widely used for error control in data communication systems. This method of error control is simple and provides high system reliability. If a properly chosen code is used for error detection, virtually error-free data transmission can be attained. Various types of ARQ and hybrid ARQ schemes, and error detection using linear block codes are surveyed.

  18. Cryptanalysis of Quantum Blind Signature Scheme

    NASA Astrophysics Data System (ADS)

    Zuo, Huijuan

    2013-01-01

    In this paper, we study the cryptanalysis of two quantum blind signature schemes and one quantum proxy blind signature protocol. We show that in these protocols the verifier can forge the signature under known message attack. The attack strategies are described in detail respectively. This kind of problem deserves more research attention in the following related study. We further point out that the arbitrator should be involved in the procedure of any dispute and some discussions of these protocols are given.

  19. A weak blind signature scheme based on quantum cryptography

    NASA Astrophysics Data System (ADS)

    Wen, Xiaojun; Niu, Xiamu; Ji, Liping; Tian, Yuan

    2009-02-01

    In this paper, we present a weak blind signature scheme based on the correlation of EPR (Einstein-Padolsky-Rosen) pairs. Different from classical blind signature schemes and current quantum signature schemes, our quantum blind signature scheme could guarantee not only the unconditionally security but also the anonymity of the message owner. To achieve that, quantum key distribution and one-time pad are adopted in our scheme. Experimental analysis proved that our scheme have the characteristics of non-counterfeit, non-disavowal, blindness and traceability. It has a wide application to E-payment system, E-government, E-business, and etc.

  20. An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments

    NASA Astrophysics Data System (ADS)

    Jeon, Woongryul; Kim, Jeeyeon; Nam, Junghyun; Lee, Youngsook; Won, Dongho

    As anonymity increasingly becomes a necessary and legitimate aim in many applications, a number of anonymous authentication schemes have been suggested over the years. Among the many schemes is Lee and Kwon's password-based authentication scheme for wireless environments. Compared with previous schemes, Lee and Kwon's scheme not only improves anonymity by employing random temporary IDs but also provides user-friendliness by allowing human-memorable passwords. In this letter, we point out that Lee and Kwon's scheme, despite its many merits, is vulnerable to off-line password guessing attacks and a forgery attack. In addition, we show how to eliminate these vulnerabilities.

  1. Computing with high-resolution upwind schemes for hyperbolic equations

    NASA Technical Reports Server (NTRS)

    Chakravarthy, S. R.; Osher, S.

    1985-01-01

    Computational aspects of modern high-resolution upwind finite-difference schemes for hyperbolic systems of conservation laws are examined. An operational unification is demonstrated for constructing a wide class of flux-difference-split and flux-split schemes based on the design principles underlying total variation diminishing (TVD) schemes. Consideration is also given to TVD scheme design by preprocessing, the extension of preprocessing and postprocessing approaches to general control volumes, the removal of expansion shocks and 'glitches', relaxation methods for implicit TVD schemes, and a new family of high-accuracy TVD schemes.

  2. Uncertainty of Microphysics Schemes in CRMs

    NASA Astrophysics Data System (ADS)

    Tao, W. K.; van den Heever, S. C.; Wu, D.; Saleeby, S. M.; Lang, S. E.

    2015-12-01

    Microphysics is the framework through which to understand the links between interactive aerosol, cloud and precipitation processes. These processes play a critical role in the water and energy cycle. CRMs with advanced microphysics schemes have been used to study the interaction between aerosol, cloud and precipitation processes at high resolution. But, there are still many uncertainties associated with these microphysics schemes. This has arisen, in part, from the fact microphysical processes cannot be measured directly; instead, cloud properties, which can be measured, are and have been used to validate model results. The utilization of current and future global high-resolution models is rapidly increasing and are at what has been traditional CRM resolutions and are using microphysics schemes that were developed in traditional CRMs. A potential NASA satellite mission called the Cloud and Precipitation Processes Mission (CaPPM) is currently being planned for submission to the NASA Earth Science Decadal Survey. This mission could provide the necessary global estimates of cloud and precipitation properties with which to evaluate and improve dynamical and microphysical parameterizations and the feedbacks. In order to facilitate the development of this mission, CRM simulations have been conducted to identify microphysical processes responsible for the greatest uncertainties in CRMs. In this talk, we will present results from numerical simulations conducted using two CRMs (NU-WRF and RAMS) with different dynamics, radiation, land surface and microphysics schemes. Specifically, we will conduct sensitivity tests to examine the uncertainty of the some of the key ice processes (i.e. riming, melting, freezing and shedding) in these two-microphysics schemes. The idea is to quantify how these two different models' respond (surface rainfall and its intensity, strength of cloud drafts, LWP/IWP, convective-stratiform-anvil area distribution) to changes of these key ice

  3. Multidimensional explicit difference schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Vanleer, B.

    1983-01-01

    First and second order explicit difference schemes are derived for a three dimensional hyperbolic system of conservation laws, without recourse to dimensional factorization. All schemes are upwind (backward) biased and optimally stable.

  4. Minimal dissipation hybrid bicompact schemes for hyperbolic equations

    NASA Astrophysics Data System (ADS)

    Bragin, M. D.; Rogov, B. V.

    2016-06-01

    New monotonicity-preserving hybrid schemes are proposed for multidimensional hyperbolic equations. They are convex combinations of high-order accurate central bicompact schemes and upwind schemes of first-order accuracy in time and space. The weighting coefficients in these combinations depend on the local difference between the solutions produced by the high- and low-order accurate schemes at the current space-time point. The bicompact schemes are third-order accurate in time, while having the fourth order of accuracy and the first difference order in space. At every time level, they can be solved by marching in each spatial variable without using spatial splitting. The upwind schemes have minimal dissipation among all monotone schemes constructed on a minimum space-time stencil. The hybrid schemes constructed has been successfully tested as applied to a number of two-dimensional gas dynamics benchmark problems.

  5. Multidimensional explicit difference schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Van Leer, B.

    1984-01-01

    First- and second-order explicit difference schemes are derived for a three-dimensional hyperbolic system of conservation laws, without recourse to dimensional factorization. All schemes are upwind biased and optimally stable.

  6. Connection Between the Lattice Boltzmann Equation and the Beam Scheme

    NASA Technical Reports Server (NTRS)

    Xu, Kun; Luo, Li-Shi

    1999-01-01

    In this paper we analyze and compare the lattice Boltzmann equation with the beam scheme in details. We notice the similarity and differences between the lattice Boltzmann equation and the beam scheme. We show that the accuracy of the lattice Boltzmann equation is indeed second order in space. We discuss the advantages and limitations of lattice Boltzmann equation and the beam scheme. Based on our analysis, we propose an improved multi-dimensional beam scheme.

  7. The Pharmaceutical Benefits Scheme 2003–2004

    PubMed Central

    Harvey, Ken J

    2005-01-01

    The Pharmaceutical Benefits Scheme (PBS) grew by 8% in 2003–04; a slower rate than the 12.0% pa average growth over the last decade. Nevertheless, the sustainability of the Scheme remained an ongoing concern given an aging population and the continued introduction of useful (but increasingly expensive) new medicines. There was also concern that the Australia-United States Free Trade Agreement could place further pressure on the Scheme. In 2003, as in 2002, the government proposed a 27% increase in PBS patient co-payments and safety-net thresholds in order to transfer more of the cost of the PBS from the government to consumers. While this measure was initially blocked by the Senate, the forthcoming election resulted in the Labor Party eventually supporting this policy. Recommendations of the Pharmaceutical Benefits Advisory Committee to list, not list or defer a decision to list a medicine on the PBS were made publicly available for the first time and the full cost of PBS medicines appeared on medicine labels if the price was greater than the co-payment. Pharmaceutical reform in Victorian public hospitals designed to minimise PBS cost-shifting was evaluated and extended to other States and Territories. Programs promoting the quality use of medicines were further developed coordinated by the National Prescribing Service, Australian Divisions of General Practice and the Pharmacy Guild of Australia. The extensive uptake of computerised prescribing software by GPs produced benefits but also problems. The latter included pharmaceutical promotion occurring at the time of prescribing, failure to incorporate key sources of objective therapeutic information in the software and gross variation in the ability of various programs to detect important drug-drug interactions. These issues remain to be tackled. PMID:15679896

  8. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under...

  9. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under...

  10. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under...

  11. Dispersion-relation-preserving schemes for computational aeroacoustics

    NASA Technical Reports Server (NTRS)

    Tam, Christopher K. W.; Webb, Jay C.

    1992-01-01

    Finite difference schemes that have the same dispersion relations as the original partial differential equations are referred to as dispersion-relation-preserving (DRP) schemes. A method to construct time marching DRP schemes by optimizing the finite difference approximations of the space and time derivatives in the wave number and frequency space is presented. A sequence of numerical simulations is then performed.

  12. Developing and Rewarding Excellent Teachers: The Scottish Chartered Teacher Scheme

    ERIC Educational Resources Information Center

    Ingvarson, Lawrence

    2009-01-01

    The Scottish Chartered Teacher Scheme was designed to recognise and reward teachers who attained high standards of practice. The scheme emerged in 2001 as part of an agreement between government, local employing authorities and teacher organisations. Policies such as the chartered teacher scheme aim to benefit students in two main ways: by…

  13. 7 CFR 760.819 - Misrepresentation, scheme, or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation, scheme, or device. 760.819 Section....819 Misrepresentation, scheme, or device. (a) A person is ineligible to receive assistance under this part if it is determined that such person has: (1) Adopted any scheme or device that tends to...

  14. 7 CFR 1491.32 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1491.32 Section 1491.32 Agriculture... Administration § 1491.32 Scheme or device. (a) If it is determined by the NRCS that a cooperating entity has employed a scheme or device to defeat the purposes of this part, any part of any program payment...

  15. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device. (a) If it is determined by USDA that a participant has employed a scheme or device to defeat the...

  16. 7 CFR 795.17 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Scheme or device. 795.17 Section 795.17 Agriculture... PROVISIONS COMMON TO MORE THAN ONE PROGRAM PAYMENT LIMITATION General § 795.17 Scheme or device. All or any... person adopts or participates in adopting any scheme or device designed to evade or which has the...

  17. 7 CFR 1467.19 - Scheme and device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme and device. 1467.19 Section 1467.19... device. (a) If it is determined by the NRCS that a participant has employed a scheme or device to defeat... determined appropriate by NRCS. (b) A scheme or device includes, but is not limited to, coercion,...

  18. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under...

  19. 30 CFR 75.800-2 - Approved circuit schemes.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Approved circuit schemes. 75.800-2 Section 75... § 75.800-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuits required by § 75.800: (a) Ground check relays may be used...

  20. 30 CFR 75.800-2 - Approved circuit schemes.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Approved circuit schemes. 75.800-2 Section 75... § 75.800-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuits required by § 75.800: (a) Ground check relays may be used...

  1. 30 CFR 75.900-2 - Approved circuit schemes.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Approved circuit schemes. 75.900-2 Section 75... Alternating Current Circuits § 75.900-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuit required by § 75.900: (a) Ground check...

  2. 30 CFR 75.900-2 - Approved circuit schemes.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Approved circuit schemes. 75.900-2 Section 75... Alternating Current Circuits § 75.900-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuit required by § 75.900: (a) Ground check...

  3. 30 CFR 75.900-2 - Approved circuit schemes.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 1 2013-07-01 2013-07-01 false Approved circuit schemes. 75.900-2 Section 75... Alternating Current Circuits § 75.900-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuit required by § 75.900: (a) Ground check...

  4. 30 CFR 75.800-2 - Approved circuit schemes.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Approved circuit schemes. 75.800-2 Section 75... § 75.800-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuits required by § 75.800: (a) Ground check relays may be used...

  5. 30 CFR 75.900-2 - Approved circuit schemes.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Approved circuit schemes. 75.900-2 Section 75... Alternating Current Circuits § 75.900-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuit required by § 75.900: (a) Ground check...

  6. Recent developments in shock-capturing schemes

    NASA Technical Reports Server (NTRS)

    Harten, Ami

    1991-01-01

    The development of the shock capturing methodology is reviewed, paying special attention to the increasing nonlinearity in its design and its relation to interpolation. It is well-known that higher-order approximations to a discontinuous function generate spurious oscillations near the discontinuity (Gibbs phenomenon). Unlike standard finite-difference methods which use a fixed stencil, modern shock capturing schemes use an adaptive stencil which is selected according to the local smoothness of the solution. Near discontinuities this technique automatically switches to one-sided approximations, thus avoiding the use of discontinuous data which brings about spurious oscillations.

  7. Secure Biometric E-Voting Scheme

    NASA Astrophysics Data System (ADS)

    Ahmed, Taha Kh.; Aborizka, Mohamed

    The implementation of the e-voting becomes more substantial with the rapid increase of e-government development. The recent growth in communications and cryptographic techniques facilitate the implementation of e-voting. Many countries introduced e-voting systems; unfortunately most of these systems are not fully functional. In this paper we will present an e-voting scheme that covers most of the e-voting requirements, smart card and biometric recognition technology were implemented to guarantee voter's privacy and authentication.

  8. Numerical Schemes for Rough Parabolic Equations

    SciTech Connect

    Deya, Aurelien

    2012-04-15

    This paper is devoted to the study of numerical approximation schemes for a class of parabolic equations on (0,1) perturbed by a non-linear rough signal. It is the continuation of Deya (Electron. J. Probab. 16:1489-1518, 2011) and Deya et al. (Probab. Theory Relat. Fields, to appear), where the existence and uniqueness of a solution has been established. The approach combines rough paths methods with standard considerations on discretizing stochastic PDEs. The results apply to a geometric 2-rough path, which covers the case of the multidimensional fractional Brownian motion with Hurst index H>1/3.

  9. Level-scheme investigation of 33S

    NASA Astrophysics Data System (ADS)

    Gavrilov, G. Tz; Goutev, N.; Dimitrov, B. I.; Tonev, D.; Petkov, P.; de Angelis, G.; Recchia, F.; Farnea, E.; Ur, C. A.; Aydin, S.; Bizzeti, P. G.; Bizzeti-Sona, A. M.; Deloncle, I.; Gottardo, A.; Laftchiev, H.; Lunardi, S.; Mengoni, D.; Michelangoli, C.; Napoli, D. R.; Orlandi, R.; Sahin, E.; Stefanova, E. A.; Valente-Dobon, J. J.; Marinov, Tz K.; Yavahchova, M. S.

    2014-09-01

    An angular correlation experiment was carried out for 33 S at Laboratori Nazionali di Legnaro with the gamma-ray detector array GASP. The reaction used was 24Mg(14N,α p)33S at a beam energy of 40MeV. An analysis of DCO ratios and triple gamma coincidences was performed. So far, a new level depopulated by 3 γ -ray transitions has been found and its spin was determined. The work for further extension of the level scheme is in progress.

  10. A numerical scheme for ionizing shock waves

    SciTech Connect

    Aslan, Necdet . E-mail: naslan@yeditepe.edu.tr; Mond, Michael

    2005-12-10

    A two-dimensional (2D) visual computer code to solve the steady state (SS) or transient shock problems including partially ionizing plasma is presented. Since the flows considered are hypersonic and the resulting temperatures are high, the plasma is partially ionized. Hence the plasma constituents are electrons, ions and neutral atoms. It is assumed that all the above species are in thermal equilibrium, namely, that they all have the same temperature. The ionization degree is calculated from Saha equation as a function of electron density and pressure by means of a nonlinear Newton type root finding algorithms. The code utilizes a wave model and numerical fluctuation distribution (FD) scheme that runs on structured or unstructured triangular meshes. This scheme is based on evaluating the mesh averaged fluctuations arising from a number of waves and distributing them to the nodes of these meshes in an upwind manner. The physical properties (directions, strengths, etc.) of these wave patterns are obtained by a new wave model: ION-A developed from the eigen-system of the flux Jacobian matrices. Since the equation of state (EOS) which is used to close up the conservation laws includes electronic effects, it is a nonlinear function and it must be inverted by iterations to determine the ionization degree as a function of density and temperature. For the time advancement, the scheme utilizes a multi-stage Runge-Kutta (RK) algorithm with time steps carefully evaluated from the maximum possible propagation speed in the solution domain. The code runs interactively with the user and allows to create different meshes to use different initial and boundary conditions and to see changes of desired physical quantities in the form of color and vector graphics. The details of the visual properties of the code has been published before (see [N. Aslan, A visual fluctuation splitting scheme for magneto-hydrodynamics with a new sonic fix and Euler limit, J. Comput. Phys. 197 (2004) 1

  11. A Classification Scheme for Glaciological AVA Responses

    NASA Astrophysics Data System (ADS)

    Booth, A.; Emir, E.

    2014-12-01

    A classification scheme is proposed for amplitude vs. angle (AVA) responses as an aid to the interpretation of seismic reflectivity in glaciological research campaigns. AVA responses are a powerful tool in characterising the material properties of glacier ice and its substrate. However, before interpreting AVA data, careful true amplitude processing is required to constrain basal reflectivity and compensate amplitude decay mechanisms, including anelastic attenuation and spherical divergence. These fundamental processing steps can be difficult to design in cases of noisy data, e.g. where a target reflection is contaminated by surface wave energy (in the case of shallow glaciers) or by energy reflected from out of the survey plane. AVA methods have equally powerful usage in estimating the fluid fill of potential hydrocarbon reservoirs. However, such applications seldom use true amplitude data and instead consider qualitative AVA responses using a well-defined classification scheme. Such schemes are often defined in terms of the characteristics of best-fit responses to the observed reflectivity, e.g. the intercept (I) and gradient (G) of a linear approximation to the AVA data. The position of the response on a cross-plot of I and G then offers a diagnostic attribute for certain fluid types. We investigate the advantages in glaciology of emulating this practice, and develop a cross-plot based on the 3-term Shuey AVA approximation (using I, G, and a curvature term C). Model AVA curves define a clear lithification trend: AVA responses to stiff (lithified) substrates fall discretely into one quadrant of the cross-plot, with positive I and negative G, whereas those to fluid-rich substrates plot diagonally opposite (in the negative I and positive G quadrant). The remaining quadrants are unoccupied by plausible single-layer responses and may therefore be diagnostic of complex thin-layer reflectivity, and the magnitude and polarity of the C term serves as a further indicator

  12. Investigation of a monochromator scheme for SPEAR

    SciTech Connect

    Wille, K.; Chao, A.W.

    1984-08-01

    The possibility of mono-chromatizing SPEAR for the purpose of increasing the hadronic event rate at the narrow resonances was investigated. By using two pairs of electostatic skew quads in monochromator scheme it is found that the event rate can be increased by a factor of 2 for the mini beta optics assuming the luminosity is kept unchanged. An attempt to increase this enhancement factor by major rearrangements of the ring magnets has encountered serious optical difficulties; although enhancement factor of 8 seems possible in principle, this alternative is not recommended.

  13. Rabi resonances in the {lambda} excitation scheme

    SciTech Connect

    Godone, Aldo; Micalizio, Salvatore; Levi, Filippo

    2002-12-01

    We consider the interaction of a three-level system with phase-modulated resonant fields in the {lambda} excitation scheme. We treat theoretically the case of a sinusoidal phase modulation, a phase step perturbation, and a stochastic phase modulation. The appearance of a Rabi resonance both in the spectrum of the optical transmitted signal (electromagnetically induced transparency) and in the spectrum of the microwave emission (coherent population trapping maser) is considered in detail. All the theoretical results are compared with the analogous ones reported for the two-level system and with our experimental observations obtained for the case of rubidium in a buffer gas.

  14. LHC INTERACTION REGION CORRECTION SCHEME STUDIES

    SciTech Connect

    FISCHER,W.; PTITSIN,V.; WEI,J.

    1999-09-07

    In a companion paper the authors showed that the performance of the Large Hadron Collider (LHC) at collision energy is limited by the field quality of the interaction region quadrupoles and dipoles. In this situation, the dynamic aperture can be increased through local multipole correctors. Since the betatron phase advance is well defined for magnets that are located in regions of large beta functions, local corrections can be very effective and robust. They compare possible compensation schemes and propose a corrector layout to meet the required dynamic aperture performance.

  15. Finite-difference schemes for anisotropic diffusion

    SciTech Connect

    Es, Bram van; Koren, Barry; Blank, Hugo J. de

    2014-09-01

    In fusion plasmas diffusion tensors are extremely anisotropic due to the high temperature and large magnetic field strength. This causes diffusion, heat conduction, and viscous momentum loss, to effectively be aligned with the magnetic field lines. This alignment leads to different values for the respective diffusive coefficients in the magnetic field direction and in the perpendicular direction, to the extent that heat diffusion coefficients can be up to 10{sup 12} times larger in the parallel direction than in the perpendicular direction. This anisotropy puts stringent requirements on the numerical methods used to approximate the MHD-equations since any misalignment of the grid may cause the perpendicular diffusion to be polluted by the numerical error in approximating the parallel diffusion. Currently the common approach is to apply magnetic field-aligned coordinates, an approach that automatically takes care of the directionality of the diffusive coefficients. This approach runs into problems at x-points and at points where there is magnetic re-connection, since this causes local non-alignment. It is therefore useful to consider numerical schemes that are tolerant to the misalignment of the grid with the magnetic field lines, both to improve existing methods and to help open the possibility of applying regular non-aligned grids. To investigate this, in this paper several discretization schemes are developed and applied to the anisotropic heat diffusion equation on a non-aligned grid.

  16. Special Semaphore Scheme for UHF Spacecraft Communications

    NASA Technical Reports Server (NTRS)

    Butman, Stanley; Satorius, Edgar; Ilott, Peter

    2006-01-01

    A semaphore scheme has been devised to satisfy a requirement to enable ultrahigh- frequency (UHF) radio communication between a spacecraft descending from orbit to a landing on Mars and a spacecraft, in orbit about Mars, that relays communications between Earth and the lander spacecraft. There are also two subsidiary requirements: (1) to use UHF transceivers, built and qualified for operation aboard the spacecraft that operate with residual-carrier binary phase-shift-keying (BPSK) modulation at a selectable data rate of 8, 32, 128, or 256 kb/s; and (2) to enable low-rate signaling even when received signals become so weak as to prevent communication at the minimum BPSK rate of 8 kHz. The scheme involves exploitation of Manchester encoding, which is used in conjunction with residual-carrier modulation to aid the carrier-tracking loop. By choosing various sequences of 1s, 0s, or 1s alternating with 0s to be fed to the residual-carrier modulator, one would cause the modulator to generate sidebands at a fundamental frequency of 4 or 8 kHz and harmonics thereof. These sidebands would constitute the desired semaphores. In reception, the semaphores would be detected by a software demodulator.

  17. The Linear Bicharacteristic Scheme for Computational Electromagnetics

    NASA Technical Reports Server (NTRS)

    Beggs, John H.; Chan, Siew-Loong

    2000-01-01

    The upwind leapfrog or Linear Bicharacteristic Scheme (LBS) has previously been implemented and demonstrated on electromagnetic wave propagation problems. This paper extends the Linear Bicharacteristic Scheme for computational electromagnetics to treat lossy dielectric and magnetic materials and perfect electrical conductors. This is accomplished by proper implementation of the LBS for homogeneous lossy dielectric and magnetic media, and treatment of perfect electrical conductors (PECs) are shown to follow directly in the limit of high conductivity. Heterogeneous media are treated through implementation of surface boundary conditions and no special extrapolations or interpolations at dielectric material boundaries are required. Results are presented for one-dimensional model problems on both uniform and nonuniform grids, and the FDTD algorithm is chosen as a convenient reference algorithm for comparison. The results demonstrate that the explicit LBS is a dissipation-free, second-order accurate algorithm which uses a smaller stencil than the FDTD algorithm, yet it has approximately one-third the phase velocity error. The LBS is also more accurate on nonuniform grids.

  18. Gaussian translation operator in a multilevel scheme

    NASA Astrophysics Data System (ADS)

    Hansen, Thorkild B.; Borries, Oscar

    2015-08-01

    A multilevel computation scheme for time-harmonic fields in three dimensions will be formulated with a new Gaussian translation operator that decays exponentially outside a circular cone centered on the line connecting the source and observation groups. This Gaussian translation operator is directional and diagonal with its sharpness determined by a beam parameter. When the beam parameter is set to zero, the Gaussian translation operator reduces to the standard fast multipole method translation operator. The directionality of the Gaussian translation operator makes it possible to reduce the number of plane waves required to achieve a given accuracy. The sampling rate can be determined straightforwardly to achieve any desired accuracy. The use of the computation scheme will be illustrated through a near-field scanning problem where the far-field pattern of a source is determined from near-field measurements with a known probe. Here the Gaussian translation operator improves the condition number of the matrix equation that determines the far-field pattern. The Gaussian translation operator can also be used when the probe pattern is known only in one hemisphere, as is common in practice. Also, the Gaussian translation operator will be used to solve the scattering problem of the perfectly conducting sphere.

  19. Coupling Schemes in Terahertz Planar Metamaterials

    DOE PAGESBeta

    Roy Chowdhury, Dibakar; Singh, Ranjan; Taylor, Antoinette J.; Chen, Hou-Tong; Zhang, Weili; Azad, Abul K.

    2012-01-01

    We present a review of the different coupling schemes in a planar array of terahertz metamaterials. The gap-to-gap near-field capacitive coupling between split-ring resonators in a unit cell leads to either blue shift or red shift of the fundamental inductive-capacitive ( LC ) resonance, depending on the position of the split gap. The inductive coupling is enhanced by decreasing the inter resonator distance resulting in strong blue shifts of the LC resonance. We observe the LC resonance tuning only when the split-ring resonators are in close proximity of each other; otherwise, they appear to be uncoupled. Conversely, the higher-ordermore » resonances are sensitive to the smallest change in the inter particle distance or split-ring resonator orientation and undergo tremendous resonance line reshaping giving rise to a sharp subradiant resonance mode which produces hot spots useful for sensing applications. Most of the coupling schemes in a metamaterial are based on a near-field effect, though there also exists a mechanism to couple the resonators through the excitation of lowest-order lattice mode which facilitates the long-range radiative or diffractive coupling in the split-ring resonator plane leading to resonance line narrowing of the fundamental as well as the higher order resonance modes.« less

  20. Privacy protection schemes for fingerprint recognition systems

    NASA Astrophysics Data System (ADS)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  1. A closure scheme for chemical master equations.

    PubMed

    Smadbeck, Patrick; Kaznessis, Yiannis N

    2013-08-27

    Probability reigns in biology, with random molecular events dictating the fate of individual organisms, and propelling populations of species through evolution. In principle, the master probability equation provides the most complete model of probabilistic behavior in biomolecular networks. In practice, master equations describing complex reaction networks have remained unsolved for over 70 years. This practical challenge is a reason why master equations, for all their potential, have not inspired biological discovery. Herein, we present a closure scheme that solves the master probability equation of networks of chemical or biochemical reactions. We cast the master equation in terms of ordinary differential equations that describe the time evolution of probability distribution moments. We postulate that a finite number of moments capture all of the necessary information, and compute the probability distribution and higher-order moments by maximizing the information entropy of the system. An accurate order closure is selected, and the dynamic evolution of molecular populations is simulated. Comparison with kinetic Monte Carlo simulations, which merely sample the probability distribution, demonstrates this closure scheme is accurate for several small reaction networks. The importance of this result notwithstanding, a most striking finding is that the steady state of stochastic reaction networks can now be readily computed in a single-step calculation, without the need to simulate the evolution of the probability distribution in time.

  2. The "style scheme" grounds perception of paintings.

    PubMed

    Cela-Conde, Camilo J; Marty, Gisèle; Munar, Enric; Nadal, Marcos; Burges, Lucrecia

    2002-08-01

    We studied the formation of style scheme (identification of the style that characterizes an artist) presenting 100 participants aesthetic visual stimuli. Participants were Spanish university students who volunteered: 72 women, 28 men of mean age 22.8 yr. Among those 50 were enrolled in History of Art and 50 students in Psychology. Stimuli belonged to different categories--High Art (pictures of well-known artists, like Van Gogh)/Popular Art (decorative pictures like Christmas postcards) and Representational (pictures with explicit meaning content, like a landscape)/Abstract (pictures without explicit meaning content, like Pollock's colored stains). Analysis using Signal Detection Theory techniques focused on how participants discriminate representational and abstract pictures. With High Art stimuli, participants can better discriminate representational paintings than abstract ones. However, the difference in discrimination between representational and abstract pictures diminishes among participants studying History of Art. It seems that prior education in art favors forming style schemes and to some extent enables the participant to detect the "meaning" in High Art abstract paintings.

  3. A group signature scheme based on quantum teleportation

    NASA Astrophysics Data System (ADS)

    Wen, Xiaojun; Tian, Yuan; Ji, Liping; Niu, Xiamu

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  4. Quantum election scheme based on anonymous quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhou, Rui-Rui; Yang, Li

    2012-08-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible.

  5. Compact finite difference schemes with spectral-like resolution

    NASA Technical Reports Server (NTRS)

    Lele, Sanjiva K.

    1992-01-01

    The present finite-difference schemes for the evaluation of first-order, second-order, and higher-order derivatives yield improved representation of a range of scales and may be used on nonuniform meshes. Various boundary conditions may be invoked, and both accurate interpolation and spectral-like filtering can be accomplished by means of schemes for derivatives at mid-cell locations. This family of schemes reduces to the Pade schemes when the maximal formal accuracy constraint is imposed with a specific computational stencil. Attention is given to illustrative applications of these schemes in fluid dynamics.

  6. Enhanced arbitrated quantum signature scheme using Bell states

    NASA Astrophysics Data System (ADS)

    Wang, Chao; Liu, Jian-Wei; Shang, Tao

    2014-06-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme.

