Science.gov

Sample records for masterless charge-control scheme

  1. Modular Battery Charge Controller

    NASA Technical Reports Server (NTRS)

    Button, Robert; Gonzalez, Marcelo

    2009-01-01

    A new approach to masterless, distributed, digital-charge control for batteries requiring charge control has been developed and implemented. This approach is required in battery chemistries that need cell-level charge control for safety and is characterized by the use of one controller per cell, resulting in redundant sensors for critical components, such as voltage, temperature, and current. The charge controllers in a given battery interact in a masterless fashion for the purpose of cell balancing, charge control, and state-of-charge estimation. This makes the battery system invariably fault-tolerant. The solution to the single-fault failure, due to the use of a single charge controller (CC), was solved by implementing one CC per cell and linking them via an isolated communication bus [e.g., controller area network (CAN)] in a masterless fashion so that the failure of one or more CCs will not impact the remaining functional CCs. Each micro-controller-based CC digitizes the cell voltage (V(sub cell)), two cell temperatures, and the voltage across the switch (V); the latter variable is used in conjunction with V(sub cell) to estimate the bypass current for a given bypass resistor. Furthermore, CC1 digitizes the battery current (I1) and battery voltage (V(sub batt) and CC5 digitizes a second battery current (I2). As a result, redundant readings are taken for temperature, battery current, and battery voltage through the summation of the individual cell voltages given that each CC knows the voltage of the other cells. For the purpose of cell balancing, each CC periodically and independently transmits its cell voltage and stores the received cell voltage of the other cells in an array. The position in the array depends on the identifier (ID) of the transmitting CC. After eight cell voltage receptions, the array is checked to see if one or more cells did not transmit. If one or more transmissions are missing, the missing cell(s) is (are) eliminated from cell

  2. Lithium-Ion Cell Charge Control Unit

    NASA Technical Reports Server (NTRS)

    Reid, Concha; Button, Robert; Manzo, Michelle; McKissock, Barbara; Miller, Thomas; Gemeiner, Russel; Bennett, William; Hand, Evan

    2006-01-01

    Life-test data of Lithium-Ion battery cells is critical in order to establish their performance capabilities for NASA missions and Exploration goals. Lithium-ion cells have the potential to replace rechargeable alkaline cells in aerospace applications, but they require a more complex charging scheme than is typically required for alkaline cells. To address these requirements in our Lithium-Ion Cell Test Verification Program, a Lithium-Ion Cell Charge Control Unit was developed by NASA Glenn Research Center (GRC). This unit gives researchers the ability to test cells together as a pack, while allowing each cell to charge individually. This allows the inherent cell-to-cell variations to be addressed on a series string of cells and results in a substantial reduction in test costs as compared to individual cell testing. The Naval Surface Warfare Center at Crane, Indiana developed a power reduction scheme that works in conjunction with the Lithium-Ion Cell Charge Control Unit. This scheme minimizes the power dissipation required by the circuitry to prolong circuit life and improve its reliability.

  3. Lithium-Ion Cell Charge-Control Unit Developed

    NASA Technical Reports Server (NTRS)

    Reid, Concha M.; Manzo, Michelle A.; Buton, Robert M.; Gemeiner, Russel

    2005-01-01

    A lithium-ion (Li-ion) cell charge-control unit was developed as part of a Li-ion cell verification program. This unit manages the complex charging scheme that is required when Li-ion cells are charged in series. It enables researchers to test cells together as a pack, while allowing each cell to charge individually. This allows the inherent cell-to-cell variations to be addressed on a series string of cells and reduces test costs substantially in comparison to individual cell testing.

  4. Charge-Control Unit for Testing Lithium-Ion Cells

    NASA Technical Reports Server (NTRS)

    Reid, Concha M.; Mazo, Michelle A.; Button, Robert M.

    2008-01-01

    A charge-control unit was developed as part of a program to validate Li-ion cells packaged together in batteries for aerospace use. The lithium-ion cell charge-control unit will be useful to anyone who performs testing of battery cells for aerospace and non-aerospace uses and to anyone who manufacturers battery test equipment. This technology reduces the quantity of costly power supplies and independent channels that are needed for test programs in which multiple cells are tested. Battery test equipment manufacturers can integrate the technology into their battery test equipment as a method to manage charging of multiple cells in series. The unit manages a complex scheme that is required for charging Li-ion cells electrically connected in series. The unit makes it possible to evaluate cells together as a pack using a single primary test channel, while also making it possible to charge each cell individually. Hence, inherent cell-to-cell variations in a series string of cells can be addressed, and yet the cost of testing is reduced substantially below the cost of testing each cell as a separate entity. The unit consists of electronic circuits and thermal-management devices housed in a common package. It also includes isolated annunciators to signal when the cells are being actively bypassed. These annunciators can be used by external charge managers or can be connected in series to signal that all cells have reached maximum charge. The charge-control circuitry for each cell amounts to regulator circuitry and is powered by that cell, eliminating the need for an external power source or controller. A 110-VAC source of electricity is required to power the thermal-management portion of the unit. A small direct-current source can be used to supply power for an annunciator signal, if desired.

  5. LEO life testing with different charge control

    NASA Technical Reports Server (NTRS)

    Baron, F.

    1985-01-01

    The effect of charge control on the performance of Nickel-Cadmium batteries is very important. The results of three tests performed in the Battery Test Centre of ESTEC are described. Two techniques were employed: (1) the tapering method well known for space applications, and (2) the temperature derivative technique (TDT) developed by ESTEC. In addition, a comparative study has been made between the behavior of a group of 3 batteries charged and discharged in parallel compared to an identical group discharged in parallel, but charged individually. An approach of evolution laws for the main electrical characteristics of cells is presented.

  6. Battery charge control: Which approach is best?

    NASA Technical Reports Server (NTRS)

    Lurie, Charles

    1994-01-01

    The question of the best approach for battery charge control is addressed from two points of view: from the battery point-of-view; and from the spacecraft/mission point-of-view. In terms of performance, more aggressive charging can result in higher discharge voltage and capacity; however, aggressive charging usually implies more overcharge at higher rates and a concomitant higher end of charge temperature (higher stress, shorter life). In terms of life, benign charging can result in lower discharge voltage and capacity (poorer performance). Additionally, benign, or low stress charging, usually implies less overcharge at lower rates with lower end of charge temperature (lower stress, longer life). A discussion of these topics is presented in viewgraph form.

  7. Performance of battery charge controllers: First year test report

    SciTech Connect

    Dunlop, J. ); Bower, W. ); Harrington, S. )

    1991-01-01

    The results of the first year of an evaluation of charge controllers for stand-alone photovoltaic (PV) systems are presented. The objectives of the test program are to positively influence the development of battery charge controllers for stand-alone PV applications and to develop design and application criteria that will improve PV system reliability and battery performance. Future goals are to expand the evaluation program to include various battery technologies and controller algorithms. Also, the information is being communicated to manufacturers to aid in the design of more effective and reliable charge controllers for PV systems. Eight different models of small (nominal 10 amp) charge controllers are being subjected to a comprehensive evaluation. These evaluations include operational tests in identical stand-alone PV systems and environmental and electrical cycling tests. Selected custom tests are also performed on the controllers to determine the response to transients, installation requirements and system design compatibilities. Data presented in this paper include measured electrical characteristics of the controllers, temperature effects on set points, and operational performance in PV systems both in the lab and in the field. A comparison is presented for four different charge controller algorithms which include array-shunt, series-interrupting, series-linear constant-voltage and series-linear-multistep constant-current. 9 refs., 11 figs., 2 tabs.

  8. Electrical charging control apparatus and method, and solar to electrical energy conversion apparatus incorporating such charging control apparatus

    SciTech Connect

    Staler, T.; Yerkes, J.W.

    1984-06-05

    Electrical charging control apparatus regulates the charging of a rechargeable battery by a solar panel. The control of the charging is through a relay which when closed directly connects the output and charging terminal of the solar panel to the output and charging terminal of the battery to permit the charging of the battery by the solar panel. Such coupling is in turn under the terminals are in a coupling prevention relationship chosen to prevent significant discharging of the battery through the solar panel; of breaker apparatus which breaks a coupling after a predetermined period of time; and of additional signal-tester apparatus which causes a termination of the coupling when the signal at the connected terminals reaches a chosen charging termination threshold. The breaking of the coupling, which can result in a periodic breaking, permits the testing for discharging prevention. A charging control method is in accordance with the above outlined method of operation of the charging control apparatus.

  9. Optimal charge control strategies for stationary photovoltaic battery systems

    NASA Astrophysics Data System (ADS)

    Li, Jiahao; Danzer, Michael A.

    2014-07-01

    Battery systems coupled to photovoltaic (PV) modules for example fulfill one major function: they locally decouple PV generation and consumption of electrical power leading to two major effects. First, they reduce the grid load, especially at peak times and therewith reduce the necessity of a network expansion. And second, they increase the self-consumption in households and therewith help to reduce energy expenses. For the management of PV batteries charge control strategies need to be developed to reach the goals of both the distribution system operators and the local power producer. In this work optimal control strategies regarding various optimization goals are developed on the basis of the predicted household loads and PV generation profiles using the method of dynamic programming. The resulting charge curves are compared and essential differences discussed. Finally, a multi-objective optimization shows that charge control strategies can be derived that take all optimization goals into account.

  10. Non-uniform space charge controlled KTN beam deflector

    NASA Astrophysics Data System (ADS)

    Chao, Ju-Hung; Zhu, Wenbin; Chen, Chang-Jiang; Yin, Stuart; Hoffman, Robert C.

    2016-09-01

    A non-uniform space charge-controlled KTN beam deflector is presented and analyzed. We found that a non-uniform space charge can result in a non-uniform beam deflection angles. This effect can be useful for some applications such as electric field controlled beam separation. However, a non-uniform space charge needs to be avoided if one wants uniform beam deflection throughout the entire crystal.

  11. Aircraft battery state of charge and charge control system

    NASA Astrophysics Data System (ADS)

    Viswanathan, S.; Charkey, A.

    1986-02-01

    This Interim Report describes work done in developing an aircraft battery state of charge and charge control system. The basis for this system developed by ERC is a nickel-oxygen (NiO2) Pilot cell (0.374 Ah). This pilot cell is cycled in tandem with a nickel-cadmium battery. The oxygen pressure of the pilot cell is utilized to determine and control the state of charge of the nickel-cadmium battery. The NiO2 pilot cell baseline performance was determined during this period. The effect of using different nickel electrodes (ERC, SAFT, MARATHON) was also performed.

  12. Battery charge control with temperature compensated voltage limit

    NASA Technical Reports Server (NTRS)

    Thierfelder, H. E.

    1983-01-01

    Battery charge control for orbiting spacecraft with mission durations from three to ten years, is a critical design feature that is discussed. Starting in 1974, the General Electric Space Systems Division designed, manufactured and tested battery systems for six different space programs. Three of these are geosynchronous missions, two are medium altitude missions and one is a near-earth mission. All six power subsystems contain nickel cadmium batteries which are charged using a temperature compensated voltage limit. This charging method was found to be successful in extending the life of nickel cadmium batteries in all three types of earth orbits. Test data and flight data are presented for each type of orbit.

  13. Masterless Distributed Computing Over Mobile Devices

    DTIC Science & Technology

    2012-09-01

    particular, Dalvik was designed to work with limited processor speed, limited RAM , no swap space, and low power consumption. Every Android ...devices that have limited processor speed and limited RAM . The developers of Android decided that the user interface (UI) was the most important...Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project

  14. UV-LED-based charge control for LISA

    NASA Astrophysics Data System (ADS)

    Olatunde, Taiwo; Shelley, Ryan; Chilton, Andrew; Ciani, Giacomo; Mueller, Guido; Conklin, John

    2014-03-01

    The test masses inside the LISA gravitational reference sensors (GRS) must maintain almost pure geodesic motion for gravitational waves to be successfully detected. The residual accelerations have to stay below 3fm/s2/rtHz at all frequencies between 0.1 and 3 mHz. One of the well known noise sources is associated with the charges on the test masses which couple to stray electrical potentials and external electro-magnetic fields. The LISA pathfinder (LPF) will use Hg-discharge lamps emitting mostly around 253 nm to discharge the test masses via photoemission in its 2015/16 flight. A future LISA mission launched around 2030 will likely replace the lamps with newer UV-LEDs. UV-LEDs have a lower mass, a better power efficiency, and are smaller than their Hg counterparts. Furthermore, the latest generation produces light at 240 nm, with energy well above the work function of pure gold. I will describe a preliminary design for effective charge control through photoelectric effect by using these LEDs. The effectiveness of this method is verified by taking Quantum Efficiency (QE) measurements which relate the number of electrons emitted to the number of photons incident on the Au test mass surface. This presentation addresses our initial results and future plans which includes implementation and testing in the UF torsion pendulum and space-qualification in a small satellite mission which will launch in the summer of 2014, through a collaboration with Stanford, KACST, and NASA Ames Research Center.

  15. 240 nm UV LEDs for LISA test mass charge control

    NASA Astrophysics Data System (ADS)

    Olatunde, Taiwo; Shelley, Ryan; Chilton, Andrew; Serra, Paul; Ciani, Giacomo; Mueller, Guido; Conklin, John

    2015-05-01

    Test Masses inside the LISA Gravitational Reference Sensor must maintain almost pure geodesic motion for gravitational waves to be successfully detected. LISA requires residual test mass accelerations below 3 fm/s2/√Hz at all frequencies between 0.1 and 3 mHz. One of the well-known noise sources is associated with the charges on the test masses which couple to stray electrical potentials and external electromagnetic fields. LISA Pathfinder will use Hg-discharge lamps emitting mostly around 254 nm to discharge the test masses via photoemission in its 2015/16 flight. A future LISA mission launched around 2030 will likely replace the lamps with newer UV-LEDs. Presented here is a preliminary study of the effectiveness of charge control using latest generation UV-LEDs which produce light at 240 nm with energy above the work function of pure Au. Their lower mass, better power efficiency and small size make them an ideal replacement for Hg lamps.

  16. A digital controlled solar array regulator employing the charge control

    SciTech Connect

    Cho, Y.J.; Cho, B.H.

    1997-12-31

    A microprocessor controlled SAR system is presented. The inner analog loops employing the charge current control scheme continuously regulate the solar array output power according to the reference value generated by the ECU. The ECU consists of the peak power tracking and the battery charge current regulation algorithm. Modeling, analysis and a design procedure of the inner loops and the system loop are presented taking into account of interaction between the inner analog loops and the outer digital loops. Utilizing the inherent characteristics of the inner voltage and current loop, the system dynamic performance and stability can be optimized up to the speed limit of the microprocessor.

  17. The effect of switched array battery charge control on CRRES spacecraft: 3 + month data summary

    NASA Technical Reports Server (NTRS)

    Olbert, Phil

    1991-01-01

    The following topics are covered in viewgraph format: Combined Release and Radiation Effects Satellite (CRRES) orbit parameters; battery charge control; battery description; battery current and voltage output during one orbit; and battery reconditioning discharge profile.

  18. Development of a Microcontroller-based Battery Charge Controller for an Off-grid Photovoltaic System

    NASA Astrophysics Data System (ADS)

    Rina, Z. S.; Amin, N. A. M.; Hashim, M. S. M.; Majid, M. S. A.; Rojan, M. A.; Zaman, I.

    2017-08-01

    A development of a microcontroller-based charge controller for a 12V battery has been explained in this paper. The system is designed based on a novel algorithm to couple existing solar photovoltaic (PV) charging and main grid supply charging power source. One of the main purposes of the hybrid charge controller is to supply a continuous charging power source to the battery. Furthermore, the hybrid charge controller was developed to shorten the battery charging time taken. The algorithm is programmed in an Arduino Uno R3 microcontroller that monitors the battery voltage and generates appropriate commands for the charging power source selection. The solar energy is utilized whenever the solar irradiation is high. The main grid supply will be only consumed whenever the solar irradiation is low. This system ensures continuous charging power supply and faster charging of the battery.

  19. Battery charging control methods, electric vehicle charging methods, battery charging apparatuses and rechargeable battery systems

    DOEpatents

    Tuffner, Francis K [Richland, WA; Kintner-Meyer, Michael C. W. [Richland, WA; Hammerstrom, Donald J [West Richland, WA; Pratt, Richard M [Richland, WA

    2012-05-22

    Battery charging control methods, electric vehicle charging methods, battery charging apparatuses and rechargeable battery systems. According to one aspect, a battery charging control method includes accessing information regarding a presence of at least one of a surplus and a deficiency of electrical energy upon an electrical power distribution system at a plurality of different moments in time, and using the information, controlling an adjustment of an amount of the electrical energy provided from the electrical power distribution system to a rechargeable battery to charge the rechargeable battery.

  20. PV batteries and charge controllers: Technical issues, costs, and market trends

    SciTech Connect

    Hammond, R.L.; Turpin, J.F.; Corey, G.P.; Hund, T.D.; Harrington, S.R.

    1997-11-01

    A survey of US system integrators, charge controller manufacturers, and battery manufacturers was conducted in 1996 to determine market and application trends. This survey was sponsored by the USDOE. Results from 21 system integrators show a 1995 PV battery sales of $4.76 million. Using the survey results, a top down market analysis was conducted with a total predicted US battery market of $34.7 million and a world wide market of US $302 million. The survey also indicated that 71% (of dollars) were spent on VRLA and 29% on flooded lead-acid batteries. Eighty percent of charge controllers were ON-OFF, vs. PWM or constant voltage.

  1. Spacecraft charging control by thermal, field emission with lanthanum-hexaboride emitters

    NASA Technical Reports Server (NTRS)

    Morris, J. F.

    1978-01-01

    Thermal, field emitters of lanthanum (or perhaps cerium) hexaboride (LaB6) with temperature variability up to about 1500K are suggested for spacecraft charging control. Such emitters operate at much lower voltages with considerably more control and add plasma-diagnostic versatility. These gains should outweigh the additional complexity of providing heat for the LaB6 thermal, field emitter.

  2. Battery and charge controller evaluations in small stand-alone PV systems

    NASA Astrophysics Data System (ADS)

    Woodworth, J. R.; Thomas, M. G.; Stevens, J. W.; Dunlop, J. L.; Swamy, M. R.; Demetrius, L.; Harrington, S. R.

    1994-12-01

    We report the results of two separate long-term tests of batteries and charge controllers in small stand-alone PV systems. In these experiments, seven complete systems were tested for two years at each of two locations: Sandia National Laboratories in Albuquerque and the Florida Solar Energy Center in Cape Canaveral, Florida. Each system contained a PV array, flooded-lead-acid battery, a charge controller and a resistive load. Performance of the systems was strongly influenced by the difference in solar irradiance at the two sites, with some batteries at Sandia exceeding manufacturer's predictions for cycle life. System performance was strongly correlated with regulation reconnect voltage (R(sup 2) correlation coefficient = 0.95) but only weakly correlated with regulation voltage. We will also discuss details of system performance, battery lifetime and battery water consumption.

  3. Battery and charge controller evaluations in small stand-alone PV systems

    SciTech Connect

    Woodworth, J.R.; Thomas, M.G.; Stevens, J.W.; Dunlop, J.L.; Swamy, M.R.; Demetrius, L.; Harrington, S.R.

    1994-07-01

    We report the results of to separate long-term tests of batteries and charge controllers in small stand-alone PV systems. In these experiments, seven complete systems were tested for two years at each of two locations: Sandia National Laboratories in Albuquerque and the Florida Solar Energy Center in Cape Canaveral, Florida. Each system contained a PV array, flooded-lead-acid battery, a charge controller and a resistive load. Performance of the systems was strongly influenced by the difference in solar irradiance at the two sites, with some batteries at Sandia exceeding manufacturer`s predictions for cycle life. System performance was strongly correlated with regulation reconnect voltage (R{sup 2} correlation coefficient = 0.95) but only weakly correlated with regulation voltage. We will also discuss details of system performance, battery lifetime and battery water consumption.

  4. Experiments in charge control at geosynchronous orbit - ATS-5 and ATS-6

    NASA Technical Reports Server (NTRS)

    Olsen, R. C.

    1985-01-01

    In connection with existing theoretical concepts, it was difficult to explain the negative potentials found in sunlight, first on Applied Technology Satellite-5 (ATS-5) and then on ATS-6. The problem became important when an association between spacecraft charging and anomalies in spacecraft behavior was observed. A study of daylight charging phenomena on ATS-6 was conducted, and an investigation was performed with the objective to determine effective methods of charge control, taking into account the feasibility to utilize the ATS-5 and ATS-6 ion engines as current sources. In the present paper, data and analysis for the ion engine experiments on ATS-5 and ATS-6 are presented. It is shown that electron emission from a satellite with insulating surfaces is not an effective method of charge control because the increase in differential charging which results limits the effectiveness of electron emitters and increases the possibility of electrostatic discharges between surfaces at different potentials.

  5. Photovoltaic battery & charge controller market & applications survey. An evaluation of the photovoltaic system market for 1995

    SciTech Connect

    Hammond, R.L.; Turpin, J.F.; Corey, G.P.

    1996-12-01

    Under the sponsorship of the Department of Energy, Office of Utility Technologies, the Battery Analysis and Evaluation Department and the Photovoltaic System Assistance Center of Sandia National Laboratories (SNL) initiated a U.S. industry-wide PV Energy Storage System Survey. Arizona State University (ASU) was contracted by SNL in June 1995 to conduct the survey. The survey included three separate segments tailored to: (a) PV system integrators, (b) battery manufacturers, and (c) PV charge controller manufacturers. The overall purpose of the survey was to: (a) quantify the market for batteries shipped with (or for) PV systems in 1995, (b) quantify the PV market segments by battery type and application for PV batteries, (c) characterize and quantify the charge controllers used in PV systems, (d) characterize the operating environment for energy storage components in PV systems, and (e) estimate the PV battery market for the year 2000. All three segments of the survey were mailed in January 1996. This report discusses the purpose, methodology, results, and conclusions of the survey.

  6. The Master-Less Studio: An Autonomous Education Community

    ERIC Educational Resources Information Center

    Lebler, Don

    2006-01-01

    In recent times, it has become difficult for even the best conservatorium graduates to achieve the traditional goals of concert performance or secure orchestral positions and this has profound effects on the work practices of musicians. There are important implications for teaching in a conservatorium, in terms of providing a learning experience…

  7. Evaluation of the batteries and charge controllers in small stand-alone photovoltaic systems

    SciTech Connect

    Woodworth, J.R.; Thomas, M.G.; Stevens, J.W.; Harrington, S.R.; Dunlop, J.P.; Swamy, M.R.; Demetrius, L.

    1994-12-31

    In this paper, the authors report the results of long-term tests on 14 separate small stand-alone PV systems. These tests were carried out at two separate laboratories in Albuquerque, New Mexico and in Cape Canaveral, Florida. The systems were heavily instrumented to help determine what effects voltage regulation set points have on system water loss, battery capacity lifetime and system reliability. The authors find that under the proper conditions, the flooded lead-acid batteries in these PV systems can achieve cycle-lifetimes comparable to manufacturer`s expectations for conventional battery applications. They also find that both the overcharge and overdischarge protection provided by the system charge controllers were necessary for proper operation of these systems. Details of the data and a number of conclusions for system designers are presented.

  8. Chargeability measurements of selected pharmaceutical dry powders to assess their electrostatic charge control capabilities.

    PubMed

    Ramirez-Dorronsoro, Juan-Carlos; Jacko, Robert B; Kildsig, Dane O

    2006-01-01

    The purpose of this study was to develop an instrument (the Purdue instrument) and the corresponding methodologies to measure the electrostatic charge development (chargeability) of dry powders when they are in dynamic contact with stainless steel surfaces. The system used an inductive noncontact sensor located inside an aluminum Faraday cage and was optimized to measure the charging capabilities of a fixed volume of powder (0.5 cc). The chargeability of 5,5-diphenyl-hydantoin, calcium sulfate dihydrate, cimetidine, 3 grades of colloidal silicon dioxide, magnesium stearate, 4 grades of microcrystalline cellulose, salicylic acid, sodium carbonate, sodium salicylate, spray-dried lactose, and sulfinpyrazone were tested at 4 linear velocities, and the particle size distribution effect was assessed for 3 different grades of colloidal silicon dioxide and 4 different grades of microcrystalline cellulose. The chargeability values exhibited a linear relationship for the range of velocities studied, with colloidal silicon dioxide exhibiting the maximum negative chargeability and with spray-dried lactose being the only compound to exhibit positive chargeability. The instrument sensitivity was improved by a factor of 2 over the first generation version, and the electrostatic charge measurements were reproducible with relative standard deviations ranging from nondetectable to 33.7% (minimum of 3 replicates). These results demonstrate the feasibility of using the Purdue instrument to measure the electrostatic charge control capabilities of pharmaceutical dry powders with a reasonable level of precision.

  9. Identification procedures for the charge-controlled nonlinear noise model of microwave electron devices

    NASA Astrophysics Data System (ADS)

    Filicori, Fabio; Traverso, Pier Andrea; Florian, Corrado; Borgarino, Mattia

    2004-05-01

    The basic features of the recently proposed Charge-Controlled Non-linear Noise (CCNN) model for the prediction of low-to-high-frequency noise up-conversion in electron devices under large-signal RF operation are synthetically presented. It is shown that the different noise generation phenomena within the device can be described by four equivalent noise sources, which are connected at the ports of a "noiseless" device model and are non-linearly controlled by the time-varying instantaneous values of the intrinsic device voltages. For the empirical identification of the voltage-controlled equivalent noise sources, different possible characterization procedures, based not only on conventional low-frequency noise data, but also on different types of noise measurements carried out under large-signal RF operating conditions are discussed. As an example of application, the measurement-based identification of the CCNN model for a GaInP heterojunction bipolar microwave transistor is presented. Preliminary validation results show that the proposed model can describe with adequate accuracy not only the low-frequency noise of the HBT, but also its phase-noise performance in a prototype VCO implemented by using the same monolithic GaAs technology.

  10. A pulse-width modulated, high reliability charge controller for small photovoltaic systems

    SciTech Connect

    Gerken, K.; Welsh, D.

    1997-02-01

    This report presents the results of a development effort to design, test and begin production of a new class of small photovoltaic (PV) charge controllers. Sandia National Laboratories provided technical support, test data and financial support through a Balance-of-System Development contract. One of the objectives of the development was to increase user confidence in small PV systems by improving the reliability and operating life of the system controllers. Another equally important objective was to improve the economics of small PV systems by extending the battery lifetimes. Using new technology and advanced manufacturing techniques, these objectives were accomplished. Because small stand-alone PV systems account for over one third of all PV modules shipped, the positive impact of improving the reliability and economics of PV systems in this market segment will be felt throughout the industry. The results of verification testing of the new product are also included in this report. The initial design goals and specifications were very aggressive, but the extensive testing demonstrates that all the goals were achieved. Production of the product started in May at a rate of 2,000 units per month. Over 40 Morningstar distributors (5 US and 35 overseas) have taken delivery in the first 2 months of shipments. Initial customer reactions to the new controller have been very favorable.

  11. A decentralized charging control strategy for plug-in electric vehicles to mitigate wind farm intermittency and enhance frequency regulation

    NASA Astrophysics Data System (ADS)

    Luo, Xiao; Xia, Shiwei; Chan, Ka Wing

    2014-02-01

    This paper proposes a decentralized charging control strategy for a large population of plug-in electric vehicles (PEVs) to neutralize wind power fluctuations so as to improve the regulation of system frequency. Without relying on a central control entity, each PEV autonomously adjusts its charging or discharging power in response to a communal virtual price signal and based on its own urgency level of charging. Simulation results show that under the proposed charging control, the aggregate PEV power can effectively neutralize wind power fluctuations in real-time while differential allocation of neutralization duties among the PEVs can be realized to meet the PEV users' charging requirements. Also, harmful wind-induced cyclic operations in thermal units can be mitigated. As shown in economic analysis, the proposed strategy can create cost saving opportunities for both PEV users and utility.

  12. Space-charge-controlled field emission model of current conduction through Al2O3 films

    NASA Astrophysics Data System (ADS)

    Hiraiwa, Atsushi; Matsumura, Daisuke; Kawarada, Hiroshi

    2016-02-01

    This study proposes a model for current conduction in metal-insulator-semiconductor (MIS) capacitors, assuming the presence of two sheets of charge in the insulator, and derives analytical formulae of field emission (FE) currents under both negative and positive bias. Since it is affected by the space charge in the insulator, this particular FE differs from the conventional FE and is accordingly named the space-charge-controlled (SCC) FE. The gate insulator of this study was a stack of atomic-layer-deposition Al2O3 and underlying chemical SiO2 formed on Si substrates. The current-voltage (I-V) characteristics simulated using the SCC-FE formulae quantitatively reproduced the experimental results obtained by measuring Au- and Al-gated Al2O3/SiO2 MIS capacitors under both biases. The two sheets of charge in the Al2O3 films were estimated to be positive and located at a depth of greater than 4 nm from the Al2O3/SiO2 interface and less than 2 nm from the gate. The density of the former is approximately 1 × 1013 cm-2 in units of electronic charge, regardless of the type of capacitor. The latter forms a sheet of dipoles together with image charges in the gate and hence causes potential jumps of 0.4 V and 1.1 V in the Au- and Al-gated capacitors, respectively. Within a margin of error, this sheet of dipoles is ideally located at the gate/Al2O3 interface and effectively reduces the work function of the gate by the magnitude of the potential jumps mentioned above. These facts indicate that the currents in the Al2O3/SiO2 MIS capacitors are enhanced as compared to those in ideal capacitors and that the currents in the Al-gated capacitors under negative bias (electron emission from the gate) are more markedly enhanced than those in the Au-gated capacitors. The larger number of gate-side dipoles in the Al-gated capacitors is possibly caused by the reaction between the Al and Al2O3, and therefore gate materials that do not react with underlying gate insulators should be chosen

  13. Performance of Li-Ion Cells Under Battery Voltage Charge Control

    NASA Technical Reports Server (NTRS)

    Rao, Gopalakrishna M.; Vaidyanathan, Hari; Day, John H. (Technical Monitor)

    2001-01-01

    A study consisting of electrochemical characterization and Low-Earth-Orbit (LEO) cycling of Li-Ion cells from three vendors was initiated in 1999 to determine the cycling performance and to infuse the new technology in the future NASA missions. The 8-cell batteries included in this evaluation are prismatic cells manufactured by Mine Safety Appliances Company (MSA), cylindrical cells manufactured by SAFT and prismatic cells manufactured by Yardney Technical Products, Inc. (YTP). The three batteries were cycle tested in the LEO regime at 40% depth of discharge, and under a charge control technique that consists of battery voltage clamp with a current taper. The initial testing was conducted at 20 C; however, the batteries were cycled also intermittently at low temperatures. YTP 20 Ah cells consisted of mixed-oxide (Co and Ni) positive, graphitic carbon negative, LIPF6 salt mixed with organic carbonate solvents. The battery voltage clamp was 32 V. The low temperature cycling tests started after 4575 cycles at 20 C. The cells were not capable of cycling. at low temperature since the charge acceptance at battery level was poor. There was a cell in the battery that showed too high an end-of-charge (EOC) voltage thereby limiting the ability to charge the rest of the cells in the battery. The battery has completed 6714 cycles. SAFT 12 Ah cells consisted of mixed-oxide (Co and NO positive, graphitic carbon negative, LiPF6 salt mixed with organic carbonate solvents. The battery voltage clamp was for 30.8 V. The low temperature cycling tests started after 4594 cycles at 20 C. A cell that showed low end of discharge (EOD) and EOC voltages and three other cells that showed higher EOC voltages limited the charge acceptance at the selected voltage limit during charge. The cells were capable of cycling at 10 C and 0 C but the charge voltage limit had to be increased to 34.3 V (4.3 V per cell). The low temperature cycling may have induced poor chargeability since the voltage had to

  14. Summary of ISO/TC 201 Standard: ISO 29081: 2010, Surface Chemical Analysis - Auger Electron Spectroscopy - Reporting of Methods Used for Charge Control and Charge Correction

    SciTech Connect

    Baer, Donald R.

    2011-11-01

    This international standard specifies the minimum amount of information required for describing the methods of charge control in measurements of Auger electron transitions from insulating specimens by electron-stimulated Auger electron spectroscopy to be reported with the analytical results. Information is provided in an Annex on methods that have been found useful for charge control prior to or during AES analysis. The Annex also includes a summary table of methods or approaches, ordered by simplicity of approach. A similar international standard has been published for x-ray photoelectron spectroscopy (ISO 19318: 2003(E), Surface chemical analysis - X-ray photoelectron spectroscopy - Reporting of methods used for charge control and charge correction).

  15. The effect of a charge control layer on the electroluminescent characteristic of blue and white organic light-emitting diodes.

    PubMed

    Lee, Dong Hyung; Lee, Seok Jae; Koo, Ja-Ryong; Lee, Ho Won; Shin, Hyun Su; Lee, Song Eun; Kim, Woo Young; Lee, Kum Hee; Yoon, Seung Soo; Kim, Young Kwan

    2014-08-01

    We investigated blue fluorescent organic light-emitting diode (OLED) with a charge control layer (CCL) to produce high efficiency and improve the half-decay lifetime. Three types of devices (device A, B, and C) were fabricated following the number of CCLs within the emitting layer (EML), maintaining the thickness of whole EML. The CCL and host material, 2-methyl-9,10-di(2-naphthyl)anthracene, which has a bipolar property, was able to control the carrier movement with ease inside the EML. Device B demonstrated a maximum luminous efficiency (LE) and external quantum efficiency (EQE) of 9.19 cd/A and 5.78%, respectively. It also showed that the enhancement of the half-decay lifetime, measured at an initial luminance of 1,000 cd/m2, was 1.5 times longer than that of the conventional structure. A hybrid white OLED (WOLED) was also fabricated using a phosphorescent red emitter, bis(2-phenylquinoline)-acetylacetonate iridium III doped in 4,4'-N,N'-dicarbazolyl-biphenyl. The property of the hybrid WOLED with CCL showed a maximum LE and an EQE of 13.46 cd/A and 8.32%, respectively. It also showed white emission with Commission International de L'Éclairage coordinates of (x = 0.41, y = 0.33) at 10 V.

  16. UV LED charge control of an electrically isolated proof mass in a Gravitational Reference Sensor configuration at 255 nm

    NASA Astrophysics Data System (ADS)

    Balakrishnan, Karthik; Sun, Ke-Xun

    2012-07-01

    Precise control over the potential of an electrically isolated proof mass is necessary for the operation of devices such as a Gravitational Reference Sensor (GRS) and satellite missions such as LISA. We show that AlGaN UV LEDs operating at 255 nm are an effective substitute for Mercury vapor lamps used in previous missions because of their ability to withstand space qualification levels of vibration and thermal cycling. After 27 thermal and thermal vacuum cycles and 9 minutes of 14.07 g RMS vibration, there is less than 3% change in current draw, less than 15% change in optical power, and no change in spectral peak or FWHM (full width at half maximum). We also demonstrate UV LED stimulated photoemission from a wide variety of thin film carbide proof mass coating candidates (SiC, Mo2C, TaC, TiC, ZrC) that were applied using electron beam evaporation on an Aluminum 6061-T6 substrate. All tested carbide films have measured quantum efficiencies of 3.8-6.8*10^-7 and reflectivities of 0.11-0.15, which compare favorably with the properties of previously used gold films. We demonstrate the ability to control proof mass potential on an 89 mm diameter spherical proof mass over a 20 mm gap in a GRS-like configuration. Proof mass potential was measured via a non-contact DC probe, which would allow control without introducing dynamic forcing of the spacecraft. Finally we provide a look ahead to an upcoming technology demonstration mission of UV LEDs and future applications toward charge control of electrically isolated proof masses.

  17. Twin Signature Schemes, Revisited

    NASA Astrophysics Data System (ADS)

    Schäge, Sven

    In this paper, we revisit the twin signature scheme by Naccache, Pointcheval and Stern from CCS 2001 that is secure under the Strong RSA (SRSA) assumption and improve its efficiency in several ways. First, we present a new twin signature scheme that is based on the Strong Diffie-Hellman (SDH) assumption in bilinear groups and allows for very short signatures and key material. A big advantage of this scheme is that, in contrast to the original scheme, it does not require a computationally expensive function for mapping messages to primes. We prove this new scheme secure under adaptive chosen message attacks. Second, we present a modification that allows to significantly increase efficiency when signing long messages. This construction uses collision-resistant hash functions as its basis. As a result, our improvements make the signature length independent of the message size. Our construction deviates from the standard hash-and-sign approach in which the hash value of the message is signed in place of the message itself. We show that in the case of twin signatures, one can exploit the properties of the hash function as an integral part of the signature scheme. This improvement can be applied to both the SRSA based and SDH based twin signature scheme.

  18. Tabled Execution in Scheme

    SciTech Connect

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  19. Compact Spreader Schemes

    SciTech Connect

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  20. Compact spreader schemes

    NASA Astrophysics Data System (ADS)

    Placidi, M.; Jung, J.-Y.; Ratti, A.; Sun, C.

    2014-12-01

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  1. Check-Digit Schemes.

    ERIC Educational Resources Information Center

    Wheeler, Mary L.

    1994-01-01

    Discusses the study of identification codes and check-digit schemes as a way to show students a practical application of mathematics and introduce them to coding theory. Examples include postal service money orders, parcel tracking numbers, ISBN codes, bank identification numbers, and UPC codes. (MKR)

  2. Hybridization schemes for clusters

    NASA Astrophysics Data System (ADS)

    Wales, David J.

    The concept of an optimum hybridization scheme for cluster compounds is developed with particular reference to electron counting. The prediction of electron counts for clusters and the interpretation of the bonding is shown to depend critically upon the presumed hybridization pattern of the cluster vertex atoms. This fact has not been properly appreciated in previous work, particularly in applications of Stone's tensor surface harmonic (TSH) theory, but is found to be a useful tool when dealt with directly. A quantitative definition is suggested for the optimum cluster hybridization pattern based directly upon the ease of interpretation of the molecular orbitals, and results are given for a range of species. The relationship of this scheme to the detailed cluster geometry is described using Löwdin's partitioned perturbation theory, and the success and range of application of TSH theory are discussed.

  3. Scalable Nonlinear Compact Schemes

    SciTech Connect

    Ghosh, Debojyoti; Constantinescu, Emil M.; Brown, Jed

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  4. Use of the Charge/Discharge (C/D) ratio to aument voltage limit (V sub T) charge control in the ERBS spacecraft

    NASA Technical Reports Server (NTRS)

    Halpert, G.

    1982-01-01

    A 50-ampere hour nickel cadmium cell test pack was operated in a power profile simulating the orbit of the Earth Radiation Budget Satellite (ERBS). The objective was to determine the ability of the temperature compensated voltage limit (V sub T) charge control system to maintain energy balance in the half sine wave-type current profile expected of this mission. The four-cell pack (50 E) was tested at the Naval Weapons Support Center (NWSC) at Crane, Indiana. The ERBS evaluation test consisted of two distinct operating sequences, each having a specific purpose. The first phase was a parametric test involving the effect of V sub T level, temperature, and Beta angle on the charge/discharge (C/D) ratio, an indicator of the amount of overcharge. The second phase of testing made use of the C/D ratio limit to augment the V sub T charge limit control. When the C/D limit was reached, the current was switched from the taper mode to a C/67 (0.75 A) trickle charge. The use of an ampere hour integrator limiting the overcharge to a C/67 rate provided a fine tuning of the charge control technique which eliminated the sensitivity problems noted in the initial operating sequence.

  5. Massive momentum-subtraction scheme

    NASA Astrophysics Data System (ADS)

    Boyle, Peter; Del Debbio, Luigi; Khamseh, Ava

    2017-03-01

    A new renormalization scheme is defined for fermion bilinears in QCD at nonvanishing quark masses. This new scheme, denoted RI/mSMOM, preserves the benefits of the nonexceptional momenta introduced in the RI/SMOM scheme and allows a definition of renormalized composite fields away from the chiral limit. Some properties of the scheme are investigated by performing explicit one-loop computation in dimensional regularization.

  6. ESCAP mobile training scheme.

    PubMed

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.

  7. Convering ARQ schemes

    NASA Astrophysics Data System (ADS)

    Arazi, B.; Hsieh, J.

    1985-04-01

    The parity check matrix of an (n, k, t) linear error-correcting code provides a unique mapping between binary vectors of length n, whose Hamming weight does not exceed t, and binary vectors of length (n-k) which are the syndrome obtained by multiplying the vector of length n by the parity check matrix. This enables the 'compression' of binary vectors having a limited Hamming weight. It is shown in the paper how this principle can be applied in ARQ schemes, where, upon detection of an error in a received message, further retransmitted messages can be made shorter from one retransmission to the next.

  8. New LNG process scheme

    SciTech Connect

    Foglietta, J.H.

    1999-07-01

    A new LNG cycle has been developed for base load liquefaction facilities. This new design offers a different technical and economical solution comparing in efficiency with the classical technologies. The new LNG scheme could offer attractive business opportunities to oil and gas companies that are trying to find paths to monetize gas sources more effectively; particularly for remote or offshore locations where smaller scale LNG facilities might be applicable. This design offers also an alternative route to classic LNG projects, as well as alternative fuel sources. Conceived to offer simplicity and access to industry standard equipment, This design is a hybrid result of combining a standard refrigeration system and turboexpander technology.