  7. On the security of arbitrated quantum signature schemes

    NASA Astrophysics Data System (ADS)

    Li, Qin; Li, Chengqing; Wen, Zhonghua; Zhao, Weizhong; Chan, Wai Hong

    2013-01-01

    Due to the potential capability of providing unconditional security, arbitrated quantum signature (AQS) schemes, whose implementation depends on the participation of a trusted third party, received intense attention in the past decade. Recently, some typical AQS schemes were cryptanalyzed and improved. In this paper, we analyze the security property of some AQS schemes and show that all the previous AQS schemes, no matter whether original or improved, are still insecure in the sense that the messages and the corresponding signatures can be exchanged among different receivers, allowing the receivers to deny having accepted the signature of an appointed message. Some further improved methods on the AQS schemes are also discussed.

  8. On the monotonicity of multidimensional finite difference schemes

    NASA Astrophysics Data System (ADS)

    Kovyrkina, O.; Ostapenko, V.

    2016-10-01

    The classical concept of monotonicity, introduced by Godunov for linear one-dimensional difference schemes, is extended to multidimensional case. Necessary and sufficient conditions of monotonicity are obtained for linear multidimensional difference schemes of first order. The constraints on the numerical viscosity are given that ensure the monotonicity of a difference scheme in the multidimensional case. It is proposed a modification of the second order multidimensional CABARET scheme that preserves the monotonicity of one-dimensional discrete solutions and, as a result, ensures higher smoothness in the computation of multidimensional discontinuous solutions. The results of two-dimensional test computations illustrating the advantages of the modified CABARET scheme are presented.

  9. An evaluation of RAMS radiation schemes by field measurements

    SciTech Connect

    Zhong, S; Doran, J C

    1994-02-01

    At present, two radiation schemes are used in RAMS: the Mahrer and Pielke (M-P) scheme and the Chen and Cotton (C-C) scheme. The M-P scheme requires little computational expense, but does not include the radiative effects of liquid water or ice; the C-C scheme accounts for the radiative effects of liquid water and ice but is fairly expensive computationally. For simulations with clouds, the C-C scheme is obviously a better choice, but for clear sky conditions, RAMS users face a decision regarding which radiation scheme to use. It has been noted that the choice of radiation scheme may result in significantly different results for the same case. To examine the differences in the radiative fluxes and the boundary-layer structure corresponding to the two radiation schemes in RAMS we have carried out a study where Rams was used to simulate the same case with two different radiation schemes. The modeled radiative fluxes by the two schemes were then compared with the field measurements. A description of the observations and the case study, a comparison and discussion of the results, and a summary and conclusions follow.

  10. Implicit Space-Time Conservation Element and Solution Element Schemes

    NASA Technical Reports Server (NTRS)

    Chang, Sin-Chung; Himansu, Ananda; Wang, Xiao-Yen

    1999-01-01

    Artificial numerical dissipation is in important issue in large Reynolds number computations. In such computations, the artificial dissipation inherent in traditional numerical schemes can overwhelm the physical dissipation and yield inaccurate results on meshes of practical size. In the present work, the space-time conservation element and solution element method is used to construct new and accurate implicit numerical schemes such that artificial numerical dissipation will not overwhelm physical dissipation. Specifically, these schemes have the property that numerical dissipation vanishes when the physical viscosity goes to zero. These new schemes therefore accurately model the physical dissipation even when it is extremely small. The new schemes presented are two highly accurate implicit solvers for a convection-diffusion equation. The two schemes become identical in the pure convection case, and in the pure diffusion case. The implicit schemes are applicable over the whole Reynolds number range, from purely diffusive equations to convection-dominated equations with very small viscosity. The stability and consistency of the schemes are analysed, and some numerical results are presented. It is shown that, in the inviscid case, the new schemes become explicit and their amplification factors are identical to those of the Leapfrog scheme. On the other hand, in the pure diffusion case, their principal amplification factor becomes the amplification factor of the Crank-Nicolson scheme.

  11. Total Variation Diminishing (TVD) schemes of uniform accuracy

    NASA Technical Reports Server (NTRS)

    Hartwich, PETER-M.; Hsu, Chung-Hao; Liu, C. H.

    1988-01-01

    Explicit second-order accurate finite-difference schemes for the approximation of hyperbolic conservation laws are presented. These schemes are nonlinear even for the constant coefficient case. They are based on first-order upwind schemes. Their accuracy is enhanced by locally replacing the first-order one-sided differences with either second-order one-sided differences or central differences or a blend thereof. The appropriate local difference stencils are selected such that they give TVD schemes of uniform second-order accuracy in the scalar, or linear systems, case. Like conventional TVD schemes, the new schemes avoid a Gibbs phenomenon at discontinuities of the solution, but they do not switch back to first-order accuracy, in the sense of truncation error, at extrema of the solution. The performance of the new schemes is demonstrated in several numerical tests.

  12. Well-balanced schemes for the Euler equations with gravitation

    NASA Astrophysics Data System (ADS)

    Käppeli, R.; Mishra, S.

    2014-02-01

    Well-balanced high-order finite volume schemes are designed to approximate the Euler equations with gravitation. The schemes preserve discrete equilibria, corresponding to a large class of physically stable hydrostatic steady states. Based on a novel local hydrostatic reconstruction, the derived schemes are well-balanced for any consistent numerical flux for the Euler equations. The form of the hydrostatic reconstruction is both very simple and computationally efficient as it requires no analytical or numerical integration. Moreover, as required by many interesting astrophysical scenarios, the schemes are applicable beyond the ideal gas law. Both first- and second-order accurate versions of the schemes and their extension to multi-dimensional equilibria are presented. Several numerical experiments demonstrating the superior performance of the well-balanced schemes, as compared to standard finite volume schemes, are also presented.

  13. Buckley's Scheme of Schemes as a Foundation for Teaching Family Systems Theory.

    ERIC Educational Resources Information Center

    Duncan, Barry L.; Fraser, J. Scott

    1987-01-01

    Urges emphasis on the development of a strong system theory base upon which future practitioners and researchers can build. Advocates the use of Buckley's hierarchical scheme as a teaching tool to provide an understandable, yet broadly applicable, theory base for graduate students in an introductory family therapy course. Outlines an effective…

  14. On smoothing of the Crank-Nicolson scheme and higher order schemes for pricing barrier options

    NASA Astrophysics Data System (ADS)

    Wade, B. A.; Khaliq, A. Q. M.; Yousuf, M.; Vigo-Aguiar, J.; Deininger, R.

    2007-07-01

    Most option pricing problems have nonsmooth payoffs or discontinuous derivatives at the exercise price. Discrete barrier options have not only nonsmooth payoffs but also time dependent discontinuities. In pricing barrier options, certain aspects are triggered if the asset price becomes too high or too low. Standard smoothing schemes used to solve problems with nonsmooth payoff do not work well for discrete barrier options because of discontinuities introduced in the time domain when each barrier is applied. Moreover, these unwanted oscillations become worse when estimating the hedging parameters, e.g., Delta and Gamma. We have an improved smoothing strategy for the Crank-Nicolson method which is unique in achieving optimal order convergence for barrier option problems. Numerical experiments are discussed for one asset and two asset problems. Time evolution graphs are obtained for one asset problems to show how option prices change with respect to time. This smoothing strategy is then extended to higher order methods using diagonal (m,m)--Pade main schemes under a smoothing strategy of using as damping schemes the (0,2m-1) subdiagonal Pade schemes.

  15. An efficient compression scheme for bitmap indices

    SciTech Connect

    Wu, Kesheng; Otoo, Ekow J.; Shoshani, Arie

    2004-04-13

    When using an out-of-core indexing method to answer a query, it is generally assumed that the I/O cost dominates the overall query response time. Because of this, most research on indexing methods concentrate on reducing the sizes of indices. For bitmap indices, compression has been used for this purpose. However, in most cases, operations on these compressed bitmaps, mostly bitwise logical operations such as AND, OR, and NOT, spend more time in CPU than in I/O. To speedup these operations, a number of specialized bitmap compression schemes have been developed; the best known of which is the byte-aligned bitmap code (BBC). They are usually faster in performing logical operations than the general purpose compression schemes, but, the time spent in CPU still dominates the total query response time. To reduce the query response time, we designed a CPU-friendly scheme named the word-aligned hybrid (WAH) code. In this paper, we prove that the sizes of WAH compressed bitmap indices are about two words per row for large range of attributes. This size is smaller than typical sizes of commonly used indices, such as a B-tree. Therefore, WAH compressed indices are not only appropriate for low cardinality attributes but also for high cardinality attributes.In the worst case, the time to operate on compressed bitmaps is proportional to the total size of the bitmaps involved. The total size of the bitmaps required to answer a query on one attribute is proportional to the number of hits. These indicate that WAH compressed bitmap indices are optimal. To verify their effectiveness, we generated bitmap indices for four different datasets and measured the response time of many range queries. Tests confirm that sizes of compressed bitmap indices are indeed smaller than B-tree indices, and query processing with WAH compressed indices is much faster than with BBC compressed indices, projection indices and B-tree indices. In addition, we also verified that the average query response time

  16. Efficient Conservative Reformulation Schemes for Lithium Intercalation

    SciTech Connect

    Urisanga, PC; Rife, D; De, S; Subramanian, VR

    2015-02-18

    Porous electrode theory coupled with transport and reaction mechanisms is a widely used technique to model Li-ion batteries employing an appropriate discretization or approximation for solid phase diffusion with electrode particles. One of the major difficulties in simulating Li-ion battery models is the need to account for solid phase diffusion in a second radial dimension r, which increases the computation time/cost to a great extent. Various methods that reduce the computational cost have been introduced to treat this phenomenon, but most of them do not guarantee mass conservation. The aim of this paper is to introduce an inherently mass conserving yet computationally efficient method for solid phase diffusion based on Lobatto III A quadrature. This paper also presents coupling of the new solid phase reformulation scheme with a macro-homogeneous porous electrode theory based pseudo 20 model for Li-ion battery. (C) The Author(s) 2015. Published by ECS. All rights reserved.

  17. Plastics waste trashes German recycling scheme

    SciTech Connect

    Chynoweth, E.

    1993-06-30

    Plastics waste is causing a major headache for Duales System Deutschland (DSD: Bonn), one of Europe`s groundbreaking national packaging recycling programs. Five of Germany`s states have threatened to withdraw from the plan mainly because of the lack of plastics recycling capacity, says a DSD spokeswoman. {open_quotes}The pace of establishing recycling capacity does not meet the zeal in collection.{close_quotes} she notes. In addition, the organization has been crippled by a lack of funds. It claims that up to half the subscribers to the scheme - who pay a fee to display a green dot on packaging - are either irregular payers or not paying fees in proportion to their use of the green dot. The cost of setting up and paying for plastics recycling - not originally part of DSD`s responsibility - is also hurting the organization.

  18. The upgraded scheme of Hefei Light Source

    SciTech Connect

    Li Weimin; Xu Hongliang; Wang Lin; Feng Guangyao; Zhang Shancai; Hao Hao

    2010-06-23

    To enhance the performance of Hefei Light Source, which was designed and constructed two decades ago, an upgrade project would be carried out in the near future. The detail upgrade scheme was described in this paper. Firstly, the magnet lattice of storage ring should be reconstructed with 4 DBA cells, whose advantages are lower beam emittance and more straight section available for insertion devices. Secondly, the beam diagnostics, main power supply, transverse and longitudinal multi-bunch feedback, beam control and manipulation system would be upgrade to improve the beam orbit stability. Finally, the injection system of storage ring and injector, which is composed of electron linac and beam transfer line, would be updated in order to assure smooth beam accumulation process under new low emittance lattice. With above improvement, it is hopeful to increase the brilliance of Hefei Light Source by two orders approximately. After three-year upgrade project, the performance of HLS would meet the demands of advanced SR users.

  19. Recycling scheme for twin BWRs reactors

    SciTech Connect

    Ramirez-Sanchez, J. R.; Perry, R. T.; Gustavo Alonso, V.; Javier Palacios, H.

    2006-07-01

    To asses the advantages of reprocess and recycle the spent fuel from nuclear power reactors, against a once through policy, a MOX fuel design is proposed to match a generic scenario for twin BWRs and establish a fuel management scheme. Calculations for the amount of fuel that the plants will use during 40 years of operation were done, and an evaluation of costs using constant money method for each option applying current prices for uranium and services were made. Finally a comparison between the options was made, resulting that even the current high prices of uranium, still the recycling option is more expensive that the once through alternative. But reprocessing could be an alternative to reduce the amount of spent fuel stored in the reactor pools. (authors)

  20. Production scheme for deep water hydrate deposits

    SciTech Connect

    Rose, W.; Pfannkuch, H.O.

    1982-09-01

    There is substantial evidence that enormous natural gas hydrate deposits are entrapped in the bottom sediments underlying many of the deep waters that cover the earth, as well as in subsurface permafrost sediments of the polar regions. This paper addresses the important but largely ignored question of how to recover natural gas from the deep water bottom occurrences. The first problem is to gain access to the resource, the second to promote decomposition of the hydrate, and the third is to collect and bring the exsolved gas to the surface. A scheme assumed to be technically feasible involves the use of closely-spaced flexible hoses imbedded to protrude through the underside of the hydrate layer through which warm water can be circulated downwards and recovered gas brought upwards from and to surface floating platforms equipped with pumps, compressors, conversion facilities, storage vessels and pipeline manifolds.

  1. Relaxation schemes for spectral multigrid methods

    NASA Technical Reports Server (NTRS)

    Phillips, Timothy N.

    1987-01-01

    The effectiveness of relaxation schemes for solving the systems of algebraic equations which arise from spectral discretizations of elliptic equations is examined. Iterative methods are an attractive alternative to direct methods because Fourier transform techniques enable the discrete matrix-vector products to be computed almost as efficiently as for corresponding but sparse finite difference discretizations. Preconditioning is found to be essential for acceptable rates of convergence. Preconditioners based on second-order finite difference methods are used. A comparison is made of the performance of different relaxation methods on model problems with a variety of conditions specified around the boundary. The investigations show that iterations based on incomplete LU decompositions provide the most efficient methods for solving these algebraic systems.

  2. Doping Scheme of Semiconducting Atomic Chains

    NASA Technical Reports Server (NTRS)

    Toshishige, Yamada; Saini, Subhash (Technical Monitor)

    1998-01-01

    Atomic chains, precise structures of atomic scale created on an atomically regulated substrate surface, are candidates for future electronics. A doping scheme for intrinsic semiconducting Mg chains is considered. In order to suppress the unwanted Anderson localization and minimize the deformation of the original band shape, atomic modulation doping is considered, which is to place dopant atoms beside the chain periodically. Group I atoms are donors, and group VI or VII atoms are acceptors. As long as the lattice constant is long so that the s-p band crossing has not occurred, whether dopant atoms behave as donors or acceptors is closely related to the energy level alignment of isolated atomic levels. Band structures are calculated for Br-doped (p-type) and Cs-doped (n-type) Mg chains using the tight-binding theory with universal parameters, and it is shown that the band deformation is minimized and only the Fermi energy position is modified.

  3. Investigation of Near Shannon Limit Coding Schemes

    NASA Technical Reports Server (NTRS)

    Kwatra, S. C.; Kim, J.; Mo, Fan

    1999-01-01

    Turbo codes can deliver performance that is very close to the Shannon limit. This report investigates algorithms for convolutional turbo codes and block turbo codes. Both coding schemes can achieve performance near Shannon limit. The performance of the schemes is obtained using computer simulations. There are three sections in this report. First section is the introduction. The fundamental knowledge about coding, block coding and convolutional coding is discussed. In the second section, the basic concepts of convolutional turbo codes are introduced and the performance of turbo codes, especially high rate turbo codes, is provided from the simulation results. After introducing all the parameters that help turbo codes achieve such a good performance, it is concluded that output weight distribution should be the main consideration in designing turbo codes. Based on the output weight distribution, the performance bounds for turbo codes are given. Then, the relationships between the output weight distribution and the factors like generator polynomial, interleaver and puncturing pattern are examined. The criterion for the best selection of system components is provided. The puncturing pattern algorithm is discussed in detail. Different puncturing patterns are compared for each high rate. For most of the high rate codes, the puncturing pattern does not show any significant effect on the code performance if pseudo - random interleaver is used in the system. For some special rate codes with poor performance, an alternative puncturing algorithm is designed which restores their performance close to the Shannon limit. Finally, in section three, for iterative decoding of block codes, the method of building trellis for block codes, the structure of the iterative decoding system and the calculation of extrinsic values are discussed.

  4. MIMO transmit scheme based on morphological perceptron with competitive learning.

    PubMed

    Valente, Raul Ambrozio; Abrão, Taufik

    2016-08-01

    This paper proposes a new multi-input multi-output (MIMO) transmit scheme aided by artificial neural network (ANN). The morphological perceptron with competitive learning (MP/CL) concept is deployed as a decision rule in the MIMO detection stage. The proposed MIMO transmission scheme is able to achieve double spectral efficiency; hence, in each time-slot the receiver decodes two symbols at a time instead one as Alamouti scheme. Other advantage of the proposed transmit scheme with MP/CL-aided detector is its polynomial complexity according to modulation order, while it becomes linear when the data stream length is greater than modulation order. The performance of the proposed scheme is compared to the traditional MIMO schemes, namely Alamouti scheme and maximum-likelihood MIMO (ML-MIMO) detector. Also, the proposed scheme is evaluated in a scenario with variable channel information along the frame. Numerical results have shown that the diversity gain under space-time coding Alamouti scheme is partially lost, which slightly reduces the bit-error rate (BER) performance of the proposed MP/CL-NN MIMO scheme. PMID:27135805

  5. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    PubMed

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  6. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    PubMed

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards. PMID:23967037

  7. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    PubMed

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  8. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    PubMed

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%. PMID:27091755

  9. Security analysis and improvements of arbitrated quantum signature schemes

    NASA Astrophysics Data System (ADS)

    Zou, Xiangfu; Qiu, Daowen

    2010-10-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  10. A novel quantum group signature scheme without using entangled states

    NASA Astrophysics Data System (ADS)

    Xu, Guang-Bao; Zhang, Ke-Jia

    2015-07-01

    In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

  11. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  12. An improved authentication scheme for telecare medicine information systems.

    PubMed

    Wei, Jianghong; Hu, Xuexian; Liu, Wenfen

    2012-12-01

    The telecare medicine information system enables or supports health-care delivery services. In order to safeguard patients' privacy, such as telephone number, medical record number, health information, etc., a secure authentication scheme will thus be in demand. Recently, Wu et al. proposed a smart card based password authentication scheme for the telecare medicine information system. Later, He et al. pointed out that Wu et al.'s scheme could not resist impersonation attacks and insider attacks, and then presented a new scheme. In this paper, we show that both of them fail to achieve two-factor authentication as smart card based password authentication schemes should achieve. We also propose an improved authentication scheme for the telecare medicine information system, and demonstrate that the improved one satisfies the security requirements of two-factor authentication and is also efficient. PMID:22374237

  13. An arbitrated quantum signature scheme with fast signing and verifying

    NASA Astrophysics Data System (ADS)

    Liu, Feng; Qin, Su-Juan; Su, Qi

    2013-11-01

    Existing arbitrated quantum signature (AQS) schemes are almost all based on the Leung quantum one-time pad (L-QOTP) algorithm. In these schemes, the receiver can achieve an existential forgery of the sender's signatures under the known message attack, and the sender can successfully disavow any of her/his signatures by a simple attack. In this paper, a solution of solving the problems is given, through designing a new QOTP algorithm relying largely on inserting decoy states into fixed insertion positions. Furthermore, we present an AQS scheme with fast signing and verifying, which is based on the new QOTP algorithm. It is just using single particle states and is unconditional secure. To fulfill the functions of AQS schemes, our scheme needs a significantly lower computational costs than that required by other AQS schemes based on the L-QOTP algorithm.

  14. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card. PMID:23321972

  15. A comparison of SPH schemes for the compressible Euler equations

    NASA Astrophysics Data System (ADS)

    Puri, Kunal; Ramachandran, Prabhu

    2014-01-01

    We review the current state-of-the-art Smoothed Particle Hydrodynamics (SPH) schemes for the compressible Euler equations. We identify three prototypical schemes and apply them to a suite of test problems in one and two dimensions. The schemes are in order, standard SPH with an adaptive density kernel estimation (ADKE) technique introduced Sigalotti et al. (2008) [44], the variational SPH formulation of Price (2012) [33] (referred herein as the MPM scheme) and the Godunov type SPH (GSPH) scheme of Inutsuka (2002) [12]. The tests investigate the accuracy of the inviscid discretizations, shock capturing ability and the particle settling behavior. The schemes are found to produce nearly identical results for the 1D shock tube problems with the MPM and GSPH schemes being the most robust. The ADKE scheme requires parameter values which must be tuned to the problem at hand. We propose an addition of an artificial heating term to the GSPH scheme to eliminate unphysical spikes in the thermal energy at the contact discontinuity. The resulting modification is simple and can be readily incorporated in existing codes. In two dimensions, the differences between the schemes is more evident with the quality of results determined by the particle distribution. In particular, the ADKE scheme shows signs of particle clumping and irregular motion for the 2D strong shock and Sedov point explosion tests. The noise in particle data is linked with the particle distribution which remains regular for the Hamiltonian formulations (MPM and GSPH) and becomes irregular for the ADKE scheme. In the interest of reproducibility, we make available our implementation of the algorithms and test problems discussed in this work.

  16. A mirror based scheme of a laser projection microscope

    NASA Astrophysics Data System (ADS)

    Gubarev, F. A.; Li, Lin; Klenovskii, M. S.

    2016-04-01

    The paper discusses the design of a laser projection microscope with a mirror-based scheme of image formation. It is shown that the laser projection microscope with the mirror-based scheme of image formation is well suited for distant objects monitoring. This scheme allowed obtaining a field of view of more than 3 cm at the distance of 4 m from the brightness amplifier

  17. Numerical schemes for a model for nonlinear dispersive waves

    NASA Technical Reports Server (NTRS)

    Bona, J. L.; Pritchard, W. G.; Scott, L. R.

    1985-01-01

    A description is given of a number of numerical schemes to solve an evolution equation (Korteweg-deVries) that arises when modelling the propagation of water waves in a channel. The discussion also includes the results of numerical experiments made with each of the schemes. It is suggested, on the basis of these experiments, that one of the schemes may have (discrete) solitary-wave solutions.

  18. Multilevel programmable logic array schemes for microprogrammed automata

    SciTech Connect

    Barkalov, A.A.

    1995-03-01

    Programmable logic arrays (PLAs) provide an efficient tool for implementation of logic schemes of microprogrammed automata (MPA). The number of PLAs in the MPA logic scheme can be minimized by increasing the number of levels. In this paper, we analyze the structures of multilevel schemes of Mealy automata, propose a number of new structures, consider the corresponding correctness conditions, and examine some problems that must be solved in order to satisfy these conditions.

  19. Scheme for atomic-state teleportation between two bad cavities

    SciTech Connect

    Zheng Shibiao; Guo Guangcan

    2006-03-15

    A scheme is presented for the long-distance teleportation of an unknown atomic state between two separated cavities. Our scheme works in the regime where the atom-cavity coupling strength is smaller than the cavity decay rate. Thus the requirement on the quality factor of the cavities is greatly relaxed. Furthermore, the fidelity of our scheme is not affected by the detection inefficiency and atomic decay. These advantages are important in view of experiments.

  20. JOURNAL SCOPE GUIDELINES: Paper classification scheme

    NASA Astrophysics Data System (ADS)

    2005-06-01

    This scheme is used to clarify the journal's scope and enable authors and readers to more easily locate the appropriate section for their work. For each of the sections listed in the scope statement we suggest some more detailed subject areas which help define that subject area. These lists are by no means exhaustive and are intended only as a guide to the type of papers we envisage appearing in each section. We acknowledge that no classification scheme can be perfect and that there are some papers which might be placed in more than one section. We are happy to provide further advice on paper classification to authors upon request (please email jphysa@iop.org). 1. Statistical physics numerical and computational methods statistical mechanics, phase transitions and critical phenomena quantum condensed matter theory Bose-Einstein condensation strongly correlated electron systems exactly solvable models in statistical mechanics lattice models, random walks and combinatorics field-theoretical models in statistical mechanics disordered systems, spin glasses and neural networks nonequilibrium systems network theory 2. Chaotic and complex systems nonlinear dynamics and classical chaos fractals and multifractals quantum chaos classical and quantum transport cellular automata granular systems and self-organization pattern formation biophysical models 3. Mathematical physics combinatorics algebraic structures and number theory matrix theory classical and quantum groups, symmetry and representation theory Lie algebras, special functions and orthogonal polynomials ordinary and partial differential equations difference and functional equations integrable systems soliton theory functional analysis and operator theory inverse problems geometry, differential geometry and topology numerical approximation and analysis geometric integration computational methods 4. Quantum mechanics and quantum information theory coherent states eigenvalue problems supersymmetric quantum mechanics

  1. The constant displacement scheme for tracking particles in heterogeneous aquifers

    SciTech Connect

    Wen, X.H.; Gomez-Hernandez, J.J.

    1996-01-01

    Simulation of mass transport by particle tracking or random walk in highly heterogeneous media may be inefficient from a computational point of view if the traditional constant time step scheme is used. A new scheme which adjusts automatically the time step for each particle according to the local pore velocity, so that each particle always travels a constant distance, is shown to be computationally faster for the same degree of accuracy than the constant time step method. Using the constant displacement scheme, transport calculations in a 2-D aquifer model, with nature log-transmissivity variance of 4, can be 8.6 times faster than using the constant time step scheme.

  2. A cancellable and fuzzy fingerprint scheme for mobile computing security

    NASA Astrophysics Data System (ADS)

    Yang, Wencheng; Xi, Kai; Li, Cai

    2012-09-01

    Fingerprint recognition provides an effective user authentication solution for mobile computing systems. However, as a fingerprint template protection scheme, fingerprint fuzzy vault is subject to cross-matching attacks, since the same finger might be registered for various applications. In this paper, we propose a fingerprint-based biometric security scheme named the cancellable and fuzzy fingerprint scheme, which combines a cancellable non-linear transformation with the client/server version of fuzzy vault, to address the cross-matching attack in a mobile computing system. Experimental results demonstrate that our scheme can provide reliable and secure protection to the mobile computing system while achieving an acceptable matching performance.

  3. Error function attack of chaos synchronization based encryption schemes.

    PubMed

    Wang, Xingang; Zhan, Meng; Lai, C-H; Gang, Hu

    2004-03-01

    Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the error function attack is presented systematically and used to evaluate system security. We define a quantitative measure (quality factor) of the effective applicability of a chaos encryption scheme, which takes into account the security, the encryption speed, and the robustness against channel noise. A comparison is made of several encryption schemes and it is found that a scheme based on one-way coupled chaotic map lattices performs outstandingly well, as judged from quality factor.

  4. Novel adsorption distillation hybrid scheme for propane/propylene separation

    SciTech Connect

    Kumar, R.; Golden, T.C.; White, T.R.; Rokicki, A. )

    1992-12-01

    A novel adsorption-distillation hybrid scheme is proposed for propane/propylene separation. The suggested scheme has potential for saving up to [approximately]50% energy and [approximately]15-30% in capital costs as compared with current technology. The key concept of the proposed scheme is to separate olefins from alkanes by adsorption and then separate individual olefins and alkanes by simple distillation, thereby eliminating energy intensive and expensive olefin-alkane distillation. A conceptual flow schematic for the proposed hybrid scheme and potential savings are outlined.s

  5. Studies of Inviscid Flux Schemes for Acoustics and Turbulence Problems

    NASA Technical Reports Server (NTRS)

    Morris, Chris

    2013-01-01

    Five different central difference schemes, based on a conservative differencing form of the Kennedy and Gruber skew-symmetric scheme, were compared with six different upwind schemes based on primitive variable reconstruction and the Roe flux. These eleven schemes were tested on a one-dimensional acoustic standing wave problem, the Taylor-Green vortex problem and a turbulent channel flow problem. The central schemes were generally very accurate and stable, provided the grid stretching rate was kept below 10%. As near-DNS grid resolutions, the results were comparable to reference DNS calculations. At coarser grid resolutions, the need for an LES SGS model became apparent. There was a noticeable improvement moving from CD-2 to CD-4, and higher-order schemes appear to yield clear benefits on coarser grids. The UB-7 and CU-5 upwind schemes also performed very well at near-DNS grid resolutions. The UB-5 upwind scheme does not do as well, but does appear to be suitable for well-resolved DNS. The UF-2 and UB-3 upwind schemes, which have significant dissipation over a wide spectral range, appear to be poorly suited for DNS or LES.

  6. Optimal coding schemes for conflict-free channel access

    NASA Astrophysics Data System (ADS)

    Browning, Douglas W.; Thomas, John B.

    1989-10-01

    A method is proposed for conflict-free access of a broadcast channel. The method uses a variable-length coding scheme to determine which user gains access to the channel. For an idle channel, an equation for optimal expected overhead is derived and a coding scheme that produces optimal codes is presented. Algorithms for generating optimal codes for access on a busy channel are discussed. Suboptimal schemes are found that perform in a nearly optimal fashion. The method is shown to be superior in performance to previously developed conflict-free channel access schemes.

  7. A Electronic Voting Scheme Achieved by Using Quantum Proxy Signature

    NASA Astrophysics Data System (ADS)

    Cao, Hai-Jing; Ding, Li-Yuan; Yu, Yao-Feng; Li, Peng-Fei

    2016-09-01

    In this paper, we propose a new electronic voting scheme using Bell entangled states as quantum channels. This scheme is based on quantum proxy signature. The voter Alice, vote management center Bob, teller Charlie and scrutineer Diana only perform single particle measurement to realize the electronic voting process. So the scheme reduces the technical difficulty and increases operation efficiency. It can be easily realized. We use quantum key distribution and one-time pad to guarantee its unconditional security. The scheme uses the physical characteristics of quantum mechanics to guarantee its anonymity, verifiability, unforgetability and undeniability.

  8. A composite scheme for gas dynamics in Lagrangian coordinates

    SciTech Connect

    Shashkov, M.; Wendroff, B.

    1999-04-10

    One cycle of a composite finite difference scheme is defined as several time steps of an oscillatory scheme such as Lax-Wendroff followed by one step of a diffusive scheme such as Lax-Friedrichs. The authors apply this idea to gas dynamics in Lagrangian coordinates. They show numerical results in two dimensions for Noh`s infinite strength shock problem and the Sedov blast wave problem, and for several one-dimensional problems including a Riemann problem with a contact discontinuity. For Noh`s problem the composite scheme produces a better result than that obtained with a more conventional Lagrangian code.

  9. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    NASA Astrophysics Data System (ADS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-02-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme.

  10. Electronic entanglement purification scheme enhanced by charge detections

    SciTech Connect

    Feng Xunli; Kwek, L. C.; Oh, C.H.

    2005-06-15

    We present an entanglement purification scheme for the mixed entangled states of electrons with the aid of charge detections. Our scheme adopts the electronic polarizing beam splitters rather than the controlled-NOT (CNOT) operations, but the total successful probability of our scheme can reach the quantity as large as that of the the CNOT-operation-based protocol and twice as large as that of linear-optics-based protocol for the purification of photonic entangled states. Thus our scheme can achieve a high successful probability without the usage of CNOT operations.

  11. An Efficient Variable-Length Data-Compression Scheme

    NASA Technical Reports Server (NTRS)

    Cheung, Kar-Ming; Kiely, Aaron B.

    1996-01-01

    Adaptive variable-length coding scheme for compression of stream of independent and identically distributed source data involves either Huffman code or alternating run-length Huffman (ARH) code, depending on characteristics of data. Enables efficient compression of output of lossless or lossy precompression process, with speed and simplicity greater than those of older coding schemes developed for same purpose. In addition, scheme suitable for parallel implementation on hardware with modular structure, provides for rapid adaptation to changing data source, compatible with block orientation to alleviate memory requirements, ensures efficiency over wide range of entropy, and easily combined with such other communication schemes as those for containment of errors and for packetization.

  12. On a fourth order accurate implicit finite difference scheme for hyperbolic conservation laws. II - Five-point schemes

    NASA Technical Reports Server (NTRS)

    Harten, A.; Tal-Ezer, H.

    1981-01-01

    This paper presents a family of two-level five-point implicit schemes for the solution of one-dimensional systems of hyperbolic conservation laws, which generalized the Crank-Nicholson scheme to fourth order accuracy (4-4) in both time and space. These 4-4 schemes are nondissipative and unconditionally stable. Special attention is given to the system of linear equations associated with these 4-4 implicit schemes. The regularity of this system is analyzed and efficiency of solution-algorithms is examined. A two-datum representation of these 4-4 implicit schemes brings about a compactification of the stencil to three mesh points at each time-level. This compact two-datum representation is particularly useful in deriving boundary treatments. Numerical results are presented to illustrate some properties of the proposed scheme.

  13. MultiScheme: a parallel-processing system based on MIT (Massachusetts Institute of Technology) scheme. Doctoral thesis

    SciTech Connect

    Miller, J.S.

    1987-09-01

    MultiScheme is a fully operational parallel-programming system based upon the Scheme dialect of Lisp. Like its Lisp ancestors, MultiScheme provides a conducive environment for prototyping and testing new linguistic structures and programming methodologies. MultiScheme supports a diverse community of users who have a wide range of interests in parallel programming. MultiScheme's flexible support for system-based experiments in parallel processing has enabled it to serve as a development vehicle for university and industrial research. At the same time, MultiScheme is sufficiently robust, and supports a sufficiently wide range of parallel-processing applications, that it has become the base for a commercial product, the Butterfly Lisp System produced by BBN Advanced Computers, Inc.

  14. Testing hydrodynamics schemes in galaxy disc simulations

    NASA Astrophysics Data System (ADS)

    Few, C. G.; Dobbs, C.; Pettitt, A.; Konstandin, L.

    2016-08-01

    We examine how three fundamentally different numerical hydrodynamics codes follow the evolution of an isothermal galactic disc with an external spiral potential. We compare an adaptive mesh refinement code (RAMSES), a smoothed particle hydrodynamics code (SPHNG), and a volume-discretized mesh-less code (GIZMO). Using standard refinement criteria, we find that RAMSES produces a disc that is less vertically concentrated and does not reach such high densities as the SPHNG or GIZMO runs. The gas surface density in the spiral arms increases at a lower rate for the RAMSES simulations compared to the other codes. There is also a greater degree of substructure in the SPHNG and GIZMO runs and secondary spiral arms are more pronounced. By resolving the Jeans length with a greater number of grid cells, we achieve more similar results to the Lagrangian codes used in this study. Other alterations to the refinement scheme (adding extra levels of refinement and refining based on local density gradients) are less successful in reducing the disparity between RAMSES and SPHNG/GIZMO. Although more similar, SPHNG displays different density distributions and vertical mass profiles to all modes of GIZMO (including the smoothed particle hydrodynamics version). This suggests differences also arise which are not intrinsic to the particular method but rather due to its implementation. The discrepancies between codes (in particular, the densities reached in the spiral arms) could potentially result in differences in the locations and time-scales for gravitational collapse, and therefore impact star formation activity in more complex galaxy disc simulations.

  15. Concentric scheme of monkey auditory cortex

    NASA Astrophysics Data System (ADS)

    Kosaki, Hiroko; Saunders, Richard C.; Mishkin, Mortimer

    2003-04-01

    The cytoarchitecture of the rhesus monkey's auditory cortex was examined using immunocytochemical staining with parvalbumin, calbindin-D28K, and SMI32, as well as staining for cytochrome oxidase (CO). The results suggest that Kaas and Hackett's scheme of the auditory cortices can be extended to include five concentric rings surrounding an inner core. The inner core, containing areas A1 and R, is the most densely stained with parvalbumin and CO and can be separated on the basis of laminar patterns of SMI32 staining into lateral and medial subdivisions. From the inner core to the fifth (outermost) ring, parvalbumin staining gradually decreases and calbindin staining gradually increases. The first ring corresponds to Kaas and Hackett's auditory belt, and the second, to their parabelt. SMI32 staining revealed a clear border between these two. Rings 2 through 5 extend laterally into the dorsal bank of the superior temporal sulcus. The results also suggest that the rostral tip of the outermost ring adjoins the rostroventral part of the insula (area Pro) and the temporal pole, while the caudal tip adjoins the ventral part of area 7a.

  16. Scheme for accelerating quantum tunneling dynamics

    NASA Astrophysics Data System (ADS)

    Khujakulov, Anvar; Nakamura, Katsuhiro

    2016-02-01

    We propose a scheme of the exact fast forwarding of standard quantum dynamics for a charged particle. The present idea allows the acceleration of both the amplitude and the phase of the wave function throughout the fast-forward time range and is distinct from that of Masuda and Nakamura [Proc. R. Soc. A 466, 1135 (2010), 10.1098/rspa.2009.0446], which enabled acceleration of only the amplitude of the wave function on the way. We apply the proposed method to the quantum tunneling phenomena and obtain the electromagnetic field to ensure the rapid penetration of wave functions through a tunneling barrier. Typical examples described here are (1) an exponential wave packet passing through the δ -function barrier and (2) the opened Moshinsky shutter with a δ -function barrier just behind the shutter. We elucidate the tunneling current in the vicinity of the barrier and find a remarkable enhancement of the tunneling rate (tunneling power) due to the fast forwarding. In the case of a very high barrier, in particular, we present the asymptotic analysis and exhibit a suitable driving force to recover a recognizable tunneling current. The analysis is also carried out on the exact acceleration of macroscopic quantum tunneling with use of the nonlinear Schrödinger equation, which accommodates a tunneling barrier.

  17. Date attachable offline electronic cash scheme.

    PubMed

    Fan, Chun-I; Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  18. Environmental endocrine disruptors: A proposed classification scheme

    SciTech Connect

    Fur, P.L. de; Roberts, J.

    1995-12-31

    A number of chemicals known to act on animal systems through the endocrine system have been termed environmental endocrine disruptors. This group includes some of the PCBs and TCDDs, as well as lead, mercury and a large number of pesticides. The common feature is that the chemicals interact with endogenous endocrine systems at the cellular and/or molecular level to alter normal processes that are controlled or regulated by hormones. Although the existence of artificial or environmental estrogens (e.g. chlordecone and DES) has been known for some time, recent data indicate that this phenomenon is widespread. Indeed, anti-androgens have been held responsible for reproductive dysfunction in alligator populations in Florida. But the significance of endocrine disruption was recognized by pesticide manufacturers when insect growth regulators were developed to interfere with hormonal control of growth. Controlling, regulating or managing these chemicals depends in no small part on the ability to identify, screen or otherwise know that a chemical is an endocrine disrupter. Two possible classifications schemes are: using the effects caused in an animal, or animals as an exposure indicator; and using a known screen for the point of contact with the animal. The former would require extensive knowledge of cause and effect relationships in dozens of animal groups; the latter would require a screening tool comparable to an estrogen binding assay. The authors present a possible classification based on chemicals known to disrupt estrogenic, androgenic and ecdysone regulated hormonal systems.

  19. Date attachable offline electronic cash scheme.

    PubMed

    Fan, Chun-I; Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling. PMID:24982931

  20. Date Attachable Offline Electronic Cash Scheme

    PubMed Central

    Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling. PMID:24982931

  1. Different options for noble gas categorization schemes

    NASA Astrophysics Data System (ADS)

    Kalinowski, Martin

    2010-05-01

    For noble gas monitoring it is crucial to support the decision makers who need to decide whether a decection may indicate a potential nuclear test. Several parameters are available that may help to distinguish a legitimate civilian source from a nuclear explosion. The most promising parameters are: (a) Anomaly observations with respect to the history of concentrations found at that site. (b) Isotopic activity ratios can be used to separate a nuclear reactor domain from the parameter space that is specific for nuclear explosions. (c) Correlation with source-receptor-sensitivities related to known civilian sources as determined by atmospheric transport simulations. A combination of these can be used to categorize an observation. So far, several initial ideas have been presented but the issue of noble gas categorisation has been postponed with the argument that further scientific studies and additional experience have to be awaited. This paper presents the principles of different options for noble gas categorisation and considers how they would meet the interests of different classes of member states. It discusses under different points of view what might be the best approach for the noble gas categorisation scheme.

  2. Splitting based finite volume schemes for ideal MHD equations

    NASA Astrophysics Data System (ADS)

    Fuchs, F. G.; Mishra, S.; Risebro, N. H.

    2009-02-01

    We design finite volume schemes for the equations of ideal magnetohydrodynamics (MHD) and based on splitting these equations into a fluid part and a magnetic induction part. The fluid part leads to an extended Euler system with magnetic forces as source terms. This set of equations are approximated by suitable two- and three-wave HLL solvers. The magnetic part is modeled by the magnetic induction equations which are approximated using stable upwind schemes devised in a recent paper [F. Fuchs, K.H. Karlsen, S. Mishra, N.H. Risebro, Stable upwind schemes for the Magnetic Induction equation. Math. Model. Num. Anal., Available on conservation laws preprint server, submitted for publication, URL: ]. These two sets of schemes can be combined either component by component, or by using an operator splitting procedure to obtain a finite volume scheme for the MHD equations. The resulting schemes are simple to design and implement. These schemes are compared with existing HLL type and Roe type schemes for MHD equations in a series of numerical experiments. These tests reveal that the proposed schemes are robust and have a greater numerical resolution than HLL type solvers, particularly in several space dimensions. In fact, the numerical resolution is comparable to that of the Roe scheme on most test problems with the computational cost being at the level of a HLL type solver. Furthermore, the schemes are remarkably stable even at very fine mesh resolutions and handle the divergence constraint efficiently with low divergence errors.

  3. On the Control of the Fixed Charge Densities in Al2O3-Based Silicon Surface Passivation Schemes.

    PubMed

    Simon, Daniel K; Jordan, Paul M; Mikolajick, Thomas; Dirnstorfer, Ingo

    2015-12-30

    A controlled field-effect passivation by a well-defined density of fixed charges is crucial for modern solar cell surface passivation schemes. Al2O3 nanolayers grown by atomic layer deposition contain negative fixed charges. Electrical measurements on slant-etched layers reveal that these charges are located within a 1 nm distance to the interface with the Si substrate. When inserting additional interface layers, the fixed charge density can be continuously adjusted from 3.5 × 10(12) cm(-2) (negative polarity) to 0.0 and up to 4.0 × 10(12) cm(-2) (positive polarity). A HfO2 interface layer of one or more monolayers reduces the negative fixed charges in Al2O3 to zero. The role of HfO2 is described as an inert spacer controlling the distance between Al2O3 and the Si substrate. It is suggested that this spacer alters the nonstoichiometric initial Al2O3 growth regime, which is responsible for the charge formation. On the basis of this charge-free HfO2/Al2O3 stack, negative or positive fixed charges can be formed by introducing additional thin Al2O3 or SiO2 layers between the Si substrate and this HfO2/Al2O3 capping layer. All stacks provide very good passivation of the silicon surface. The measured effective carrier lifetimes are between 1 and 30 ms. This charge control in Al2O3 nanolayers allows the construction of zero-fixed-charge passivation layers as well as layers with tailored fixed charge densities for future solar cell concepts and other field-effect based devices.

  4. An improved SPH scheme for cosmological simulations

    NASA Astrophysics Data System (ADS)

    Beck, A. M.; Murante, G.; Arth, A.; Remus, R.-S.; Teklu, A. F.; Donnert, J. M. F.; Planelles, S.; Beck, M. C.; Förster, P.; Imgrund, M.; Dolag, K.; Borgani, S.

    2016-01-01

    We present an implementation of smoothed particle hydrodynamics (SPH) with improved accuracy for simulations of galaxies and the large-scale structure. In particular, we implement and test a vast majority of SPH improvement in the developer version of GADGET-3. We use the Wendland kernel functions, a particle wake-up time-step limiting mechanism and a time-dependent scheme for artificial viscosity including high-order gradient computation and shear flow limiter. Additionally, we include a novel prescription for time-dependent artificial conduction, which corrects for gravitationally induced pressure gradients and improves the SPH performance in capturing the development of gas-dynamical instabilities. We extensively test our new implementation in a wide range of hydrodynamical standard tests including weak and strong shocks as well as shear flows, turbulent spectra, gas mixing, hydrostatic equilibria and self-gravitating gas clouds. We jointly employ all modifications; however, when necessary we study the performance of individual code modules. We approximate hydrodynamical states more accurately and with significantly less noise than standard GADGET-SPH. Furthermore, the new implementation promotes the mixing of entropy between different fluid phases, also within cosmological simulations. Finally, we study the performance of the hydrodynamical solver in the context of radiative galaxy formation and non-radiative galaxy cluster formation. We find galactic discs to be colder and more extended and galaxy clusters showing entropy cores instead of steadily declining entropy profiles. In summary, we demonstrate that our improved SPH implementation overcomes most of the undesirable limitations of standard GADGET-SPH, thus becoming the core of an efficient code for large cosmological simulations.

  5. Description scheme for video editing work

    NASA Astrophysics Data System (ADS)

    Ruiloba, Rosa I.; Joly, Philippe

    2001-03-01

    This article presents a Description Scheme (DS) to describe the audio-visual documents from the video editing work point of view. This DS is based on edition techniques used in the video edition domain. The main objective of this DS is to provide a complete, modular and extensible description of the structure of the video documents based on editing process. This VideoEditing DS is generic in the sense that it may be used in a large number of applications such as video document indexing and analysis, description of Edit Decision List and elaboration of editing patterns. It is based on accurate and complete definitions of shots and transition effects required for video document analysis applications. The VideoEditing DS allows three levels of description : analytic, synthetic and semantic. In the DS, the higher (resp. the lower) is the element of description, the more analytic (resp. synthetic) is the information. %Phil This DS allows describing the editing work made by editing boards, using more detailed descriptors of Shots and Transition DSs. These elements are provided to define editing patterns that allow several possible reconstructions of movies depending on, for example, the target audience. A part of the video description made with this DS may be automatically produced by the video to shots segmentation algorithms (analytic DSs ) or by editing software, at the same time the edition work is made. This DS gives an answer to the needs related to the exchange of editing work descriptions between editing softwares. At the same time, the same DS provide an analytic description of editing work which is complementary to existing standards for Edit Decision Lists like SMPTE or AAF.

  6. On schemes of combinatorial transcription logic

    NASA Astrophysics Data System (ADS)

    Buchler, Nicolas E.; Gerland, Ulrich; Hwa, Terence

    2003-04-01

    Cells receive a wide variety of cellular and environmental signals, which are often processed combinatorially to generate specific genetic responses. Here we explore theoretically the potentials and limitations of combinatorial signal integration at the level of cis-regulatory transcription control. Our analysis suggests that many complex transcription-control functions of the type encountered in higher eukaryotes are already implementable within the much simpler bacterial transcription system. Using a quantitative model of bacterial transcription and invoking only specific protein-DNA interaction and weak glue-like interaction between regulatory proteins, we show explicit schemes to implement regulatory logic functions of increasing complexity by appropriately selecting the strengths and arranging the relative positions of the relevant protein-binding DNA sequences in the cis-regulatory region. The architectures that emerge are naturally modular and evolvable. Our results suggest that the transcription regulatory apparatus is a "programmable" computing machine, belonging formally to the class of Boltzmann machines. Crucial to our results is the ability to regulate gene expression at a distance. In bacteria, this can be achieved for isolated genes via DNA looping controlled by the dimerization of DNA-bound proteins. However, if adopted extensively in the genome, long-distance interaction can cause unintentional intergenic cross talk, a detrimental side effect difficult to overcome by the known bacterial transcription-regulation systems. This may be a key factor limiting the genome-wide adoption of complex transcription control in bacteria. Implications of our findings for combinatorial transcription control in eukaryotes are discussed. Abbreviations: TF, transcription factor RNAP, RNA polymerase DNF, disjunctive normal form CNF, conjunctive normal form

  7. High order WENO scheme for computational cosmology

    NASA Astrophysics Data System (ADS)

    Roy, Ishani

    2010-11-01

    This doctoral dissertation is concerned with the formulation and application of a high order accurate numerical algorithm suitable in solving complex multi dimensional equations and the application of this algorithm to a problem in Astrophysics. The algorithm is designed with the aim of resolving solutions of partial differential equations with sharp fronts propagating with time. This high order accurate class of numerical technique is called a Weighted Essentially Non Oscillatory (WENO) method and is well suited for shock capturing in solving conservation laws. The numerical approximation method, in the algorithm, is coupled with high order time marching as well as integration techniques designed to reduce computational cost. This numerical algorithm is used in several applications in computational cosmology to help understand questions about certain physical phenomena which occurred during the formation and evolution of first generation stars. The thesis is divided broadly in terms of the algorithm and its application to the different galactic processes. The first chapter deals with the astrophysical problem and offers an introduction to the numerical algorithm. In chapter 2 we outline the mathematical model and the various functions and parameters associated with the model. We also give a brief description of the relevant physical phenomena and the conservation laws associated with them. In chapter 3, we give a detailed description of the higher order algorithm and its formulation. We also highlight the special techniques incorporated in the algorithm in order to make it more suitable for handling cases which are computationally intensive. In the later chapters, 4-7, we explore in detail the physical processes and the different applications of our numerical scheme. We calculate different results such as the time scale of a temperature coupling mechanism, radiation and intensity changes etc. Different tests are also performed to illustrate the stability and

  8. Generalized formulation of TVD Lax-Wendroff schemes

    NASA Technical Reports Server (NTRS)

    Roe, P. L.

    1984-01-01

    The work of Davis which imports the concept of total variation diminution (TVD) into non-upwinded, Lax-Wendroff type schemes is reformulated in a way which is easier to analyze. The analysis reveals a class of TVD schemes not observed by Davis. Only the case of one dimensional linear advection is treated.

  9. Extricating Justification Scheme Theory in Middle School Mathematical Problem Solving

    ERIC Educational Resources Information Center

    Matteson, Shirley; Capraro, Mary Margaret; Capraro, Robert M.; Lincoln, Yvonna S.

    2012-01-01

    Twenty middle grades students were interviewed to gain insights into their reasoning about problem-solving strategies using a Problem Solving Justification Scheme as our theoretical lens and the basis for our analysis. The scheme was modified from the work of Harel and Sowder (1998) making it more broadly applicable and accounting for research…

  10. Stable explicit schemes for equations of Schroedinger type

    NASA Technical Reports Server (NTRS)

    Mickens, Ronald E.

    1989-01-01

    A method for constructing explicit finite-difference schemes which can be used to solve Schroedinger-type partial-differential equations is presented. A forward Euler scheme that is conditionally stable is given by the procedure. The results presented are based on the analysis of the simplest Schroedinger type equation.

  11. 7 CFR 1410.60 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1410.60 Section 1410.60 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION RESERVE PROGRAM § 1410.60 Scheme or device....

  12. Second-order accurate difference schemes on highly irregular meshes

    SciTech Connect

    Manteuffel, T.A.; White, A.B. Jr.

    1988-01-01

    In this paper compact-as-possible second-order accurate difference schemes will be constructed for boundary-value problems of arbitrary order on highly irregular meshes. It will be shown that for equations of order (K) these schemes will have truncation error of order (3/endash/K). This phenomena is known as supraconvergence. 7 refs.

  13. A FRACTAL-BASED STOCHASTIC INTERPOLATION SCHEME IN SUBSURFACE HYDROLOGY

    EPA Science Inventory

    The need for a realistic and rational method for interpolating sparse data sets is widespread. Real porosity and hydraulic conductivity data do not vary smoothly over space, so an interpolation scheme that preserves irregularity is desirable. Such a scheme based on the properties...

  14. Accuracy study of the IDO scheme by Fourier analysis

    NASA Astrophysics Data System (ADS)

    Imai, Yohsuke; Aoki, Takayuki

    2006-09-01

    The numerical accuracy of the Interpolated Differential Operator (IDO) scheme is studied with Fourier analysis for the solutions of Partial Differential Equations (PDEs): advection, diffusion, and Poisson equations. The IDO scheme solves governing equations not only for physical variable but also for first-order spatial derivative. Spatial discretizations are based on Hermite interpolation functions with both of them. In the Fourier analysis for the IDO scheme, the Fourier coefficients of the physical variable and the first-order derivative are coupled by the equations derived from the governing equations. The analysis shows the IDO scheme resolves all the wavenumbers with higher accuracy than the fourth-order Finite Difference (FD) and Compact Difference (CD) schemes for advection equation. In particular, for high wavenumbers, the accuracy is superior to that of the sixth-order Combined Compact Difference (CCD) scheme. The diffusion and Poisson equations are also more accurately solved in comparison with the FD and CD schemes. These results show that the IDO scheme guarantees highly resolved solutions for all the terms of fluid flow equations.

  15. A Pilot CAI Scheme for the Malaysian Secondary Education System.

    ERIC Educational Resources Information Center

    Rao, A. Kanakaratnam; Rao, G. S.

    1982-01-01

    A multi-phase computer aided instruction (CAI) scheme for Malaysian Secondary Schools and Matriculation Centres attached to local universities is presented as an aid for improving instruction and for solving some problems presently faced by the Malaysian Secondary Education System. Some approaches for successful implementation of a CAI scheme are…

  16. Resolution-optimised nonlinear scheme for secondary derivatives

    NASA Astrophysics Data System (ADS)

    Li, Li; Yu, Changping; Chen, Zhe; Li, Xinliang

    2016-02-01

    A 5-point-stencil optimised nonlinear scheme with spectral-like resolution within the whole wave number range for secondary derivatives is devised. The proposed scheme can compensate for the dissipation deficiency of traditional linear schemes and suppress the spurious energy accumulation that occurs at high wave numbers, both of which are frequently encountered in large eddy simulation. The new scheme is composed of a linear fourth-order central scheme term and an artificial viscosity term. These two terms are connected by a nonlinear weight. The proposed nonlinear weight is designed based on Fourier analysis, rather than Taylor analysis, to guarantee a spectral-like resolution. Moreover, the accuracy is not affected by the optimisation, and the new scheme reaches fourth-order accuracy. The new scheme is tested numerically using the one-dimensional diffusion problem, one-dimensional steady viscous Burger's shock, two-dimensional vortex decaying, three-dimensional isotropic decaying turbulence and fully developed turbulent channel flow. All the tests confirm that the new scheme has spectral-like resolution and can improve the accuracy of the energy spectrum, dissipation rate and high-order statistics of turbulent flows.

  17. Increasing Employability: An Evaluation of the Fullemploy Training Scheme.

    ERIC Educational Resources Information Center

    Pearn, M. A.; Munene, J.

    The Fullemploy Training Scheme is an experiment designed to overcome problems encountered by disadvantaged youth in Britain's Manpower Services Commission's job training program. The aim of the scheme is to bring minority disadvantaged young people into a special office skills training course which would combine vocational training with…

  18. Distinguishing Schemes and Tasks in Children's Development of Multiplicative Reasoning

    ERIC Educational Resources Information Center

    Tzur, Ron; Johnson, Heather L.; McClintock, Evan; Kenney, Rachael H.; Xin, Yan P.; Si, Luo; Woordward, Jerry; Hord, Casey; Jin, Xianyan

    2013-01-01

    We present a synthesis of findings from constructivist teaching experiments regarding six schemes children construct for reasoning multiplicatively and tasks to promote them. We provide a task-generating platform game, depictions of each scheme, and supporting tasks. Tasks must be distinguished from children's thinking, and learning situations…

  19. Second-order accurate nonoscillatory schemes for scalar conservation laws

    NASA Technical Reports Server (NTRS)

    Huynh, Hung T.

    1989-01-01

    Explicit finite difference schemes for the computation of weak solutions of nonlinear scalar conservation laws is presented and analyzed. These schemes are uniformly second-order accurate and nonoscillatory in the sense that the number of extrema of the discrete solution is not increasing in time.

  20. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 1 2011-01-01 2011-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture Office of the Secretary of Agriculture HIGHLY ERODIBLE LAND AND WETLAND CONSERVATION General Provisions § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person...

  1. 7 CFR 1467.19 - Scheme and device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Scheme and device. 1467.19 Section 1467.19 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS WETLANDS RESERVE PROGRAM § 1467.19 Scheme...

  2. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 1 2012-01-01 2012-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture Office of the Secretary of Agriculture HIGHLY ERODIBLE LAND AND WETLAND CONSERVATION General Provisions § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person...

  3. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture Office of the Secretary of Agriculture HIGHLY ERODIBLE LAND AND WETLAND CONSERVATION General Provisions § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person...

  4. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 1 2013-01-01 2013-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture Office of the Secretary of Agriculture HIGHLY ERODIBLE LAND AND WETLAND CONSERVATION General Provisions § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person...

  5. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 1 2014-01-01 2014-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture Office of the Secretary of Agriculture HIGHLY ERODIBLE LAND AND WETLAND CONSERVATION General Provisions § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person...

  6. 7 CFR 623.21 - Scheme and device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 623.21 Section 623.21 Agriculture Regulations of the Department of Agriculture (Continued) NATURAL RESOURCES CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE WATER RESOURCES EMERGENCY WETLANDS RESERVE PROGRAM § 623.21 Scheme and device. (a) If it...

  7. 7 CFR 625.19 - Scheme and device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 625.19 Section 625.19 Agriculture Regulations of the Department of Agriculture (Continued) NATURAL RESOURCES CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE WATER RESOURCES HEALTHY FORESTS RESERVE PROGRAM § 625.19 Scheme and device. (a) If it...

  8. Performance improvement of robots using a learning control scheme

    NASA Technical Reports Server (NTRS)

    Krishna, Ramuhalli; Chiang, Pen-Tai; Yang, Jackson C. S.

    1987-01-01

    Many applications of robots require that the same task be repeated a number of times. In such applications, the errors associated with one cycle are also repeated every cycle of the operation. An off-line learning control scheme is used here to modify the command function which would result in smaller errors in the next operation. The learning scheme is based on a knowledge of the errors and error rates associated with each cycle. Necessary conditions for the iterative scheme to converge to zero errors are derived analytically considering a second order servosystem model. Computer simulations show that the errors are reduced at a faster rate if the error rate is included in the iteration scheme. The results also indicate that the scheme may increase the magnitude of errors if the rate information is not included in the iteration scheme. Modification of the command input using a phase and gain adjustment is also proposed to reduce the errors with one attempt. The scheme is then applied to a computer model of a robot system similar to PUMA 560. Improved performance of the robot is shown by considering various cases of trajectory tracing. The scheme can be successfully used to improve the performance of actual robots within the limitations of the repeatability and noise characteristics of the robot.

  9. LDPC-PPM Coding Scheme for Optical Communication

    NASA Technical Reports Server (NTRS)

    Barsoum, Maged; Moision, Bruce; Divsalar, Dariush; Fitz, Michael

    2009-01-01

    In a proposed coding-and-modulation/demodulation-and-decoding scheme for a free-space optical communication system, an error-correcting code of the low-density parity-check (LDPC) type would be concatenated with a modulation code that consists of a mapping of bits to pulse-position-modulation (PPM) symbols. Hence, the scheme is denoted LDPC-PPM. This scheme could be considered a competitor of a related prior scheme in which an outer convolutional error-correcting code is concatenated with an interleaving operation, a bit-accumulation operation, and a PPM inner code. Both the prior and present schemes can be characterized as serially concatenated pulse-position modulation (SCPPM) coding schemes. Figure 1 represents a free-space optical communication system based on either the present LDPC-PPM scheme or the prior SCPPM scheme. At the transmitting terminal, the original data (u) are processed by an encoder into blocks of bits (a), and the encoded data are mapped to PPM of an optical signal (c). For the purpose of design and analysis, the optical channel in which the PPM signal propagates is modeled as a Poisson point process. At the receiving terminal, the arriving optical signal (y) is demodulated to obtain an estimate (a^) of the coded data, which is then processed by a decoder to obtain an estimate (u^) of the original data.