  9. Fault Tolerant Cache Schemes

    NASA Astrophysics Data System (ADS)

    Tu, H.-Yu.; Tasneem, Sarah

    Most of modern microprocessors employ on—chip cache memories to meet the memory bandwidth demand. These caches are now occupying a greater real es tate of chip area. Also, continuous down scaling of transistors increases the possi bility of defects in the cache area which already starts to occupies more than 50% of chip area. For this reason, various techniques have been proposed to tolerate defects in cache blocks. These techniques can be classified into three different cat egories, namely, cache line disabling, replacement with spare block, and decoder reconfiguration without spare blocks. This chapter examines each of those fault tol erant techniques with a fixed typical size and organization of L1 cache, through extended simulation using SPEC2000 benchmark on individual techniques. The de sign and characteristics of each technique are summarized with a view to evaluate the scheme. We then present our simulation results and comparative study of the three different methods.

  10. On Some Numerical Dissipation Schemes

    NASA Technical Reports Server (NTRS)

    Swanson, R. C.; Radespiel, R.; Turkel, E.

    1998-01-01

    Several schemes for introducing an artificial dissipation into a central difference approximation to the Euler and Navier Stokes equations are considered. The focus of the paper is on the convective upwind and split pressure (CUSP) scheme, which is designed to support single interior point discrete shock waves. This scheme is analyzed and compared in detail with scalar dissipation and matrix dissipation (MATD) schemes. Resolution capability is determined by solving subsonic, transonic, and hypersonic flow problems. A finite-volume discretization and a multistage time-stepping scheme with multigrid are used to compute solutions to the flow equations. Numerical solutions are also compared with either theoretical solutions or experimental data. For transonic airfoil flows the best accuracy on coarse meshes for aerodynamic coefficients is obtained with a simple MATD scheme. The coarse-grid accuracy for the original CUSP scheme is improved by modifying the limiter function used with the scheme, giving comparable accuracy to that obtained with the MATD scheme. The modifications reduce the background dissipation and provide control over the regions where the scheme can become first order.

  11. Chaotic communication scheme with multiplication

    NASA Astrophysics Data System (ADS)

    Bobreshov, A. M.; Karavaev, A. A.

    2007-05-01

    A new scheme of data transmission with nonlinear admixing is described, in which the two mutually inverse operations (multiplication and division) ensure multiplicative mixing of the informative and chaotic signals that provides a potentially higher degree of security. A special feature of the proposed scheme is the absence of limitations (related to the division by zero) imposed on the types of informative signals.

  12. Plotting and Scheming

    NASA Technical Reports Server (NTRS)

    2004-01-01

    [figure removed for brevity, see original site] Figure 1 [figure removed for brevity, see original site] Figure 2 Click for larger view

    These two graphics are planning tools used by Mars Exploration Rover engineers to plot and scheme the perfect location to place the rock abrasion tool on the rock collection dubbed 'El Capitan' near Opportunity's landing site. 'El Capitan' is located within a larger outcrop nicknamed 'Opportunity Ledge.'

    The rover visualization team from NASA Ames Research Center, Moffett Field, Calif., initiated the graphics by putting two panoramic camera images of the 'El Capitan' area into their three-dimensional model. The rock abrasion tool team from Honeybee Robotics then used the visualization tool to help target and orient their instrument on the safest and most scientifically interesting locations. The blue circle represents one of two current targets of interest, chosen because of its size, lack of dust, and most of all its distinct and intriguing geologic features. To see the second target location, see the image titled 'Plotting and Scheming.'

    The rock abrasion tool is sensitive to the shape and texture of a rock, and must safely sit within the 'footprint' indicated by the blue circles. The rock area must be large enough to fit the contact sensor and grounding mechanism within the area of the outer blue circle, and the rock must be smooth enough to get an even grind within the abrasion area of the inner blue circle. If the rock abrasion tool were not grounded by its support mechanism or if the surface were uneven, it could 'run away' from its target. The rock abrasion tool is location on the rover's instrument deployment device, or arm.

    Over the next few martian days, or sols, the rover team will use these and newer, similar graphics created with more recent, higher-resolution panoramic camera images and super-spectral data from the miniature thermal emission spectrometer. These data will be used to pick the best

  13. A new flux splitting scheme

    NASA Technical Reports Server (NTRS)

    Liou, Meng-Sing; Steffen, Christopher J., Jr.

    1991-01-01

    A new flux splitting scheme is proposed. The scheme is remarkably simple and yet its accuracy rivals and in some cases surpasses that of Roe's solver in the Euler and Navier-Stokes solutions performed in this study. The scheme is robust and converges as fast as the Roe splitting. An approximately defined cell-face advection Mach number is proposed using values from the two straddling cells via associated characteristic speeds. This interface Mach number is then used to determine the upwind extrapolation for the convective quantities. Accordingly, the name of the scheme is coined as Advection Upstream Splitting Method (AUSM). A new pressure splitting is introduced which is shown to behave successfully, yielding much smoother results than other existing pressure splittings. Of particular interest is the supersonic blunt body problem in which the Roe scheme gives anomalous solutions. The AUSM produces correct solutions without difficulty for a wide range of flow conditions as well as grids.

  14. Satellite Spacecraft Charging Control Materials.

    DTIC Science & Technology

    1980-04-01

    OF TH4IS PAGE(Iflun Data AnfoeE) Block 20: The charge dissipation mechanisms for silica fabrics in a geo9ynchronous magnetic substorm environment...or on orbit, these grounding techni- ques fail, open electrically, as a result of vibration, corrosion, electrical or mechanical /thermal effects...aluminized FEP with outstanding, mechanical , optical and electrical properties (3) . These various materials have been tested in the past under

  15. Three order increase in scanning speed of space charge-controlled KTN deflector by eliminating electric field induced phase transition in nanodisordered KTN

    NASA Astrophysics Data System (ADS)

    Zhu, Wenbin; Chao, Ju-Hung; Chen, Chang-Jiang; Yin, Shizhuo; Hoffman, Robert C.

    2016-09-01

    In this paper, we report a three orders-of-magnitude increase in the speed of a space-charge-controlled KTN beam deflector achieved by eliminating the electric field-induced phase transition (EFIPT) in a nanodisordered KTN crystal. Previously, to maximize the electro-optic effect, a KTN beam deflector was operated at a temperature slightly above the Curie temperature. The electric field could cause the KTN to undergo a phase transition from the paraelectric phase to the ferroelectric phase at this temperature, which causes the deflector to operate in the linear electro-optic regime. Since the deflection angle of the deflector is proportional to the space charge distribution but not the magnitude of the applied electric field, the scanning speed of the beam deflector is limited by the electron mobility within the KTN crystal. To overcome this speed limitation caused by the EFIPT, we propose to operate the deflector at a temperature above the critical end point. This results in a significant increase in the scanning speed from the microsecond to nanosecond regime, which represents a major technological advance in the field of fast speed beam scanners. This can be highly beneficial for many applications including high-speed imaging, broadband optical communications, and ultrafast laser display and printing.

  16. Three order increase in scanning speed of space charge-controlled KTN deflector by eliminating electric field induced phase transition in nanodisordered KTN

    PubMed Central

    Zhu, Wenbin; Chao, Ju-Hung; Chen, Chang-Jiang; Yin, Shizhuo; Hoffman, Robert C.

    2016-01-01

    In this paper, we report a three orders-of-magnitude increase in the speed of a space-charge-controlled KTN beam deflector achieved by eliminating the electric field-induced phase transition (EFIPT) in a nanodisordered KTN crystal. Previously, to maximize the electro-optic effect, a KTN beam deflector was operated at a temperature slightly above the Curie temperature. The electric field could cause the KTN to undergo a phase transition from the paraelectric phase to the ferroelectric phase at this temperature, which causes the deflector to operate in the linear electro-optic regime. Since the deflection angle of the deflector is proportional to the space charge distribution but not the magnitude of the applied electric field, the scanning speed of the beam deflector is limited by the electron mobility within the KTN crystal. To overcome this speed limitation caused by the EFIPT, we propose to operate the deflector at a temperature above the critical end point. This results in a significant increase in the scanning speed from the microsecond to nanosecond regime, which represents a major technological advance in the field of fast speed beam scanners. This can be highly beneficial for many applications including high-speed imaging, broadband optical communications, and ultrafast laser display and printing. PMID:27610923

  17. Highly efficient blue- and white-organic light-emitting diode based on dual recombination zones with a charge control layer.

    PubMed

    Lee, Seok Jae; Koo, Ja Ryong; Shin, Hyun Su; Kim, Bo Young; Park, Hye Rim; Kim, Young Kwan; Ha, Yunkyoung

    2012-07-01

    Highly efficient blue phosphorescent organic light-emitting diodes are investigated using iridium(Ill) bis[(4,6-di-fluorophenyl)-pyridinato-N,C2']picolinate doped in N,N'-dicarbazolyl-3,5-benzene (mCP) with a charge control layer (CCL) as the dual recombination zone (DRZ) system. DRZ with CCL was used to form a broad recombination zone and exciton confinement within each emission zone. Holes and electrons can be easily transported through the CCL, which were a mixed p-type mCP and n-type 2,2',2"-(1,3,5-benzenetryl) tris(1-phenyl)-1H-benzimidazol, for controlling the carrier movement. The CCL can play a role in triplet exciton blocking as expected from high triplet energy levels as well. Additionally, a white organic light-emitting diode was fabricated using a new phosphorescent orange emitter: bis[2-(2,4-difluorophenyl)pyridinato]iridium 2-(2-hydroxyphenyl)benzothia zolate doped in DRZ. The white device showed a maximum luminous efficiency of 23.15 cd/A, a maximum external quantum efficiency of 9.56%, and a maximum power efficiency of 13.37 lm/W. It also showed white emission with CIEx,y coordinates of (x = 0.33, y = 0.41) at 8 V.

  18. Three order increase in scanning speed of space charge-controlled KTN deflector by eliminating electric field induced phase transition in nanodisordered KTN.

    PubMed

    Zhu, Wenbin; Chao, Ju-Hung; Chen, Chang-Jiang; Yin, Shizhuo; Hoffman, Robert C

    2016-09-09

    In this paper, we report a three orders-of-magnitude increase in the speed of a space-charge-controlled KTN beam deflector achieved by eliminating the electric field-induced phase transition (EFIPT) in a nanodisordered KTN crystal. Previously, to maximize the electro-optic effect, a KTN beam deflector was operated at a temperature slightly above the Curie temperature. The electric field could cause the KTN to undergo a phase transition from the paraelectric phase to the ferroelectric phase at this temperature, which causes the deflector to operate in the linear electro-optic regime. Since the deflection angle of the deflector is proportional to the space charge distribution but not the magnitude of the applied electric field, the scanning speed of the beam deflector is limited by the electron mobility within the KTN crystal. To overcome this speed limitation caused by the EFIPT, we propose to operate the deflector at a temperature above the critical end point. This results in a significant increase in the scanning speed from the microsecond to nanosecond regime, which represents a major technological advance in the field of fast speed beam scanners. This can be highly beneficial for many applications including high-speed imaging, broadband optical communications, and ultrafast laser display and printing.

  19. Relaxation schemes for Chebyshev spectral multigrid methods

    NASA Technical Reports Server (NTRS)

    Kang, Yimin; Fulton, Scott R.

    1993-01-01

    Two relaxation schemes for Chebyshev spectral multigrid methods are presented for elliptic equations with Dirichlet boundary conditions. The first scheme is a pointwise-preconditioned Richardson relaxation scheme and the second is a line relaxation scheme. The line relaxation scheme provides an efficient and relatively simple approach for solving two-dimensional spectral equations. Numerical examples and comparisons with other methods are given.

  20. High resolution schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Harten, A.

    1983-01-01

    A class of new explicit second order accurate finite difference schemes for the computation of weak solutions of hyperbolic conservation laws is presented. These highly nonlinear schemes are obtained by applying a nonoscillatory first order accurate scheme to an appropriately modified flux function. The so-derived second order accurate schemes achieve high resolution while preserving the robustness of the original nonoscillatory first order accurate scheme. Numerical experiments are presented to demonstrate the performance of these new schemes.

  1. Optimal probabilistic dense coding schemes

    NASA Astrophysics Data System (ADS)

    Kögler, Roger A.; Neves, Leonardo

    2017-04-01

    Dense coding with non-maximally entangled states has been investigated in many different scenarios. We revisit this problem for protocols adopting the standard encoding scheme. In this case, the set of possible classical messages cannot be perfectly distinguished due to the non-orthogonality of the quantum states carrying them. So far, the decoding process has been approached in two ways: (i) The message is always inferred, but with an associated (minimum) error; (ii) the message is inferred without error, but only sometimes; in case of failure, nothing else is done. Here, we generalize on these approaches and propose novel optimal probabilistic decoding schemes. The first uses quantum-state separation to increase the distinguishability of the messages with an optimal success probability. This scheme is shown to include (i) and (ii) as special cases and continuously interpolate between them, which enables the decoder to trade-off between the level of confidence desired to identify the received messages and the success probability for doing so. The second scheme, called multistage decoding, applies only for qudits ( d-level quantum systems with d>2) and consists of further attempts in the state identification process in case of failure in the first one. We show that this scheme is advantageous over (ii) as it increases the mutual information between the sender and receiver.

  2. Nonlinear Secret Image Sharing Scheme

    PubMed Central

    Shin, Sang-Ho; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2⁡m⌉ bit-per-pixel (bpp), respectively. PMID:25140334

  3. Nonlinear secret image sharing scheme.

    PubMed

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  4. Simple scheme for gauge mediation

    SciTech Connect

    Murayama, Hitoshi; Nomura, Yasunori

    2007-05-01

    We present a simple scheme for constructing models that achieve successful gauge mediation of supersymmetry breaking. In addition to our previous work [H. Murayama and Y. Nomura, Phys. Rev. Lett. 98, 151803 (2007)] that proposed drastically simplified models using metastable vacua of supersymmetry breaking in vectorlike theories, we show there are many other successful models using various types of supersymmetry-breaking mechanisms that rely on enhanced low-energy U(1){sub R} symmetries. In models where supersymmetry is broken by elementary singlets, one needs to assume U(1){sub R} violating effects are accidentally small, while in models where composite fields break supersymmetry, emergence of approximate low-energy U(1){sub R} symmetries can be understood simply on dimensional grounds. Even though the scheme still requires somewhat small parameters to sufficiently suppress gravity mediation, we discuss their possible origins due to dimensional transmutation. The scheme accommodates a wide range of the gravitino mass to avoid cosmological problems.

  5. One-qubit fingerprinting schemes

    SciTech Connect

    Beaudrap, J. Niel de

    2004-02-01

    Fingerprinting is a technique in communication complexity in which two parties (Alice and Bob) with large data sets send short messages to a third party (a referee), who attempts to compute some function of the larger data sets. For the equality function, the referee attempts to determine whether Alice's data and Bob's data are the same. In this paper, we consider the extreme scenario of performing fingerprinting where Alice and Bob both send either one bit (classically) or one qubit (in the quantum regime) messages to the referee for the equality problem. Restrictive bounds are demonstrated for the error probability of one-bit fingerprinting schemes, and show that it is easy to construct one-qubit fingerprinting schemes which can outperform any one-bit fingerprinting scheme. The author hopes that this analysis will provide results useful for performing physical experiments, which may help to advance implementations for more general quantum communication protocols.

  6. New evaluation method for ARQ schemes

    NASA Astrophysics Data System (ADS)

    Nakamura, M.; Kodama, T.

    1988-10-01

    Automatic-repeat-request (ARQ) schemes which provide high system reliability with simple error control are widely used in data communication systems. A new evaluation method for ARQ schemes is presented which makes it possible to compare performances for various error-control schemes. Numerical results are reported for error correction, pure ARQ, and hybrid ARQ schemes.

  7. The inclusion problem for monadic recursion schemes

    NASA Technical Reports Server (NTRS)

    Friedman, E. P.

    1973-01-01

    The inclusion problem for the class of monadic recursion schemes is shown to be undecidable. The proof illustrates the close relationship between monadic recursion schemes and deterministic pushdown automata. The proof is extended to show that both the weak equivalence problem for the class of monadic recursion schemes and the weak equivalence problem for the class of free schemes without identity are undecidable.

  8. Hybrid scheme for heavy flavors: Merging the fixed flavor number scheme and variable flavor number scheme

    NASA Astrophysics Data System (ADS)

    Kusina, A.; Olness, F. I.; Schienbein, I.; Ježo, T.; Kovařík, K.; Stavreva, T.; Yu, J. Y.

    2013-10-01

    We introduce a hybrid variable flavor number scheme for heavy flavors, denoted H-VFNS, which incorporates the advantages of both the traditional variable flavor number scheme as well as the fixed flavor number scheme (FFNS). By including an explicit NF dependence in both the parton distribution functions (PDFs) and the strong coupling constant αS, we generate coexisting sets of PDFs and αS for NF={3,4,5,6} at any scale μ that are related analytically by the MS¯ matching conditions. The H-VFNS resums the heavy quark contributions and provides the freedom to choose the optimal NF for each particular data set. Thus, we can fit selected HERA data in a FFNS framework, while retaining the benefits of the VFNS to analyze LHC data at high scales. We illustrate how such a fit can be implemented for the case of both HERA and LHC data.

  9. On symmetric and upwind TVD schemes

    NASA Technical Reports Server (NTRS)

    Yee, H. C.

    1985-01-01

    A class of explicit and implicit total variation diminishing (TVD) schemes for the compressible Euler and Navier-Stokes equations was developed. They do not generate spurious oscillations across shocks and contact discontinuities. In general, shocks can be captured within 1 to 2 grid points. For the inviscid case, these schemes are divided into upwind TVD schemes and symmetric (nonupwind) TVD schemes. The upwind TVD scheme is based on the second-order TVD scheme. The symmetric TVD scheme is a generalization of Roe's and Davis' TVD Lax-Wendroff scheme. The performance of these schemes on some viscous and inviscid airfoil steady-state calculations is investigated. The symmetric and upwind TVD schemes are compared.

  10. Invisibly Sanitizable Digital Signature Scheme

    NASA Astrophysics Data System (ADS)

    Miyazaki, Kunihiko; Hanaoka, Goichiro; Imai, Hideki

    A digital signature does not allow any alteration of the document to which it is attached. Appropriate alteration of some signed documents, however, should be allowed because there are security requirements other than the integrity of the document. In the disclosure of official information, for example, sensitive information such as personal information or national secrets is masked when an official document is sanitized so that its nonsensitive information can be disclosed when it is requested by a citizen. If this disclosure is done digitally by using the current digital signature schemes, the citizen cannot verify the disclosed information because it has been altered to prevent the leakage of sensitive information. The confidentiality of official information is thus incompatible with the integrity of that information, and this is called the digital document sanitizing problem. Conventional solutions such as content extraction signatures and digitally signed document sanitizing schemes with disclosure condition control can either let the sanitizer assign disclosure conditions or hide the number of sanitized portions. The digitally signed document sanitizing scheme we propose here is based on the aggregate signature derived from bilinear maps and can do both. Moreover, the proposed scheme can sanitize a signed document invisibly, that is, no one can distinguish whether the signed document has been sanitized or not.

  11. Upwind Compact Finite Difference Schemes

    NASA Astrophysics Data System (ADS)

    Christie, I.

    1985-07-01

    It was shown by Ciment, Leventhal, and Weinberg ( J. Comput. Phys.28 (1978), 135) that the standard compact finite difference scheme may break down in convection dominated problems. An upwinding of the method, which maintains the fourth order accuracy, is suggested and favorable numerical results are found for a number of test problems.

  12. A New Improving Quantum Secret Sharing Scheme

    NASA Astrophysics Data System (ADS)

    Xu, Ting-Ting; Li, Zhi-Hui; Bai, Chen-Ming; Ma, Min

    2017-01-01

    An improving quantum secret sharing scheme (IQSS scheme) was introduced by Nascimento et al. (Phys. Rev. A 64, 042311 (2001)), which was analyzed by the improved quantum access structure. In this paper, we propose a new improving quantum secret sharing scheme, and more quantum access structures can be realized by this scheme than the previous one. For example, we prove that any threshold and hypercycle quantum access structures can be realized by the new scheme.

  13. A New Improving Quantum Secret Sharing Scheme

    NASA Astrophysics Data System (ADS)

    Xu, Ting-Ting; Li, Zhi-Hui; Bai, Chen-Ming; Ma, Min

    2017-04-01

    An improving quantum secret sharing scheme (IQSS scheme) was introduced by Nascimento et al. (Phys. Rev. A 64, 042311 (2001)), which was analyzed by the improved quantum access structure. In this paper, we propose a new improving quantum secret sharing scheme, and more quantum access structures can be realized by this scheme than the previous one. For example, we prove that any threshold and hypercycle quantum access structures can be realized by the new scheme.