  10. Comment on "Quantum Signature Scheme with Weak Arbitrator"

    NASA Astrophysics Data System (ADS)

    Kang, Min-Sung; Hong, Chang-Ho; Heo, Jino; Lim, Jong-In; Yang, Hyung-Jin

    2014-06-01

    This comment explains that the quantum signature scheme proposed by Ming-Xing Luo et al. (in Int. J. Theor. Phys. 51:2134, 2012) cannot satisfy the signature requirements. The comment presents methods of possible attacks by forgers, while also demonstrating that it is difficult to proceed by the normal protocol because of some errors in the formula of the scheme.

  11. A high-speed distortionless predictive image-compression scheme

    NASA Technical Reports Server (NTRS)

    Cheung, K.-M.; Smyth, P.; Wang, H.

    1990-01-01

    A high-speed distortionless predictive image-compression scheme that is based on differential pulse code modulation output modeling combined with efficient source-code design is introduced. Experimental results show that this scheme achieves compression that is very close to the difference entropy of the source.

  12. The salivary testosterone and cortisol response to three loading schemes.

    PubMed

    Crewther, Blair; Cronin, John; Keogh, Justin; Cook, Christian

    2008-01-01

    This aim of this study was to examine the free hormone (in saliva) responses to squat workouts performed by recreationally weight-trained males, using either a power (8 sets of 6 reps, 45% 1 repetition maximum [1RM], 3-minute rest periods, ballistic movements), hypertrophy (10 sets of 10 reps, 75% 1RM, 2-minute rest periods, controlled movements), or maximal strength scheme (6 sets of 4 reps, 88% 1RM, 4-minute rest periods, explosive intent). To determine the relative importance of the different training variables, these schemes were equated by workout duration with the power and strength schemes also equated by load volume. Salivary testosterone (T) and cortisol (C) both increased following the hypertrophy scheme (P < 0.05), with little to no hormonal change across the power and maximal strength schemes (P > 0.05). In general, the postexercise T and C responses to the hypertrophy scheme exceeded the other two schemes (P < 0.05). The greater volume of load lifted in the hypertrophy protocol over the same workout duration may explain the endocrine differences observed. The similar T and C responses to the power and maximal strength schemes (of equal volume) support such a view and suggest that differences in load intensity, rest periods, and technique are secondary to volume. Because the acute hormonal responses to resistance exercise contribute to protein metabolism, then load volume may be the most important workout variable activating the endocrine system and stimulating muscle growth.

  13. Review of the Assistance for Isolated Children Scheme.

    ERIC Educational Resources Information Center

    Tomlinson, D. G.; Tannock, P. D.

    A total of 3,732 recipients of Assistance for Isolated Children (AIC) allowances during 1979 and 1980 received questionnaires and parents of 313 families were interviewed to determine who benefitted from the AIC Scheme, what use was made of the AIC allowance, what effect did the AIC Scheme appear to have had, and what anomalies existed in relation…

  14. Convergence Acceleration for Multistage Time-Stepping Schemes

    NASA Technical Reports Server (NTRS)

    Swanson, R. C.; Turkel, Eli L.; Rossow, C-C; Vasta, V. N.

    2006-01-01

    The convergence of a Runge-Kutta (RK) scheme with multigrid is accelerated by preconditioning with a fully implicit operator. With the extended stability of the Runge-Kutta scheme, CFL numbers as high as 1000 could be used. The implicit preconditioner addresses the stiffness in the discrete equations associated with stretched meshes. Numerical dissipation operators (based on the Roe scheme, a matrix formulation, and the CUSP scheme) as well as the number of RK stages are considered in evaluating the RK/implicit scheme. Both the numerical and computational efficiency of the scheme with the different dissipation operators are discussed. The RK/implicit scheme is used to solve the two-dimensional (2-D) and three-dimensional (3-D) compressible, Reynolds-averaged Navier-Stokes equations. In two dimensions, turbulent flows over an airfoil at subsonic and transonic conditions are computed. The effects of mesh cell aspect ratio on convergence are investigated for Reynolds numbers between 5.7 x 10(exp 6) and 100.0 x 10(exp 6). Results are also obtained for a transonic wing flow. For both 2-D and 3-D problems, the computational time of a well-tuned standard RK scheme is reduced at least a factor of four.

  15. On the novel chaotic secure communication scheme design

    NASA Astrophysics Data System (ADS)

    Wang, B.; Zhong, S. M.; Dong, X. C.

    2016-10-01

    In this paper, the problem on the chaotic secure communication is discussed. First a new dual channel transmission mechanism is presented and used in secure communication scheme design, then the channel-switching techniques are adopted to further improve the security of information transmission. Finally some typical numerical simulations are carried out to demonstrate the effectiveness of the proposed secure communication scheme.

  16. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device....

  17. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device....

  18. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device....

  19. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device....

  20. A Learning Scheme for Information Retrieval in Hypertext.

    ERIC Educational Resources Information Center

    Savoy, Jacques

    1994-01-01

    Proposes a new learning algorithm to improve the retrieval effectiveness of the search system used in the hypertext environment using an extended Boolean model with links to improve the ranking of retrieved items. Highlights include the basic retrieval scheme, the learning scheme, and a review of basic probabilistic retrieval models. (Contains 32…

  1. New User Support in the University Network with DACS Scheme

    ERIC Educational Resources Information Center

    Odagiri, Kazuya; Yaegashi, Rihito; Tadauchi, Masaharu; Ishii, Naohiro

    2007-01-01

    Purpose: The purpose of this paper is to propose and examine the new user support in university network. Design/methodology/approach: The new user support is realized by use of DACS (Destination Addressing Control System) Scheme which manages a whole network system through communication control on a client computer. This DACS Scheme has been…

  2. Quantum secret sharing schemes and reversibility of quantum operations

    SciTech Connect

    Ogawa, Tomohiro; Sasaki, Akira; Iwamoto, Mitsugu; Yamamoto, Hirosuke

    2005-09-15

    Quantum secret sharing schemes encrypting a quantum state into a multipartite entangled state are treated. The lower bound on the dimension of each share given by Gottesman [Phys. Rev. A 61, 042311 (2000)] is revisited based on a relation between the reversibility of quantum operations and the Holevo information. We also propose a threshold ramp quantum secret sharing scheme and evaluate its coding efficiency.

  3. Ranking Schemes in Hybrid Boolean Systems: A New Approach.

    ERIC Educational Resources Information Center

    Savoy, Jacques

    1997-01-01

    Suggests a new ranking scheme especially adapted for hypertext environments in order to produce more effective retrieval results and still use Boolean search strategies. Topics include Boolean ranking schemes; single-term indexing and term weighting; fuzzy set theory extension; and citation indexing. (64 references) (Author/LRW)

  4. Receptivity of a TVD Scheme in Incompressible Flow Analysis

    NASA Astrophysics Data System (ADS)

    Shin, Byeong Rog

    A TVD upwind scheme originally designed for compressible flow is applied to the SMAC finite-difference method for incompressible flow analysis. The receptivity and validity of this application are investigated by an evaluation of the accuracy, stability and convergence rate for the SMAC method combined with the TVD scheme. Using this method, three-dimensional developing entry flows through a square-curved duct are calculated and compared with available experimental data as well as some computational results obtained by QUICKs and third-order upwind schemes. Such comparisons show that the numerical method applying the TVD scheme has the highest computational efficiency without a sharp loss of accuracy, resulting in confidence in the application this scheme to incompressible flow computations.

  5. Comparison of Several Dissipation Algorithms for Central Difference Schemes

    NASA Technical Reports Server (NTRS)

    Swanson, R. C.; Radespiel, R.; Turkel, E.

    1997-01-01

    Several algorithms for introducing artificial dissipation into a central difference approximation to the Euler and Navier Stokes equations are considered. The focus of the paper is on the convective upwind and split pressure (CUSP) scheme, which is designed to support single interior point discrete shock waves. This scheme is analyzed and compared in detail with scalar and matrix dissipation (MATD) schemes. Resolution capability is determined by solving subsonic, transonic, and hypersonic flow problems. A finite-volume discretization and a multistage time-stepping scheme with multigrid are used to compute solutions to the flow equations. Numerical results are also compared with either theoretical solutions or experimental data. For transonic airfoil flows the best accuracy on coarse meshes for aerodynamic coefficients is obtained with a simple MATD scheme.

  6. A Secure and Efficient Threshold Group Signature Scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Yansheng; Wang, Xueming; Qiu, Gege

    The paper presents a secure and efficient threshold group signature scheme aiming at two problems of current threshold group signature schemes: conspiracy attack and inefficiency. Scheme proposed in this paper takes strategy of separating designed clerk who is responsible for collecting and authenticating each individual signature from group, the designed clerk don't participate in distribution of group secret key and has his own public key and private key, designed clerk needs to sign part information of threshold group signature after collecting signatures. Thus verifier has to verify signature of the group after validating signature of the designed clerk. This scheme is proved to be secure against conspiracy attack at last and is more efficient by comparing with other schemes.

  7. The construction of high-accuracy schemes for acoustic equations

    NASA Technical Reports Server (NTRS)

    Tang, Lei; Baeder, James D.

    1995-01-01

    An accuracy analysis of various high order schemes is performed from an interpolation point of view. The analysis indicates that classical high order finite difference schemes, which use polynomial interpolation, hold high accuracy only at nodes and are therefore not suitable for time-dependent problems. Thus, some schemes improve their numerical accuracy within grid cells by the near-minimax approximation method, but their practical significance is degraded by maintaining the same stencil as classical schemes. One-step methods in space discretization, which use piecewise polynomial interpolation and involve data at only two points, can generate a uniform accuracy over the whole grid cell and avoid spurious roots. As a result, they are more accurate and efficient than multistep methods. In particular, the Cubic-Interpolated Psuedoparticle (CIP) scheme is recommended for computational acoustics.

  8. A river flow routing scheme for general circulation models

    NASA Astrophysics Data System (ADS)

    Arora, Vivek K.; Chiew, Francis H. S.; Grayson, Rodger B.

    1999-06-01

    The routing of runoff estimates from General Circulation Models (GCMs) is important to model river flow from large river basins and to estimate freshwater inflow into the oceans. Present routing approaches use arbitrary constants and empirical equations to determine travel times between the GCM grid cells. A new river flow routing scheme is developed, which uses physical catchment and river channel information and river discharge data. The scheme uses surface runoff and deep percolation data from land surface parameterization schemes, and routing is performed via linear surface and groundwater reservoirs. Geomorphological relationships between mean annual river discharge and other physical variables are used to interpolate existing information to define the channel morphology for the digital river networks at the routing model resolution. Applications of the routing scheme to the Mississippi and Amazon River Basins indicate that it performs adequately. The scheme does not require the calibration of parameters and can thus be easily used in GCMs.

  9. Factorizable Upwind Schemes: The Triangular Unstructured Grid Formulation

    NASA Technical Reports Server (NTRS)

    Sidilkover, David; Nielsen, Eric J.

    2001-01-01

    The upwind factorizable schemes for the equations of fluid were introduced recently. They facilitate achieving the Textbook Multigrid Efficiency (TME) and are expected also to result in the solvers of unparalleled robustness. The approach itself is very general. Therefore, it may well become a general framework for the large-scale, Computational Fluid Dynamics. In this paper we outline the triangular grid formulation of the factorizable schemes. The derivation is based on the fact that the factorizable schemes can be expressed entirely using vector notation. without explicitly mentioning a particular coordinate frame. We, describe the resulting discrete scheme in detail and present some computational results verifying the basic properties of the scheme/solver.

  10. On Approximate Factorization Schemes for Solving the Full Potential Equation

    NASA Technical Reports Server (NTRS)

    Holst, Terry L.

    1997-01-01

    An approximate factorization scheme based on the AF2 algorithm is presented for solving the three-dimensional full potential equation for the transonic flow about isolated wings. Two spatial discretization variations are presented, one using a hybrid first-order/second-order-accurate scheme and the second using a fully second-order-accurate scheme. The present algorithm utilizes a C-H grid topology to map the flow field about the wing. One version of the AF2 iteration scheme is used on the upper wing surface and another slightly modified version is used on the lower surface. These two algorithm variations are then connected at the wing leading edge using a local iteration technique. The resulting scheme has improved linear stability characteristics and improved time-like damping characteristics relative to previous implementations of the AF2 algorithm. The presentation is highlighted with a grid refinement study and a number of numerical results.

  11. A new antiproton beam transfer scheme without coalescing

    SciTech Connect

    Weiren Chou et al.

    2003-06-04

    An effective way to increase the luminosity in the Fermilab Tevatron collider program Run2 is to improve the overall antiproton transfer efficiency. During antiproton coalescing in the Main Injector (MI), about 10-15% particles get lost. This loss could be avoided in a new antiproton transfer scheme that removes coalescing from the process. Moreover, this scheme would also eliminate emittance dilution due to coalescing. This scheme uses a 2.5 MHz RF system to transfer antiprotons from the Accumulator to the Main Injector. It is then followed by a bunch rotation in the MI to shorten the bunch length so that it can be captured by a 53 MHz RF bucket. Calculations and ESME simulations show that this scheme works. No new hardware is needed to implement this scheme.

  12. Improved-efficiency DSMC collision-partner selection schemes.

    SciTech Connect

    Gallis, Michail A.; Torczynski, John Robert

    2010-11-01

    The effect of collision-partner selection schemes on the accuracy and the efficiency of the Direct Simulation Monte Carlo (DSMC) method of Bird is investigated. Several schemes to reduce the total discretization error as a function of the mean collision separation and the mean collision time are examined. These include the historically first sub-cell scheme, the more recent nearest-neighbor scheme, and various near-neighbor schemes, which are evaluated for their effect on the thermal conductivity for Fourier flow. Their convergence characteristics as a function of spatial and temporal discretization and the number of simulators per cell are compared to the convergence characteristics of the sophisticated and standard DSMC algorithms. Improved performance is obtained if the population from which possible collision partners are selected is an appropriate fraction of the population of the cell.

  13. Completely anonymous multi-recipient signcryption scheme with public verification.

    PubMed

    Pang, Liaojun; Li, Huixian; Gao, Lu; Wang, Yumin

    2013-01-01

    Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer's anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer's and the recipient's anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer's and the recipient's anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant. PMID:23675490

  14. Comparison of two schemes for derivation of atmospheric motion vectors

    NASA Astrophysics Data System (ADS)

    Xu, J.; Holmlund, K.; Zhang, Q.; Schmetz, J.

    2002-07-01

    This paper presents the operational scheme of the National Satellite Meteorological Center (NSMC) of the China Meteorological Administration (CMA) to derive atmospheric motion vectors. The NSMC scheme is compared with a method developed at the European Organization for the Exploitation of Meteorological Satellites (EUMETSAT) in preparation for Meteosat Second Generation. Both schemes employ similar basic principles in terms of feature tracking and height assignment, however there are also some important differences. Furthermore, the EUMETSAT scheme assigns quality indicators to each wind vector at the end of the processing chain, whereas the NMSC scheme has inbuilt quality checking at different processing steps allowing for reinstatement of winds rejected by a first quality check. The evaluation of the performance is gained from two periods: a week in January and a week in July 1999. European Centre for Medium-Range Weather Forecast analyses and radiosonde data are used as independent data for evaluation of the two schemes. It is shown that correlating infrared image data with water vapor data before height adjustment, as performed in the NSMC scheme, has a great potential to better distinguish high and low cloud and to provide high-density wind fields. The utilization of radiative transfer calculations for the estimation of the height of thin clouds in the EUMETSAT scheme is shown to be imperative for good quality wind fields. Finally, the feature of the EUMETSAT scheme to assign quality indicators improves the utility of the wind vectors for use in numerical weather prediction models. It is suggested that a combination of the different features of both schemes potentially provide highly increased spatial density in the wind field with improved quality.

  15. Generalized energy and potential enstrophy conserving finite difference schemes for the shallow water equations

    NASA Technical Reports Server (NTRS)

    Abramopoulos, Frank

    1988-01-01

    The conditions under which finite difference schemes for the shallow water equations can conserve both total energy and potential enstrophy are considered. A method of deriving such schemes using operator formalism is developed. Several such schemes are derived for the A-, B- and C-grids. The derived schemes include second-order schemes and pseudo-fourth-order schemes. The simplest B-grid pseudo-fourth-order schemes are presented.

  16. Upwind schemes and bifurcating solutions in real gas computations

    NASA Technical Reports Server (NTRS)

    Suresh, Ambady; Liou, Meng-Sing

    1992-01-01

    The area of high speed flow is seeing a renewed interest due to advanced propulsion concepts such as the National Aerospace Plane (NASP), Space Shuttle, and future civil transport concepts. Upwind schemes to solve such flows have become increasingly popular in the last decade due to their excellent shock capturing properties. In the first part of this paper the authors present the extension of the Osher scheme to equilibrium and non-equilibrium gases. For simplicity, the source terms are treated explicitly. Computations based on the above scheme are presented to demonstrate the feasibility, accuracy and efficiency of the proposed scheme. One of the test problems is a Chapman-Jouguet detonation problem for which numerical solutions have been known to bifurcate into spurious weak detonation solutions on coarse grids. Results indicate that the numerical solution obtained depends both on the upwinding scheme used and the limiter employed to obtain second order accuracy. For example, the Osher scheme gives the correct CJ solution when the super-bee limiter is used, but gives the spurious solution when the Van Leer limiter is used. With the Roe scheme the spurious solution is obtained for all limiters.

  17. The GP retainer scheme: report of a national survey.

    PubMed

    Lockyer, Lesley; Young, Pat; Main, Paul Gn; Morison, Jim

    2014-11-01

    The current context of organisational change and new working patterns, together with the high cost of medical training, mean it is of vital importance that the NHS retains its trained workforce. The GP retainer scheme supports doctors who for reasons of personal circumstance are restricted in their ability to compete for employment in medicine, and aims to facilitate the retention of their skills and confidence. This national study evaluates the experiences and views of current and past GP retainers and provides a rigorous assessment of the retainer scheme. It is a mixed method study: an online questionnaire was completed by 318 current and ex-retainers across the UK; follow-up telephone interviews were conducted with 30 respondents. The study finds that the GP retainer scheme is effective in retaining GPs through times of transition and provides evidence to support the continuing funding of the scheme across the UK. The scheme is beneficial for doctors who also have a role in caring for young children and is also highly valued by a minority of GP retainers who are using it to return to work after illness, or to practice in a more limited role, due to chronic illness or disability. This study found variations in the implementation of the educational entitlement which is fundamental to the scheme. A minority of retainers experienced problems with the implementation of the scheme and recommendations are made for improvements. PMID:25693154

  18. A modified symplectic scheme for seismic wave modeling

    NASA Astrophysics Data System (ADS)

    Liu, Shaolin; Li, Xiaofan; Wang, Wenshuai; Xu, Ling; Li, Bingfei

    2015-05-01

    Symplectic integrators are well known for their excellent performance in solving partial differential equation of dynamical systems because they are capable of preserving some conservative properties of dynamic equations. However, there are not enough high-order, for example third-order symplectic schemes, which are suitable for seismic wave equations. Here, we propose a strategy to construct a symplectic scheme that is based on a so-called high-order operator modification method. We first employ a conventional two-stage Runge-Kutta-Nyström (RKN) method to solve the ordinary differential equations, which are derived from the spatial discretization of the seismic wave equations. We then add a high-order term to the RKN method. Finally, we obtain a new third-order symplectic scheme with all positive symplectic coefficients, and it is defined based on the order condition, the symplectic condition, the stability condition and the dispersion relation. It is worth noting that the new scheme is independent of the spatial discretization type used, and we simply apply some finite difference operators to approximate the spatial derivatives of the isotropic elastic equations for a straightforward discussion. For the theoretical analysis, we obtain the semi-analytic stability conditions of our scheme with various orders of spatial approximation. The stability and dispersion properties of our scheme are also compared with conventional schemes to illustrate the favorable numerical behaviors of our scheme in terms of precision, stability and dispersion characteristics. Finally, three numerical experiments are employed to further demonstrate the validity of our method. The modified strategy that is proposed in this paper can be used to construct other explicit symplectic schemes.

  19. AMR vs High Order Schemes Wavelets as a Guide

    SciTech Connect

    Jameson, L.

    2000-10-04

    The final goal behind any numerical method is give the smallest wall-clock time for a given final time error or, conversely, the smallest run-time error for a given wall clock time, etc. Here a comparison will be given between adaptive mesh refinement schemes and non-adaptive schemes of higher order. It will be shown that in three dimension calculations that in order for AMR schemes to be competitive that the finest scale must be restricted to an extremely, and unrealistic, small percentage of the computational domain.

  20. A simple scheme for injection and extraction in compact rings

    SciTech Connect

    Xu, H. S. Huang, W. H.; Tang, C. X.

    2014-03-15

    There has been great interest in building compact synchrotrons for various applications, for example, inverse Compton scattering X-ray sources. However, the beam injection and extraction in compact rings require careful design for the lack of space. In this paper, we propose a simple combined injection-extraction scheme exploiting the fringe field of existing dipole magnets instead of additional septum magnets. This scheme is illustrated by using the 4.8 m ring proposed for Tsinghua Thomson scattering X-ray source as an example. Particle tracking is applied to demonstrate the validity of this scheme.

  1. The Implicit and Explicit alpha-mu Schemes

    NASA Technical Reports Server (NTRS)

    Chang, Sin-Chung; Himansu, Ananda

    1997-01-01

    Artificial numerical dissipation is an important issue in large Reynolds number computations. In such computations, the artificial dissipation inherent in traditional numerical schemes can overwhelm the physical dissipation and yield inaccurate results on meshes of practical size. In the present work, the space-time conservation element and solution element method is used to construct new and accurate numerical schemes such that artificial numerical dissipation will not overwhelm physical dissipation. Specifically, these schemes have the property that numerical dissipation vanishes when the physical viscosity goes to zero. These new schemes therefore accurately model the physical dissipation even when it is extremely small. The method of space-time conservation element and solution element, currently under development, is a nontraditional numerical method for solving conservation laws. The method is developed on the basis of local and global flux conservation in a space-time domain, in which space and time are treated in a unified manner. Explicit solvers for model and fluid dynamic conservation laws have previously been investigated. In this paper, we introduce a new concept in the design of implicit schemes, and use it to construct two highly accurate solvers for a convection-diffusion equation. The two schemes become identical in the pure convection case, and in the pure diffusion case. The implicit schemes are applicable over the whole Reynolds number range, from purely diffusive equations to purely inviscid (convective) equations. The stability and consistency of the schemes are analyzed, and some numerical results are presented. It is shown that, in the inviscid case, the new schemes become explicit and their amplification factors are identical to those of the Leapfrog scheme. On the other hand, in the pure diffusion case, their principal amplification factor becomes the amplification factor of the Crank-Nicolson scheme. We also construct an explicit solver

  2. Weighted-mean scheme for solving incompressible viscous flow

    NASA Technical Reports Server (NTRS)

    Huynh, Q. Q.

    1981-01-01

    The problem of how a boundary layer responds to the motion of a convexed vortex on a porous wall was investigated. The wall velocity is approximately given by Darcy's law. The vorticity-stream function approach was adopted for solving Navier-Stokes equations of two dimensional incompressible viscous flows. The weighted-mean scheme was used for constructing finite difference approximations of spatial derivatives. Several test problems were solved and numerical results demonstrate clearly the accuracy, stability, and efficiency of the scheme. The weighted mean scheme then can be applied to the vortical flow problem.

  3. An Energy Decaying Scheme for Nonlinear Dynamics of Shells

    NASA Technical Reports Server (NTRS)

    Bottasso, Carlo L.; Bauchau, Olivier A.; Choi, Jou-Young; Bushnell, Dennis M. (Technical Monitor)

    2000-01-01

    A novel integration scheme for nonlinear dynamics of geometrically exact shells is developed based on the inextensible director assumption. The new algorithm is designed so as to imply the strict decay of the system total mechanical energy at each time step, and consequently unconditional stability is achieved in the nonlinear regime. Furthermore, the scheme features tunable high frequency numerical damping and it is therefore stiffly accurate. The method is tested for a finite element spatial formulation of shells based on mixed interpolations of strain tensorial components and on a two-parameter representation of director rotations. The robustness of the, scheme is illustrated with the help of numerical examples.

  4. Multi-dimensional ENO schemes for general geometries

    NASA Technical Reports Server (NTRS)

    Harten, Ami; Chakravarthy, Sukumar R.

    1991-01-01

    A class of ENO schemes is presented for the numerical solution of multidimensional hyperbolic systems of conservation laws in structured and unstructured grids. This is a class of shock-capturing schemes which are designed to compute cell-averages to high order accuracy. The ENO scheme is composed of a piecewise-polynomial reconstruction of the solution form its given cell-averages, approximate evolution of the resulting initial value problem, and averaging of this approximate solution over each cell. The reconstruction algorithm is based on an adaptive selection of stencil for each cell so as to avoid spurious oscillations near discontinuities while achieving high order of accuracy away from them.

  5. Recent progress on essentially non-oscillatory shock capturing schemes

    NASA Technical Reports Server (NTRS)

    Osher, Stanley; Shu, Chi-Wang

    1989-01-01

    An account is given of the construction of efficient implementations of 'essentially nonoscillatory' (ENO) schemes that approximate systems of hyperbolic conservation laws. ENO schemes use a local adaptive stencil to automatically obtain information from regions of smoothness when the solution develops discontinuities. Approximations employing ENOs can thereby obtain uniformly high accuracy to the very onset of discontinuities, while retaining a sharp and essentially nonoscillatory shock transition. For ease of implementation, ENO schemes applying the adaptive stencil concept to the numerical fluxes and employing a TVD Runge-Kutta-type time discretization are constructed.

  6. Triangle based TVD schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Durlofsky, Louis J.; Osher, Stanley; Engquist, Bjorn

    1990-01-01

    A triangle based total variation diminishing (TVD) scheme for the numerical approximation of hyperbolic conservation laws in two space dimensions is constructed. The novelty of the scheme lies in the nature of the preprocessing of the cell averaged data, which is accomplished via a nearest neighbor linear interpolation followed by a slope limiting procedures. Two such limiting procedures are suggested. The resulting method is considerably more simple than other triangle based non-oscillatory approximations which, like this scheme, approximate the flux up to second order accuracy. Numerical results for linear advection and Burgers' equation are presented.

  7. Quantum Ramp Secret Sharing Scheme and Quantum Operations

    NASA Astrophysics Data System (ADS)

    Xiao, Heling; Wang, Huifeng; Wang, Bin

    2016-09-01

    In order to improve the efficiency of quantum secret sharing, quantum ramp secret sharing schemes were proposed (Ogawa et al., Phys. Rev. A 72, 032318 [2005]), which had a trade-off between security and coding efficiency. In quantum ramp secret sharing, partial information about the secret is allowed to leak to a set of participants, called an intermediate set, which cannot fully reconstruct the secret. This paper revisits the size of a share in the quantum ramp secret scheme based on a relation between the quantum operations and the coherent information. We also propose an optimal quantum ramp secret sharing scheme.

  8. Implicit schemes and parallel computing in unstructured grid CFD

    NASA Technical Reports Server (NTRS)

    Venkatakrishnam, V.

    1995-01-01

    The development of implicit schemes for obtaining steady state solutions to the Euler and Navier-Stokes equations on unstructured grids is outlined. Applications are presented that compare the convergence characteristics of various implicit methods. Next, the development of explicit and implicit schemes to compute unsteady flows on unstructured grids is discussed. Next, the issues involved in parallelizing finite volume schemes on unstructured meshes in an MIMD (multiple instruction/multiple data stream) fashion are outlined. Techniques for partitioning unstructured grids among processors and for extracting parallelism in explicit and implicit solvers are discussed. Finally, some dynamic load balancing ideas, which are useful in adaptive transient computations, are presented.

  9. A Motion-Compensating Image-Compression Scheme

    NASA Technical Reports Server (NTRS)

    Wong, Carol

    1994-01-01

    Chrominance used (in addition to luminance) in estimating motion. Variable-rate digital coding scheme for compression of color-video-image data designed to deliver pictures of good quality at moderate compressed-data rate of 1 to 2 bits per pixel, or of fair quality at rate less than 1 bit per pixel. Scheme, in principle, implemented by use of commercially available application-specific integrated circuits. Incorporates elements of some prior coding schemes, including motion compensation (MC) and discrete cosine transform (DCT).

  10. Improved Boundary Conditions for Cell-centered Difference Schemes

    NASA Technical Reports Server (NTRS)

    VanderWijngaart, Rob F.; Klopfer, Goetz H.; Chancellor, Marisa K. (Technical Monitor)

    1997-01-01

    Cell-centered finite-volume (CCFV) schemes have certain attractive properties for the solution of the equations governing compressible fluid flow. Among others, they provide a natural vehicle for specifying flux conditions at the boundaries of the physical domain. Unfortunately, they lead to slow convergence for numerical programs utilizing them. In this report a method for investigating and improving the convergence of CCFV schemes is presented, which focuses on the effect of the numerical boundary conditions. The key to the method is the computation of the spectral radius of the iteration matrix of the entire demoralized system of equations, not just of the interior point scheme or the boundary conditions.

  11. An adaptive control scheme for coordinated multimanipulator systems

    SciTech Connect

    Jonghann Jean; Lichen Fu . Dept. of Electrical Engineering)

    1993-04-01

    The problem of adaptive coordinated control of multiple robot arms transporting an object is addressed. A stable adaptive control scheme for both trajectory tracking and internal force control is presented. Detailed analyses on tracking properties of the object position, velocity and the internal forces exerted on the object are given. It is shown that this control scheme can achieve satisfactory tracking performance without using the measurement of contact forces and their derivatives. It can be shown that this scheme can be realized by decentralized implementation to reduce the computational burden. Moreover, some efficient adaptive control strategies can be incorporated to reduce the computational complexity.