  14. Subranging scheme for SQUID sensors

    NASA Technical Reports Server (NTRS)

    Penanen, Konstantin I. (Inventor)

    2008-01-01

    A readout scheme for measuring the output from a SQUID-based sensor-array using an improved subranging architecture that includes multiple resolution channels (such as a coarse resolution channel and a fine resolution channel). The scheme employs a flux sensing circuit with a sensing coil connected in series to multiple input coils, each input coil being coupled to a corresponding SQUID detection circuit having a high-resolution SQUID device with independent linearizing feedback. A two-resolution configuration (course and fine) is illustrated with a primary SQUID detection circuit for generating a fine readout, and a secondary SQUID detection circuit for generating a course readout, both having feedback current coupled to the respective SQUID devices via feedback/modulation coils. The primary and secondary SQUID detection circuits function and derive independent feedback. Thus, the SQUID devices may be monitored independently of each other (and read simultaneously) to dramatically increase slew rates and dynamic range.

  15. [PICS: pharmaceutical inspection cooperation scheme].

    PubMed

    Morénas, J

    2009-01-01

    The pharmaceutical inspection cooperation scheme (PICS) is a structure containing 34 participating authorities located worldwide (October 2008). It has been created in 1995 on the basis of the pharmaceutical inspection convention (PIC) settled by the European free trade association (EFTA) in1970. This scheme has different goals as to be an international recognised body in the field of good manufacturing practices (GMP), for training inspectors (by the way of an annual seminar and experts circles related notably to active pharmaceutical ingredients [API], quality risk management, computerized systems, useful for the writing of inspection's aide-memoires). PICS is also leading to high standards for GMP inspectorates (through regular crossed audits) and being a room for exchanges on technical matters between inspectors but also between inspectors and pharmaceutical industry.

  16. Cambridge community Optometry Glaucoma Scheme.

    PubMed

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  17. An Arbitrated Quantum Signature Scheme without Entanglement*

    NASA Astrophysics Data System (ADS)

    Li, Hui-Ran; Luo, Ming-Xing; Peng, Dai-Yuan; Wang, Xiao-Jun

    2017-09-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks.

  18. A biometric signcryption scheme without bilinear pairing

    NASA Astrophysics Data System (ADS)

    Wang, Mingwen; Ren, Zhiyuan; Cai, Jun; Zheng, Wentao

    2013-03-01

    How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis's fuzzy extractor method and Liu's original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.

  19. Decoupling schemes for the SSC Collider

    SciTech Connect

    Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.

    1993-05-01

    A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper.

  20. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    NASA Technical Reports Server (NTRS)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  1. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    NASA Technical Reports Server (NTRS)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  2. Current terminology and diagnostic classification schemes.

    PubMed

    Okeson, J P

    1997-01-01

    This article reviews the current terminology and classification schemes available for temporomandibular disorders. The origin of each term is presented, and the classification schemes that have been offered for temporomandibular disorders are briefly reviewed. Several important classifications are presented in more detail, with mention of advantages and disadvantages. Final recommendations are provided for future direction in the area of classification schemes.

  3. Update on the Pyramid Scheme

    NASA Astrophysics Data System (ADS)

    Banks, Tom; Torres, T. J.

    2012-10-01

    We summarize recent work in which we attempt to make consistent models of LHC physics, from the Pyramid Scheme. The models share much with the NMSSM, in particular, enhanced tree level contributions to the Higgs mass and a preference for small tan β. There are three different singlet fields, and a new strongly coupled gauge theory, so the constraints of perturbative unification are quite different. We outline our general approach to the model, which contains a Kähler potential for three of the low energy fields, which is hard to calculate. Detailed calculations, based on approximations to the Kähler potential, will be presented in a future publication.

  4. Adaptive Optics Metrics & QC Scheme

    NASA Astrophysics Data System (ADS)

    Girard, Julien H.

    2017-09-01

    "There are many Adaptive Optics (AO) fed instruments on Paranal and more to come. To monitor their performances and assess the quality of the scientific data, we have developed a scheme and a set of tools and metrics adapted to each flavour of AO and each data product. Our decisions to repeat observations or not depends heavily on this immediate quality control "zero" (QC0). Atmospheric parameters monitoring can also help predict performances . At the end of the chain, the user must be able to find the data that correspond to his/her needs. In Particular, we address the special case of SPHERE."

  5. An adaptive vector quantization scheme

    NASA Technical Reports Server (NTRS)

    Cheung, K.-M.

    1990-01-01

    Vector quantization is known to be an effective compression scheme to achieve a low bit rate so as to minimize communication channel bandwidth and also to reduce digital memory storage while maintaining the necessary fidelity of the data. However, the large number of computations required in vector quantizers has been a handicap in using vector quantization for low-rate source coding. An adaptive vector quantization algorithm is introduced that is inherently suitable for simple hardware implementation because it has a simple architecture. It allows fast encoding and decoding because it requires only addition and subtraction operations.

  6. Hybrid scheme for color dithering

    NASA Astrophysics Data System (ADS)

    Sloan, Kenneth R., Jr.

    1990-10-01

    This paper presents a hybrid color dithering scheme suitable for rendering continuous tone color images on a CRT display with a small number (on the order of 16-256) of distinct colors. Monochrome (especially bi-level) dithering techniques are well studied. Which of these techniques extend naturally to color? We look at four classes of monochrome dithering techniques and attempt to generalize each one, first to multiple gray-level (but still monochrome) inks and then to a multiple color pallette. In the monochrome case, we discover that texture introduced by the dithering process can significantly affect the appearance of the image. We develop a scheme by which the user can control these texture effects. The primary tradeoff is between very fine grained textures which depend critically on the local gray level and relatively coarser, more obvious, textures which appear uniform across the entire image. In the color case, we have the further complication of choosing a color pallette. We deal primarily with the case where there are a small number of available colors, and where the color pallette is not optimized separately for each image.

  7. High-Order Energy Stable WENO Schemes

    NASA Technical Reports Server (NTRS)

    Yamaleev, Nail K.; Carpenter, Mark H.

    2008-01-01

    A new third-order Energy Stable Weighted Essentially NonOscillatory (ESWENO) finite difference scheme for scalar and vector linear hyperbolic equations with piecewise continuous initial conditions is developed. The new scheme is proven to be stable in the energy norm for both continuous and discontinuous solutions. In contrast to the existing high-resolution shock-capturing schemes, no assumption that the reconstruction should be total variation bounded (TVB) is explicitly required to prove stability of the new scheme. A rigorous truncation error analysis is presented showing that the accuracy of the 3rd-order ESWENO scheme is drastically improved if the tuning parameters of the weight functions satisfy certain criteria. Numerical results show that the new ESWENO scheme is stable and significantly outperforms the conventional third-order WENO finite difference scheme of Jiang and Shu in terms of accuracy, while providing essentially nonoscillatory solutions near strong discontinuities.

  8. Channel Aggregation Schemes for Cognitive Radio Networks

    NASA Astrophysics Data System (ADS)

    Lee, Jongheon; So, Jaewoo

    This paper proposed three channel aggregation schemes for cognitive radio networks, a constant channel aggregation scheme, a probability distribution-based variable channel aggregation scheme, and a residual channel-based variable channel aggregation scheme. A cognitive radio network can have a wide bandwidth if unused channels in the primary networks are aggregated. Channel aggregation schemes involve either constant channel aggregation or variable channel aggregation. In this paper, a Markov chain is used to develop an analytical model of channel aggregation schemes; and the performance of the model is evaluated in terms of the average sojourn time, the average throughput, the forced termination probability, and the blocking probability. Simulation results show that channel aggregation schemes can reduce the average sojourn time of cognitive users by increasing the channel occupation rate of unused channels in a primary network.

  9. Efficient implementation of weighted ENO schemes

    NASA Technical Reports Server (NTRS)

    Jiang, Guang-Shan; Shu, Chi-Wang

    1995-01-01

    In this paper, we further analyze, test, modify and improve the high order WENO (weighted essentially non-oscillatory) finite difference schemes of Liu, Osher and Chan. It was shown by Liu et al. that WENO schemes constructed from the r-th order (in L1 norm) ENO schemes are (r+1)-th order accurate. We propose a new way of measuring the smoothness of a numerical solution, emulating the idea of minimizing the total variation of the approximation, which results in a 5-th order WENO scheme for the case r = 3, instead of the 4-th order with the original smoothness measurement by Liu et al. This 5-th order WENO scheme is as fast as the 4-th order WENO scheme of Liu et al., and both schemes are about twice as fast as the 4-th order ENO schemes on vector supercomputers and as fast on serial and parallel computers. For Euler systems of gas dynamics, we suggest computing the weights from pressure and entropy instead of the characteristic values to simplify the costly characteristic procedure. The resulting WENO schemes are about twice as fast as the WENO schemes using the characteristic decompositions to compute weights, and work well for problems which do not contain strong shocks or strong reflected waves. We also prove that, for conservation laws with smooth solutions, all WENO schemes are convergent. Many numerical tests, including the 1D steady state nozzle flow problem and 2D shock entropy wave interaction problem, are presented to demonstrate the remarkable capability of the WENO schemes, especially the WENO scheme using the new smoothness measurement, in resolving complicated shock and flow structures. We have also applied Yang's artificial compression method to the WENO schemes to sharpen contact discontinuities.

  10. Scheme of thinking quantum systems

    NASA Astrophysics Data System (ADS)

    Yukalov, V. I.; Sornette, D.

    2009-11-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field.

  11. Matroids and quantum-secret-sharing schemes

    SciTech Connect

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-05-15

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  12. Rapid Parameterization Schemes for Aircraft Shape Optimization

    NASA Technical Reports Server (NTRS)

    Li, Wu

    2012-01-01

    A rapid shape parameterization tool called PROTEUS is developed for aircraft shape optimization. This tool can be applied directly to any aircraft geometry that has been defined in PLOT3D format, with the restriction that each aircraft component must be defined by only one data block. PROTEUS has eight types of parameterization schemes: planform, wing surface, twist, body surface, body scaling, body camber line, shifting/scaling, and linear morphing. These parametric schemes can be applied to two types of components: wing-type surfaces (e.g., wing, canard, horizontal tail, vertical tail, and pylon) and body-type surfaces (e.g., fuselage, pod, and nacelle). These schemes permit the easy setup of commonly used shape modification methods, and each customized parametric scheme can be applied to the same type of component for any configuration. This paper explains the mathematics for these parametric schemes and uses two supersonic configurations to demonstrate the application of these schemes.

  13. How can conceptual schemes change teaching?

    NASA Astrophysics Data System (ADS)

    Wickman, Per-Olof

    2012-03-01

    Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.

  14. A cascaded coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Kasami, T.; Lin, S.

    1985-01-01

    A cascaded coding scheme for error control was investigated. The scheme employs a combination of hard and soft decisions in decoding. Error performance is analyzed. If the inner and outer codes are chosen properly, extremely high reliability can be attained even for a high channel bit-error-rate. Some example schemes are studied which seem to be quite suitable for satellite down-link error control.

  15. A cascaded coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Shu, L.; Kasami, T.

    1985-01-01

    A cascade coding scheme for error control is investigated. The scheme employs a combination of hard and soft decisions in decoding. Error performance is analyzed. If the inner and outer codes are chosen properly, extremely high reliability can be attained even for a high channel bit-error-rate. Some example schemes are evaluated. They seem to be quite suitable for satellite down-link error control.

  16. Curvilinear bicubic spline fit interpolation scheme

    NASA Technical Reports Server (NTRS)

    Chi, C.

    1973-01-01

    Modification of the rectangular bicubic spline fit interpolation scheme so as to make it suitable for use with a polar grid pattern. In the proposed modified scheme the interpolation function is expressed in terms of the radial length and the arc length, and the shape of the patch, which is a wedge or a truncated wedge, is taken into account implicitly. Examples are presented in which the proposed interpolation scheme was used to reproduce the equations of a hemisphere.

  17. Curvilinear bicubic spline fit interpolation scheme

    NASA Technical Reports Server (NTRS)

    Chi, C.

    1973-01-01

    Modification of the rectangular bicubic spline fit interpolation scheme so as to make it suitable for use with a polar grid pattern. In the proposed modified scheme the interpolation function is expressed in terms of the radial length and the arc length, and the shape of the patch, which is a wedge or a truncated wedge, is taken into account implicitly. Examples are presented in which the proposed interpolation scheme was used to reproduce the equations of a hemisphere.

  18. Short Signature Scheme From Bilinear Pairings

    DTIC Science & Technology

    2010-11-01

    model. 3.3 Efficiency We compare our signature scheme with the BLS scheme and ZSS scheme from the implementation point of view. PO, SM , PA, Squ, Inv, MTP ...1 SM 1 SM 2 SM Signing 1 MTP , 1 SM 1 H, 1 Inv, 1 SM 1 H, 1 Squ, 1 Inv, 1 SM Verification 1 MTP , 2 PO 1 H, 1 SM , 1 PO 1 H, 1 Squ, 1 SM , 2 PA, 1 PO

  19. A dispersion reducing convective finite difference scheme

    NASA Astrophysics Data System (ADS)

    Matus, R. J.; Hindman, R. G.

    1986-01-01

    A one-parameter family of finite difference schemes for systems of convective equations has been developed and applied to the inviscid Burgers' equation and the one-dimensional, unsteady Euler equations. The parameter, alpha, may be chosen in a way to reduce the phase error of the numerical solution compared to other commonly used second order difference schemes, and computational results are included which show the ability of the scheme, called the alpha-scheme in this paper, to calculate solutions which contain discontinuities with very little oscillation. For linear one-dimensional problems, the scheme reduces to Fromm's zero average phase error method, but the present scheme differs from Fromm's in that it is easily applied to nonlinear systems of equations such as the Euler equations describing inviscid fluid flow. A modified MacCormack scheme and Warming and Beam's predictor-corrector upwind scheme are also members of the family of schemes which can be retrieved for particular choices of the parameter, alpha.

  20. Nonlinearly stable compact schemes for shock calculations

    NASA Technical Reports Server (NTRS)

    Cockburn, Bernardo; Shu, Chi-Wang

    1992-01-01

    The applications of high-order, compact finite difference methods in shock calculations are discussed. The main concern is to define a local mean which will serve as a reference for introducing a local nonlinear limiting to control spurious numerical oscillations while maintaining the formal accuracy of the scheme. For scalar conservation laws, the resulting schemes can be proven total-variation stable in one space dimension and maximum-norm stable in multiple space dimensions. Numerical examples are shown to verify accuracy and stability of such schemes for problems containing shocks. These ideas can also be applied to other implicit schemes such as the continuous Galerkin finite element methods.

  1. ID-based encryption scheme with revocation

    NASA Astrophysics Data System (ADS)

    Othman, Hafizul Azrie; Ismail, Eddie Shahril

    2017-04-01

    In 2015, Meshram proposed an efficient ID-based cryptographic encryption based on the difficulty of solving discrete logarithm and integer-factoring problems. The scheme was pairing free and claimed to be secure against adaptive chosen plaintext attacks (CPA). Later, Tan et al. proved that the scheme was insecure by presenting a method to recover the secret master key and to obtain prime factorization of modulo n. In this paper, we propose a new pairing-free ID-based encryption scheme with revocation based on Meshram's ID-based encryption scheme, which is also secure against Tan et al.'s attacks.

  2. On Tenth Order Central Spatial Schemes

    SciTech Connect

    Sjogreen, B; Yee, H C

    2007-05-14

    This paper explores the performance of the tenth-order central spatial scheme and derives the accompanying energy-norm stable summation-by-parts (SBP) boundary operators. The objective is to employ the resulting tenth-order spatial differencing with the stable SBP boundary operators as a base scheme in the framework of adaptive numerical dissipation control in high order multistep filter schemes of Yee et al. (1999), Yee and Sj{umlt o}green (2002, 2005, 2006, 2007), and Sj{umlt o}green and Yee (2004). These schemes were designed for multiscale turbulence flows including strong shock waves and combustion.

  3. On central-difference and upwind schemes

    NASA Technical Reports Server (NTRS)

    Swanson, R. C.; Turkel, Eli

    1990-01-01

    A class of numerical dissipation models for central-difference schemes constructed with second- and fourth-difference terms is considered. The notion of matrix dissipation associated with upwind schemes is used to establish improved shock capturing capability for these models. In addition, conditions are given that guarantee that such dissipation models produce a Total Variation Diminishing (TVD) scheme. Appropriate switches for this type of model to ensure satisfaction of the TVD property are presented. Significant improvements in the accuracy of a central-difference scheme are demonstrated by computing both inviscid and viscous transonic airfoil flows.

  4. Seyfert galaxies and ``Unified Scheme''

    NASA Astrophysics Data System (ADS)

    Pashchenko, I. N.; Pilipenko, S. V.; Vitrishchak, V. M.

    2011-01-01

    From spectroscopic point of view Seyfert galaxies (as other Active Galactic Nuclei --- AGN) basically are subdivided into two types: with and without broad permitted emission lines in their optical spectra (so called type I and type II Seyfert galaxies or AGNs). One of the most fundumental idea concerning AGN is that observed AGN type (I or II) is determined by inclination angle of AGN to the line of sight (LOS). At high inclination angles LOS crosses dusty torus which absorbs and scatters line emission. But in some recent papers the differences in close (<100 kpc) environment of SyI and SyII (SyII have more close companions), which are incompatible with Unification Scheme, were found and the possibility of physical (intrinsic) differences between Seyfert I and II was discussed. It was shown that this difference could be due to selection effects caused by the sample criteria. We sampled SyI and SyII galaxies from the Sloan Digital Sky Survey (SDSS) on the basis of their emission line properties thus excluding selection and discuss the properties of the environment of Seyfert galaxies.

  5. Nutrient profiling schemes: overview and comparative analysis.

    PubMed

    Garsetti, Marcella; de Vries, Jan; Smith, Maurice; Amosse, Amélie; Rolf-Pedersen, Nathalie

    2007-12-01

    Nutrient profiling is a discipline aimed at classifying foods based on their nutritional composition. So far, several profiling schemes have been proposed for varied purposes world-wide. Primary aim to inventory the main profiling schemes that have been developed so far (both applied and not) and to summarise their main aspects. Secondary aim to critically review a selection of them, to test their "performance" and to evaluate their strengths and weaknesses. Scientific and popular search engines were used for identifying profiling schemes. Schemes were described concisely by providing details on four main "Building Blocks" or factors: (1) Food category declination: category-wise or "across the board"; (2) Reference amount: 100 g, 100 kcal; serving; (3) Cut-off use: thresholds or scores; (4) Nutrients Selection: balance between positive and negative nutrients and number of them. The "performance" analysis was done by testing how the selected schemes classify a sample of food. Profiling schemes display considerable variation based on the underlying approach, format and content. Moreover, the rationale of the schemes largely varies and seems to be inspired by either nutrient recommendations or regulations figures. When tested for "performance", the five selected schemes classify in the same way foods having either a very "positive" or a very "negative" nutrient profile, whereas they give inconsistent results for food products with intermediate characteristics. Strengths and weaknesses analysis shows the difficulty of finding schemes combining qualities such as simplicity, scientific relevance, ability to cope with changes in nutrient recommendations. Current proposed profiling schemes exhibit a wide range of differences both in terms of approaches and "performance". Nutrition scientists have now the challenge to develop the "ideal scheme" that, in our view, will have to be strict enough to ensure consumer protection but also flexible enough to encourage food industry

  6. Modified Mean-Pyramid Coding Scheme

    NASA Technical Reports Server (NTRS)

    Cheung, Kar-Ming; Romer, Richard

    1996-01-01

    Modified mean-pyramid coding scheme requires transmission of slightly fewer data. Data-expansion factor reduced from 1/3 to 1/12. Schemes for progressive transmission of image data transmitted in sequence of frames in such way coarse version of image reconstructed after receipt of first frame and increasingly refined version of image reconstructed after receipt of each subsequent frame.

  7. Practical formulation of a positively conservative scheme

    NASA Astrophysics Data System (ADS)

    Obayashi, Shigeru; Wada, Yasuhiro

    1994-05-01

    Approximate Riemann solvers have been highly successful for computing the Euler/Navier-Stokes equations, but linearized Riemann solvers are known to fail occasionally by predicting non-physical states with negative density or internal energy. Positively conservative schemes, in contrast, guarantee physical solutions from realistic input. The Harten-Lax-van Leer-Einfeldt (HLLE) scheme is a typical example of a positively conservative scheme. However, the HLLE scheme is highly dissipative at contact discontinuities and shear layers and thus it is not applicable to practicle simulations. An existing modification to the HLLE scheme, known as HLLEM, enhances the resolution to that of the Roe scheme. However, this modification violates the positivity of density and internal energy. Precise derivation of the modification yields a quatratic inequality and thus requires a case-by-case treatment. This Note describes a new, modified HLLE scheme that satisfies the positively conservative condition approximately. Sample computationa are included to demonstrate the resolution and the robustness of the scheme.

  8. Eno-Osher schemes for Euler equations

    NASA Technical Reports Server (NTRS)

    Vandervegt, Jacobus J.

    1992-01-01

    The combination of the Osher approximate Riemann solver for the Euler equations and various ENO schemes is discussed for one-dimensional flow. The three basic approaches, viz. the ENO scheme using primitive variable reconstruction, either with Cauchy-Kowalewski procedure for time integration or the TVD Runge-Kutta scheme, and the flux-ENO method are tested on different shock tube cases. The shock tube cases were chosen to present a serious challenge to the ENO schemes in order to test their ability to capture flow discontinuities, such as shocks. Also the effect of the ordering of the eigen values, viz. natural or reversed ordering, in the Osher scheme is investigated. The ENO schemes are tested up to fifth order accuracy in space and time. The ENO-Osher scheme using the Cauchy-Kowalewski procedure for time integration is found to be the most accurate and robust compared with the other methods and is also computationally efficient. The tests showed that the ENO schemes perform reasonably well, but have problems in cases where two discontinuities are close together. In that case there are not enough points in the smooth part of the flow to create a non-oscillatory interpolation.

  9. Finite volume renormalization scheme for fermionic operators

    SciTech Connect

    Monahan, Christopher; Orginos, Kostas

    2013-11-01

    We propose a new finite volume renormalization scheme. Our scheme is based on the Gradient Flow applied to both fermion and gauge fields and, much like the Schr\\"odinger functional method, allows for a nonperturbative determination of the scale dependence of operators using a step-scaling approach. We give some preliminary results for the pseudo-scalar density in the quenched approximation.

  10. Modeling Students' Mathematics Using Steffe's Fraction Schemes

    ERIC Educational Resources Information Center

    Norton, Anderson H.; McCloskey, Andrea V.

    2008-01-01

    Each year, more teachers learn about the successful intervention program known as Math Recovery (USMRC 2008; Wright 2003). The program uses Steffe's whole-number schemes to model, understand, and support children's development of whole-number reasoning. Readers are probably less familiar with Steffe's fraction schemes, which have proven similarly…

  11. Phase calibration scheme for a ``T'' array

    NASA Astrophysics Data System (ADS)

    Ramesh, R.; Subramanian, K. R.; Sastry, Ch. V.

    1999-10-01

    A calibration scheme based on closure and redundancy techniques is described for correcting the phase errors in the complex visibilities observed with a T-shaped radio interferometer array. Practical details of the scheme are illustrated with reference to the Gauribidanur radioheliograph (GRH).

  12. A Resilient Quantum Secret Sharing Scheme

    NASA Astrophysics Data System (ADS)

    Maitra, Arpita; Paul, Goutam

    2015-02-01

    A resilient secret sharing scheme is supposed to generate the secret correctly even after some shares are damaged. In this paper, we show how quantum error correcting codes can be exploited to design a resilient quantum secret sharing scheme, where a quantum state is shared among more than one parties.

  13. Localization scheme for relativistic spinors

    NASA Astrophysics Data System (ADS)

    Ciupka, J.; Hanrath, M.; Dolg, M.

    2011-12-01

    A new method to determine localized complex-valued one-electron functions in the occupied space is presented. The approach allows the calculation of localized orbitals regardless of their structure and of the entries in the spinor coefficient matrix, i.e., one-, two-, and four-component Kramers-restricted or unrestricted one-electron functions with real or complex expansion coefficients. The method is applicable to localization schemes that maximize (or minimize) a functional of the occupied spinors and that use a localization operator for which a matrix representation is available. The approach relies on the approximate joint diagonalization (AJD) of several Hermitian (symmetric) matrices which is utilized in electronic signal processing. The use of AJD in this approach has the advantage that it allows a reformulation of the localization criterion on an iterative 2 × 2 pair rotating basis in an analytical closed form which has not yet been described in the literature for multi-component (complex-valued) spinors. For the one-component case, the approach delivers the same Foster-Boys or Pipek-Mezey localized orbitals that one obtains from standard quantum chemical software, whereas in the multi-component case complex-valued spinors satisfying the selected localization criterion are obtained. These localized spinors allow the formulation of local correlation methods in a multi-component relativistic framework, which was not yet available. As an example, several heavy and super-heavy element systems are calculated using a Kramers-restricted self-consistent field and relativistic two-component pseudopotentials in order to investigate the effect of spin-orbit coupling on localization.

  14. Efficient DSMC collision-partner selection schemes.

    SciTech Connect

    Gallis, Michail A.; Torczynski, John Robert

    2010-05-01

    The effect of collision-partner selection schemes on the accuracy and the efficiency of the Direct Simulation Monte Carlo (DSMC) method of Bird is investigated. Several schemes to reduce the total discretization error as a function of the mean collision separation and the mean collision time are examined. These include the historically first sub-cell scheme, the more recent nearest-neighbor scheme, and various near-neighbor schemes, which are evaluated for their effect on the thermal conductivity for Fourier flow. Their convergence characteristics as a function of spatial and temporal discretization and the number of simulators per cell are compared to the convergence characteristics of the sophisticated and standard DSMC algorithms. Improved performance is obtained if the population from which possible collision partners are selected is an appropriate fraction of the population of the cell.

  15. The basic function scheme of polynomial type

    SciTech Connect

    WU, Wang-yi; Lin, Guang

    2009-12-01

    A new numerical method---Basic Function Method is proposed. This method can directly discrete differential operator on unstructured grids. By using the expansion of basic function to approach the exact function, the central and upwind schemes of derivative are constructed. By using the second-order polynomial as basic function and applying the technique of flux splitting method and the combination of central and upwind schemes to suppress the non-physical fluctuation near the shock wave, the second-order basic function scheme of polynomial type for solving inviscid compressible flow numerically is constructed in this paper. Several numerical results of many typical examples for two dimensional inviscid compressible transonic and supersonic steady flow illustrate that it is a new scheme with high accuracy and high resolution for shock wave. Especially, combining with the adaptive remeshing technique, the satisfactory results can be obtained by these schemes.

  16. Efficient DSMC collision-partner selection schemes.

    SciTech Connect

    Gallis, Michail A.; Torczynski, John Robert

    2010-07-01

    The effect of collision-partner selection schemes on the accuracy and the efficiency of the Direct Simulation Monte Carlo (DSMC) method of Bird is investigated. Several schemes to reduce the total discretization error as a function of the mean collision separation and the mean collision time are examined. These include the historically first sub-cell scheme, the more recent nearest-neighbor scheme, and various near-neighbor schemes, which are evaluated for their effect on the thermal conductivity for Fourier flow. Their convergence characteristics as a function of spatial and temporal discretization and the number of simulators per cell are compared to the convergence characteristics of the sophisticated and standard DSMC algorithms. Improved performance is obtained if the population from which possible collision partners are selected is an appropriate fraction of the population of the cell.

  17. A Novel Quantum Proxy Blind Signature Scheme

    NASA Astrophysics Data System (ADS)

    Guo, Wei; Xie, Shu-Cui; Zhang, Jian-Zhong

    2017-05-01

    A novel quantum proxy blind signature scheme is proposed. In this scheme, a special type of non-maximally entangled three-qubit state is introduced as a quantum channel, which can realize perfect teleportation. The message sender U blinds his message by means of preparing two groups of non-orthogonal single-photon states. According to the original signer Charlie's delegation message, the proxy signer Alice generates a corresponding signature. The arbitrator Trent can help the receiver Bob verify the signature, and also prevent Bob from doing any damage. The above-mentioned advantages make this scheme different from some existing schemes. It is showed that our scheme has the properties of undeniability, unforgeability, blindness, untraceability. Moreover, it is free from intercept-resend attack.

  18. A Novel Quantum Proxy Blind Signature Scheme

    NASA Astrophysics Data System (ADS)

    Guo, Wei; Xie, Shu-Cui; Zhang, Jian-Zhong

    2017-02-01

    A novel quantum proxy blind signature scheme is proposed. In this scheme, a special type of non-maximally entangled three-qubit state is introduced as a quantum channel, which can realize perfect teleportation. The message sender U blinds his message by means of preparing two groups of non-orthogonal single-photon states. According to the original signer Charlie's delegation message, the proxy signer Alice generates a corresponding signature. The arbitrator Trent can help the receiver Bob verify the signature, and also prevent Bob from doing any damage. The above-mentioned advantages make this scheme different from some existing schemes. It is showed that our scheme has the properties of undeniability, unforgeability, blindness, untraceability. Moreover, it is free from intercept-resend attack.

  19. A novel key management scheme using biometrics

    NASA Astrophysics Data System (ADS)

    Sui, Yan; Yang, Kai; Du, Yingzi; Orr, Scott; Zou, Xukai

    2010-04-01

    Key management is one of the most important issues in cryptographic systems. Several important challenges in such a context are represented by secure and efficient key generation, key distribution, as well as key revocation. Addressing such challenges requires a comprehensive solution which is robust, secure and efficient. Compared to traditional key management schemes, key management using biometrics requires the presence of the user, which can reduce fraud and protect the key better. In this paper, we propose a novel key management scheme using iris based biometrics. Our newly proposed scheme outperforms traditional key management schemes as well as some existing key-binding biometric schemes in terms of security, diversity and/or efficiency.

  20. Towards a genuinely multi-dimensional upwind scheme

    NASA Technical Reports Server (NTRS)

    Powell, Kenneth G.; Vanleer, Bram; Roe, Philip L.

    1990-01-01

    Methods of incorporating multi-dimensional ideas into algorithms for the solution of Euler equations are presented. Three schemes are developed and tested: a scheme based on a downwind distribution, a scheme based on a rotated Riemann solver and a scheme based on a generalized Riemann solver. The schemes show an improvement over first-order, grid-aligned upwind schemes, but the higher-order performance is less impressive. An outlook for the future of multi-dimensional upwind schemes is given.

  1. Towards an "All Speed" Unstructured Upwind Scheme

    NASA Technical Reports Server (NTRS)

    Loh, Ching Y.; Jorgenson, Philip C.E.

    2009-01-01

    In the authors previous studies [1], a time-accurate, upwind finite volume method (ETAU scheme) for computing compressible flows on unstructured grids was proposed. The scheme is second order accurate in space and time and yields high resolution in the presence of discontinuities. The scheme features a multidimensional limiter and multidimensional numerical dissipation. These help to stabilize the numerical process and to overcome the annoying pathological behaviors of upwind schemes. In the present paper, it will be further shown that such multidimensional treatments also lead to a nearly all-speed or Mach number insensitive upwind scheme. For flows at very high Mach number, e.g., 10, local numerical instabilities or the pathological behaviors are suppressed, while for flows at very low Mach number, e.g., 0.02, computation can be directly carried out without invoking preconditioning. For flows in different Mach number regimes, i.e., low, medium, and high Mach numbers, one only needs to adjust one or two parameters in the scheme. Several examples with low and high Mach numbers are demonstrated in this paper. Thus, the ETAU scheme is applicable to a broad spectrum of flow regimes ranging from high supersonic to low subsonic, appropriate for both CFD (computational fluid dynamics) and CAA (computational aeroacoustics).

  2. Ponzi scheme diffusion in complex networks

    NASA Astrophysics Data System (ADS)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  3. Symmetric weak ternary quantum homomorphic encryption schemes

    NASA Astrophysics Data System (ADS)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  4. A Real Quantum Designated Verifier Signature Scheme

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2015-09-01

    The effectiveness of most quantum signature schemes reported in the literature can be verified by a designated person, however, those quantum signature schemes aren't the real traditional designated verifier signature schemes, because the designated person hasn't the capability to efficiently simulate a signature which is indistinguishable from a signer, which cannot satisfy the requirements in some special environments such as E-voting, call for tenders and software licensing. For solving this problem, a real quantum designated verifier signature scheme is proposed in this paper. According to the property of unitary transformation and quantum one-way function, only a verifier designated by a signer can verify the "validity of a signature" and the designated verifier cannot prove to a third party that the signature was produced by the signer or by himself through a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Analysis results show that this new scheme satisfies the main security requirements of designated verifier signature scheme and the major attack strategies.

  5. Deitmar schemes, graphs and zeta functions

    NASA Astrophysics Data System (ADS)

    Mérida-Angulo, Manuel; Thas, Koen

    2017-07-01

    In Thas (2014) it was explained how one can naturally associate a Deitmar scheme (which is a scheme defined over the field with one element, F1) to a so-called ;loose graph; (which is a generalization of a graph). Several properties of the Deitmar scheme can be proven easily from the combinatorics of the (loose) graph, and known realizations of objects over F1 such as combinatorial F1-projective and F1-affine spaces exactly depict the loose graph which corresponds to the associated Deitmar scheme. In this paper, we first modify the construction of loc. cit., and show that Deitmar schemes which are defined by finite trees (with possible end points) are ;defined over F1; in Kurokawa's sense; we then derive a precise formula for the Kurokawa zeta function for such schemes (and so also for the counting polynomial of all associated Fq-schemes). As a corollary, we find a zeta function for all such trees which contains information such as the number of inner points and the spectrum of degrees, and which is thus very different than Ihara's zeta function (which is trivial in this case). Using a process called ;surgery,; we show that one can determine the zeta function of a general loose graph and its associated {Deitmar, Grothendieck}-schemes in a number of steps, eventually reducing the calculation essentially to trees. We study a number of classes of examples of loose graphs, and introduce the Grothendieck ring ofF1-schemes along the way in order to perform the calculations. Finally, we include a computer program for performing more tedious calculations, and compare the new zeta function to Ihara's zeta function for graphs in a number of examples.

  6. A Spatial Domain Quantum Watermarking Scheme

    NASA Astrophysics Data System (ADS)

    Wei, Zhan-Hong; Chen, Xiu-Bo; Xu, Shu-Jiang; Niu, Xin-Xin; Yang, Yi-Xian

    2016-07-01

    This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. Supported by the National Natural Science Foundation of China under Grant Nos. 61272514, 61170272, 61373131, 61121061, 61411146001, the program for New Century Excellent Talents under Grant No. NCET-13-0681, the National Development Foundation for Cryptological Research (Grant No. MMJJ201401012) and the Fok Ying Tung Education Foundation under Grant No. 131067, and the Shandong Provincial Natural Science Foundation of China under Grant No. ZR2013FM025

  7. A classification scheme for chimera states

    NASA Astrophysics Data System (ADS)

    Kemeth, Felix P.; Haugland, Sindre W.; Schmidt, Lennart; Kevrekidis, Ioannis G.; Krischer, Katharina

    2016-09-01

    We present a universal characterization scheme for chimera states applicable to both numerical and experimental data sets. The scheme is based on two correlation measures that enable a meaningful definition of chimera states as well as their classification into three categories: stationary, turbulent, and breathing. In addition, these categories can be further subdivided according to the time-stationarity of these two measures. We demonstrate that this approach is both consistent with previously recognized chimera states and enables us to classify states as chimeras which have not been categorized as such before. Furthermore, the scheme allows for a qualitative and quantitative comparison of experimental chimeras with chimeras obtained through numerical simulations.

  8. The Overseas Doctors Training Scheme: failing expectations.

    PubMed Central

    Richards, T.

    1994-01-01

    The Overseas Doctors Training Scheme needs appraisal. Set up 10 years ago to improve the quality of postgraduate training that overseas (non-European) doctors receive in Britain, the scheme has been popular, but it is questionable how far it has achieved its aims. If Britain is to continue to employ large numbers of overseas doctors in training grades, both through the scheme and through independent arrangements, the apparent mismatch between their expectations and the reality of what Britain offers must be tackled. Images p1629-a PMID:7993422

  9. Galilean invariant resummation schemes of cosmological perturbations

    NASA Astrophysics Data System (ADS)

    Peloso, Marco; Pietroni, Massimo

    2017-01-01

    Many of the methods proposed so far to go beyond Standard Perturbation Theory break invariance under time-dependent boosts (denoted here as extended Galilean Invariance, or GI). This gives rise to spurious large scale effects which spoil the small scale predictions of these approximation schemes. By using consistency relations we derive fully non-perturbative constraints that GI imposes on correlation functions. We then introduce a method to quantify the amount of GI breaking of a given scheme, and to correct it by properly tailored counterterms. Finally, we formulate resummation schemes which are manifestly GI, discuss their general features, and implement them in the so called Time-Flow, or TRG, equations.

  10. A classification scheme for chimera states.

    PubMed

    Kemeth, Felix P; Haugland, Sindre W; Schmidt, Lennart; Kevrekidis, Ioannis G; Krischer, Katharina

    2016-09-01

    We present a universal characterization scheme for chimera states applicable to both numerical and experimental data sets. The scheme is based on two correlation measures that enable a meaningful definition of chimera states as well as their classification into three categories: stationary, turbulent, and breathing. In addition, these categories can be further subdivided according to the time-stationarity of these two measures. We demonstrate that this approach is both consistent with previously recognized chimera states and enables us to classify states as chimeras which have not been categorized as such before. Furthermore, the scheme allows for a qualitative and quantitative comparison of experimental chimeras with chimeras obtained through numerical simulations.

  11. Finite-volume scheme for anisotropic diffusion

    SciTech Connect

    Es, Bram van; Koren, Barry; Blank, Hugo J. de

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  12. Chaotic cryptographic scheme and its randomness evaluation

    NASA Astrophysics Data System (ADS)

    Stoyanov, B. P.

    2012-10-01

    We propose a new cryptographic scheme based on the Lorenz chaos attractor and 32 bit bent Boolean function. We evaluated the keystream generated by the scheme with batteries of the NIST statistical tests. We also applied a number of statistical analysis techniques, such as calculating histograms, correlations between two adjacent pixels, information entropy, and differential resistance, all refer to images encrypted by the proposed system. The results of the analysis show that the new cryptographic scheme ensures a secure way for sending digital data with potential applications in real-time image encryption.

  13. The GEMPAK Barnes objective analysis scheme

    NASA Technical Reports Server (NTRS)

    Koch, S. E.; Desjardins, M.; Kocin, P. J.

    1981-01-01

    GEMPAK, an interactive computer software system developed for the purpose of assimilating, analyzing, and displaying various conventional and satellite meteorological data types is discussed. The objective map analysis scheme possesses certain characteristics that allowed it to be adapted to meet the analysis needs GEMPAK. Those characteristics and the specific adaptation of the scheme to GEMPAK are described. A step-by-step guide for using the GEMPAK Barnes scheme on an interactive computer (in real time) to analyze various types of meteorological datasets is also presented.

  14. A diagonally inverted LU implicit multigrid scheme

    NASA Technical Reports Server (NTRS)

    Yokota, Jeffrey W.; Caughey, David A.; Chima, Rodrick V.

    1988-01-01

    A new Diagonally Inverted LU Implicit scheme is developed within the framework of the multigrid method for the 3-D unsteady Euler equations. The matrix systems that are to be inverted in the LU scheme are treated by local diagonalizing transformations that decouple them into systems of scalar equations. Unlike the Diagonalized ADI method, the time accuracy of the LU scheme is not reduced since the diagonalization procedure does not destroy time conservation. Even more importantly, this diagonalization significantly reduces the computational effort required to solve the LU approximation and therefore transforms it into a more efficient method of numerically solving the 3-D Euler equations.

  15. Relaxation methods for unfactored implicit upwind schemes

    NASA Technical Reports Server (NTRS)

    Chakravarthy, S. R.

    1984-01-01

    Relaxation methods are presented for unfactored implicit upwind schemes for hyperbolic equations. The theoretical bases are explained using linear and nonlinear scalar equations; construction of the method for the unsteady Euler equations (nonlinear system) is but a natural extension. One of the important advantages of the above methods vis a vis factored implicit schemes is the possibility of faster convergence to steady state, as illustrated by the results. Several classes of relaxation schemes such as pointwise, linewise, Gauss-Seidel, and non-Gauss-Seidel methods are discussed, along with various strategies for convergence.

  16. Graph state-based quantum authentication scheme

    NASA Astrophysics Data System (ADS)

    Liao, Longxia; Peng, Xiaoqi; Shi, Jinjing; Guo, Ying

    2017-04-01

    Inspired by the special properties of the graph state, a quantum authentication scheme is proposed in this paper, which is implemented with the utilization of the graph state. Two entities, a reliable party, Trent, as a verifier and Alice as prover are included. Trent is responsible for registering Alice in the beginning and confirming Alice in the end. The proposed scheme is simple in structure and convenient to realize in the realistic physical system due to the use of the graph state in a one-way quantum channel. In addition, the security of the scheme is extensively analyzed and accordingly can resist the general individual attack strategies.