  12. Accurate Monotonicity - Preserving Schemes With Runge-Kutta Time Stepping

    NASA Technical Reports Server (NTRS)

    Suresh, A.; Huynh, H. T.

    1997-01-01

    A new class of high-order monotonicity-preserving schemes for the numerical solution of conservation laws is presented. The interface value in these schemes is obtained by limiting a higher-order polynominal reconstruction. The limiting is designed to preserve accuracy near extrema and to work well with Runge-Kutta time stepping. Computational efficiency is enhanced by a simple test that determines whether the limiting procedure is needed. For linear advection in one dimension, these schemes are shown as well as the Euler equations also confirm their high accuracy, good shock resolution, and computational efficiency.

  13. A simple photoionization scheme for characterizing electron and ion spectrometers

    NASA Astrophysics Data System (ADS)

    Wituschek, A.; von Vangerow, J.; Grzesiak, J.; Stienkemeier, F.; Mudrich, M.

    2016-08-01

    We present a simple diode laser-based photoionization scheme for generating electrons and ions with well-defined spatial and energetic (≲2 eV) structures. This scheme can easily be implemented in ion or electron imaging spectrometers for the purpose of off-line characterization and calibration. The low laser power ˜1 mW needed from a passively stabilized diode laser and the low flux of potassium atoms in an effusive beam make our scheme a versatile source of ions and electrons for applications in research and education.

  14. Performance of hashed cache data migration schemes on multicomputers

    NASA Technical Reports Server (NTRS)

    Hiranandani, Seema; Saltz, Joel; Mehrotra, Piyush; Berryman, Harry

    1991-01-01

    After conducting an examination of several data-migration mechanisms which permit an explicit and controlled mapping of data to memory, a set of schemes for storage and retrieval of off-processor array elements is experimentally evaluated and modeled. All schemes considered have their basis in the use of hash tables for efficient access of nonlocal data. The techniques in question are those of hashed cache, partial enumeration, and full enumeration; in these, nonlocal data are stored in hash tables, so that the operative difference lies in the amount of memory used by each scheme and in the retrieval mechanism used for nonlocal data.

  15. A New Scheme for Probabilistic Teleportation and Its Potential Applications

    NASA Astrophysics Data System (ADS)

    Wei, Jia-Hua; Dai, Hong-Yi; Zhang, Ming

    2013-12-01

    We propose a novel scheme to probabilistically teleport an unknown two-level quantum state when the information of the partially entangled state is only available for the sender. This is in contrast with the fact that the receiver must know the non-maximally entangled state in previous typical schemes for the teleportation. Additionally, we illustrate two potential applications of the novel scheme for probabilistic teleportation from a sender to a receiver with the help of an assistant, who plays distinct roles under different communication conditions, and our results show that the novel proposal could enlarge the applied range of probabilistic teleportation.

  16. Direct simulations of turbulent flow using finite-difference schemes

    NASA Technical Reports Server (NTRS)

    Rai, Man Mohan; Moin, Parviz

    1989-01-01

    A high-order accurate finite-difference approach is presented for calculating incompressible turbulent flow. The methods used include a kinetic energy conserving central difference scheme and an upwind difference scheme. The methods are evaluated in test cases for the evolution of small-amplitude disturbances and fully developed turbulent channel flow. It is suggested that the finite-difference approach can be applied to complex geometries more easilty than highly accurate spectral methods. It is concluded that the upwind scheme is a good candidate for direct simulations of turbulent flows over complex geometries.

  17. Pulse-Modulation Scheme For Voice And Telemetry

    NASA Technical Reports Server (NTRS)

    Mills, William J.

    1993-01-01

    Pulse-modulation scheme provides for transmission of 1 channel of voice information along with 16 channels of serially multiplexed analog iotelemetric information, all on single radio-frequency carrier signal. Encoder/multiplexer combination effects PMD scheme, in which biotelemetry encoded in time-division multiplex PIM, while voice encoded in PWM. Combination of PIM and PWM encoding called "pulse modulated data" or PMD. Principal advantage of scheme simplicity: comodulation of voice along with biotelemetry involves minimal additional circuitry in transmitter. In receiver, biotelemetric data extracted by ordinary PIM-encoding circuitry, not affected by voice PWM; and simple PWM decoder added to receiver to recover voice.

  18. An optimized quantum information splitting scheme with multiple controllers

    NASA Astrophysics Data System (ADS)

    Jiang, Min

    2016-09-01

    We propose an efficient scheme for splitting multi-qudit information with cooperative control of multiple agents. Each controller is assigned one controlling qudit, and he can monitor the state sharing of all multi-qudit information. Compared with the existing schemes, our scheme requires less resource consumption and approaches higher communication efficiency. In addition, our proposal involves only generalized Bell-state measurement, single-qudit measurement, one-qudit gates and a unitary-reduction operation, which makes it flexible and achievable for physical implementation.

  19. An efficient quantum scheme for Private Set Intersection

    NASA Astrophysics Data System (ADS)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    Private Set Intersection allows a client to privately compute set intersection with the collaboration of the server, which is one of the most fundamental and key problems within the multiparty collaborative computation of protecting the privacy of the parties. In this paper, we first present a cheat-sensitive quantum scheme for Private Set Intersection. Compared with classical schemes, our scheme has lower communication complexity, which is independent of the size of the server's set. Therefore, it is very suitable for big data services in Cloud or large-scale client-server networks.

  20. A simple photoionization scheme for characterizing electron and ion spectrometers.

    PubMed

    Wituschek, A; von Vangerow, J; Grzesiak, J; Stienkemeier, F; Mudrich, M

    2016-08-01

    We present a simple diode laser-based photoionization scheme for generating electrons and ions with well-defined spatial and energetic (≲2 eV) structures. This scheme can easily be implemented in ion or electron imaging spectrometers for the purpose of off-line characterization and calibration. The low laser power ∼1 mW needed from a passively stabilized diode laser and the low flux of potassium atoms in an effusive beam make our scheme a versatile source of ions and electrons for applications in research and education. PMID:27587098

  1. Higher-order schemes with CIP method and adaptive Soroban grid towards mesh-free scheme

    NASA Astrophysics Data System (ADS)

    Yabe, Takashi; Mizoe, Hiroki; Takizawa, Kenji; Moriki, Hiroshi; Im, Hyo-Nam; Ogata, Youichi

    2004-02-01

    A new class of body-fitted grid system that can keep the third-order accuracy in time and space is proposed with the help of the CIP (constrained interpolation profile/cubic interpolated propagation) method. The grid system consists of the straight lines and grid points moving along these lines like abacus - Soroban in Japanese. The length of each line and the number of grid points in each line can be different. The CIP scheme is suitable to this mesh system and the calculation of large CFL (>10) at locally refined mesh is easily performed. Mesh generation and searching of upstream departure point are very simple and almost mesh-free treatment is possible. Adaptive grid movement and local mesh refinement are demonstrated.

  2. A Computer Oriented Scheme for Coding Chemicals in the Field of Biomedicine.

    ERIC Educational Resources Information Center

    Bobka, Marilyn E.; Subramaniam, J.B.

    The chemical coding scheme of the Medical Coding Scheme (MCS), developed for use in the Comparative Systems Laboratory (CSL), is outlined and evaluated in this report. The chemical coding scheme provides a classification scheme and encoding method for drugs and chemical terms. Using the scheme complicated chemical structures may be expressed…

  3. On the Conservation and Convergence to Weak Solutions of Global Schemes

    NASA Technical Reports Server (NTRS)

    Carpenter, Mark H.; Gottlieb, David; Shu, Chi-Wang

    2001-01-01

    In this paper we discuss the issue of conservation and convergence to weak solutions of several global schemes, including the commonly used compact schemes and spectral collocation schemes, for solving hyperbolic conservation laws. It is shown that such schemes, if convergent boundedly almost everywhere, will converge to weak solutions. The results are extensions of the classical Lax-Wendroff theorem concerning conservative schemes.

  4. Explicit Von Neumann Stability Conditions for the c-tau Scheme: A Basic Scheme in the Development of the CE-SE Courant Number Insensitive Schemes

    NASA Technical Reports Server (NTRS)

    Chang, Sin-Chung

    2005-01-01

    As part of the continuous development of the space-time conservation element and solution element (CE-SE) method, recently a set of so call ed "Courant number insensitive schemes" has been proposed. The key advantage of these new schemes is that the numerical dissipation associa ted with them generally does not increase as the Courant number decre ases. As such, they can be applied to problems with large Courant number disparities (such as what commonly occurs in Navier-Stokes problem s) without incurring excessive numerical dissipation.

  5. Improving multivariate Horner schemes with Monte Carlo tree search

    NASA Astrophysics Data System (ADS)

    Kuipers, J.; Plaat, A.; Vermaseren, J. A. M.; van den Herik, H. J.

    2013-11-01

    Optimizing the cost of evaluating a polynomial is a classic problem in computer science. For polynomials in one variable, Horner's method provides a scheme for producing a computationally efficient form. For multivariate polynomials it is possible to generalize Horner's method, but this leaves freedom in the order of the variables. Traditionally, greedy schemes like most-occurring variable first are used. This simple textbook algorithm has given remarkably efficient results. Finding better algorithms has proved difficult. In trying to improve upon the greedy scheme we have implemented Monte Carlo tree search, a recent search method from the field of artificial intelligence. This results in better Horner schemes and reduces the cost of evaluating polynomials, sometimes by factors up to two.

  6. TVD scheme for computing open channel wave flows

    NASA Astrophysics Data System (ADS)

    Buntina, M. V.; Ostapenko, V. V.

    2008-12-01

    For the shallow water equations in the first approximation (Saint-Venant equations), a TVD scheme is developed for shock-capturing computations of open channel flows with discontinuous waves. The scheme is based on a special nondivergence approximation of the total momentum equation that does not involve integrals related to the cross-section pressure force and the channel wall reaction. In standard divergence difference schemes, most of the CPU time is spent on the computation of these integrals. Test computations demonstrate that the discontinuity relations reproduced by the scheme are accurate enough for actual discontinuous wave propagation to be numerically simulated. All the qualitatively distinct solutions for a dam collapsing in a trapezoidal channel with a contraction in the tailwater area are constructed as an example.

  7. Renormalization-scheme-invariant perturbation theory: Miracle or mirage

    SciTech Connect

    Chyla, J.

    1985-05-15

    A recently proposed solution to the renormalization-scheme ambiguity in perturbation theory is critically analyzed and shown to possess another kind of ambiguity closely related to the one it is supposed to cure.

  8. 7 CFR 1430.220 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS DAIRY PRODUCTS Milk Income Loss Contract Program § 1430.220 Misrepresentation and scheme or device. (a) A dairy operation shall...

  9. Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model

    NASA Astrophysics Data System (ADS)

    Dhar, Pranab Kumar; Kim, Cheol Hong; Kim, Jong-Myon

    Digital watermarking has been widely used for protecting digital contents from unauthorized duplication. This paper proposes a new watermarking scheme based on spectral modeling synthesis (SMS) for copyright protection of digital contents. SMS defines a sound as a combination of deterministic events plus a stochastic component that makes it possible for a synthesized sound to attain all of the perceptual characteristics of the original sound. In our proposed scheme, watermarks are embedded into the highest prominent peak of the magnitude spectrum of each non-overlapping frame in peak trajectories. Simulation results indicate that the proposed watermarking scheme is highly robust against various kinds of attacks such as noise addition, cropping, re-sampling, re-quantization, and MP3 compression and achieves similarity values ranging from 17 to 22. In addition, our proposed scheme achieves signal-to-noise ratio (SNR) values ranging from 29 dB to 30 dB.

  10. GENERAL: Linear Optical Scheme for Implementing Optimal Real State Cloning

    NASA Astrophysics Data System (ADS)

    Wan, Hong-Bo; Ye, Liu

    2010-06-01

    We propose an experimental scheme for implementing the optimal 1 → 3 real state cloning via linear optical elements. This method relies on one polarized qubit and two location qubits and is feasible with current experimental technology.

  11. Progress with multigrid schemes for hypersonic flow problems

    NASA Technical Reports Server (NTRS)

    Radespiel, R.; Swanson, R. C.

    1991-01-01

    Several multigrid schemes are considered for the numerical computation of viscous hypersonic flows. For each scheme, the basic solution algorithm uses upwind spatial discretization with explicit multistage time stepping. Two level versions of the various multigrid algorithms are applied to the two dimensional advection equation, and Fourier analysis is used to determine their damping properties. The capabilities of the multigrid methods are assessed by solving three different hypersonic flow problems. Some new multigrid schemes based on semicoarsening strategies are shown to be quite effective in relieving the stiffness caused by the high aspect ratio cells required to resolve high Reynolds number flows. These schemes exhibit good convergence rates for Reynolds numbers up to 200 x 10(exp 6) and Mach numbers up to 25.

  12. A Two-Timescale Discretization Scheme for Collocation

    NASA Technical Reports Server (NTRS)

    Desai, Prasun; Conway, Bruce A.

    2004-01-01

    The development of a two-timescale discretization scheme for collocation is presented. This scheme allows a larger discretization to be utilized for smoothly varying state variables and a second finer discretization to be utilized for state variables having higher frequency dynamics. As such. the discretization scheme can be tailored to the dynamics of the particular state variables. In so doing. the size of the overall Nonlinear Programming (NLP) problem can be reduced significantly. Two two-timescale discretization architecture schemes are described. Comparison of results between the two-timescale method and conventional collocation show very good agreement. Differences of less than 0.5 percent are observed. Consequently. a significant reduction (by two-thirds) in the number of NLP parameters and iterations required for convergence can be achieved without sacrificing solution accuracy.

  13. 7 CFR 1424.13 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS BIOENERGY PROGRAM § 1424.13... misrepresentation, scheme, or device, or to any other person as a result of the bioenergy producer's actions,...

  14. 7 CFR 1424.13 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS BIOENERGY PROGRAM § 1424.13... misrepresentation, scheme, or device, or to any other person as a result of the bioenergy producer's actions,...

  15. 7 CFR 1424.13 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS BIOENERGY PROGRAM § 1424.13... misrepresentation, scheme, or device, or to any other person as a result of the bioenergy producer's actions,...

  16. 7 CFR 1424.13 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS BIOENERGY PROGRAM § 1424.13... misrepresentation, scheme, or device, or to any other person as a result of the bioenergy producer's actions,...

  17. 7 CFR 1424.13 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS BIOENERGY PROGRAM § 1424.13... misrepresentation, scheme, or device, or to any other person as a result of the bioenergy producer's actions,...

  18. Interpolated Differential Operator (IDO) scheme for solving partial differential equations

    NASA Astrophysics Data System (ADS)

    Aoki, Takayuki

    1997-05-01

    We present a numerical scheme applicable to a wide variety of partial differential equations (PDEs) in space and time. The scheme is based on a high accurate interpolation of the profile for the independent variables over a local area and repetitive differential operations regarding PDEs as differential operators. We demonstrate that the scheme is uniformly applicable to hyperbolic, ellipsoidal and parabolic equations. The equations are solved in terms of the primitive independent variables, so that the scheme has flexibility for various types of equations including source terms. We find out that the conservation holds accurate when a Hermite interpolation is used. For compressible fluid problems, the shock interface is found to be sharply described by adding an artificial viscosity term.

  19. 122. FULL STARBOARD VIEW UNDERWAY, IN CAMOUFLAGE PAINT SCHEME. 5 ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    122. FULL STARBOARD VIEW UNDERWAY, IN CAMOUFLAGE PAINT SCHEME. 5 SEPTEMBER 1944. (NATIONAL ARCHIVES NO. 80-G-284087) - U.S.S. HORNET, Puget Sound Naval Shipyard, Sinclair Inlet, Bremerton, Kitsap County, WA

  20. A Variable-Flavour-Number Scheme at NNLO

    SciTech Connect

    Thorne, Robert S.

    2005-10-06

    I present a formulation of a Variable Flavour Number Scheme for heavy quarks that is implemented up to NNLO in the strong coupling constant and may be used in NNLO global fits for parton distributions.

  1. Adaptive Source Coding Schemes for Geometrically Distributed Integer Alphabets

    NASA Technical Reports Server (NTRS)

    Cheung, K-M.; Smyth, P.

    1993-01-01

    Revisit the Gallager and van Voorhis optimal source coding scheme for geometrically distributed non-negative integer alphabets and show that the various subcodes in the popular Rice algorithm can be derived from the Gallager and van Voorhis code.

  2. A blind reversible robust watermarking scheme for relational databases.

    PubMed

    Chang, Chin-Chen; Nguyen, Thai-Son; Lin, Chia-Chen

    2013-01-01

    Protecting the ownership and controlling the copies of digital data have become very important issues in Internet-based applications. Reversible watermark technology allows the distortion-free recovery of relational databases after the embedded watermark data are detected or verified. In this paper, we propose a new, blind, reversible, robust watermarking scheme that can be used to provide proof of ownership for the owner of a relational database. In the proposed scheme, a reversible data-embedding algorithm, which is referred to as "histogram shifting of adjacent pixel difference" (APD), is used to obtain reversibility. The proposed scheme can detect successfully 100% of the embedded watermark data, even if as much as 80% of the watermarked relational database is altered. Our extensive analysis and experimental results show that the proposed scheme is robust against a variety of data attacks, for example, alteration attacks, deletion attacks, mix-match attacks, and sorting attacks.

  3. Conservative properties of finite difference schemes for incompressible flow

    NASA Technical Reports Server (NTRS)

    Morinishi, Youhei

    1995-01-01

    The purpose of this research is to construct accurate finite difference schemes for incompressible unsteady flow simulations such as LES (large-eddy simulation) or DNS (direct numerical simulation). In this report, conservation properties of the continuity, momentum, and kinetic energy equations for incompressible flow are specified as analytical requirements for a proper set of discretized equations. Existing finite difference schemes in staggered grid systems are checked for satisfaction of the requirements. Proper higher order accurate finite difference schemes in a staggered grid system are then proposed. Plane channel flow is simulated using the proposed fourth order accurate finite difference scheme and the results compared with those of the second order accurate Harlow and Welch algorithm.

  4. DISGUISED IN AN OCEANIC CAMOUFLAGE PAINT SCHEME, EVERGREEN MAKES HER ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    DISGUISED IN AN OCEANIC CAMOUFLAGE PAINT SCHEME, EVERGREEN MAKES HER WAY THROUGH THE NORTH ATLANTIC DURING WORLD WAR II. HER 3" GUN IS VISIBLE BEHIND THE STACK - U.S. Coast Guard Cutter EVERGREEN, New London, New London County, CT

  5. Factorizable Schemes for the Equations of Fluid Flow

    NASA Technical Reports Server (NTRS)

    Sidilkover, David

    1999-01-01

    We present an upwind high-resolution factorizable (UHF) discrete scheme for the compressible Euler equations that allows to distinguish between full-potential and advection factors at the discrete level. The scheme approximates equations in their general conservative form and is related to the family of genuinely multidimensional upwind schemes developed previously and demonstrated to have good shock-capturing capabilities. A unique property of this scheme is that in addition to the aforementioned features it is also factorizable, i.e., it allows to distinguish between full-potential and advection factors at the discrete level. The latter property facilitates the construction of optimally efficient multigrid solvers. This is done through a relaxation procedure that utilizes the factorizability property.

  6. A Blind Reversible Robust Watermarking Scheme for Relational Databases

    PubMed Central

    Chang, Chin-Chen; Nguyen, Thai-Son; Lin, Chia-Chen

    2013-01-01

    Protecting the ownership and controlling the copies of digital data have become very important issues in Internet-based applications. Reversible watermark technology allows the distortion-free recovery of relational databases after the embedded watermark data are detected or verified. In this paper, we propose a new, blind, reversible, robust watermarking scheme that can be used to provide proof of ownership for the owner of a relational database. In the proposed scheme, a reversible data-embedding algorithm, which is referred to as “histogram shifting of adjacent pixel difference” (APD), is used to obtain reversibility. The proposed scheme can detect successfully 100% of the embedded watermark data, even if as much as 80% of the watermarked relational database is altered. Our extensive analysis and experimental results show that the proposed scheme is robust against a variety of data attacks, for example, alteration attacks, deletion attacks, mix-match attacks, and sorting attacks. PMID:24223033

  7. Progress with multigrid schemes for hypersonic flow problems

    SciTech Connect

    Radespiel, R.; Swanson, R.C.

    1995-01-01

    Several multigrid schemes are considered for the numerical computation of viscous hypersonic flows. For each scheme, the basic solution algorithm employs upwind spatial discretization with explicit multistage time stepping. Two-level versions of the various multigrid algorithms are applied to the two-dimensional advection equation, and Fourier analysis is used to determine their damping properties. The capabilities of the multigrid methods are assessed by solving three different hypersonic flow problems. Some new multigrid schemes based on semicoarsening strategies are shown to be quite effective in relieving the stiffness caused by the high-aspect-ratio cells required to resolve high Reynolds number flows. These schemes exhibit good convergence rates for Reynolds numbers up to 200 X 10{sup 6} and Mach numbers up to 25. 32 refs., 31 figs., 1 tab.

  8. Experimental quantum-cryptography scheme based on orthogonal states

    NASA Astrophysics Data System (ADS)

    Avella, Alessio; Brida, Giorgio; Degiovanni, Ivo Pietro; Genovese, Marco; Gramegna, Marco; Traina, Paolo

    2010-12-01

    Since, in general, nonorthogonal states cannot be cloned, any eavesdropping attempt in a quantum-communication scheme using nonorthogonal states as carriers of information introduces some errors in the transmission, leading to the possibility of detecting the spy. Usually, orthogonal states are not used in quantum-cryptography schemes since they can be faithfully cloned without altering the transmitted data. Nevertheless, L. Goldberg and L. Vaidman [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.75.1239 75, 1239 (1995)] proposed a protocol in which, even if the data exchange is realized using two orthogonal states, any attempt to eavesdrop is detectable by the legal users. In this scheme the orthogonal states are superpositions of two localized wave packets traveling along separate channels. Here we present an experiment realizing this scheme.

  9. Experimental quantum-cryptography scheme based on orthogonal states

    SciTech Connect

    Avella, Alessio; Brida, Giorgio; Degiovanni, Ivo Pietro; Genovese, Marco; Gramegna, Marco; Traina, Paolo

    2010-12-15

    Since, in general, nonorthogonal states cannot be cloned, any eavesdropping attempt in a quantum-communication scheme using nonorthogonal states as carriers of information introduces some errors in the transmission, leading to the possibility of detecting the spy. Usually, orthogonal states are not used in quantum-cryptography schemes since they can be faithfully cloned without altering the transmitted data. Nevertheless, L. Goldberg and L. Vaidman [Phys. Rev. Lett. 75, 1239 (1995)] proposed a protocol in which, even if the data exchange is realized using two orthogonal states, any attempt to eavesdrop is detectable by the legal users. In this scheme the orthogonal states are superpositions of two localized wave packets traveling along separate channels. Here we present an experiment realizing this scheme.

  10. Experimental quantum cryptography scheme based on orthogonal states: preliminary results

    NASA Astrophysics Data System (ADS)

    Avella, Alessio; Brida, Giorgio; Degiovanni, Ivo P.; Genovese, Marco; Gramegna, Marco; Traina, Paolo

    2010-04-01

    Since, in general, non-orthogonal states cannot be cloned, any eavesdropping attempt in a Quantum Communication scheme using non-orthogonal states as carriers of information introduces some errors in the transmission, leading to the possibility of detecting the spy. Usually, orthogonal states are not used in Quantum Cryptography schemes since they can be faithfully cloned without altering the transmitted data. Nevertheless, L. Goldberg and L. Vaidman [Phys. Rev. Lett. 75 (7), pp. 12391243, 1995] proposed a protocol in which, even if the data exchange is realized using two orthogonal states, any attempt to eavesdrop is detectable by the legal users. In this scheme the orthogonal states are superpositions of two localized wave packets which travel along separate channels, i.e. two different paths inside a balanced Mach-Zehnder interferometer. Here we present an experiment realizing this scheme.

  11. High resolution difference schemes for compressible gas dynamics

    SciTech Connect

    Woodward, P.; Colella, P.

    1980-07-30

    The advantages and disadvantages of four new high-resolution difference schemes, namely the von Neumann-Richtmyer, Godunovs, MUSCL and Glimms, for mathematically representing physical conditions in compressible gas flows are compared. (LCL)

  12. The market behavior and performance of different strategy evaluation schemes

    NASA Astrophysics Data System (ADS)

    Baek, Yongjoo; Lee, Sang Hoon; Jeong, Hawoong

    2010-03-01

    We observe the performances of three strategy evaluation schemes, which are the history-dependent wealth game, the trend-opposing minority game, and the trend-following majority game in a stock market where the price is exogenously determined. The price is either directly adopted from the real stock market indices or generated with the Markov chain of order <=2. Each scheme's success is quantified by average wealth accumulated by the traders equipped with the scheme. The wealth game, as it learns from the history, generally shows good performance unless the market is highly unpredictable. The majority game is relatively successful in a trendy market dominated by long periods of sustained price increasing or decreasing. On the other hand, the minority game is suitable for a market with persistent zig-zag price patterns. These observations agree with our intuition and support the viability of the wealth game as a strategy evaluation scheme in typical markets.

  13. Scheme for teleportation of quantum states onto a mechanical resonator.

    PubMed

    Mancini, Stefano; Vitali, David; Tombesi, Paolo

    2003-04-01

    We propose an experimentally feasible scheme to teleport an unkown quantum state onto the vibrational degree of freedom of a macroscopic mirror. The quantum channel between the two parties is established by exploiting radiation pressure effects. PMID:12689325

  14. Numerical simulation of shock wave diffraction by TVD schemes

    NASA Technical Reports Server (NTRS)

    Young, Victor Y. C.; Yee, H. C.

    1987-01-01

    An upwind total variation diminishing (TVD) scheme and a predictor-corrector symmetric TVD scheme were used to numerically simulate the blast wave diffraction on a stationary object. The objective is to help design an optimum configuration so that lateral motion is minimized and at the same time vortex shedding and flow separation are reduced during a blast wave encounter. Results are presented for a generic configuration for both a coarse grid and a fine grid to illustrate the global and local diffraction flow fields. Numerical experiments for the shock wave reflection on a wedge are also included to validate the current approach. Numerical study indicated that these TVD schemes are more stable and produced higher shock resolution than classical shock capturing methods such as the explicit MacCormack scheme.

  15. Efficient scheme for parametric fitting of data in arbitrary dimensions.

    PubMed

    Pang, Ning-Ning; Tzeng, Wen-Jer; Kao, Hisen-Ching

    2008-07-01

    We propose an efficient scheme for parametric fitting expressed in terms of the Legendre polynomials. For continuous systems, our scheme is exact and the derived explicit expression is very helpful for further analytical studies. For discrete systems, our scheme is almost as accurate as the method of singular value decomposition. Through a few numerical examples, we show that our algorithm costs much less CPU time and memory space than the method of singular value decomposition. Thus, our algorithm is very suitable for a large amount of data fitting. In addition, the proposed scheme can also be used to extract the global structure of fluctuating systems. We then derive the exact relation between the correlation function and the detrended variance function of fluctuating systems in arbitrary dimensions and give a general scaling analysis.

  16. Robust entanglement via optomechanical dark mode: adiabatic scheme

    NASA Astrophysics Data System (ADS)

    Tian, Lin; Wang, Ying-Dan; Huang, Sumei; Clerk, Aashish

    2013-03-01

    Entanglement is a powerful resource for studying quantum effects in macroscopic objects and for quantum information processing. Here, we show that robust entanglement between cavity modes with distinct frequencies can be generated via a mechanical dark mode in an optomechanical quantum interface. Due to quantum interference, the effect of the mechanical noise is cancelled in a way that is similar to the electromagnetically induced transparency. We derive the entanglement in the strong coupling regime by solving the quantum Langevin equation using a perturbation theory approach. The entanglement in the adiabatic scheme is then compared with the entanglement in the stationary state scheme. Given the robust entanglement schemes and our previous schemes on quantum wave length conversion, the optomechanical interface hence forms an effective building block for a quantum network. This work is supported by DARPA-ORCHID program, NSF-DMR-0956064, NSF-CCF-0916303, and NSF-COINS.

  17. Compatibility of weak rigidity with some types of elastic schemes

    SciTech Connect

    del Olmo, V.; Olivert, J.

    1986-04-01

    The behavior of the hypoelastic-Synge, hypoelastic-Maugin, and hypoelastic-Carter and Quintana almost-thermodynamic material schemes, under weak rigidity hypotheses, is studied. In every case, the absence of principal transverse shock waves (or the vanishing of the corresponding speeds) is obtained. The same result follows for the longitudinal shock waves when the Lame coefficient ..mu.. does not vanish. A definition of an elastic almost-thermodynamic material scheme based on the Fermi--Walker transport is proposed and compared with the above elastic schemes. The speeds of the principal shock waves associated are attained and its compatibility with the Ferrando--Olivert incompressibility condition is proved. In the presence of weak rigidity the elastic schemes here defined lead (assuming ..mu..not =0) to the Born-rigidity condition.

  18. Experimental validation of a novel imaging scheme to eliminate astigmatism

    NASA Astrophysics Data System (ADS)

    Fierroz, S.; Bitter, M.; Delgado-Aparicio, L.; Hill, K. W.; Pablant, N.; Scott, S.; Scotti, F.; Rice, J. E.