  17. A concatenated coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Lin, S.

    1985-01-01

    A concatenated coding scheme for error contol in data communications was analyzed. The inner code is used for both error correction and detection, however the outer code is used only for error detection. A retransmission is requested if either the inner code decoder fails to make a successful decoding or the outer code decoder detects the presence of errors after the inner code decoding. Probability of undetected error of the proposed scheme is derived. An efficient method for computing this probability is presented. Throughout efficiency of the proposed error control scheme incorporated with a selective repeat ARQ retransmission strategy is analyzed.

  18. Password authentication scheme based on the quadratic residue problem

    NASA Astrophysics Data System (ADS)

    Ali, Muhammad Helmi; Ismail, Eddie Shahril

    2017-04-01

    In this paper, we propose a new password-authentication scheme based on quadratic residue problem with the following advantages: the scheme does not require a verification file, and the scheme can withstand replay attacks and resist from the guessing and impersonation attacks. We next discuss the advantages of our designated scheme over other schemes in terms of security and efficiency.

  19. Secure Wake-Up Scheme for WBANs

    NASA Astrophysics Data System (ADS)

    Liu, Jing-Wei; Ameen, Moshaddique Al; Kwak, Kyung-Sup

    Network life time and hence device life time is one of the fundamental metrics in wireless body area networks (WBAN). To prolong it, especially those of implanted sensors, each node must conserve its energy as much as possible. While a variety of wake-up/sleep mechanisms have been proposed, the wake-up radio potentially serves as a vehicle to introduce vulnerabilities and attacks to WBAN, eventually resulting in its malfunctions. In this paper, we propose a novel secure wake-up scheme, in which a wake-up authentication code (WAC) is employed to ensure that a BAN Node (BN) is woken up by the correct BAN Network Controller (BNC) rather than unintended users or malicious attackers. The scheme is thus particularly implemented by a two-radio architecture. We show that our scheme provides higher security while consuming less energy than the existing schemes.

  20. High-Order Energy Stable WENO Schemes

    NASA Technical Reports Server (NTRS)

    Yamaleev, Nail K.; Carpenter, Mark H.

    2009-01-01

    A third-order Energy Stable Weighted Essentially Non-Oscillatory (ESWENO) finite difference scheme developed by Yamaleev and Carpenter was proven to be stable in the energy norm for both continuous and discontinuous solutions of systems of linear hyperbolic equations. Herein, a systematic approach is presented that enables 'energy stable' modifications for existing WENO schemes of any order. The technique is demonstrated by developing a one-parameter family of fifth-order upwind-biased ESWENO schemes; ESWENO schemes up to eighth order are presented in the appendix. New weight functions are also developed that provide (1) formal consistency, (2) much faster convergence for smooth solutions with an arbitrary number of vanishing derivatives, and (3) improved resolution near strong discontinuities.

  1. Robust Synchronization Schemes for Dynamic Channel Environments

    NASA Technical Reports Server (NTRS)

    Xiong, Fugin

    2003-01-01

    Professor Xiong will investigate robust synchronization schemes for dynamic channel environment. A sliding window will be investigated for symbol timing synchronizer and an open loop carrier estimator for carrier synchronization. Matlab/Simulink will be used for modeling and simulations.

  2. Optimal Symmetric Ternary Quantum Encryption Schemes

    NASA Astrophysics Data System (ADS)

    Wang, Yu-qi; She, Kun; Huang, Ru-fen; Ouyang, Zhong

    2016-11-01

    In this paper, we present two definitions of the orthogonality and orthogonal rate of an encryption operator, and we provide a verification process for the former. Then, four improved ternary quantum encryption schemes are constructed. Compared with Scheme 1 (see Section 2.3), these four schemes demonstrate significant improvements in term of calculation and execution efficiency. Especially, under the premise of the orthogonal rate ɛ as secure parameter, Scheme 3 (see Section 4.1) shows the highest level of security among them. Through custom interpolation functions, the ternary secret key source, which is composed of the digits 0, 1 and 2, is constructed. Finally, we discuss the security of both the ternary encryption operator and the secret key source, and both of them show a high level of security and high performance in execution efficiency.

  3. The Evolution of a Training Scheme.

    ERIC Educational Resources Information Center

    Atkinson, Ken; Nicholson, Brian

    1986-01-01

    The director of Youth Training for Britain's Manpower Services Commission (MSC) traces the evolution in youth training policy during the last decade. MSC chair Bryan Nicholson explains the thinking behind the new scheme. (Author/CT)

  4. A concatenated coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Kasami, T.; Fujiwara, T.; Lin, S.

    1986-01-01

    In this paper, a concatenated coding scheme for error control in data communications is presented and analyzed. In this scheme, the inner code is used for both error correction and detection; however, the outer code is used only for error detection. A retransmission is requested if either the inner code decoder fails to make a successful decoding or the outer code decoder detects the presence of errors after the inner code decoding. Probability of undetected error (or decoding error) of the proposed scheme is derived. An efficient method for computing this probability is presented. Throughput efficiency of the proposed error control scheme incorporated with a selective-repeat ARQ retransmission strategy is also analyzed. Three specific examples are presented. One of the examples is proposed for error control in the NASA Telecommand System.

  5. ONU Power Saving Scheme for EPON System

    NASA Astrophysics Data System (ADS)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  6. A robust coding scheme for packet video

    NASA Technical Reports Server (NTRS)

    Chen, Yun-Chung; Sayood, Khalid; Nelson, Don J.

    1992-01-01

    A layered packet video coding algorithm based on a progressive transmission scheme is presented. The algorithm provides good compression and can handle significant packet loss with graceful degradation in the reconstruction sequence. Simulation results for various conditions are presented.

  7. The Dewey Decimal Scheme and Mathematics

    ERIC Educational Resources Information Center

    Donovan, Peter W.; And Others

    1973-01-01

    This essay criticizes the mathematical schedules of the 18th edition of the Dewey Decimal Classification Scheme and offers two alternatives suitable for college libraries that use this system. (Authors)

  8. A concatenated coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Kasami, T.; Fujiwara, T.; Lin, S.

    1986-01-01

    In this paper, a concatenated coding scheme for error control in data communications is presented and analyzed. In this scheme, the inner code is used for both error correction and detection; however, the outer code is used only for error detection. A retransmission is requested if either the inner code decoder fails to make a successful decoding or the outer code decoder detects the presence of errors after the inner code decoding. Probability of undetected error (or decoding error) of the proposed scheme is derived. An efficient method for computing this probability is presented. Throughput efficiency of the proposed error control scheme incorporated with a selective-repeat ARQ retransmission strategy is also analyzed. Three specific examples are presented. One of the examples is proposed for error control in the NASA Telecommand System.

  9. A robust coding scheme for packet video

    NASA Technical Reports Server (NTRS)

    Chen, Y. C.; Sayood, Khalid; Nelson, D. J.

    1991-01-01

    We present a layered packet video coding algorithm based on a progressive transmission scheme. The algorithm provides good compression and can handle significant packet loss with graceful degradation in the reconstruction sequence. Simulation results for various conditions are presented.

  10. Renormalization scheme dependence with renormalization group summation

    NASA Astrophysics Data System (ADS)

    McKeon, D. G. C.

    2015-08-01

    We consider all perturbative radiative corrections to the total e+e- annihilation cross section Re+e- showing how the renormalization group (RG) equation associated with the radiatively induced mass scale μ can be used to sum the logarithmic contributions in two ways. First of all, one can sum leading-log, next-to-leading-log, etc., contributions to Re+e- using in turn the one-loop, two-loop, etc., contributions to the RG function β . A second summation shows how all logarithmic corrections to Re+e- can be expressed entirely in terms of the log-independent contributions when one employs the full β -function. Next, using Stevenson's characterization of any choice of renormalization scheme by the use of the contributions to the β -function arising beyond two-loop order, we examine the RG scheme dependence in Re+e- when using the second way of summing logarithms. The renormalization scheme invariants that arise are then related to the renormalization scheme invariants found by Stevenson. We next consider two choices of the renormalization scheme, one which can be used to express Re+e- solely in terms of two powers of a running coupling, and the second which can be used to express Re+e- as an infinite series in the two-loop running coupling (i.e., a Lambert W -function). In both cases, Re+e- is expressed solely in terms of renormalization scheme invariant parameters that are to be computed by a perturbative evaluation of Re+e-. We then establish how in general the coupling constant arising in one renormalization scheme can be expressed as a power series of the coupling arising in any other scheme. We then establish how, by using a different renormalization mass scale at each order of perturbation theory, all renormalization scheme dependence can be absorbed into these mass scales when one uses the second way of summing logarithmic corrections to Re+e-. We then employ the approach to renormalization scheme dependency that we have applied to Re+e- to a RG summed

  11. Matching Multistage Schemes to Viscous Flow

    NASA Technical Reports Server (NTRS)

    Kleb, William L.; VanLeer, Bram; Wood, William A.

    2005-01-01

    Multistage, explicit time stepping can be tailored to accelerate convergence for scalar advection-diffusion problems by using optimized multistage coefficients that vary with the local cell Reynolds number. And, when combined with local preconditioning, variable-coefficient multistage schemes for computational fluid dynamics codes can also provide an order of magnitude faster convergence, relative to standard, fixed-coefficient schemes, for the Navier-Stokes system of equations.

  12. Simplified Learning Scheme For Analog Neural Network

    NASA Technical Reports Server (NTRS)

    Eberhardt, Silvio P.

    1991-01-01

    Synaptic connections adjusted one at a time in small increments. Simplified gradient-descent learning scheme for electronic neural-network processor less efficient than better-known back-propagation scheme, but offers two advantages: easily implemented in circuitry because data-access circuitry separated from learning circuitry; and independence of data-access circuitry makes possible to implement feedforward as well as feedback networks, including those of multiple-attractor type. Important in such applications as recognition of patterns.

  13. Asynchronous Communication Scheme For Hypercube Computer

    NASA Technical Reports Server (NTRS)

    Madan, Herb S.

    1988-01-01

    Scheme devised for asynchronous-message communication system for Mark III hypercube concurrent-processor network. Network consists of up to 1,024 processing elements connected electrically as though were at corners of 10-dimensional cube. Each node contains two Motorola 68020 processors along with Motorola 68881 floating-point processor utilizing up to 4 megabytes of shared dynamic random-access memory. Scheme intended to support applications requiring passage of both polled or solicited and unsolicited messages.

  14. Dynamic Restarting Schemes for Eigenvalue Problems

    SciTech Connect

    Wu, Kesheng; Simon, Horst D.

    1999-03-10

    In studies of restarted Davidson method, a dynamic thick-restart scheme was found to be excellent in improving the overall effectiveness of the eigen value method. This paper extends the study of the dynamic thick-restart scheme to the Lanczos method for symmetric eigen value problems and systematically explore a range of heuristics and strategies. We conduct a series of numerical tests to determine their relative strength and weakness on a class of electronic structure calculation problems.

  15. Finance schemes for funding private orthodontic treatment.

    PubMed

    Perks, S

    1997-02-01

    Over the last ten years there has been a steady increase in the volume of private dental treatment and numerous finance schemes have been developed to help both patients and dentists. Private orthodontic treatment is increasing and the purpose of this article is to summarise the main features of the schemes currently available to fund private orthodontic treatment and to provide a source of reference.

  16. FRESCO: flexible alignment with rectangle scoring schemes.

    PubMed

    Dalca, A V; Brudno, M

    2008-01-01

    While the popular DNA sequence alignment tools incorporate powerful heuristics to allow for fast and accurate alignment of DNA, most of them still optimize the classical Needleman Wunsch scoring scheme. The development of novel scoring schemes is often hampered by the difficulty of finding an optimizing algorithm for each non-trivial scheme. In this paper we define the broad class of rectangle scoring schemes, and describe an algorithm and tool that can align two sequences with an arbitrary rectangle scoring scheme in polynomial time. Rectangle scoring schemes encompass some of the popular alignment scoring metrics currently in use, as well as many other functions. We investigate a novel scoring function based on minimizing the expected number of random diagonals observed with the given scores and show that it rivals the LAGAN and Clustal-W aligners, without using any biological or evolutionary parameters. The FRESCO program, freely available at http://compbio.cs.toronto.edu/fresco, gives bioinformatics researchers the ability to quickly compare the performance of other complex scoring formulas without having to implement new algorithms to optimize them.

  17. Efficient multiparty quantum-secret-sharing schemes

    SciTech Connect

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-05-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information.

  18. Simplification of the unified gas kinetic scheme

    NASA Astrophysics Data System (ADS)

    Chen, Songze; Guo, Zhaoli; Xu, Kun

    2016-08-01

    The unified gas kinetic scheme (UGKS) is an asymptotic preserving (AP) scheme for kinetic equations. It is superior for transition flow simulation and has been validated in the past years. However, compared to the well-known discrete ordinate method (DOM), which is a classical numerical method solving the kinetic equations, the UGKS needs more computational resources. In this study, we propose a simplification of the unified gas kinetic scheme. It allows almost identical numerical cost as the DOM, but predicts numerical results as accurate as the UGKS. In the simplified scheme, the numerical flux for the velocity distribution function and the numerical flux for the macroscopic conservative quantities are evaluated separately. The equilibrium part of the UGKS flux is calculated by analytical solution instead of the numerical quadrature in velocity space. The simplification is equivalent to a flux hybridization of the gas kinetic scheme for the Navier-Stokes (NS) equations and the conventional discrete ordinate method. Several simplification strategies are tested, through which we can identify the key ingredient of the Navier-Stokes asymptotic preserving property. Numerical tests show that, as long as the collision effect is built into the macroscopic numerical flux, the numerical scheme is Navier-Stokes asymptotic preserving, regardless the accuracy of the microscopic numerical flux for the velocity distribution function.

  19. Access and accounting schemes of wireless broadband

    NASA Astrophysics Data System (ADS)

    Zhang, Jian; Huang, Benxiong; Wang, Yan; Yu, Xing

    2004-04-01

    In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.

  20. Lithium Ion Source for Satellite Charge Control

    DTIC Science & Technology

    1990-06-01

    2 Figure 2. Schematic representation of particle flows ............. .......... 3 Figure 3. ATS-5 neutralizer operation, September 20, 1974[Ref.4...in eclipse. Typical values for spacecraft potential in eclipse are from -1 to -10 KV. This results in current flows as shown in Figure Ia. The...important. An equilibrium potential is achieved when the flow of escaping photoelectrons is equal to the difference between the flows of plasma electrons and

  1. Automatic charge control system for satellites

    NASA Technical Reports Server (NTRS)

    Shuman, B. M.; Cohen, H. A.

    1985-01-01

    The SCATHA and the ATS-5 and 6 spacecraft provided insights to the problem of spacecraft charging at geosychronous altitudes. Reduction of the levels of both absolute and differential charging was indicated, by the emission of low energy neutral plasma. It is appropriate to complete the transition from experimental results to the development of a system that will sense the state-of-charge of a spacecraft, and, when a predetermined threshold is reached, will respond automatically to reduce it. A development program was initiated utilizing sensors comparable to the proton electrostatic analyzer, the surface potential monitor, and the transient pulse monitor that flew in SCATHA, and combine these outputs through a microprocessor controller to operate a rapid-start, low energy plasma source.

  2. Battery compatibility with photovoltaic charge controllers

    NASA Astrophysics Data System (ADS)

    Harrington, S. R.; Bower, W. I.

    Photovoltaic (PV) systems offer a cost-effective solution to provide electrical power for a wide variety of applications, with battery performance playing a major role in their success. Some of the results of an industry meeting regarding battery specifications and ratings that photovoltaic system designers require, but do not typically have available to them are presented. Communications between the PV industry and the battery industry regarding appropriate specifications were uncoordinated and poor in the past. The effort under way involving the PV industry and battery manufacturers is discussed and a working draft of specifications to develop and outline the information sorely needed on batteries is provided. The development of this information is referred to as 'Application Notes for Batteries in Photovoltaic Systems.' The content of these 'notes' was compiled from various sources, including the input from the results of a survey on battery use in the photovoltaic industry. Only lead-acid batteries are discussed.

  3. PRICE: primitive centred schemes for hyperbolic systems

    NASA Astrophysics Data System (ADS)

    Toro, E. F.; Siviglia, A.

    2003-08-01

    We present first- and higher-order non-oscillatory primitive (PRI) centred (CE) numerical schemes for solving systems of hyperbolic partial differential equations written in primitive (or non-conservative) form. Non-conservative systems arise in a variety of fields of application and they are adopted in that form for numerical convenience, or more importantly, because they do not posses a known conservative form; in the latter case there is no option but to apply non-conservative methods. In addition we have chosen a centred, as distinct from upwind, philosophy. This is because the systems we are ultimately interested in (e.g. mud flows, multiphase flows) are exceedingly complicated and the eigenstructure is difficult, or very costly or simply impossible to obtain. We derive six new basic schemes and then we study two ways of extending the most successful of these to produce second-order non-oscillatory methods. We have used the MUSCL-Hancock and the ADER approaches. In the ADER approach we have used two ways of dealing with linear reconstructions so as to avoid spurious oscillations: the ADER TVD scheme and ADER with ENO reconstruction. Extensive numerical experiments suggest that all the schemes are very satisfactory, with the ADER/ENO scheme being perhaps the most promising, first for dealing with source terms and secondly, because higher-order extensions (greater than two) are possible. Work currently in progress includes the application of some of these ideas to solve the mud flow equations. The schemes presented are generic and can be applied to any hyperbolic system in non-conservative form and for which solutions include smooth parts, contact discontinuities and weak shocks. The advantage of the schemes presented over upwind-based methods is simplicity and efficiency, and will be fully realized for hyperbolic systems in which the provision of upwind information is very costly or is not available.

  4. Establishing a Proficiency Testing Scheme for Drinking Water Radiochemistry

    SciTech Connect

    Brookman, Brian

    2008-08-14

    As part of its international water proficiency testing (PT) scheme, 'Aquacheck', the LGC Proficiency Testing Group has established a new water radiochemistry PT scheme. The PT scheme is aimed at laboratories who undertake radiochemical analysis on drinking water samples as part of an environmental monitoring programme. Following a scheme design and feasibility study, the new scheme was established to monitor the laboratory performance of participants undertaking the determination of gross alpha, gross beta and tritium activity. Three rounds of the new water radiochemistry PT scheme are now complete. This paper explains the process of establishing such a scheme, reviews the results so far, and addresses future development of the scheme.

  5. Combining image-processing and image compression schemes

    NASA Technical Reports Server (NTRS)

    Greenspan, H.; Lee, M.-C.

    1995-01-01

    An investigation into the combining of image-processing schemes, specifically an image enhancement scheme, with existing compression schemes is discussed. Results are presented on the pyramid coding scheme, the subband coding scheme, and progressive transmission. Encouraging results are demonstrated for the combination of image enhancement and pyramid image coding schemes, especially at low bit rates. Adding the enhancement scheme to progressive image transmission allows enhanced visual perception at low resolutions. In addition, further progressing of the transmitted images, such as edge detection schemes, can gain from the added image resolution via the enhancement.

  6. Combining image-processing and image compression schemes

    NASA Technical Reports Server (NTRS)

    Greenspan, H.; Lee, M.-C.

    1995-01-01

    An investigation into the combining of image-processing schemes, specifically an image enhancement scheme, with existing compression schemes is discussed. Results are presented on the pyramid coding scheme, the subband coding scheme, and progressive transmission. Encouraging results are demonstrated for the combination of image enhancement and pyramid image coding schemes, especially at low bit rates. Adding the enhancement scheme to progressive image transmission allows enhanced visual perception at low resolutions. In addition, further progressing of the transmitted images, such as edge detection schemes, can gain from the added image resolution via the enhancement.

  7. A classification scheme for risk assessment methods.

    SciTech Connect

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In Section 2 we provide context for this report

  8. Identification Schemes from Key Encapsulation Mechanisms

    NASA Astrophysics Data System (ADS)

    Anada, Hiroaki; Arita, Seiko

    We propose a generic conversion from a key encapsulation mechanism (KEM) to an identification (ID) scheme. The conversion derives the security for ID schemes against concurrent man-in-the-middle (cMiM) attacks from the security for KEMs against adaptive chosen ciphertext attacks on one-wayness (one-way-CCA2). Then, regarding the derivation as a design principle of ID schemes, we develop a series of concrete one-way-CCA2 secure KEMs. We start with El Gamal KEM and prove it secure against non-adaptive chosen ciphertext attacks on one-wayness (one-way-CCA1) in the standard model. Then, we apply a tag framework with the algebraic trick of Boneh and Boyen to make it one-way-CCA2 secure based on the Gap-CDH assumption. Next, we apply the CHK transformation or a target collision resistant hash function to exit the tag framework. And finally, as it is better to rely on the CDH assumption rather than the Gap-CDH assumption, we apply the Twin DH technique of Cash, Kiltz and Shoup. The application is not “black box” and we do it by making the Twin DH technique compatible with the algebraic trick. The ID schemes obtained from our KEMs show the highest performance in both computational amount and message length compared with previously known ID schemes secure against concurrent man-in-the-middle attacks.