    2010-11-01

    Recent papers by Bitter et al.^1-3 have proposed novel imaging schemes to eliminate astigmatism by matched pairs of spherically bent crystals or reflectors. These imaging schemes should allow stigmatic (or point-to point) imaging at arbitrarily large angles of incidence and be applicable to a broad spectrum of the electromagnetic radiation, including microwaves, visible light, EUV radiation, and x-rays, if appropriate spherically bent reflectors are used. This paper presents experimental results from tests of one of these imaging schemes with visible light, which validate the concept of this scheme and show that stigmatic imaging of objects with areas of about 5 mm x 5 mm is possible. ^1M. Bitter et al, Rev Sci. Instrum. 79, 10E927 (2008); ^2M. Bitter et al., J. Xray Sci. Technol. 17, 153 (2009); ^3M. Bitter et al., J. Phys. B: At. Mol. Opt. Phys. 43, 144011 (2010)

  19. 7 CFR 1430.220 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS DAIRY PRODUCTS Milk Income Loss Contract Program § 1430.220 Misrepresentation and scheme or device. (a) A dairy operation shall...

  20. 7 CFR 1430.220 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS DAIRY PRODUCTS Milk Income Loss Contract Program § 1430.220 Misrepresentation and scheme or device. (a) A dairy operation shall...

  1. Time Integration Schemes for the Unsteady Navier-stokes Equations

    NASA Technical Reports Server (NTRS)

    Bijl, Hester; Carpenter, Mark H.; Vatsa, Veer N.

    2001-01-01

    The efficiency and accuracy of several time integration schemes are investigated for the unsteady Navier-Stokes equations. This study focuses on the efficiency of higher-order Runge-Kutta schemes in comparison with the popular Backward Differencing Formulations. For this comparison an unsteady two-dimensional laminar flow problem is chosen, i.e., flow around a circular cylinder at Re = 1200. It is concluded that for realistic error tolerances (smaller than 10(exp -1)) fourth-and fifth-order Runge-Kutta schemes are the most efficient. For reasons of robustness and computer storage, the fourth-order Runge-Kutta method is recommended. The efficiency of the fourth-order Runge-Kutta scheme exceeds that of second-order Backward Difference Formula by a factor of 2.5 at engineering error tolerance levels (10(exp -1) to 10(exp -2)). Efficiency gains are more dramatic at smaller tolerances.

  2. Factors affecting sustainability of rural water schemes in Swaziland

    NASA Astrophysics Data System (ADS)

    Peter, Graciana; Nkambule, Sizwe E.

    The Millennium Development Goal (MDG) target to reduce the proportion of people without sustainable access to safe drinking water by the year 2015 has been met as of 2010, but huge disparities exist. Some regions, particularly Sub-Saharan Africa are lagging behind it is also in this region where up to 30% of the rural schemes are not functional at any given time. There is need for more studies on factors affecting sustainability and necessary measures which when implemented will improve the sustainability of rural water schemes. The main objective of this study was to assess the main factors affecting the sustainability of rural water schemes in Swaziland using a Multi-Criteria Analysis Approach. The main factors considered were: financial, social, technical, environmental and institutional. The study was done in Lubombo region. Fifteen functional water schemes in 11 communities were studied. Data was collected using questionnaires, checklist and focused group discussion guide. A total of 174 heads of households were interviewed. Statistical Package for Social Sciences (SPSS) was used to analyse the data and to calculate sustainability scores for water schemes. SPSS was also used to classify sustainability scores according to sustainability categories: sustainable, partially sustainable and non-sustainable. The averages of the ratings for the different sub-factors studied and the results on the sustainability scores for the sustainable, partially sustainable and non-sustainable schemes were then computed and compared to establish the main factors influencing sustainability of the water schemes. The results indicated technical and social factors as most critical while financial and institutional, although important, played a lesser role. Factors which contributed to the sustainability of water schemes were: functionality; design flow; water fetching time; ability to meet additional demand; use by population; equity; participation in decision making on operation and

  3. Direct plasma injection scheme with various ion beams

    SciTech Connect

    Okamura, M.

    2010-09-15

    The laser ion source is one of the most powerful heavy ion sources. However, it is difficult to obtain good stability and to control its intense current. To overcome these difficulties, we proposed a new beam injection scheme called 'direct plasma injection scheme'. Following this it was established to provide various species with desired charge state as an intense accelerated beam. Carbon, aluminum and iron beams have been tested.

  4. The Effect of the Weight Scheme on DFT Vibrational Frequencies

    NASA Technical Reports Server (NTRS)

    Bauschlicher, Charles; Ricca, Alessandra

    1999-01-01

    All-electron B3LYP harmonic frequencies of Ge2H5 and Ge2H6 are computed for several choices of grid and using both the Becke and the Stratmann, Scuseria, and Frisch atomic partition functions (weight scheme). For large grids, the results are independent of the weighting scheme. The lowest frequency mode is much more stable with respect to the number of grid points when the Stratmann, Scuseria, and Frisch weights are used.

  5. Central Schemes for Multi-Dimensional Hamilton-Jacobi Equations

    NASA Technical Reports Server (NTRS)

    Bryson, Steve; Levy, Doron; Biegel, Bryan (Technical Monitor)

    2002-01-01

    We present new, efficient central schemes for multi-dimensional Hamilton-Jacobi equations. These non-oscillatory, non-staggered schemes are first- and second-order accurate and are designed to scale well with an increasing dimension. Efficiency is obtained by carefully choosing the location of the evolution points and by using a one-dimensional projection step. First-and second-order accuracy is verified for a variety of multi-dimensional, convex and non-convex problems.

  6. Hybrid subband image coding scheme using DWT, DPCM, and ADPCM

    NASA Astrophysics Data System (ADS)

    Oh, Kyung-Seak; Kim, Sung-Jin; Joo, Chang-Bok

    1998-07-01

    Subband image coding techniques have received considerable attention as a powerful source coding ones. These techniques provide good compression results, and also can be extended for progressive transmission and multiresolution analysis. In this paper, we propose a hybrid subband image coding scheme using DWT (discrete wavelet transform), DPCM (differential pulse code modulation), and ADPCM (adaptive DPCM). This scheme produces both simple, but significant, image compression and transmission coding.

  7. Vector-quantization-based scheme for data embedding for images

    NASA Astrophysics Data System (ADS)

    Liu, Ning; Subbalakshmi, Koduvayur P.

    2004-06-01

    Today, data hiding has become more and more important in a variety of applications including security. Since Costa's work in the context of communication, the set of quantization based schemes have been proposed as one class of data hiding schemes. Most of these schemes are based on uniform scalar quantizer, which is optimal only if the host signal is uniformly distributed. In this paper, we propose pdf -matched embedding schemes, which not only consider pdf -matched quantizers, but also extend them to multiple dimensions. Specifically, our contributions to this paper are: We propose a pdf-matched embedding (PME) scheme by generalizing the probability distribution of host image and then constructing a pdf-matched quantizer as the starting point. We show experimentally that the proposed pdf-matched quantizer provides better trade-offs between distortion caused by embedding, the robustness to attacks and the embedding capacity. We extend our algorithm to embed a vector of bits in a host signal vector. We show by experiments that our scheme can be closer to the data hiding capacity by embedding larger dimension bit vectors in larger dimension VQs. Two enhancements have been proposed to our method: by vector flipping and by using distortion compensation (DC-PME), that serve to further decrease the embedding distortion. For the 1-D case, the PME scheme shows a 1 dB improvement over the QIM method in a robustness-distortion sense, while DC-PME is 1 dB better than DC-QIM and the 4-D vector quantizer based PME scheme performs about 3 dB better than the 1-D PME.

  8. Entropy stable schemes for initial-boundary-value conservation laws

    NASA Astrophysics Data System (ADS)

    Svärd, Magnus; Mishra, Siddhartha

    2012-12-01

    We consider initial-boundary-value problems for systems of conservation laws and design entropy stable finite difference schemes to approximate them. The schemes are shown to be entropy stable for a large class of systems that are equipped with a symmetric splitting, derived from the entropy formulation. Numerical examples for the Euler equations of gas dynamics are presented to illustrate the robust performance of the proposed method.

  9. An expert system based intelligent control scheme for space bioreactors

    NASA Technical Reports Server (NTRS)

    San, Ka-Yiu

    1988-01-01

    An expert system based intelligent control scheme is being developed for the effective control and full automation of bioreactor systems in space. The scheme developed will have the capability to capture information from various resources including heuristic information from process researchers and operators. The knowledge base of the expert system should contain enough expertise to perform on-line system identification and thus be able to adapt the controllers accordingly with minimal human supervision.

  10. Arbitrated quantum signature scheme based on cluster states

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Lei, He; Liu, Zhi-Chao; Zhou, Yi-Hua; Shi, Wei-Min

    2016-06-01

    Cluster states can be exploited for some tasks such as topological one-way computation, quantum error correction, teleportation and dense coding. In this paper, we investigate and propose an arbitrated quantum signature scheme with cluster states. The cluster states are used for quantum key distribution and quantum signature. The proposed scheme can achieve an efficiency of 100 %. Finally, we also discuss its security against various attacks.

  11. A cache-aided multiprocessor rollback recovery scheme

    NASA Technical Reports Server (NTRS)

    Wu, Kun-Lung; Fuchs, W. Kent

    1989-01-01

    This paper demonstrates how previous uniprocessor cache-aided recovery schemes can be applied to multiprocessor architectures, for recovering from transient processor failures, utilizing private caches and a global shared memory. As with cache-aided uniprocessor recovery, the multiprocessor cache-aided recovery scheme of this paper can be easily integrated into standard bus-based snoopy cache coherence protocols. A consistent shared memory state is maintained without the necessity of global check-pointing.

  12. On the dynamics of some grid adaption schemes

    NASA Technical Reports Server (NTRS)

    Sweby, Peter K.; Yee, Helen C.

    1994-01-01

    The dynamics of a one-parameter family of mesh equidistribution schemes coupled with finite difference discretisations of linear and nonlinear convection-diffusion model equations is studied numerically. It is shown that, when time marched to steady state, the grid adaption not only influences the stability and convergence rate of the overall scheme, but can also introduce spurious dynamics to the numerical solution procedure.

  13. Weak rigidity in almost-thermodynamic material schemes

    SciTech Connect

    del Olmo, V.; Olivert, J.

    1985-06-01

    To avoid the restrictions that the Born rigidity supposes for the motions in relativity, the definition of a weakly rigid almost-thermodynamic material scheme is proposed. From it the relativistic incompressibility condition given by Ferrando and Olivert is obtained. Moreover, it is proved that, for the weakly rigid irrotational and geodesic almost-thermodynamic material schemes, the scalar curvature of the Landau manifolds is constant along the streamlines.

  14. Quantum Signature Scheme Using a Single Qubit Rotation Operator

    NASA Astrophysics Data System (ADS)

    Kang, Min-Sung; Hong, Chang-Ho; Heo, Jino; Lim, Jong-In; Yang, Hyung-Jin

    2015-02-01

    We present a quantum signature scheme using a single qubit rotation operator. In this protocol, the trusted center confirms the quantum signature and thus conforms with other quantum signature schemes. Utilizing the unitary properties of a single qubit rotation operator and Pauli operators, our protocol provides signature security and enhances the efficiency of communication. In addition, our protocol - using only a single qubit measurement - facilitates the ease of implementation and enhances convenience for users. The security of the protocol is analyzed.

  15. Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation

    PubMed Central

    Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi

    2016-01-01

    After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t′, n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely. PMID:27792784

  16. A class of difference schemes with flexible local approximation

    SciTech Connect

    Tsukerman, Igor . E-mail: igor@uakron.edu

    2006-01-20

    Solutions of many physical problems have salient local features that are qualitatively known a priori (for example, singularities at point sources, edge and corners; boundary layers; derivative jumps at material interfaces; strong dipole field components near polarized spherical particles; cusps of electronic wavefunctions at the nuclei; electrostatic double layers around colloidal particles, etc.) The known methods capable of providing flexible local approximation of such features include the generalized finite element - partition of unity method, special variational-difference schemes in broken Sobolev spaces, and a few other specialized techniques. In the proposed new class of Flexible Local Approximation MEthods (FLAME), a desirable set of local approximating functions (such as cylindrical or spherical harmonics, plane waves, harmonic polynomials, etc.) defines a finite difference scheme on a chosen grid stencil. One motivation is to minimize the notorious 'staircase' effect at curved and slanted interface boundaries. However, the new approach has much broader applications. As illustrative examples, the paper presents arbitrarily high order 3-point schemes for the 1D Schroedinger equation and a 1D singular equation, schemes for electrostatic interactions of colloidal particles, electromagnetic wave propagation and scattering, plasmon resonances. Moreover, many classical finite difference schemes, including the Collatz 'Mehrstellen' schemes, are direct particular cases of FLAME.

  17. Involution and Difference Schemes for the Navier-Stokes Equations

    NASA Astrophysics Data System (ADS)

    Gerdt, Vladimir P.; Blinkov, Yuri A.

    In the present paper we consider the Navier-Stokes equations for the two-dimensional viscous incompressible fluid flows and apply to these equations our earlier designed general algorithmic approach to generation of finite-difference schemes. In doing so, we complete first the Navier-Stokes equations to involution by computing their Janet basis and discretize this basis by its conversion into the integral conservation law form. Then we again complete the obtained difference system to involution with eliminating the partial derivatives and extracting the minimal Gröbner basis from the Janet basis. The elements in the obtained difference Gröbner basis that do not contain partial derivatives of the dependent variables compose a conservative difference scheme. By exploiting arbitrariness in the numerical integration approximation we derive two finite-difference schemes that are similar to the classical scheme by Harlow and Welch. Each of the two schemes is characterized by a 5×5 stencil on an orthogonal and uniform grid. We also demonstrate how an inconsistent difference scheme with a 3×3 stencil is generated by an inappropriate numerical approximation of the underlying integrals.

  18. XFEM schemes for level set based structural optimization

    NASA Astrophysics Data System (ADS)

    Li, Li; Wang, Michael Yu; Wei, Peng

    2012-12-01

    In this paper, some elegant extended finite element method (XFEM) schemes for level set method structural optimization are proposed. Firstly, two-dimension (2D) and three-dimension (3D) XFEM schemes with partition integral method are developed and numerical examples are employed to evaluate their accuracy, which indicate that an accurate analysis result can be obtained on the structural boundary. Furthermore, the methods for improving the computational accuracy and efficiency of XFEM are studied, which include the XFEM integral scheme without quadrature sub-cells and higher order element XFEM scheme. Numerical examples show that the XFEM scheme without quadrature sub-cells can yield similar accuracy of structural analysis while prominently reducing the time cost and that higher order XFEM elements can improve the computational accuracy of structural analysis in the boundary elements, but the time cost is increasing. Therefore, the balance of time cost between FE system scale and the order of element needs to be discussed. Finally, the reliability and advantages of the proposed XFEM schemes are illustrated with several 2D and 3D mean compliance minimization examples that are widely used in the recent literature of structural topology optimization. All numerical results demonstrate that the proposed XFEM is a promising structural analysis approach for structural optimization with the level set method.

  19. Development of advanced control schemes for telerobot manipulators

    NASA Technical Reports Server (NTRS)

    Nguyen, Charles C.; Zhou, Zhen-Lei

    1991-01-01

    To study space applications of telerobotics, Goddard Space Flight Center (NASA) has recently built a testbed composed mainly of a pair of redundant slave arms having seven degrees of freedom and a master hand controller system. The mathematical developments required for the computerized simulation study and motion control of the slave arms are presented. The slave arm forward kinematic transformation is presented which is derived using the D-H notation and is then reduced to its most simplified form suitable for real-time control applications. The vector cross product method is then applied to obtain the slave arm Jacobian matrix. Using the developed forward kinematic transformation and quaternions representation of the slave arm end-effector orientation, computer simulation is conducted to evaluate the efficiency of the Jacobian in converting joint velocities into Cartesian velocities and to investigate the accuracy of the Jacobian pseudo-inverse for various sampling times. In addition, the equivalence between Cartesian velocities and quaternion is also verified using computer simulation. The motion control of the slave arm is examined. Three control schemes, the joint-space adaptive control scheme, the Cartesian adaptive control scheme, and the hybrid position/force control scheme are proposed for controlling the motion of the slave arm end-effector. Development of the Cartesian adaptive control scheme is presented and some preliminary results of the remaining control schemes are presented and discussed.

  20. Control Scheme of Tether Drag Deorbit System in Orbital Plane

    NASA Astrophysics Data System (ADS)

    Cui, Wei-Dong; Sun, Liang; Zhao, Guo-Wei

    In this paper, based on a dumbbell model of tethered satellite, a tension control scheme and a thrust control scheme of tether drag deorbit system in orbital plane are respectively proposed. In the tension control scheme, the tether tension can be measured by tension sensor and controlled by adjusting the tether length with a certain windlass mechanism, so that the librational angles could track the expected value; meanwhile, the tether could come back to the initial value. Because of the windlass mechanism, the slackness of tether can be avoided. In the thrust control scheme, the tether drag deorbit system is with a short tether in orbital maneuvering and the thrust acceleration imposed on the base satellite can be adjusted to avoid the slackness of tether and damp out the librational angles; besides, it is required that the regulation value of thrust acceleration meets with accuracy trajectory in practical engineering. Afterwards, a reasonable deorbit case of an abandoned GEO satellite is studied, in which the control of base satellite is considered; then, the advantages and disadvantages of two control schemes are analyzed and an improved control strategy is given. Numerical simulation results indicate that the slackness of tether can be eliminated and the librational angles are damped out according to the designed controllers, and the stability of the attitude of abandoned satellite is also guaranteed during flight. The proposed control schemes are feasible, which is useful for the flight safety.

  1. A Robust Trust Establishment Scheme for Wireless Sensor Networks

    PubMed Central

    Ishmanov, Farruh; Kim, Sung Won; Nam, Seung Yeob

    2015-01-01

    Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms. PMID:25806875

  2. Community health insurance schemes & patient satisfaction - evidence from India

    PubMed Central

    Devadasan, N.; Criel, Bart; Damme, Wim Van; Lefevre, Pierre; Manoharan, S.; der Stuyft, Patrick Van

    2011-01-01

    Background & objectives: Quality of care is an important determinant for utilizing health services. In India, the quality of care in most health services is poor. The government recognizes this and has been working on both supply and demand aspects. In particular, it is promoting community health insurance (CHI) schemes, so that patients can access quality services. This observational study was undertaken to measure the level of satisfaction among insured and uninsured patients in two CHI schemes in India. Methods: Patient satisfaction was measured, which is an outcome of good quality care. Two CHI schemes, Action for Community Organisation, Rehabilitation and Development (ACCORD) and Kadamalai Kalanjiam Vattara Sangam (KKVS), were chosen. Randomly selected, insured and uninsured households were interviewed. The household where a patient was admitted to a hospital was interviewed in depth about the health seeking behaviour, the cost of treatment and the satisfaction levels. Results: It was found that at both ACCORD and KKVS, there was no significant difference in the levels of satisfaction between the insured and uninsured patients. The main reasons for satisfaction were the availability of doctors and medicines and the recovery by the patient. Interpretation & conclusions: Our study showed that insured hospitalized patients did not have significantly higher levels of satisfaction compared to uninsured hospitalized patients. If CHI schemes want to improve the quality of care for their clients, so that they adhere to the scheme, the scheme managers need to negotiate actively for better quality of care with empanelled providers. PMID:21321418

  3. A robust trust establishment scheme for wireless sensor networks.

    PubMed

    Ishmanov, Farruh; Kim, Sung Won; Nam, Seung Yeob

    2015-01-01

    Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms. PMID:25806875

  4. Asymptotic Diffusion-Limit Accuracy of Sn Angular Differencing Schemes

    SciTech Connect

    Bailey, T S; Morel, J E; Chang, J H

    2009-11-05

    In a previous paper, Morel and Montry used a Galerkin-based diffusion analysis to define a particular weighted diamond angular discretization for S{sub n}n calculations in curvilinear geometries. The weighting factors were chosen to ensure that the Galerkin diffusion approximation was preserved, which eliminated the discrete-ordinates flux dip. It was also shown that the step and diamond angular differencing schemes, which both suffer from the flux dip, do not preserve the diffusion approximation in the Galerkin sense. In this paper we re-derive the Morel and Montry weighted diamond scheme using a formal asymptotic diffusion-limit analysis. The asymptotic analysis yields more information than the Galerkin analysis and demonstrates that the step and diamond schemes do in fact formally preserve the diffusion limit to leading order, while the Morel and Montry weighted diamond scheme preserves it to first order, which is required for full consistency in this limit. Nonetheless, the fact that the step and diamond differencing schemes preserve the diffusion limit to leading order suggests that the flux dip should disappear as the diffusion limit is approached for these schemes. Computational results are presented that confirm this conjecture. We further conjecture that preserving the Galerkin diffusion approximation is equivalent to preserving the asymptotic diffusion limit to first order.

  5. The standard upwind compact difference schemes for incompressible flow simulations

    NASA Astrophysics Data System (ADS)

    Fan, Ping

    2016-10-01

    Compact difference schemes have been used extensively for solving the incompressible Navier-Stokes equations. However, the earlier formulations of the schemes are of central type (called central compact schemes, CCS), which are dispersive and susceptible to numerical instability. To enhance stability of CCS, the optimal upwind compact schemes (OUCS) are developed recently by adding high order dissipative terms to CCS. In this paper, it is found that OUCS are essentially not of the upwind type because they do not use upwind-biased but central type of stencils. Furthermore, OUCS are not the most optimal since orders of accuracy of OUCS are at least one order lower than the maximum achievable orders. New upwind compact schemes (called standard upwind compact schemes, SUCS) are developed in this paper. In contrast to OUCS, SUCS are constructed based completely on upwind-biased stencils and hence can gain adequate numerical dissipation with no need for introducing optimization calculations. Furthermore, SUCS can achieve the maximum achievable orders of accuracy and hence be more compact than OUCS. More importantly, SUCS have prominent advantages on combining the stable and high resolution properties which are demonstrated from the global spectral analyses and typical numerical experiments.

  6. Comparisons of TVD schemes applied to the Navier-Stokes equations. [total variation diminishing

    NASA Technical Reports Server (NTRS)

    Buelow, Philip E.

    1989-01-01

    In this study, the following total variation diminishing (TVD) schemes for solving the Navier-Stokes equations have been tested: the Chakravarthy and Szema (1985) upwind biased TVD scheme, the Harten's upwind TVD scheme described by Yee et al. (1983), and the Yee's (1985) symmetric TVD scheme. The schemes have been compared using three test cases. The first case was the one-dimensional shock tube problem which tested the shock-capturing abilities of the schemes. Chakravarthy's and Harten's schemes gave similar results which were found to be more accurate than the results from Yee's scheme. The second case was a compressible boundary layer which tested the schemes's abilities to solve fiscous flows. In this case, the three schemes yielded almost identical results. Finally, the shock/boundary-layer interaction case studied experimentally by Hakkinen et al. (1959) was computed. Here, Chakravarthy's and Yee's schemes compared most favorably with the published data, with Yee's scheme giving slightly better results.

  7. Contemplation on marking scheme for Type X multiple choice questions, and an illustration of a practically applicable scheme

    PubMed Central

    Siddiqui, Nazeem Ishrat; Bhavsar, Vinayak H.; Bhavsar, Arnav V.; Bose, Sukhwant

    2016-01-01

    Ever since its inception 100 years back, multiple choice items have been widely used as a method of assessment. It has certain inherent limitations such as inability to test higher cognitive skills, element of guesswork while answering, and issues related with marking schemes. Various marking schemes have been proposed in the past but they are not balanced, skewed, and complex, which are based on mathematical calculations which are typically not within the grasp of medical personnel. Type X questions has many advantages being easy to construct, can test multiple concepts/application/facets of a topic, cognitive skill of various level of hierarchy can be tested, and unlike Type K items, they are free from complicated coding. In spite of these advantages, they are not in common use due to complicated marking schemes. This is the reason we explored the aspects of methods of evaluation of multiple correct options multiple choice questions and came up with the simple, practically applicable, nonstringent but logical scoring system for the same. The rationale of the illustrated marking scheme is that it takes into consideration the distracter recognition ability of the examinee rather than relying on the ability only to select the correct response. Thus, examinee's true knowledge is tested, and he is rewarded accordingly for selecting a correct answer and omitting a distracter. The scheme also penalizes for not recognizing a distracter thus controlling guessing behavior. It is emphasized that if the illustrated scoring scheme is adopted, then Type X questions would come in common practice. PMID:27127312

  8. Dispersion-relation-preserving finit difference schemes for computational acoustics

    SciTech Connect

    Tam, C.K.W.; Webb, J.C. )

    1993-08-01

    Acoustics problems are governed by the linearized Euler equations. According to wave propagation theory, the number of wave modes and their wave propagation characteristics are all encoded in the dispersion relation of the governing equations. Thus one is assured that the numerical solutions of high order finite difference scheme will have the same number of wave modes (namely, the acoustic, vorticity, and entropy waves), the same wave propagation characteristics (namely, nondispersive, nondissipative, and isotropic) and the same wave speeds as those of the solutions of the Euler equations if both systems of equations have the same dispersion relations. Finite difference schemes which have the same dispersion relations as the original partial differential equations are referred to as dispersion-relation-preserving (DRP) schemes. A way to construct time marching DRP schemes by optimizing the finite difference approximations of the space and time derivatives in the wave number and frequency space is proposed. The stability of these schemes is analyzed and a sufficient condition for numerical stability is established. A set of radiation and outflow boundary conditions compatible with the DRP schemes is constructed. These conditions are derived from the asymptotic solutions of the governing equations. The asymptotic solutions are found by the use of Fourier-Laplace transforms and the method of stationary phase. A sequence of numerical simulations has been carried out. These simulation are designed to test the effectiveness of the DRP schemes and the radiation and outflow boundary conditions. The computed solutions agree very favorably with the exact solutions. The radiation boundary conditions perform satisfactorily causing little acoustic reflections. The outflow boundary conditions are found to be quite transparent to outgoing disturbances even when the disturbances are made up of a combination of acoustic, vorticity, and entropy waves. 26 refs., 14 figs.

  9. An improved biometrics-based remote user authentication scheme with user anonymity.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability. PMID:24350272

  10. An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity

    PubMed Central

    Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability. PMID:24350272

  11. An improved biometrics-based remote user authentication scheme with user anonymity.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.

  12. Sensitivity of land surface and Cumulus schemes for Thunderstorm prediction

    NASA Astrophysics Data System (ADS)

    Kumar, Dinesh; Mohanty, U. C.; Kumar, Krishan

    2016-06-01

    The cloud processes play an important role in all forms of precipitation. Its proper representation is one of the challenging tasks in mesoscale numerical simulation. Studies have revealed that mesoscale feature require proper initialization which may likely to improve the convective system rainfall forecasts. Understanding the precipitation process, model initial condition accuracy and resolved/sub grid-scale precipitation processes representation, are the important areas which needed to improve in order to represent the mesoscale features properly. Various attempts have been done in order to improve the model performance through grid resolution, physical parameterizations, etc. But it is the physical parameterizations which provide a convective atmosphere for the development and intensification of convective events. Further, physical parameterizations consist of cumulus convection, surface fluxes of heat, moisture, momentum, and vertical mixing in the planetary boundary layer (PBL). How PBL and Cumulus schemes capture the evolution of thunderstorm have been analysed by taking thunderstorm cases occurred over Kolkata, India in the year 2011. PBL and cumulus schemes were customized for WSM-6 microphysics because WSM series has been widely used in operational forecast. Results have shown that KF (PBL scheme) and WSM-6 (Cumulus Scheme) have reproduced the evolution of surface variable such as CAPE, temperature and rainfall very much like observation. Further, KF and WSM-6 scheme also provided the increased moisture availability in the lower atmosphere which was taken to higher level by strong vertical velocities providing a platform to initiate a thunderstorm much better. Overestimation of rain in WSM-6 occurs primarily because of occurrence of melting and freezing process within a deeper layer in WSM-6 scheme. These Schemes have reproduced the spatial pattern and peak rainfall coverage closer to TRMM observation. It is the the combination of WSM-6, and KF schemes

  13. Breeding programs for smallholder sheep farming systems: I. Evaluation of alternative designs of breeding schemes.

    PubMed

    Gizaw, S; Rischkowsky, B; Valle-Zárate, A; Haile, A; van Arendonk, J A M; Mwai, A O; Dessie, T

    2014-10-01

    Village- and central nucleus-based schemes were simulated and evaluated for their relative bio-economic efficiencies, using Ethiopia's Menz sheep as example. The schemes were: village-based 2-tier (Scheme-1) and 1-tier (Scheme-2) cooperative village breeding schemes, dispersed village-based nuclei scheme (Scheme-3), conventional 2-tier central nucleus-based scheme (Scheme-4), and schemes linking a central nucleus and village multiplier nuclei with selection in central nucleus (Scheme-5) or in both central and village nuclei (Scheme-6). Among village-based schemes, Scheme-1 gave the highest genetic progress, while Scheme-2 was economically the most efficient with genetic gain in the breeding objective of Birr 5.6 and a profit of Birr 37.2/ewe/year. The central nucleus schemes were more efficient than the village schemes. Scheme-4 was the most efficient with genetic gain in the breeding objective of Birr 13.5 and a profit of Birr 71.2, but is operationally more difficult as it requires a very large central nucleus. The choice between village and central nucleus-based schemes would depend on local conditions (availability of infrastructure, logistics and technical knowhow and support). Linking central nucleus with village-based nuclei (Scheme-6) would be a feasible option to overcome the operational difficulties of the conventional central nucleus scheme. If a village-based breeding program is envisaged as should be the 1st step in most low-input systems, then Scheme-2 is the most efficient. To scale out to an entire Menz breed level, Scheme-3 would be recommended.