  9. Scientific review of the Welfare Food Scheme.

    PubMed

    2002-01-01

    The COMA Panel on Maternal and Child Nutrition has undertaken the first scientific review of the Welfare Food Scheme since its inception in 1940. It has: reviewed current dietary recommendations, identified from national data, population groups vulnerable to adverse nutritional outcomes, evaluated the contribution of the current scheme to prevention of these vulnerabilities and identified further information needs and highlighted improvements likely to be cost neutral. Originally the Scheme incorporated universal provision. Subsequently it was targeted at the most socio-economically vulnerable. Today, a quarter of children under five are beneficiaries by virtue of their family's income. The Scheme has two principal beneficiary groups: pregnant women, mothers and young chidren in families eligible for certain social security benefits. With the exception of children under one year of age, all are entitled to a pint of milk a day (using redeemable milk tokens) and free vitamin supplements (available from designated clinics). Infant formula instead of milk is available for infants who are not breastfed. children under five years attending Scheme-registered day care facilities can receive one third of a pint of milk a day. Children aged 5-16 years not registered at school by virtue of mental or physical disability are entitled to a pint of milk a day. The following adverse nutritional outcomes were considered: pregnant women and mothers low uptake of periconceptional folic acid supplements low dietary intake during pregnancy vitamin D deficiency.

  10. Selecting optimal partitioning schemes for phylogenomic datasets.

    PubMed

    Lanfear, Robert; Calcott, Brett; Kainer, David; Mayer, Christoph; Stamatakis, Alexandros

    2014-04-17

    Partitioning involves estimating independent models of molecular evolution for different subsets of sites in a sequence alignment, and has been shown to improve phylogenetic inference. Current methods for estimating best-fit partitioning schemes, however, are only computationally feasible with datasets of fewer than 100 loci. This is a problem because datasets with thousands of loci are increasingly common in phylogenetics. We develop two novel methods for estimating best-fit partitioning schemes on large phylogenomic datasets: strict and relaxed hierarchical clustering. These methods use information from the underlying data to cluster together similar subsets of sites in an alignment, and build on clustering approaches that have been proposed elsewhere. We compare the performance of our methods to each other, and to existing methods for selecting partitioning schemes. We demonstrate that while strict hierarchical clustering has the best computational efficiency on very large datasets, relaxed hierarchical clustering provides scalable efficiency and returns dramatically better partitioning schemes as assessed by common criteria such as AICc and BIC scores. These two methods provide the best current approaches to inferring partitioning schemes for very large datasets. We provide free open-source implementations of the methods in the PartitionFinder software. We hope that the use of these methods will help to improve the inferences made from large phylogenomic datasets.

  11. Explicit and implicit finite difference schemes for fractional Cattaneo equation

    NASA Astrophysics Data System (ADS)

    Ghazizadeh, H. R.; Maerefat, M.; Azimi, A.

    2010-09-01

    In this paper, the numerical solution of fractional (non-integer)-order Cattaneo equation for describing anomalous diffusion has been investigated. Two finite difference schemes namely an explicit predictor-corrector and totally implicit schemes have been developed. In developing each scheme, a separate formulation approach for the governing equations has been considered. The explicit predictor-corrector scheme is the fractional generalization of well-known MacCormack scheme and has been called Generalized MacCormack scheme. This scheme solves two coupled low-order equations and simultaneously computes the flux term with the main variable. Fully implicit scheme however solves a single high-order undecomposed equation. For Generalized MacCormack scheme, stability analysis has been studied through Fourier method. Through a numerical test, the experimental order of convergency of both schemes has been found. Then, the domain of applicability and some numerical properties of each scheme have been discussed.

  12. Scheme variations of the QCD coupling

    NASA Astrophysics Data System (ADS)

    Boito, Diogo; Jamin, Matthias; Miravitllas, Ramon

    2017-03-01

    The Quantum Chromodynamics (QCD) coupling αs is a central parameter in the Standard Model of particle physics. However, it depends on theoretical conventions related to renormalisation and hence is not an observable quantity. In order to capture this dependence in a transparent way, a novel definition of the QCD coupling, denoted by â, is introduced, whose running is explicitly renormalisation scheme invariant. The remaining renormalisation scheme dependence is related to transformations of the QCD scale Λ, and can be parametrised by a single parameter C. Hence, we call â the C-scheme coupling. The dependence on C can be exploited to study and improve perturbative predictions of physical observables. This is demonstrated for the QCD Adler function and hadronic decays of the τ lepton.

  13. Physical Renormalization Schemes and Grand Unification

    SciTech Connect

    Binger, M.

    2003-11-07

    In a physical renormalization scheme, gauge couplings are defined directly in terms of physical observables. Such effective charges are analytic functions of physical scales, and thus mass thresholds are treated with their correct analytic dependence. In particular, particles will contribute to physical predictions even at energies below their threshold. This is in contrast to unphysical renormalization schemes such as {ovr MS} where mass thresholds are treated as step functions. In this paper we analyze supersymmetric grand unification in the context of physical renormalization schemes and find a number of qualitative differences and improvements in precision over conventional approaches. The effective charge formalism presented here provides a template for calculating all mass threshold effects for any given grand unified theory. These new threshold corrections may be important in making the measured values of the gauge couplings consistent with unification.

  14. Asynchronous discrete event schemes for PDEs

    NASA Astrophysics Data System (ADS)

    Stone, D.; Geiger, S.; Lord, G. J.

    2017-08-01

    A new class of asynchronous discrete-event simulation schemes for advection-diffusion-reaction equations is introduced, based on the principle of allowing quanta of mass to pass through faces of a (regular, structured) Cartesian finite volume grid. The timescales of these events are linked to the flux on the face. The resulting schemes are self-adaptive, and local in both time and space. Experiments are performed on realistic physical systems related to porous media flow applications, including a large 3D advection diffusion equation and advection diffusion reaction systems. The results are compared to highly accurate reference solutions where the temporal evolution is computed with exponential integrator schemes using the same finite volume discretisation. This allows a reliable estimation of the solution error. Our results indicate a first order convergence of the error as a control parameter is decreased, and we outline a framework for analysis.

  15. Progressive classification scheme for document layout recognition

    NASA Astrophysics Data System (ADS)

    Minguillon, Julian; Pujol, Jaume; Zeger, Kenneth

    1999-06-01

    In this paper, we present a progressive classification scheme for a document layout recognition system using three stages. The first stages, preprocessing, extracts statistical information that may be used for background detection and removal. The second stage, a tree based classified, uses a variable block size and a set of probabilistic rules to classify segmented blocks that are independently classified. The third, state, postprocessing, uses the label map generated in the second state with a set of context rules to label unclassified blocks, trying also to solve some of the misclassification errors that may have been generated during the previous stage. The progressive scheme used in the second and third stages allows the user to stop the classification process at any block size, depending on this requirements. Experiments show that a progressive scheme combined with a set of postprocessing rules increases the percentage of correctly classified blocks and reduces the number of block computations.

  16. Cooling scheme for turbine hot parts

    DOEpatents

    Hultgren, Kent Goran; Owen, Brian Charles; Dowman, Steven Wayne; Nordlund, Raymond Scott; Smith, Ricky Lee

    2000-01-01

    A closed-loop cooling scheme for cooling stationary combustion turbine components, such as vanes, ring segments and transitions, is provided. The cooling scheme comprises: (1) an annular coolant inlet chamber, situated between the cylinder and blade ring of a turbine, for housing coolant before being distributed to the turbine components; (2) an annular coolant exhaust chamber, situated between the cylinder and the blade ring and proximate the annular coolant inlet chamber, for collecting coolant exhaust from the turbine components; (3) a coolant inlet conduit for supplying the coolant to said coolant inlet chamber; (4) a coolant exhaust conduit for directing coolant from said coolant exhaust chamber; and (5) a piping arrangement for distributing the coolant to and directing coolant exhaust from the turbine components. In preferred embodiments of the invention, the cooling scheme further comprises static seals for sealing the blade ring to the cylinder and flexible joints for attaching the blade ring to the turbine components.

  17. High order well-balanced schemes

    SciTech Connect

    Noelle, Sebastian; Xing, Yulong; Shu, Chi-wang

    2010-01-01

    In this paper the authors review some recent work on high-order well-balanced schemes. A characteristic feature of hyperbolic systems of balance laws is the existence of non-trivial equilibrium solutions, where the effects of convective fluxes and source terms cancel each other. Well-balanced schemes satisfy a discrete analogue of this balance and are therefore able to maintain an equilibrium state. They discuss two classes of schemes, one based on high-order accurate, non-oscillatory finite difference operators which are well-balanced for a general class of equilibria, and the other one based on well-balanced quadratures, which can - in principle - be applied to all equilibria. Applications include equilibria at rest, where the flow velocity vanishes, and also the more challenging moving flow equilibria. Numerical experiments show excellent resolution of unperturbed as well as slightly perturbed equilibria.

  18. Vector lifting schemes for stereo image coding.

    PubMed

    Kaaniche, Mounir; Benazza-Benyahia, Amel; Pesquet-Popescu, Béatrice; Pesquet, Jean-Christophe

    2009-11-01

    Many research efforts have been devoted to the improvement of stereo image coding techniques for storage or transmission. In this paper, we are mainly interested in lossy-to-lossless coding schemes for stereo images allowing progressive reconstruction. The most commonly used approaches for stereo compression are based on disparity compensation techniques. The basic principle involved in this technique first consists of estimating the disparity map. Then, one image is considered as a reference and the other is predicted in order to generate a residual image. In this paper, we propose a novel approach, based on vector lifting schemes (VLS), which offers the advantage of generating two compact multiresolution representations of the left and the right views. We present two versions of this new scheme. A theoretical analysis of the performance of the considered VLS is also conducted. Experimental results indicate a significant improvement using the proposed structures compared with conventional methods.

  19. Upwind and symmetric shock-capturing schemes

    NASA Technical Reports Server (NTRS)

    Yee, H. C.

    1987-01-01

    The development of numerical methods for hyperbolic conservation laws has been a rapidly growing area for the last ten years. Many of the fundamental concepts and state-of-the-art developments can only be found in meeting proceedings or internal reports. This review paper attempts to give an overview and a unified formulation of a class of shock-capturing methods. Special emphasis is on the construction of the basic nonlinear scalar second-order schemes and the methods of extending these nonlinear scalar schemes to nonlinear systems via the extact Riemann solver, approximate Riemann solvers, and flux-vector splitting approaches. Generalization of these methods to efficiently include real gases and large systems of nonequilibrium flows is discussed. The performance of some of these schemes is illustrated by numerical examples for one-, two- and three-dimensional gas dynamics problems.

  20. Matching multistage schemes to viscous flow

    NASA Astrophysics Data System (ADS)

    Kleb, William Leonard

    A method to accelerate convergence to steady state by explicit time-marching schemes for the compressible Navier-Stokes equations is presented. The combination of cell-Reynolds-number-based multistage time stepping and local preconditioning makes solving steady-state viscous flow problems competitive with the convergence rates typically associated with implicit methods, without the associated memory penalty. Initially, various methods are investigated to extend the range of multistage schemes to diffusion-dominated cases. It is determined that the Chebyshev polynomials are well suited to serve as amplification factors for these schemes; however, creating a method that can bridge the continuum from convection-dominated to diffusion-dominated regimes proves troublesome, until the Manteuffel family of polynomials is uncovered. This transformation provides a smooth transition between the two extremes; and armed with this information, sets of multistage coefficients are created for a given spatial discretization as a function of cell Reynolds number according to various design criteria. As part of this process, a precise definition for the numerical time step is hammered out, something which up to this time, has been set via algebraic arguments only. Next are numerical tests of these sets of variable multistage coefficients. To isolate the effects of the variable multistage coefficients, the test case chosen is very simple: circular advection-diffusion. The numerical results support the analytical analysis by demonstrating an order of magnitude improvement in convergence rate for single-grid relaxation and a factor of three for multigrid relaxation. Building upon the success of the scalar case, preconditioning is applied to make the Navier-Stokes system of equations behave more nearly as a single scalar equation. Then, by applying the variable multistage coefficient scheme to a typical boundary-layer flow problem, the results affirm the benefits of local preconditioning

  1. EPU correction scheme study at the CLS

    SciTech Connect

    Bertwistle, Drew Baribeau, C.; Dallin, L.; Chen, S.; Vogt, J.; Wurtz, W.

    2016-07-27

    The Canadian Light Source (CLS) Quantum Materials Spectroscopy Center (QMSC) beamline will employ a novel double period (55 mm, 180 mm) elliptically polarizing undulator (EPU) to produce photons of arbitrary polarization in the soft X-ray regime. The long period and high field of the 180 mm period EPU will have a strong dynamic focusing effect on the storage ring electron beam. We have considered two partial correction schemes, a 4 m long planar array of BESSY-II style current strips, and soft iron L-shims. In this paper we briefly consider the implementation of these correction schemes.

  2. Security problem on arbitrated quantum signature schemes

    SciTech Connect

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  3. A New Secure Quantum Key Expansion Scheme

    NASA Astrophysics Data System (ADS)

    Yang, Yun-yan; Luo, Lai-zhen; Yin, Gui-sheng

    2013-06-01

    A new quantum key expansion scheme is proposed. The protocol of quantum key expansion proposed by Hwang is analyzed and the eavesdropping scheme is presented. We found that the using of the basis sequence shared by communicating parties is the weakness of the protocol. Hence we propose a `purification attack' for the eavesdropper to steal partial information of the raw key and the new key between communicating parties. In view of this defect, we propose a new protocol of quantum key expansion, where the shared key is encrypted into a sequence of unitary operators which can be used securely against the presented attack.

  4. An Elaborate Secure Quantum Voting Scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Jia-Lei; Xie, Shu-Cui; Zhang, Jian-Zhong

    2017-07-01

    An elaborate secure quantum voting scheme is presented in this paper. It is based on quantum proxy blind signature. The eligible voter's voting information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Charlie's supervision in the whole voting process can make the protocol satisfy fairness and un-repeatability so as to avoid Bob's dishonest behaviour. Our scheme uses the physical characteristics of quantum mechanics to achieve voting, counting and immediate supervision. In addition, the program also uses quantum key distribution protocol and quantum one-time pad to guarantee its unconditional security.

  5. ARQ scheme reinforced with past acknowledgement signals

    NASA Astrophysics Data System (ADS)

    Nakamura, Makoto; Takada, Yasushi

    An ARQ (automatic-repeat-request) scheme that can reduce the influence of backward channel errors for bidirectional data transmission systems is proposed. The main feature of the scheme is that both present and past acknowledgement signals are utilized to decide whether the data signals should be retransmitted or not. Throughput performance is analyzed in both go-back-N and selective-repeat ARQ. A small number of returned past acknowledgement signals are required to improve the throughput efficiency. For an ideal selective-repeat ARQ with an infinite buffer, increasing the number of returned past acknowledgement signals makes the throughput efficiency asymptotically close to the upper bound.

  6. A COMPLETE SCHEME FOR A MUON COLLIDER.

    SciTech Connect

    PALMER,R.B.; BERG, J.S.; FERNOW, R.C.; GALLARDO, J.C.; KIRK, H.G.; ALEXAHIN, Y.; NEUFFER, D.; KAHN, S.A.; SUMMERS, D.

    2007-09-01

    A complete scheme for production, cooling, acceleration, and ring for a 1.5 TeV center of mass muon collider is presented, together with parameters for two higher energy machines. The schemes starts with the front end of a proposed neutrino factory that yields bunch trains of both muon signs. Six dimensional cooling in long-period helical lattices reduces the longitudinal emittance until it becomes possible to merge the trains into single bunches, one of each sign. Further cooling in all dimensions is applied to the single bunches in further helical lattices. Final transverse cooling to the required parameters is achieved in 50 T solenoids.

  7. High resolution schemes and the entropy condition

    NASA Technical Reports Server (NTRS)

    Osher, S.; Chakravarthy, S.

    1983-01-01

    A systematic procedure for constructing semidiscrete, second order accurate, variation diminishing, five point band width, approximations to scalar conservation laws, is presented. These schemes are constructed to also satisfy a single discrete entropy inequality. Thus, in the convex flux case, convergence is proven to be the unique physically correct solution. For hyperbolic systems of conservation laws, this construction is used formally to extend the first author's first order accurate scheme, and show (under some minor technical hypotheses) that limit solutions satisfy an entropy inequality. Results concerning discrete shocks, a maximum principle, and maximal order of accuracy are obtained. Numerical applications are also presented.

  8. An Elaborate Secure Quantum Voting Scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Jia-Lei; Xie, Shu-Cui; Zhang, Jian-Zhong

    2017-10-01

    An elaborate secure quantum voting scheme is presented in this paper. It is based on quantum proxy blind signature. The eligible voter's voting information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Charlie's supervision in the whole voting process can make the protocol satisfy fairness and un-repeatability so as to avoid Bob's dishonest behaviour. Our scheme uses the physical characteristics of quantum mechanics to achieve voting, counting and immediate supervision. In addition, the program also uses quantum key distribution protocol and quantum one-time pad to guarantee its unconditional security.

  9. Fixed Wordsize Implementation of Lifting Schemes

    NASA Astrophysics Data System (ADS)

    Karp, Tanja

    2006-12-01

    We present a reversible nonlinear discrete wavelet transform with predefined fixed wordsize based on lifting schemes. Restricting the dynamic range of the wavelet domain coefficients due to a fixed wordsize may result in overflow. We show how this overflow has to be handled in order to maintain reversibility of the transform. We also perform an analysis on how large a wordsize of the wavelet coefficients is needed to perform optimal lossless and lossy compressions of images. The scheme is advantageous to well-known integer-to-integer transforms since the wordsize of adders and multipliers can be predefined and does not increase steadily. This also results in significant gains in hardware implementations.

  10. A Trade-off Traitor Tracing Scheme

    NASA Astrophysics Data System (ADS)

    Ohtake, Go; Ogawa, Kazuto; Hanaoka, Goichiro; Imai, Hideki

    There has been a wide-ranging discussion on the issue of content copyright protection in digital content distribution systems. Fiat and Tassa proposed the framework of dynamic traitor tracing. Their framework requires dynamic computation transactions according to the real-time responses of the pirate, and it presumes real-time observation of content redistribution. Therefore, it cannot be simply utilized in an application where such an assumption is not valid. In this paper, we propose a new scheme that provides the advantages of dynamic traitor tracing schemes and also overcomes their problems.

  11. How the Pharmaceutical Benefits Scheme began.

    PubMed

    Goddard, Martyn S

    2014-07-07

    Seventy years ago, the Curtin wartime government introduced legislation for a Pharmaceutical Benefits Scheme (PBS). It was a response to the need to provide access to a wave of antibiotic drugs - sulfonamides, streptomycin, penicillin - to the whole population, not only to the minority able to afford them. The scheme was immediately and successfully opposed by doctors and the conservative opposition, which saw in universal health care an underhand plan to nationalise medicine. There were two High Court challenges, two referendums and a constitutional amendment; but it was not until 1960 that Australians had the comprehensive PBS envisaged by Curtin in 1944.

  12. Student Loans Schemes in Mauritius: Experience, Analysis and Scenarios

    ERIC Educational Resources Information Center

    Mohadeb, Praveen

    2006-01-01

    This study makes a comprehensive review of the situation of student loans schemes in Mauritius, and makes recommendations, based on best practices, for setting up a national scheme that attempts to avoid weaknesses identified in some of the loans schemes of other countries. It suggests that such a scheme would be cost-effective and beneficial both…

  13. Strong authentication scheme for telecare medicine information systems.

    PubMed

    Pu, Qiong; Wang, Jian; Zhao, Rongyong

    2012-08-01

    The telecare medicine information system enables or supports health-care delivery services. A secure authentication scheme will thus be needed to safeguard data integrity, confidentiality, and availability. In this paper, we propose a generic construction of smart-card-based password authentication protocol and prove its security. The proposed framework is superior to previous schemes in three following aspects : (1) our scheme is a true two-factor authentication scheme. (2) our scheme can yield a forward secure two-factor authentication scheme with user anonymity when appropriately instantiated. (3) our scheme utilizes each user's unique identity to accomplish the user authentication and does not need to store or verify others's certificates. And yet, our scheme is still reasonably efficient and can yield such a concrete scheme that is even more efficient than previous schemes. Therefore the end result is more practical for the telecare medicine system.