  14. An Orbit And Dispersion Correction Scheme for the PEP II

    SciTech Connect

    Cai, Y.; Donald, M.; Shoaee, H.; White, G.; Yasukawa, L.A.; /SLAC

    2011-09-01

    To achieve optimum luminosity in a storage ring it is vital to control the residual vertical dispersion. In the original PEP storage ring, a scheme to control the residual dispersion function was implemented using the ring orbit as the controlling element. The 'best' orbit not necessarily giving the lowest vertical dispersion. A similar scheme has been implemented in both the on-line control code and in the simulation code LEGO. The method involves finding the response matrices (sensitivity of orbit/dispersion at each Beam-Position-Monitor (BPM) to each orbit corrector) and solving in a least squares sense for minimum orbit, dispersion function or both. The optimum solution is usually a subset of the full least squares solution. A scheme of simultaneously correcting the orbits and dispersion has been implemented in the simulation code and on-line control system for PEP-II. The scheme is based on the eigenvector decomposition method. An important ingredient of the scheme is to choose the optimum eigenvectors that minimize the orbit, dispersion and corrector strength. Simulations indicate this to be a very effective way to control the vertical residual dispersion.

  15. Diffusion Characteristics of Upwind Schemes on Unstructured Triangulations

    NASA Technical Reports Server (NTRS)

    Wood, William A.; Kleb, William L.

    1998-01-01

    The diffusive characteristics of two upwind schemes, multi-dimensional fluctuation splitting and dimensionally-split finite volume, are compared for scalar advection-diffusion problems. Algorithms for the two schemes are developed for node-based data representation on median-dual meshes associated with unstructured triangulations in two spatial dimensions. Four model equations are considered: linear advection, non-linear advection, diffusion, and advection-diffusion. Modular coding is employed to isolate the effects of the two approaches for upwind flux evaluation, allowing for head-to-head accuracy and efficiency comparisons. Both the stability of compressive limiters and the amount of artificial diffusion generated by the schemes is found to be grid-orientation dependent, with the fluctuation splitting scheme producing less artificial diffusion than the dimensionally-split finite volume scheme. Convergence rates are compared for the combined advection-diffusion problem, with a speedup of 2-3 seen for fluctuation splitting versus finite volume when solved on the same mesh. However, accurate solutions to problems with small diffusion coefficients can be achieved on coarser meshes using fluctuation splitting rather than finite volume, so that when comparing convergence rates to reach a given accuracy, fluctuation splitting shows a 20-25 speedup over finite volume.

  16. An Advanced Leakage Scheme for Neutrino Treatment in Astrophysical Simulations

    NASA Astrophysics Data System (ADS)

    Perego, A.; Cabezón, R. M.; Käppeli, R.

    2016-04-01

    We present an Advanced Spectral Leakage (ASL) scheme to model neutrinos in the context of core-collapse supernovae (CCSNe) and compact binary mergers. Based on previous gray leakage schemes, the ASL scheme computes the neutrino cooling rates by interpolating local production and diffusion rates (relevant in optically thin and thick regimes, respectively) separately for discretized values of the neutrino energy. Neutrino trapped components are also modeled, based on equilibrium and timescale arguments. The better accuracy achieved by the spectral treatment allows a more reliable computation of neutrino heating rates in optically thin conditions. The scheme has been calibrated and tested against Boltzmann transport in the context of Newtonian spherically symmetric models of CCSNe. ASL shows a very good qualitative and a partial quantitative agreement for key quantities from collapse to a few hundreds of milliseconds after core bounce. We have proved the adaptability and flexibility of our ASL scheme, coupling it to an axisymmetric Eulerian and to a three-dimensional smoothed particle hydrodynamics code to simulate core collapse. Therefore, the neutrino treatment presented here is ideal for large parameter-space explorations, parametric studies, high-resolution tests, code developments, and long-term modeling of asymmetric configurations, where more detailed neutrino treatments are not available or are currently computationally too expensive.

  17. Reversible fragile watermarking scheme for three-dimensional models

    NASA Astrophysics Data System (ADS)

    Wang, Jen-Tse; Wang, Peng-Cheng; Yu, Shyr-Shen

    2009-09-01

    Watermarking is a very important technique for protecting the authorization of digital content, such as still images, video streams, audio streams, and 3-D models. Most fragile watermarking schemes for 3-D models are not reversible. Published reversible or irreversible fragile watermarking schemes for 3-D models have many drawbacks, such as the causality problem, not being blind, or being unable to locate changed regions. To overcome these drawbacks, a reversible fragile watermarking scheme for 3-D models in spatial domain is proposed. Principal component analysis (PCA) is employed to produce the PCA coordinate system and make the system robust against similarity transformation attacks. PCA, together with a novel interval embedding technique, provide the blind reversibility of the proposed scheme. Intervals larger than a threshold and smaller than another threshold are adopted as legitimate to avoid large distortion. Moreover, experimental results show that the proposed scheme can overcome the causality, convergence, and confusion problems; provide both tampering detection and better embedding rate and requiring a small key size.

  18. Development of a multilocus sequence typing scheme for Streptococcus gallolyticus.

    PubMed

    Shibata, Yusuke; Tien, Le Hong Thuy; Nomoto, Ryohei; Osawa, Ro

    2014-01-01

    Streptococcus gallolyticus is often found as a member of the normal gut microflora in various animals. However, it has been reported to cause mastitis in cattle, septicaemia in pigeons, and meningitis, septicaemia and endocarditis in humans. However, little is known about the epidemiology and crucial virulence factors of S. gallolyticus. To help address these issues, we developed a multilocus sequence typing (MLST) scheme for S. gallolyticus. Seven housekeeping gene fragments were sequenced from each of 58 S. gallolyticus isolates collected from diverse origins and sources. The MLST scheme had good discriminatory ability. The 63 strains, including the 5 whole genome sequenced strains examined, resolved into 57 sequence types (STs), with 52 STs represented by only a single strain. With respect to the identification of S. gallolyticus subspecies (i.e. S. gallolyticus subsp. gallolyticus, S. gallolyticus subsp. pasteurianus and S. gallolyticus subsp. macedonicus), the results of biochemical tests and DNA-DNA hybridization were in high concordance with those of the MLST scheme. The MLST scheme developed in this study may be a useful tool capable of replacing the conventional methods used for S. gallolyticus subspecies identification. The results of this study suggest that the biology and virulence of two pathogenic S. gallolyticus subspecies (i.e. S. gallolyticus subsp. gallolyticus and S. gallolyticus subsp. pasteurianus) are very different. The MLST scheme offers researchers a valuable typing tool that will promote further investigation of the epidemiology of S. gallolyticus. PMID:24131946

  19. Unconditionally stable time marching scheme for Reynolds stress models

    NASA Astrophysics Data System (ADS)

    Mor-Yossef, Y.

    2014-11-01

    Progress toward a stable and efficient numerical treatment for the compressible Favre-Reynolds-averaged Navier-Stokes equations with a Reynolds-stress model (RSM) is presented. The mean-flow and the Reynolds stress model equations are discretized using finite differences on a curvilinear coordinates mesh. The convective flux is approximated by a third-order upwind biased MUSCL scheme. The diffusive flux is approximated using second-order central differencing, based on a full-viscous stencil. The novel time-marching approach relies on decoupled, implicit time integration, that is, the five mean-flow equations are solved separately from the seven Reynolds-stress closure equations. The key idea is the use of the unconditionally positive-convergent implicit scheme (UPC), originally developed for two-equation turbulence models. The extension of the UPC scheme for RSM guarantees the positivity of the normal Reynolds-stress components and the turbulence (specific) dissipation rate for any time step. Thanks to the UPC matrix-free structure and the decoupled approach, the resulting computational scheme is very efficient. Special care is dedicated to maintain the implicit operator compact, involving only nearest neighbor grid points, while fully supporting the larger discretized residual stencil. Results obtained from two- and three-dimensional numerical simulations demonstrate the significant progress achieved in this work toward optimally convergent solution of Reynolds stress models. Furthermore, the scheme is shown to be unconditionally stable and positive.

  20. High-order ALE schemes for incompressible capillary flows

    NASA Astrophysics Data System (ADS)

    Montefuscolo, Felipe; Sousa, Fabricio S.; Buscaglia, Gustavo C.

    2014-12-01

    The spatial discretization of problems with moving boundaries is considered, incorporating the temporal evolution of not just the mechanical variables, but also of the nodal positions of the moving mesh. The outcome is a system of Differential-Algebraic Equations (DAE) of index 2 or, in the case of inertialess flow, just 1. From the DAE formulation it its possible to define strategies to build schemes of arbitrary accuracy. We introduce here several schemes of order 2 and 3 that avoid the solution of a nonlinear system involving simultaneously the mechanical variables and the geometrical ones. This class of schemes has been the one adopted by the majority of practitioners of Computational Fluid Dynamics up to now. The proposed schemes indeed achieve the design accuracy, and further show stability restrictions that are not significantly more severe than those of popular first order schemes. The numerical experimentation is performed on capillary problems, discretized by both div-stable (P2/P1, P1+/P1) and equal-order (P1/P1, stabilized) finite elements, and incorporating surface tension and triple (contact) line effects.

  1. Second-generation watermarking scheme against geometric attacks

    NASA Astrophysics Data System (ADS)

    Ji, Zhen; Xiao, Weiwei; Zhang, Jihong

    2003-01-01

    In this paper, a scheme which following the second generation watermarking paradigm is proposed. The goal of this proposed scheme is basically to increase the robustness against geometric attacks. The host image is decomposed with the wavelet packet. The bit stream of binary watermark is coded into several patterns with salient feature. The circular feature is used in this paper, because: (a) the computational complexity of the method grows rapidly with more complex shapes. (b) circle is rotation-invariant and partially scale-invariant. (c) circular feature can be detected by Hough transform effectively. These patterns are embedded into wavelet packet coefficients according to human perceptual characteristics. A new HVS mask based on wavelet transform is proposed with consideration of local texture characteristics. The introduction of HVS characteristics boosts the performance of the whole scheme. For the detection of watermark, the geometric distortion is calibrated for the contaminated watermarked image. Hough transform is used to detect the circular features in the WP Coefficients. This scheme has the following characteristics: (a) robustness against the common geometric attacks(rotation, scaling, cropping, and etc) is improved significantly. (b) human perceptual characteristics is taken into consideration, so the tradeoff between invisibility and robustness is improved. Results of extensive experiments indicate that this proposed scheme is significantly effective in resisting various geometric attacks such as rotation, scaling, JPEG compression, adding noise, etc.

  2. Multi-area layered multicast scheme for MPLS networks

    NASA Astrophysics Data System (ADS)

    Ma, Yajie; Yang, Zongkai; Wang, Yuming; Chen, Jingwen

    2005-02-01

    Multi-protocol label switching (MPLS) is multiprotocols both at layer 2 and layer 3. It is suggested to overcome the shortcomings of performing complex longest prefix matching in layer 3 routing by using short, fixed length labels. The MPLS community has put more effort into the label switching of unicast IP traffic, but less in the MPLS multicast mechanism. The reasons are the higher label consumption, the dynamical mapping of L3 multicast tree to L2 LSPs and the 20-bit shim header which is much fewer than the IPv4 IP header. On the other hand, heterogeneity of node capability degrades total performance of a multicast group. In order to achieve the scalability as well as the heterogeneity in MPLS networks, a novel scheme of MPLS-based Multi-area Layered Multicast Scheme (MALM) is proposed. Unlike the existing schemes which focus on aggregating the multicast stream, we construct the multicast tree based on the virtual topology aggregation. The MPLS area is divided into different sub-areas to form the hierarchical virtual topology and the multicast group is reconstructed into multiple layers according to the node capability. At the same time, the label stack is used to save the label space. For stability of the MALM protocol, a multi-layer protection scheme is also discussed. The experiment results show that the proposed scheme saves label space and decrease the Multicast Forwarding Table in much degree.

  3. Market behavior and performance of different strategy evaluation schemes

    NASA Astrophysics Data System (ADS)

    Baek, Yongjoo; Lee, Sang Hoon; Jeong, Hawoong

    2010-08-01

    Strategy evaluation schemes are a crucial factor in any agent-based market model, as they determine the agents’ strategy preferences and consequently their behavioral pattern. This study investigates how the strategy evaluation schemes adopted by agents affect their performance in conjunction with the market circumstances. We observe the performance of three strategy evaluation schemes, the history-dependent wealth game, the trend-opposing minority game, and the trend-following majority game, in a stock market where the price is exogenously determined. The price is either directly adopted from the real stock market indices or generated with a Markov chain of order ≤2 . Each scheme’s success is quantified by average wealth accumulated by the traders equipped with the scheme. The wealth game, as it learns from the history, shows relatively good performance unless the market is highly unpredictable. The majority game is successful in a trendy market dominated by long periods of sustained price increase or decrease. On the other hand, the minority game is suitable for a market with persistent zigzag price patterns. We also discuss the consequence of implementing finite memory in the scoring processes of strategies. Our findings suggest under which market circumstances each evaluation scheme is appropriate for modeling the behavior of real market traders.

  4. Influence of two convection schemes on the radiative energy budget

    NASA Astrophysics Data System (ADS)

    Li, L.

    2010-12-01

    The authors use the Grid-point Atmospheric Model of IAP LASG version 1.0 (GAMIL1.0) to investigate impacts of different convective schemes on the energy budget. The two convective schemes are Zhang and McFarlance (1995) /Hack (1994) (ZM) and Tiedtke (1989) / Nordeng (1994) (TN). Two simulations are performed: one with the ZM scheme (EX_ZM) and the other with the TN scheme (EX_TN). The results indicate that, during the convective process, more water vapor consumption and temperature increment are found in EX_ZM, especially in lower model layer, its environment is therefore very dry. In contrast, there is a moister atmosphere in EX_TN, which favors low cloud formation and large-scale condensation, and hence more low cloud fraction, cloud water mixing ratio and deeper cloud extinction optical depth are simulated, reflecting more solar radiation flux in EX_TN. This explains why the TN scheme underestimates the net shortwave radiation flux at the top of the atmosphere and at surface. In addition, convection influences longwave radiative, surface sensible and latent heat fluxes through changes in cloud emissivity and precipitation.

  5. Influence of two convection schemes on the radiative energy budget

    NASA Astrophysics Data System (ADS)

    Li, Lijuan; Wang, Bin

    2010-05-01

    The authous use the Grid-point Atmospheric Model of IAP LASG version 1.0 (GAMIL1.0) to investigate impacts of different convective schemes on the energy budget. The two convective schemes are Zhang and McFarlance (1995) /Hack (1994) (ZM) and Tiedtke (1989) / Nordeng (1994) (TN). Two simulations are performed: one with the ZM scheme (EX_ZM) and the other with the TN scheme (EX_TN). The results indicate that, duiring the convective process, more water vapor consumption and temperature increment are found in EX_ZM, especially in lower model layer, its environment is therefore very dry. In contrast, there is a moister atmosphere in EX_TN, which favors low cloud formation and large-scale condensation, and hence more low cloud fraction, cloud water mixing ratio and deeper cloud extinction optical depth are simulated, reflecting more solar radiation flux in EX_TN. This explains why the TN scheme underestimates the net shortwave radiation flux at the top of the atmosphere and at surface. In addition, convection influences longwave radiative, surface sensible and latent heat fluxes through changes in cloud emissivity and precipitation.

  6. Reactivity Control Schemes for Fast Spectrum Space Nuclear Reactors

    SciTech Connect

    Craft, Aaron E.; King, Jeffrey C.

    2008-01-21

    Several different reactivity control schemes are considered for future space nuclear reactor power systems. Each of these control schemes uses a combination of boron carbide absorbers and/or beryllium oxide reflectors to achieve sufficient reactivity swing to keep the reactor subcritical during launch and to provide sufficient excess reactivity to operate the reactor over its expected 7-15 year lifetime. The size and shape of the control system directly impacts the size and mass of the space reactor's reflector and shadow shield, leading to a tradeoff between reactivity swing and total system mass. This paper presents a trade study of drum, shutter, and petal control schemes based on reactivity swing and mass effects for a representative fast-spectrum, gas-cooled reactor. For each control scheme, the dimensions and composition of the core are constant, and the reflector is sized to provide $5 of cold-clean excess reactivity with each configuration in its most reactive state. The advantages and disadvantages of each configuration are discussed, along with optimization techniques and novel geometric approaches for each scheme.

  7. A maternal health voucher scheme: what have we learned from the demand-side financing scheme in Bangladesh?

    PubMed

    Ahmed, Shakil; Khan, M Mahmud

    2011-01-01

    It is now more than 2 years since the Ministry of Health and Family Welfare of the Government of Bangladesh implemented the Maternal Health Voucher Scheme, a specialized form of demand-side financing programme. To analyse the early lessons from the scheme, information was obtained through semi-structured interviews with stakeholders at the sub-district level. The analysis identified a number of factors affecting the efficiency and performance of the scheme in the program area: delay in the release of voucher funds, selection criteria used for enrolling pregnant women in the programme, incentives created by the reimbursement system, etc. One of the objectives of the scheme was to encourage market competition among health care providers, but it failed to increase market competitiveness in the area. The resources made available through the scheme did not attract any new providers into the market and public facilities remained the only eligible provider both before and after scheme implementation. However, incentives provided through the voucher system did motivate public providers to offer a higher level of services. The beneficiaries expressed their overall satisfaction with the scheme as well. Since the local facility was not technically ready to provide all types of maternal health care services, providing vouchers may not improve access to care for many pregnant women. To improve the performance of the demand-side strategy, it has become important to adopt some supply-side interventions. In poor developing countries, a demand-side strategy may not be very effective without significant expansion of the service delivery capacity of health facilities at the sub-district level.

  8. New, Improved Bulk-microphysical Schemes for Studying Precipitation Processes in WRF. Part 1; Comparisons with Other Schemes

    NASA Technical Reports Server (NTRS)

    Tao, W.-K.; Shi, J.; Chen, S. S> ; Lang, S.; Hong, S.-Y.; Thompson, G.; Peters-Lidard, C.; Hou, A.; Braun, S.; Simpson, J.

    2007-01-01

    Advances in computing power allow atmospheric prediction models to be mn at progressively finer scales of resolution, using increasingly more sophisticated physical parameterizations and numerical methods. The representation of cloud microphysical processes is a key component of these models, over the past decade both research and operational numerical weather prediction models have started using more complex microphysical schemes that were originally developed for high-resolution cloud-resolving models (CRMs). A recent report to the United States Weather Research Program (USWRP) Science Steering Committee specifically calls for the replacement of implicit cumulus parameterization schemes with explicit bulk schemes in numerical weather prediction (NWP) as part of a community effort to improve quantitative precipitation forecasts (QPF). An improved Goddard bulk microphysical parameterization is implemented into a state-of the-art of next generation of Weather Research and Forecasting (WRF) model. High-resolution model simulations are conducted to examine the impact of microphysical schemes on two different weather events (a midlatitude linear convective system and an Atllan"ic hurricane). The results suggest that microphysics has a major impact on the organization and precipitation processes associated with a summer midlatitude convective line system. The 31CE scheme with a cloud ice-snow-hail configuration led to a better agreement with observation in terms of simulated narrow convective line and rainfall intensity. This is because the 3ICE-hail scheme includes dense ice precipitating (hail) particle with very fast fall speed (over 10 m/s). For an Atlantic hurricane case, varying the microphysical schemes had no significant impact on the track forecast but did affect the intensity (important for air-sea interaction)

  9. Study on Safety Technology Scheme of the Unmanned Helicopter

    NASA Astrophysics Data System (ADS)

    Lin, Z.; Zhang, W.; Chen, S.; Liu, T.; Yao, Y.

    2013-08-01

    Nowadays the unmanned helicopter is widely used for its' unique strongpoint, however, the high failure rate of unmanned helicopter seriously limits its further application and development. For solving the above problems, in this paper, the reasons for the high failure rate of unmanned helicopter is analyzed and the corresponding solution schemes are proposed. The main problem of the failure cause of the unmanned helicopter is the aircraft engine fault, and the failure cause of the unmanned helicopter is analyzed particularly. In order to improving the safety performance of unmanned helicopter system, the scheme of adding the safety parachute system to the unmanned helicopter system is proposed and introduced. These schemes provide the safety redundancy of the unmanned helicopter system and lay on basis for the unmanned helicopter applying into residential areas.

  10. Customer oriented SNR scalability scheme for scalable video coding

    NASA Astrophysics Data System (ADS)

    Li, Z. G.; Rahardja, S.

    2005-07-01

    Let the whole region be the whole bit rate range that customers are interested in, and a sub-region be a specific bit rate range. The weighting factor of each sub-region is determined according to customers' interest. A new type of region of interest (ROI) is defined for the SNR scalability as the gap between the coding efficiency of SNR scalability scheme and that of the state-of-the-art single layer coding for a sub-region is a monotonically non-increasing function of its weighting factor. This type of ROI is used as a performance index to design a customer oriented SNR scalability scheme. Our scheme can be used to achieve an optimal customer oriented scalable tradeoff (COST). The profit can thus be maximized.

  11. Improving the schemes for preparing chamotte-clay mixtures

    SciTech Connect

    Goncharov, V.I.; Bulakh, V.L.; Korchakov, V.G.

    1988-07-01

    Based on data obtained on the combined milling, particle size, density, and sinterability of chamotte and clay and the energy and productivity parameters of the requisite equipment, a number of schemes are recommended for preparing finely milled chamotte and clay mixtures. The schemes call for prior separate milling and particle size classification of the chamotte followed by the addition of surfactants and the combined milling of the chamotte and clay. Charging and mixing techniques were evaluated for the batch preparation of firebrick and for lowering equipment energy consumption and producing high-grade nondust mixtures. Schematic diagrams depicting the configuration of the mills, hoppers, feed lines, and pneumatic classifiers are given. The introduction of such schemes into refractory practice is expected to stabilize service properties, increase the utilization of raw materials, reduce production costs, and reduce dust in the work space.

  12. Secure SCADA communication by using a modified key management scheme.

    PubMed

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks.

  13. Secure SCADA communication by using a modified key management scheme.

    PubMed

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks. PMID:23528753

  14. Path selection process utilizing rapid estimation scheme. [for Martian rover

    NASA Technical Reports Server (NTRS)

    Ring, H.; Shen, C. N.

    1978-01-01

    The paper describes the use of a rapid estimation scheme for path selection by a roving vehicle. Essentially, the evaluation procedure simulates movement of the rover over each of several corridors lying radially outward from the scanning position. Two levels of corridors are used, and the path selection scheme selects the optimal primary corridor according to a dynamic programming algorithm. In the present version, the length of the corridors is variable. The rapid estimation scheme provides information to define corridor dimensions. This corridor structure, which varies as a function of the terrain, eliminates the need for backtracking, except in certain extreme cases. Computer results are promising in that obstacles were avoided while corridor lengths were kept to a maximum where safety permitted.

  15. Uniformly high order accurate essentially non-oscillatory schemes 3

    NASA Technical Reports Server (NTRS)

    Harten, A.; Engquist, B.; Osher, S.; Chakravarthy, S. R.

    1986-01-01

    In this paper (a third in a series) the construction and the analysis of essentially non-oscillatory shock capturing methods for the approximation of hyperbolic conservation laws are presented. Also presented is a hierarchy of high order accurate schemes which generalizes Godunov's scheme and its second order accurate MUSCL extension to arbitrary order of accuracy. The design involves an essentially non-oscillatory piecewise polynomial reconstruction of the solution from its cell averages, time evolution through an approximate solution of the resulting initial value problem, and averaging of this approximate solution over each cell. The reconstruction algorithm is derived from a new interpolation technique that when applied to piecewise smooth data gives high-order accuracy whenever the function is smooth but avoids a Gibbs phenomenon at discontinuities. Unlike standard finite difference methods this procedure uses an adaptive stencil of grid points and consequently the resulting schemes are highly nonlinear.

  16. The Split-weight Particle Simulation Scheme for Plasmas

    SciTech Connect

    Igor Manuilskiy; W.W. Lee

    1999-11-01

    An efficient numerical method for treating electrons in magnetized plasmas has been developed. The scheme, which is based on the perturbative (delta f) gyrokinetic particle simulation, splits the particle electron responses into adiabatic and non-adiabatic parts. The former is incorporated into the gyrokinetic Poisson's equation, while the latter is calculated dynamically with the aid of the charge conservation equation. The new scheme affords us the possibility of suppressing unwanted high frequency oscillations and, in the meantime, relaxing the Courant condition for the thermal particles moving in the parallel direction. It is most useful for studying low-frequency phenomena in plasmas. As an example, one-dimensional drift wave simulation has been carried out using the scheme and the results are presented in the paper. This methodology can easily be generalized to problems in three-dimensional toroidal geometry as well as those in unmagnetized plasmas.

  17. Quantum blind dual-signature scheme without arbitrator

    NASA Astrophysics Data System (ADS)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-03-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology.

  18. Proposal of Wireless Traffic Control Schemes for Wireless LANs

    NASA Astrophysics Data System (ADS)

    Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji

    This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.

  19. Uniformly high-order accurate non-oscillatory schemes, 1

    NASA Technical Reports Server (NTRS)

    Harten, A.; Osher, S.

    1985-01-01

    The construction and the analysis of nonoscillatory shock capturing methods for the approximation of hyperbolic conservation laws was begun. These schemes share many desirable properties with total variation diminishing schemes (TVD), but TVD schemes have at most first order accuracy, in the sense of truncation error, at extreme of the solution. A uniformly second order approximation was constucted, which is nonoscillatory in the sense that the number of extrema of the discrete solution is not increasing in time. This is achieved via a nonoscillatory piecewise linear reconstruction of the solution from its cell averages, time evolution through an approximate solution of the resulting initial value problem, and averaging of this approximate solution over each cell.

  20. A Technique of Treating Negative Weights in WENO Schemes

    NASA Technical Reports Server (NTRS)

    Shi, Jing; Hu, Changqing; Shu, Chi-Wang

    2000-01-01

    High order accurate weighted essentially non-oscillatory (WENO) schemes have recently been developed for finite difference and finite volume methods both in structural and in unstructured meshes. A key idea in WENO scheme is a linear combination of lower order fluxes or reconstructions to obtain a high order approximation. The combination coefficients, also called linear weights, are determined by local geometry of the mesh and order of accuracy and may become negative. WENO procedures cannot be applied directly to obtain a stable scheme if negative linear weights are present. Previous strategy for handling this difficulty is by either regrouping of stencils or reducing the order of accuracy to get rid of the negative linear weights. In this paper we present a simple and effective technique for handling negative linear weights without a need to get rid of them.

  1. Enabling an integrated rate-temporal learning scheme on memristor.

    PubMed

    He, Wei; Huang, Kejie; Ning, Ning; Ramanathan, Kiruthika; Li, Guoqi; Jiang, Yu; Sze, Jiayin; Shi, Luping; Zhao, Rong; Pei, Jing

    2014-04-23

    Learning scheme is the key to the utilization of spike-based computation and the emulation of neural/synaptic behaviors toward realization of cognition. The biological observations reveal an integrated spike time- and spike rate-dependent plasticity as a function of presynaptic firing frequency. However, this integrated rate-temporal learning scheme has not been realized on any nano devices. In this paper, such scheme is successfully demonstrated on a memristor. Great robustness against the spiking rate fluctuation is achieved by waveform engineering with the aid of good analog properties exhibited by the iron oxide-based memristor. The spike-time-dependence plasticity (STDP) occurs at moderate presynaptic firing frequencies and spike-rate-dependence plasticity (SRDP) dominates other regions. This demonstration provides a novel approach in neural coding implementation, which facilitates the development of bio-inspired computing systems.

  2. Adaptive IMEX schemes for high-order unstructured methods

    NASA Astrophysics Data System (ADS)

    Vermeire, Brian C.; Nadarajah, Siva

    2015-01-01

    We present an adaptive implicit-explicit (IMEX) method for use with high-order unstructured schemes. The proposed method makes use of the Gerschgorin theorem to conservatively estimate the influence of each individual degree of freedom on the spectral radius of the discretization. This information is used to split the system into implicit and explicit regions, adapting to unsteady features in the flow. We dynamically repartition the domain to balance the number of implicit and explicit elements per core. As a consequence, we are able to achieve an even load balance for each implicit/explicit stage of the IMEX scheme. We investigate linear advection-diffusion, isentropic vortex advection, unsteady laminar flow over an SD7003 airfoil, and turbulent flow over a circular cylinder. Results show that the proposed method consistently yields a stable discretization, and maintains the theoretical order of accuracy of the high-order spatial schemes.

  3. Quantum teleportation scheme by selecting one of multiple output ports

    NASA Astrophysics Data System (ADS)

    Ishizaka, Satoshi; Hiroshima, Tohya

    2009-04-01

    The scheme of quantum teleportation, where Bob has multiple (N) output ports and obtains the teleported state by simply selecting one of the N ports, is thoroughly studied. We consider both the deterministic version and probabilistic version of the teleportation scheme aiming to teleport an unknown state of a qubit. Moreover, we consider two cases for each version: (i) the state employed for the teleportation is fixed to a maximally entangled state and (ii) the state is also optimized as well as Alice’s measurement. We analytically determine the optimal protocols for all the four cases and show the corresponding optimal fidelity or optimal success probability. All these protocols can achieve the perfect teleportation in the asymptotic limit of N→∞ . The entanglement properties of the teleportation scheme are also discussed.

  4. Low-cost resilience schemes for the Optical Ethernet

    NASA Astrophysics Data System (ADS)

    Cugini, Filippo; Valcarenghi, Luca; Castoldi, Piero; Guglielmucci, Michele

    2005-12-01

    Optical Ethernet (OE) architectures transport IP packets directly over the optical layer by providing a specific Layer 2 framing. Although the architectures represent a simple and low-cost solution, the limiting factor for their widespread deployment is represented by the lack of some efficient operation, administration, and maintenance (OA&M) features, such as resilience. Optical layer protection represents a low-cost resilience scheme for OE links. We present the experimental results of low-cost protection implementations that are based on different failure detection and failure protection activation schemes for IP-over-OE networks. Specifically, a dedicated span protection scheme and an evolution for shared protection based on generalized multiprotocol label switching (GMPLS) signaling in transparent domains is presented. Experimental results show that recovery times in the millisecond range are achieved.

  5. Enabling an Integrated Rate-temporal Learning Scheme on Memristor

    PubMed Central

    He, Wei; Huang, Kejie; Ning, Ning; Ramanathan, Kiruthika; Li, Guoqi; Jiang, Yu; Sze, JiaYin; Shi, Luping; Zhao, Rong; Pei, Jing

    2014-01-01

    Learning scheme is the key to the utilization of spike-based computation and the emulation of neural/synaptic behaviors toward realization of cognition. The biological observations reveal an integrated spike time- and spike rate-dependent plasticity as a function of presynaptic firing frequency. However, this integrated rate-temporal learning scheme has not been realized on any nano devices. In this paper, such scheme is successfully demonstrated on a memristor. Great robustness against the spiking rate fluctuation is achieved by waveform engineering with the aid of good analog properties exhibited by the iron oxide-based memristor. The spike-time-dependence plasticity (STDP) occurs at moderate presynaptic firing frequencies and spike-rate-dependence plasticity (SRDP) dominates other regions. This demonstration provides a novel approach in neural coding implementation, which facilitates the development of bio-inspired computing systems. PMID:24755608

  6. A Cell-Centered Multiphase ALE Scheme With Structural Coupling

    SciTech Connect

    Dunn, Timothy Alan

    2012-04-16

    A novel computational scheme has been developed for simulating compressible multiphase flows interacting with solid structures. The multiphase fluid is computed using a Godunov-type finite-volume method. This has been extended to allow computations on moving meshes using a direct arbitrary-Eulerian- Lagrangian (ALE) scheme. The method has been implemented within a Lagrangian hydrocode, which allows modeling the interaction with Lagrangian structural regions. Although the above scheme is general enough for use on many applications, the ultimate goal of the research is the simulation of heterogeneous energetic material, such as explosives or propellants. The method is powerful enough for application to all stages of the problem, including the initial burning of the material, the propagation of blast waves, and interaction with surrounding structures. The method has been tested on a number of canonical multiphase tests as well as fluid-structure interaction problems.

  7. Multi-proxy Strong Blind Quantum Signature Scheme

    NASA Astrophysics Data System (ADS)

    Guo, Wei; Zhang, Jian-Zhong; Li, Yan-Ping; An, Wan

    2016-08-01

    A multi-proxy strong blind quantum signature scheme is proposed in this paper. An original signatory Alice delegates her signing authority to a group of proxy signatories by using a classical warrant. A blind factor is introduced by a sender U to blind a message, and the proxy signatories sign the message blindly via applying appropriate unitary operators. A receiver Bob verifies the generated signature with the help of an arbitrator Trent. The security of this scheme is based on a quantum key distribution protocol, a quantum one-time pad and other quantum properties. It is proved that our scheme has the properties of non-disavowal, non-counterfeit, multi-proxy, blindness, untraceability and can resist some common attacks.

  8. Use of finite volume schemes for transition simulation

    NASA Technical Reports Server (NTRS)

    Fenno, Charles C., Jr.; Hassan, H. A.; Streett, Craig L.

    1991-01-01

    The use of finite-volume methods in the study of spatially and temporally evolving transitional flows over a flat plate is investigated. Schemes are developed with both central and upwind differencing. The compressible Navier-Stokes equations are solved with a Runge-Kutta time stepping scheme. Disturbances are determined using linear theory and superimposed at the inflow boundary. Time accurate integration is then used to allow temporal and spatial disturbance evolution. Characteristic-based boundary conditions are employed. The requirements of using finite-volume algorithms are studied in detail. Special emphasis is placed on difference schemes, grid resolution, and disturbance amplitudes. Moreover, comparisons are made with linear theory for small amplitude disturbances. Both subsonic and supersonic flows are considered, and it is shown that the locations of branch 1 and branch 2 of the neutral stability curve are well predicted, given sufficient resolution.

  9. Ka-band geostationary satellite spacing requirements and access schemes

    NASA Technical Reports Server (NTRS)

    Caron, Mario; Hindson, Daniel J.

    1995-01-01

    Geostationary satellite systems for wideband personal communications applications have been proposed. This paper looks at the geostationary satellite spacing requirement to meet the ITU-R sharing criterion for FDMA and CDMA access schemes. CDMA capacity equation is first developed. Then the basis for the interference analysis between two systems with an overlapping coverage area is developed for the cases of identical and different access schemes and for bandwidth and power limited systems. An example of an interference analysis between two systems is fully carried out. The paper also points out the inherent problems when comparing systems with different access schemes. It is found that under certain scenarios, CDMA can allow a closer spacing between satellites.

  10. Realization schemes for quantum instruments in finite dimensions

    SciTech Connect

    Chiribella, Giulio; Perinotti, Paolo; D'Ariano, Giacomo Mauro

    2009-04-15

    We present a general dilation scheme for quantum instruments with continuous outcome space in finite dimensions, in terms of a measurement on a finite-dimensional ancilla, described by a positive operator valued measure (POVM). The general result is then applied to a large class of instruments generated by operator frames, which contains group-covariant instruments as a particular case and allows one to construct dilation schemes based on a measurement on the ancilla followed by a conditional feed-forward operation on the output. In the case of tight operator frames, our construction generalizes quantum teleportation and telecloning, producing a whole family of generalized teleportation schemes in which the instrument is realized via a joint POVM at the sender combined with a conditional feed-forward operation at the receiver.

  11. An Improved Lattice Kinetic Scheme for Incompressible Viscous Fluid Flows

    NASA Astrophysics Data System (ADS)

    Suzuki, Kosuke; Inamuro, Takaji

    2014-01-01

    The lattice Boltzmann method (LBM) is an explicit numerical scheme for the incompressible Navier-Stokes equations (INSE) without integrating the Poisson equation for the pressure. In spite of its merit, the LBM has some drawbacks in accuracy. First, we review drawbacks for three numerical methods based on the LBM. The three methods are the LBM with the Bhatnagar-Gross-Krook model (LBGK), the lattice kinetic scheme (LKS) and the link-wise artificial compressibility method (LWACM). Second, in order to remedy the drawbacks, we propose an improved LKS. The present method incorporates (i) the scheme used in the LWACM for determining the kinematic viscosity, (ii) an iterative calculation of the pressure and (iii) a semi-implicit algorithm, while preserving the simplicity of the algorithm of the original LKS. Finally, in simulations of test problems, we find that the improved LKS eliminates the drawbacks and gives more accurate and stable results than LBGK, LKS and LWACM.

  12. A Secure Distributed Spectrum Sensing Scheme in Cognitive Radio

    NASA Astrophysics Data System (ADS)

    Nhan, Nguyen-Thanh; Koo, Insoo

    Distributed spectrum sensing provides an improvement for primary user detection but leads a new security threat into CR system. The spectrum sensing data falsification malicious users can decrease the cooperative sensing performance. In this paper, we propose a distributed scheme in which the presence and absence hypotheses distribution of primary signal is estimated based on past sensing received power data by robust statistics, and the data fusion are performed according to estimated parameters by Dempster-Shafer theory of evidence. Our scheme can achive a powerful capability of malicious user elimination due to the abnormality of the distribution of malicious users compared with that of other legitimate users. In addition, the performance of our data fusion scheme is enhanced by supplemented nodes’ reliability weight.

  13. New optical scheme for a polarimetric-based glucose sensor

    NASA Technical Reports Server (NTRS)

    Ansari, Rafat R.; Bockle, Stefan; Rovati, Luigi

    2004-01-01

    A new optical scheme to detect glucose concentration in the aqueous humor of the eye is presented. The ultimate aim is to apply this technique in designing a new instrument for, routinely and frequently, noninvasively monitoring blood glucose levels in diabetic patients without contact (no index matching) between the eye and the instrument. The optical scheme exploits the Brewster reflection of circularly polarized light off of the lens of the eye. Theoretically, this reflected linearly polarized light on its way to the detector is expected to rotate its state of polarization, owing to the presence of glucose molecules in the aqueous humor of a patient's eye. An experimental laboratory setup based on this scheme was designed and tested by measuring a range of known concentrations of glucose solutions dissolved in water. (c) 2004 Society of Photo-Optical Instrumentation Engineers.

  14. Implicit Block ACK Scheme for IEEE 802.11 WLANs

    PubMed Central

    Sthapit, Pranesh; Pyun, Jae-Young

    2016-01-01

    The throughput of IEEE 802.11 standard is significantly bounded by the associated Medium Access Control (MAC) overhead. Because of the overhead, an upper limit exists for throughput, which is bounded, including situations where data rates are extremely high. Therefore, an overhead reduction is necessary to achieve higher throughput. The IEEE 802.11e amendment introduced the block ACK mechanism, to reduce the number of control messages in MAC. Although the block ACK scheme greatly reduces overhead, further improvements are possible. In this letter, we propose an implicit block ACK method that further reduces the overhead associated with IEEE 802.11e’s block ACK scheme. The mathematical analysis results are presented for both the original protocol and the proposed scheme. A performance improvement of greater than 10% was achieved with the proposed implementation.

  15. Adaptive PCA based fault diagnosis scheme in imperial smelting process.

    PubMed

    Hu, Zhikun; Chen, Zhiwen; Gui, Weihua; Jiang, Bin

    2014-09-01

    In this paper, an adaptive fault detection scheme based on a recursive principal component analysis (PCA) is proposed to deal with the problem of false alarm due to normal process changes in real process. Our further study is also dedicated to develop a fault isolation approach based on Generalized Likelihood Ratio (GLR) test and Singular Value Decomposition (SVD) which is one of general techniques of PCA, on which the off-set and scaling fault can be easily isolated with explicit off-set fault direction and scaling fault classification. The identification of off-set and scaling fault is also applied. The complete scheme of PCA-based fault diagnosis procedure is proposed. The proposed scheme is first applied to Imperial Smelting Process, and the results show that the proposed strategies can be able to mitigate false alarms and isolate faults efficiently.

  16. Near-unit-fidelity entanglement distribution scheme using Gaussian communication

    SciTech Connect

    Praxmeyer, Ludmila; Loock, Peter van

    2010-06-15

    We show how to distribute with percentage success probabilities almost perfectly entangled qubit memory pairs over repeater channel segments of the order of the optical attenuation distance. In addition to some weak, dispersive light-matter interactions, only Gaussian state transmissions and measurements are needed for this scheme. Our protocol outperforms the existing coherent-state-based schemes for entanglement distribution, even those using error-free non-Gaussian measurements. This is achieved through two innovations: First, optical squeezed states are utilized instead of coherent states. Second, the amplitudes of the bright signal pulses are reamplified at each repeater station. This latter variation is a strategy reminiscent of classical repeaters and would be impossible in single-photon-based schemes.

  17. A discrete-time adaptive control scheme for robot manipulators

    NASA Technical Reports Server (NTRS)

    Tarokh, M.

    1990-01-01

    A discrete-time model reference adaptive control scheme is developed for trajectory tracking of robot manipulators. The scheme utilizes feedback, feedforward, and auxiliary signals, obtained from joint angle measurement through simple expressions. Hyperstability theory is utilized to derive the adaptation laws for the controller gain matrices. It is shown that trajectory tracking is achieved despite gross robot parameter variation and uncertainties. The method offers considerable design flexibility and enables the designer to improve the performance of the control system by adjusting free design parameters. The discrete-time adaptation algorithm is extremely simple and is therefore suitable for real-time implementation. Simulations and experimental results are given to demonstrate the performance of the scheme.

  18. Improved Readout Scheme for SQUID-Based Thermometry

    NASA Technical Reports Server (NTRS)

    Penanen, Konstantin

    2007-01-01

    An improved readout scheme has been proposed for high-resolution thermometers, (HRTs) based on the use of superconducting quantum interference devices (SQUIDs) to measure temperature- dependent magnetic susceptibilities. The proposed scheme would eliminate counting ambiguities that arise in the conventional scheme, while maintaining the superior magnetic-flux sensitivity of the conventional scheme. The proposed scheme is expected to be especially beneficial for HRT-based temperature control of multiplexed SQUIDbased bolometer sensor arrays. SQUID-based HRTs have become standard for measuring and controlling temperatures in the sub-nano-Kelvin temperature range in a broad range of low-temperature scientific and engineering applications. A typical SQUIDbased HRT that utilizes the conventional scheme includes a coil wound on a core made of a material that has temperature- dependent magnetic susceptibility in the temperature range of interest. The core and the coil are placed in a DC magnetic field provided either by a permanent magnet or as magnetic flux inside a superconducting outer wall. The aforementioned coil is connected to an input coil of a SQUID. Changes in temperature lead to changes in the susceptibility of the core and to changes in the magnetic flux detected by the SQUID. The SQUID readout instrumentation is capable of measuring magnetic-flux changes that correspond to temperature changes down to a noise limit .0.1 nK/Hz1/2. When the flux exceeds a few fundamental flux units, which typically corresponds to a temperature of .100 nK, the SQUID is reset. The temperature range can be greatly expanded if the reset events are carefully tracked and counted, either by a computer running appropriate software or by a dedicated piece of hardware.

  19. External quality assessment scheme and laboratory accreditation in Indonesia.

    PubMed

    Timan, Ina S; Aulia, Diana; Santoso, Witono

    2002-02-01

    The National Program on External Quality Assessment Scheme (NEQAS) in Indonesia was first started in 1979, organized by the Indonesian Ministry of Health collaborating with professional bodies. The first trial was for clinical chemistry test with 2 cycles per year, followed by the hematology NEQAS in 1986 in collaboration with WHO-Royal Post Graduate Medical School London. After that, the schemes for serology, microbiology and parasitology were also organized. Around 500-600 laboratories throughout Indonesia participated each year in these quality control schemes, 2-4 cycles per year. Samples would be sent to participants and results will be given back to each laboratory. Poor performers should participate in the workshop or training course conducted by the Central Health Laboratory to improve their results. Participation in this NEQAS is mandatory for obtaining the laboratory license, and the Ministry of Health uses these schemes as one of the means for monitoring and coordinating the performance of laboratories throughout Indonesia. There are also some other EQAS (External Quality Assessment Scheme) programs conducted by professional bodies, such as for hemostasis, clinical chemistry and serology. During the course of conducting these schemes, it could be observed that manual methods were gradually changed to the automatic methods, especially for the clinical chemistry and hematology laboratories, which counts also for improvements of their results. Since the last 6 years, the Ministry of Health also began to conduct the Accreditation System evaluation for hospitals, including the laboratory departments. There are 7 standards that were evaluated, such as the aspect of the organization, administration and management, staffing, facilities and equipment, standard operating procedures, research and developments and quality control. This accreditation program is still in progress for all public and private hospital laboratories.

  20. Coupling WRF double-moment 6-class microphysics schemes to RRTMG radiation scheme in weather research forecasting model

    SciTech Connect

    Bae, Soo Ya; Hong, Song -You; Lim, Kyo-Sun Sunny

    2016-01-01

    A method to explicitly calculate the effective radius of hydrometeors in the Weather Research Forecasting (WRF) double-moment 6-class (WDM6) microphysics scheme is designed to tackle the physical inconsistency in cloud properties between the microphysics and radiation processes. At each model time step, the calculated effective radii of hydrometeors from the WDM6 scheme are linked to the Rapid Radiative Transfer Model for GCMs (RRTMG) scheme to consider the cloud effects in radiative flux calculation. This coupling effect of cloud properties between the WDM6 and RRTMG algorithms is examined for a heavy rainfall event in Korea during 25–27 July 2011, and it is compared to the results from the control simulation in which the effective radius is prescribed as a constant value. It is found that the derived radii of hydrometeors in the WDM6 scheme are generally larger than the prescribed values in the RRTMG scheme. Consequently, shortwave fluxes reaching the ground (SWDOWN) are increased over less cloudy regions, showing a better agreement with a satellite image. The overall distribution of the 24-hour accumulated rainfall is not affected but its amount is changed. In conclusion, a spurious rainfall peak over the Yellow Sea is alleviated, whereas the local maximum in the central part of the peninsula is increased.

  1. Coupling WRF double-moment 6-class microphysics schemes to RRTMG radiation scheme in weather research forecasting model

    DOE PAGESBeta

    Bae, Soo Ya; Hong, Song -You; Lim, Kyo-Sun Sunny

    2016-01-01

    A method to explicitly calculate the effective radius of hydrometeors in the Weather Research Forecasting (WRF) double-moment 6-class (WDM6) microphysics scheme is designed to tackle the physical inconsistency in cloud properties between the microphysics and radiation processes. At each model time step, the calculated effective radii of hydrometeors from the WDM6 scheme are linked to the Rapid Radiative Transfer Model for GCMs (RRTMG) scheme to consider the cloud effects in radiative flux calculation. This coupling effect of cloud properties between the WDM6 and RRTMG algorithms is examined for a heavy rainfall event in Korea during 25–27 July 2011, and itmore » is compared to the results from the control simulation in which the effective radius is prescribed as a constant value. It is found that the derived radii of hydrometeors in the WDM6 scheme are generally larger than the prescribed values in the RRTMG scheme. Consequently, shortwave fluxes reaching the ground (SWDOWN) are increased over less cloudy regions, showing a better agreement with a satellite image. The overall distribution of the 24-hour accumulated rainfall is not affected but its amount is changed. In conclusion, a spurious rainfall peak over the Yellow Sea is alleviated, whereas the local maximum in the central part of the peninsula is increased.« less

  2. A Hybrid Nonlinear Control Scheme for Active Magnetic Bearings

    NASA Technical Reports Server (NTRS)

    Xia, F.; Albritton, N. G.; Hung, J. Y.; Nelms, R. M.

    1996-01-01

    A nonlinear control scheme for active magnetic bearings is presented in this work. Magnet winding currents are chosen as control inputs for the electromechanical dynamics, which are linearized using feedback linearization. Then, the desired magnet currents are enforced by sliding mode control design of the electromagnetic dynamics. The overall control scheme is described by a multiple loop block diagram; the approach also falls in the class of nonlinear controls that are collectively known as the 'integrator backstepping' method. Control system hardware and new switching power electronics for implementing the controller are described. Various experiments and simulation results are presented to demonstrate the concepts' potentials.

  3. A secret image sharing scheme for light images

    NASA Astrophysics Data System (ADS)

    Wu, Kuang-Shyr

    2013-12-01

    In this study, a new ( r, n)-threshold secret image sharing scheme with low information overhead for images is provided, which has a low distortion rate, and is more applicable for light images. A secret image is encoded into n noise-like shadow images to satisfy the condition that any r of the n shares can be used to reveal the secret image, and no information on the secret can be revealed from any r - 1 or fewer shares. The size of the shadow images is relatively small. The experimental results show the effectiveness of the proposed scheme.

  4. General mass scheme for jet production in DIS

    NASA Astrophysics Data System (ADS)

    Kotko, P.; Slominski, W.

    2012-11-01

    We propose a method for calculating DIS jet production cross sections in QCD at NLO accuracy with consistent treatment of heavy quarks. The scheme relies on the dipole subtraction method for jets, which we extend to all possible initial state splittings with heavy partons, so that the Aivazis-Collins-Olness-Tung massive collinear factorization scheme can be applied. As a first check of the formalism we recover the Aivazis-Collins-Olness-Tung result for the heavy quark structure function using a dedicated Monte Carlo program.

  5. A new quantum scheme for normal-form games

    NASA Astrophysics Data System (ADS)

    Fraçkiewicz, Piotr

    2015-06-01

    We give a strict mathematical description for a refinement of the Marinatto-Weber quantum game scheme. The model allows the players to choose projector operators that determine the state on which they perform their local operators. The game induced by the scheme generalizes finite strategic-form game. In particular, it covers normal representations of extensive games, i.e., strategic games generated by extensive ones. We illustrate our idea with an example of extensive game and prove that rational choices in the classical game and its quantum counterpart may lead to significantly different outcomes.

  6. A secure quantum group signature scheme based on Bell states

    NASA Astrophysics Data System (ADS)

    Zhang, Kejia; Song, Tingting; Zuo, Huijuan; Zhang, Weiwei

    2013-04-01

    In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared with the recent quantum group signature protocols, our scheme is focused on the most general situation in practice, i.e. only the arbitrator is trusted and no intermediate information needs to be stored in the signing phase to ensure the security. Furthermore, our scheme has achieved all the characteristics of group signature—anonymity, verifiability, traceability, unforgetability and undeniability, by using some current developed quantum and classical technologies. Finally, a feasible security analysis model for quantum group signature is presented.

  7. A geometric approach to high resolution TVD schemes

    NASA Technical Reports Server (NTRS)

    Goodman, J. B.; Leveque, R. J.

    1984-01-01

    A geometric approach, similar to Van Leer's MUSCL schemes, is used to construct a second-order accurate generalization of Godunov's method for solving scalar conservation laws. By making suitable approximations, a scheme is obtained which is easy to implement and total variation diminishing. The entropy condition is also investigated from the standpoint of the spreading of rarefaction waves. Quantitative information is obtained for Godunov's method on the rate of spreading which explain the kinks in rarefaction waves often observed at the sonic point.

  8. Splitting scheme for the stability of strong shock profile

    NASA Astrophysics Data System (ADS)

    Du, Linglong

    2016-10-01

    In this paper, we use the Laplace transform and Dirichlet-Neumann map to give a systematical scheme to study the small wave perturbation of general shock profile with general amplitude. Here we use certain non-classical shock waves for a rotationally invariant system of viscous conservation laws to demonstrate this scheme. We derive an explicit solution and show that it converges pointwise to another over-compressive profile exponentially, when the perturbations of the initial data to a given over-compressive shock profile are sufficiently small.

  9. Efficient implementation of essentially non-oscillatory shock capturing schemes

    NASA Technical Reports Server (NTRS)

    Shu, Chi-Wang; Osher, Stanley

    1987-01-01

    In the computation of discontinuous solutions of hyperbolic conservation laws, TVD (total-variation-diminishing), TVB (total-variation-bounded) and the recently developed ENO (essentially non-oscillatory) schemes have proven to be very useful. In this paper two improvements are discussed: a simple TVD Runge-Kutta type time discretization, and an ENO construction procedure based on fluxes rather than on cell averages. These improvements simplify the schemes considerably -- especially for multi-dimensional problems or problems with forcing terms. Preliminary numerical results are also given.

  10. The Spanish external quality assessment scheme for mercury in urine.

    PubMed

    Quintana, M J; Mazarrasa, O

    1996-01-01

    In 1986 the Instituto Nacional de Seguridad e Higiene en el Trabajo (INSHT), established the "Programa interlaboratorios de control de calidad de mercurio en orina (PICC-HgU)". The operation of this scheme is explained, criteria for evaluation of laboratory performance are defined and some results obtained are reviewed. Since the scheme started, an improvement in the overall performance of laboratories has been observed. The differences in the analytical methods used by laboratories do not seem to have a clear influence on the results.

  11. Fourier analysis of finite element preconditioned collocation schemes

    NASA Technical Reports Server (NTRS)

    Deville, Michel O.; Mund, Ernest H.

    1990-01-01

    The spectrum of the iteration operator of some finite element preconditioned Fourier collocation schemes is investigated. The first part of the paper analyses one-dimensional elliptic and hyperbolic model problems and the advection-diffusion equation. Analytical expressions of the eigenvalues are obtained with use of symbolic computation. The second part of the paper considers the set of one-dimensional differential equations resulting from Fourier analysis (in the tranverse direction) of the 2-D Stokes problem. All results agree with previous conclusions on the numerical efficiency of finite element preconditioning schemes.

  12. Mesh-based enhancement schemes in diffuse optical tomography.

    PubMed

    Gu, Xuejun; Xu, Yong; Jiang, Huabei

    2003-05-01

    Two mesh-based methods including dual meshing and adaptive meshing are developed to improve the finite element-based reconstruction of both absorption and scattering images of heterogeneous turbid media. The idea of dual meshing scheme is to use a fine mesh for the solution of photon propagation and a coarse mesh for the inversion of optical property distributions. The adaptive meshing method is accomplished by the automatic mesh refinement in the region of heterogeneity during reconstruction. These schemes are validated using tissue-like phantom measurements. Our results demonstrate the capabilities of the dual meshing and adaptive meshing in both qualitative and quantitative improvement of optical image reconstruction.

  13. A review of thrust-vectoring schemes for fighter applications

    NASA Technical Reports Server (NTRS)

    Berrier, B. L.; Re, R. J.

    1978-01-01

    This paper presents a review of thrust vectoring schemes for advanced fighter applications. Results are presented from wind tunnel and system integration studies on thrust vectoring nozzle concepts. Vectoring data are presented from wind tunnel tests of axisymmetric C-D (convergent-divergent) and nonaxisymmetric wedge, C-D, single ramp and USB (upper-surface blowing) nozzle concepts. Results from recent airframe/nozzle integration studies on the impact of thrust vectoring on weight, cooling and performance characteristics are discussed. This review indicates that the aircraft designer has, at his disposal, a wide range of thrust vectoring schemes which offer potential for added or improved aircraft capability.

  14. Development and evaluation of scheme for serotyping Gardnerella vaginalis.

    PubMed Central

    Ison, C A; Harvey, D G; Tanna, A; Easmon, C S

    1987-01-01

    Antibodies to Gardnerella vaginalis were raised in rabbits. Nine antisera that reacted with their immunising strains, but not with the remaining eight strains, were used to develop a serotyping scheme. A dot blotting technique was used, and complexes of antigen and antibody were visualised using anti-rabbit immunoglobulin linked to alkaline phosphatase. Of 91 clinical isolates used to evaluate the scheme, 79 (87%) were typable and 52 (57%) reacted with only a single antiserum. The antigens expressed were stable during growth on different media and on subculture. The specificity of the antibody was shown to be directed against different immunodominant proteins and possibly a carbohydrate. Images PMID:3497087

  15. A Comparison of three high-precision quadrature schemes

    SciTech Connect

    Bailey, David H.; Li, Xiaoye S.

    2003-07-01

    The authors have implemented three numerical quadrature schemes, using the new Arbitrary Precision (ARPREC) software package, with the objective of seeking a completely ''automatic'' arbitrary precision quadrature facility, namely one that does not rely on a priori information of the function to be integrated. Such a facility is required, for example, to permit the experimental identification of definite integrals based on their numerical values. The performance and accuracy of these three quadrature schemes are compared using a suite of 15 integrals, ranging from continuous, well-behaved functions on finite intervals to functions with vertical derivatives and integrable singularities at endpoints, as well as several integrals on an infinite interval.

  16. A rotationally biased upwind difference scheme for the Euler equations

    NASA Technical Reports Server (NTRS)

    Davis, S. F.

    1983-01-01

    The upwind difference schemes of Godunov, Osher, Roe and van Leer are able to resolve one dimensional steady shocks for the Euler equations within one or two mesh intervals. Unfortunately, this resolution is lost in two dimensions when the shock crosses the computing grid at an oblique angle. To correct this problem, a numerical scheme was developed which automatically locates the angle at which a shock might be expected to cross the computing grid and then constructs separate finite difference formulas for the flux components normal and tangential to this direction. Numerical results which illustrate the ability of this method to resolve steady oblique shocks are presented.

  17. Crab Crossing Schemes and Studies for Electron Ion Collider

    SciTech Connect

    S. Ahmed, Y. Derbenev, V. Morozov, A. Castilla, G.A. Krafft, B. Yunn, Y. Zhang, J.R. Delayen

    2011-09-01

    This report shows our progress in crab crossing consideration for future electron-ion collider envisioned at JLab. In this design phase, we are evaluating two crabbing schemes viz., the deflecting and dispersive. The mathematical formulations and lattice design for these schemes are discussed in this paper. Numerical simulations involving particle tracking through a realistic deflecting RF cavity and optics illustrate the desired crab tilt of 25 mrad for 1.35 MV. Evolution of beam propagation are shown which provides the physical insight of the crabbing phenomenon.

  18. Iterative schemes for nonsymmetric and indefinite elliptic boundary value problems

    SciTech Connect

    Bramble, J.H.; Leyk, Z.; Pasciak, J.E.

    1993-01-01

    The purpose of this paper is twofold. The first is to describe some simple and robust iterative schemes for nonsymmetric and indefinite elliptic boundary value problems. The schemes are based in the Sobolev space H ([Omega]) and require minimal hypotheses. The second is to develop algorithms utilizing a coarse-grid approximation. This leads to iteration matrices whose eigenvalues lie in the right half of the complex plane. In fact, for symmetric indefinite problems, the iteration is reduced to a well-conditioned symmetric positive definite system which can be solved by conjugate gradient interation. Applications of the general theory as well as numerical examples are given. 20 refs., 8 tabs.

  19. Scheme of IMSF-EP for matrix video display

    NASA Astrophysics Data System (ADS)

    Liu, Bin; He, Zhuyuan; Liu, Shicai

    1996-09-01

    The wide commercial utilization of varied matrix display systems provides a promising development of matrix display techniques. Some methods, which are addressed in this paper, have existed for matrix systems to display video (dynamic) pictures with colors and multi-level brightness. A novel scheme, referred to as the integration of multi-sub-frames with equal period (IMSF-EP), is proposed. With this scheme, the implement of display control is simplified. A proof-in- principle LED matrix display system of 64 X 48 pixels, with the breadboard-based circuits, is constructed.

  20. An Enhanced Facet Determination Scheme in 3D

    NASA Astrophysics Data System (ADS)

    Reivinen, M.; Salonen, E.-M.; Todoshchenko, I.; Vaskelainen, V. P.

    2016-07-01

    An enhanced scheme for the determination of equilibrium crystal shapes is introduced. The emphasis of the present study is put on the proper detection of the facets appearing on the crystal surface. The original formulation presented in [1] employs the principle of the virtual work, and the enhanced scheme additionally makes use of a penalty formulation approach. The derivation of the penalty terms is discussed in detail. Finally, the corresponding discrete method is applied to a certain problematic example case presented in [1] resulting now in the correct crystal shape.