  14. Cross-ontological analytics for alignment of different classification schemes

    DOEpatents

    Posse, Christian; Sanfilippo, Antonio P; Gopalan, Banu; Riensche, Roderick M; Baddeley, Robert L

    2010-09-28

    Quantification of the similarity between nodes in multiple electronic classification schemes is provided by automatically identifying relationships and similarities between nodes within and across the electronic classification schemes. Quantifying the similarity between a first node in a first electronic classification scheme and a second node in a second electronic classification scheme involves finding a third node in the first electronic classification scheme, wherein a first product value of an inter-scheme similarity value between the second and third nodes and an intra-scheme similarity value between the first and third nodes is a maximum. A fourth node in the second electronic classification scheme can be found, wherein a second product value of an inter-scheme similarity value between the first and fourth nodes and an intra-scheme similarity value between the second and fourth nodes is a maximum. The maximum between the first and second product values represents a measure of similarity between the first and second nodes.

  15. The Partners in Flight species prioritization scheme

    Treesearch

    William C. Hunter; Michael F. Carter; David N. Pashley; Keith Barker

    1993-01-01

    The prioritization scheme identifies those birds at any locality on several geographic scales most in need of conservation action. Further, it suggests some of those actions that ought to be taken. Ranking criteria used to set priorities for Neotropical migratory landbirds measure characteristics of species that make them vulnerable to local and global extinction....

  16. A new scheme of force reflecting control

    NASA Technical Reports Server (NTRS)

    Kim, Won S.

    1992-01-01

    A new scheme of force reflecting control has been developed that incorporates position-error-based force reflection and robot compliance control. The operator is provided with a kinesthetic force feedback which is proportional to the position error between the operator-commanded and the actual position of the robot arm. Robot compliance control, which increases the effective compliance of the robot, is implemented by low pass filtering the outputs of the force/torque sensor mounted on the base of robot hand and using these signals to alter the operator's position command. This position-error-based force reflection scheme combined with shared compliance control has been implemented successfully to the Advanced Teleoperation system consisting of dissimilar master-slave arms. Stability measurements have demonstrated unprecedentedly high force reflection gains of up to 2 or 3, even though the slave arm is much stiffer than operator's hand holding the force reflecting hand controller. Peg-in-hole experiments were performed with eight different operating modes to evaluate the new force-reflecting control scheme. Best task performance resulted with this new control scheme.

  17. Harmonic generation with multiple wiggler schemes

    SciTech Connect

    Bonifacio, R.; De Salvo, L.; Pierini, P.

    1995-02-01

    In this paper the authors give a simple theoretical description of the basic physics of the single pass high gain free electron laser (FEL), describing in some detail the FEL bunching properties and the harmonic generation technique with a multiple-wiggler scheme or a high gain optical klystron configuration.

  18. A classification scheme for LWR fuel assemblies

    SciTech Connect

    Moore, R.S.; Williamson, D.A.; Notz, K.J.

    1988-11-01

    With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs.

  19. A Simplified Scheme for Kinematic Source Inversion

    NASA Astrophysics Data System (ADS)

    Iglesias, A.; Castro-Artola, O.; Singh, S.; Hjorleifsdottir, V.; Legrand, D.

    2013-05-01

    It is well known that different kinematic source inversion schemes lead to non-unique solutions. For this reason, a simplified scheme, which yields the main characteristics of the rupture process, rather than the details, may be desirable. In this work we propose a modification of the frequency-domain inversion scheme of Cotton & Campillo (1995) to extract kinematic parameters using simplified geometries (ellipses). The forward problem is re-parameterized by including one or two ellipses in which the displacement is smoothly distributed. For the ellipses we invert for the position of the centers within the fault plane, the major and minor semi-axes, the maximum displacements, the angles of rotation and a parameter that controls the distribution of slip. A simulated annealing scheme is used to invert near-source displacements. We first test the method on synthetic displacement records corresponding to the Guerrero-Oaxaca earthquake (20/03/2012, Mw=7.5) by comparing the results obtained from the modified technique with the original method. In the next step, we use displacements obtained by double numerical integration of recorded accelerograms. We find that, in spite of the simple geometry, the modified method leads to a good fit between observed and synthetic displacements and recovers the main rupture characteristics.

  20. High Order Semi-Lagrangian Advection Scheme

    NASA Astrophysics Data System (ADS)

    Malaga, Carlos; Mandujano, Francisco; Becerra, Julian

    2014-11-01

    In most fluid phenomena, advection plays an important roll. A numerical scheme capable of making quantitative predictions and simulations must compute correctly the advection terms appearing in the equations governing fluid flow. Here we present a high order forward semi-Lagrangian numerical scheme specifically tailored to compute material derivatives. The scheme relies on the geometrical interpretation of material derivatives to compute the time evolution of fields on grids that deform with the material fluid domain, an interpolating procedure of arbitrary order that preserves the moments of the interpolated distributions, and a nonlinear mapping strategy to perform interpolations between undeformed and deformed grids. Additionally, a discontinuity criterion was implemented to deal with discontinuous fields and shocks. Tests of pure advection, shock formation and nonlinear phenomena are presented to show performance and convergence of the scheme. The high computational cost is considerably reduced when implemented on massively parallel architectures found in graphic cards. The authors acknowledge funding from Fondo Sectorial CONACYT-SENER Grant Number 42536 (DGAJ-SPI-34-170412-217).

  1. Creating Culturally Sustainable Agri-Environmental Schemes

    ERIC Educational Resources Information Center

    Burton, Rob J. F.; Paragahawewa, Upananda Herath

    2011-01-01

    Evidence is emerging from across Europe that contemporary agri-environmental schemes are having only limited, if any, influence on farmers' long-term attitudes towards the environment. In this theoretical paper we argue that these approaches are not "culturally sustainable," i.e. the actions are not becoming embedded within farming…

  2. Tunneling and the Emergent Universe Scheme

    NASA Astrophysics Data System (ADS)

    Labraña, Pedro

    We present an alternative scheme for an Emergent Universe scenario, developed previously in Phys. Rev. D 86, 083524 (2012), where the universe is initially in a static state supported by a scalar field located in a false vacuum. The universe begins to evolve when, by quantum tunneling, the scalar field decays into a state of true vacuum.

  3. [Modern scheme for the diagnosis of staphylococci].

    PubMed

    Skalka, B

    1985-08-01

    A simplified scheme for the subdivision of coagulase-positive staphylococci and another simplified scheme for the diagnostics of coagulase-negative species were worked out. On the basis of the production of staphylokinase, coagulation of human and bovine plasma, acetoin production from glucose, and growth on agar with crystal violet, it is possible to identify S. aureus with its biovars A, B, C1, C2, D, as well as S. intermedius. The coagulase-negative species can be diagnosed according to their sensitivity to novobiocin, nitrate reduction, fermentation of maltose, sucrose, salicin, xylose, trehalose, mannitol and mannose, and haemolytic activity. The proposed diagnostic schemes were verified with success on the collection strains and on the 1305 staphylococci strains isolated largely from the bovine mammary gland, from dogs, man and domestic fowl. In S. aureus strains a close correlation was demonstrated between their biotype characteristics and the host species. A similar correlation was determined for S. intermedius. As to the coagulase-negative species, S. epidermidis, S. hominis and S. haemolyticus were diagnosed most frequently. Both schemes represent a reliable, prompt and technically simple method of the diagnostics of the Staphylococcus microorganisms.

  4. Scheme for air treatment in welding workshop

    NASA Astrophysics Data System (ADS)

    Wang, Gang; Wu, Jin

    2017-04-01

    There are two major ways to control the pollution of welding fume which are respectively local purification and comprehensive purification. In this paper, the practical welding workshop at school is taken as an example to realize fume treatment in different training conditions by adopting the scheme in which two major ways are combined.

  5. The MEI Structured Sixth Form Mathematics Scheme.

    ERIC Educational Resources Information Center

    Porkess, Roger

    1991-01-01

    Describes the history and the rationale behind the Structured Sixth Form Scheme, the national secondary school mathematics education program in England, generated by the Mathematics in Education and Industry (MEI) School Project. Discusses the grading system, the implementation schedule, and the advantages of this program that was approved in June…

  6. Fitting coding scheme for image wavelet representation

    NASA Astrophysics Data System (ADS)

    Przelaskowski, Artur

    1998-10-01

    Efficient coding scheme for image wavelet representation in lossy compression scheme is presented. Spatial-frequency hierarchical structure of quantized coefficient and their statistics is analyzed to reduce any redundancy. We applied context-based linear magnitude predictor to fit 1st order conditional probability model in arithmetic coding of significant coefficients to local data characteristics and eliminate spatial and inter-scale dependencies. Sign information is also encoded by inter and intra-band prediction and entropy coding of prediction errors. But main feature of our algorithm deals with encoding way of zerotree structures. Additional symbol of zerotree root is included into magnitude data stream. Moreover, four neighbor zerotree roots with significant parent node are included in extended high-order context model of zerotrees. This significant parent is signed as significant zerotree root and information about these roots distribution is coded separately. The efficiency of presented coding scheme was tested in dyadic wavelet decomposition scheme with two quantization procedures. Simple scalar uniform quantizer and more complex space-frequency quantizer with adaptive data thresholding were used. The final results seem to be promising and competitive across the most effective wavelet compression methods.

  7. Experimental Evaluation of LIDAR Data Visualization Schemes

    NASA Astrophysics Data System (ADS)

    Ghosh, S.; Lohan, B.

    2012-07-01

    LiDAR (Light Detection and Ranging) has attained the status of an industry standard method of data collection for gathering three dimensional topographic information. Datasets captured through LiDAR are dense, redundant and are perceivable from multiple directions, which is unlike other geospatial datasets collected through conventional methods. This three dimensional information has triggered an interest in the scientific community to develop methods for visualizing LiDAR datasets and value added products. Elementary schemes of visualization use point clouds with intensity or colour, triangulation and tetrahedralization based terrain models draped with texture. Newer methods use feature extraction either through the process of classification or segmentation. In this paper, the authors have conducted a visualization experience survey where 60 participants respond to a questionnaire. The questionnaire poses six different questions on the qualities of feature perception and depth for 12 visualization schemes. The answers to these questions are obtained on a scale of 1 to 10. Results are thus presented using the non-parametric Friedman's test, using post-hoc analysis for hypothetically ranking the visualization schemes based on the rating received and finally confirming the rankings through the Page's trend test. Results show that a heuristic based visualization scheme, which has been developed by Ghosh and Lohani (2011) performs the best in terms of feature and depth perception.

  8. Creating Culturally Sustainable Agri-Environmental Schemes

    ERIC Educational Resources Information Center

    Burton, Rob J. F.; Paragahawewa, Upananda Herath

    2011-01-01

    Evidence is emerging from across Europe that contemporary agri-environmental schemes are having only limited, if any, influence on farmers' long-term attitudes towards the environment. In this theoretical paper we argue that these approaches are not "culturally sustainable," i.e. the actions are not becoming embedded within farming…

  9. Configuration-Control Scheme Copes With Singularities

    NASA Technical Reports Server (NTRS)

    Seraji, Homayoun; Colbaugh, Richard D.

    1993-01-01

    Improved configuration-control scheme for robotic manipulator having redundant degrees of freedom suppresses large joint velocities near singularities, at expense of small trajectory errors. Provides means to enforce order of priority of tasks assigned to robot. Basic concept of configuration control of redundant robot described in "Increasing The Dexterity Of Redundant Robots" (NPO-17801).

  10. How Can Conceptual Schemes Change Teaching?

    ERIC Educational Resources Information Center

    Wickman, Per-Olof

    2012-01-01

    Lundqvist, Almqvist and Ostman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the "epistemological moves",…

  11. Quantum Walk Schemes for Universal Quantum Computation

    NASA Astrophysics Data System (ADS)

    Underwood, Michael S.

    Random walks are a powerful tool for the efficient implementation of algorithms in classical computation. Their quantum-mechanical analogues, called quantum walks, hold similar promise. Quantum walks provide a model of quantum computation that has recently been shown to be equivalent in power to the standard circuit model. As in the classical case, quantum walks take place on graphs and can undergo discrete or continuous evolution, though quantum evolution is unitary and therefore deterministic until a measurement is made. This thesis considers the usefulness of continuous-time quantum walks to quantum computation from the perspectives of both their fundamental power under various formulations, and their applicability in practical experiments. In one extant scheme, logical gates are effected by scattering processes. The results of an exhaustive search for single-qubit operations in this model are presented. It is shown that the number of distinct operations increases exponentially with the number of vertices in the scattering graph. A catalogue of all graphs on up to nine vertices that implement single-qubit unitaries at a specific set of momenta is included in an appendix. I develop a novel scheme for universal quantum computation called the discontinuous quantum walk, in which a continuous-time quantum walker takes discrete steps of evolution via perfect quantum state transfer through small 'widget' graphs. The discontinuous quantum-walk scheme requires an exponentially sized graph, as do prior discrete and continuous schemes. To eliminate the inefficient vertex resource requirement, a computation scheme based on multiple discontinuous walkers is presented. In this model, n interacting walkers inhabiting a graph with 2n vertices can implement an arbitrary quantum computation on an input of length n, an exponential savings over previous universal quantum walk schemes. This is the first quantum walk scheme that allows for the application of quantum error correction

  12. LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica

    NASA Astrophysics Data System (ADS)

    Caprio, M. A.

    2005-09-01

    LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.

  13. Phase II Evaluation of Clinical Coding Schemes

    PubMed Central

    Campbell, James R.; Carpenter, Paul; Sneiderman, Charles; Cohn, Simon; Chute, Christopher G.; Warren, Judith

    1997-01-01

    Abstract Objective: To compare three potential sources of controlled clinical terminology (READ codes version 3.1, SNOMED International, and Unified Medical Language System (UMLS) version 1.6) relative to attributes of completeness, clinical taxonomy, administrative mapping, term definitions and clarity (duplicate coding rate). Methods: The authors assembled 1929 source concept records from a variety of clinical information taken from four medical centers across the United States. The source data included medical as well as ample nursing terminology. The source records were coded in each scheme by an investigator and checked by the coding scheme owner. The codings were then scored by an independent panel of clinicians for acceptability. Codes were checked for definitions provided with the scheme. Codes for a random sample of source records were analyzed by an investigator for “parent” and “child” codes within the scheme. Parent and child pairs were scored by an independent panel of medical informatics specialists for clinical acceptability. Administrative and billing code mapping from the published scheme were reviewed for all coded records and analyzed by independent reviewers for accuracy. The investigator for each scheme exhaustively searched a sample of coded records for duplications. Results: SNOMED was judged to be significantly more complete in coding the source material than the other schemes (SNOMED* 70%; READ 57%; UMLS 50%; *p <.00001). SNOMED also had a richer clinical taxonomy judged by the number of acceptable first-degree relatives per coded concept (SNOMED* 4.56; UMLS 3.17; READ 2.14, *p <.005). Only the UMLS provided any definitions; these were found for 49% of records which had a coding assignment. READ and UMLS had better administrative mappings (composite score: READ* 40.6%; UMLS* 36.1%; SNOMED 20.7%, *p <. 00001), and SNOMED had substantially more duplications of coding assignments (duplication rate: READ 0%; UMLS 4.2%; SNOMED* 13.9%, *p

  14. High-resolution schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Harten, A.

    1982-01-01

    A class of new explicit second order accurate finite difference schemes for the computation of weak solutions of hyperbolic conservation laws is presented. These highly nonlinear schemes are obtained by applying a nonoscillatory first order accurae scheme to an appropriately modified flux function. The so derived second order accurate schemes achieve high resolution while preserving the robustness of the original nonoscillatory first order accurate scheme.

  15. Simple Numerical Schemes for the Korteweg-deVries Equation

    SciTech Connect

    C. J. McKinstrie; M. V. Kozlov

    2000-12-01

    Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves.

  16. Finite difference schemes for long-time integration

    NASA Technical Reports Server (NTRS)

    Haras, Zigo; Taasan, Shlomo

    1993-01-01

    Finite difference schemes for the evaluation of first and second derivatives are presented. These second order compact schemes were designed for long-time integration of evolution equations by solving a quadratic constrained minimization problem. The quadratic cost function measures the global truncation error while taking into account the initial data. The resulting schemes are applicable for integration times fourfold, or more, longer than similar previously studied schemes. A similar approach was used to obtain improved integration schemes.

  17. A novel secret image sharing scheme based on chaotic system

    NASA Astrophysics Data System (ADS)

    Li, Li; Abd El-Latif, Ahmed A.; Wang, Chuanjun; Li, Qiong; Niu, Xiamu

    2012-04-01

    In this paper, we propose a new secret image sharing scheme based on chaotic system and Shamir's method. The new scheme protects the shadow images with confidentiality and loss-tolerance simultaneously. In the new scheme, we generate the key sequence based on chaotic system and then encrypt the original image during the sharing phase. Experimental results and analysis of the proposed scheme demonstrate a better performance than other schemes and confirm a high probability to resist brute force attack.

  18. Uplink Access Schemes for LTE-Advanced

    NASA Astrophysics Data System (ADS)

    Liu, Le; Inoue, Takamichi; Koyanagi, Kenji; Kakura, Yoshikazu

    The 3GPP LTE-Advanced has been attracting much attention recently, where the channel bandwidth would be beyond the maximum bandwidth of LTE, 20MHz. In LTE, single carrier-frequency division multiple access (SC-FDMA) was accepted as the uplink access scheme due to its advantage of very low cubic metric (CM). For LTE-A wideband transmission, multicarrier access would be more effective than single carrier access to make use of multi-user diversity and can maintain the physical channel structure of LTE, where the control information is transmitted on the edges of each 20MHz. In this paper, we discuss the access schemes in bandwidth under 20MHz as well as over 20MHz. In the case of bandwidth under 20MHz, we propose the access schemes allowing discontinuous resource allocation to enhance average throughput while maintaining cell-edge user throughput, that is, DFT-spread-OFDM with spectrum division control (SDC) and adaptive selection of SC-FDMA and OFDM (SC+OFDM). The number of discontinuous spectrums is denoted as spectrum division (SD). For DFT-S-OFDM, we define a parameter max SD as the upper limit of SD. We evaluate our proposed schemes in bandwidth under 20MHz and find that SC+OFDM as well as SDC with common max SD or UE-specific max SD can improve average throughput while their cell-edge user throughput can approach that of SC-FDMA. In the case of bandwidth over 20MHz, we consider key factors to decide a feasible access scheme for aggregating several 20MHz-wide bands.

  19. Electricity storage using a thermal storage scheme

    NASA Astrophysics Data System (ADS)

    White, Alexander

    2015-01-01

    The increasing use of renewable energy technologies for electricity generation, many of which have an unpredictably intermittent nature, will inevitably lead to a greater demand for large-scale electricity storage schemes. For example, the expanding fraction of electricity produced by wind turbines will require either backup or storage capacity to cover extended periods of wind lull. This paper describes a recently proposed storage scheme, referred to here as Pumped Thermal Storage (PTS), and which is based on "sensible heat" storage in large thermal reservoirs. During the charging phase, the system effectively operates as a high temperature-ratio heat pump, extracting heat from a cold reservoir and delivering heat to a hot one. In the discharge phase the processes are reversed and it operates as a heat engine. The round-trip efficiency is limited only by process irreversibilities (as opposed to Second Law limitations on the coefficient of performance and the thermal efficiency of the heat pump and heat engine respectively). PTS is currently being developed in both France and England. In both cases, the schemes operate on the Joule-Brayton (gas turbine) cycle, using argon as the working fluid. However, the French scheme proposes the use of turbomachinery for compression and expansion, whereas for that being developed in England reciprocating devices are proposed. The current paper focuses on the impact of the various process irreversibilities on the thermodynamic round-trip efficiency of the scheme. Consideration is given to compression and expansion losses and pressure losses (in pipe-work, valves and thermal reservoirs); heat transfer related irreversibility in the thermal reservoirs is discussed but not included in the analysis. Results are presented demonstrating how the various loss parameters and operating conditions influence the overall performance.

  20. Electricity storage using a thermal storage scheme

    SciTech Connect

    White, Alexander

    2015-01-22

    The increasing use of renewable energy technologies for electricity generation, many of which have an unpredictably intermittent nature, will inevitably lead to a greater demand for large-scale electricity storage schemes. For example, the expanding fraction of electricity produced by wind turbines will require either backup or storage capacity to cover extended periods of wind lull. This paper describes a recently proposed storage scheme, referred to here as Pumped Thermal Storage (PTS), and which is based on “sensible heat” storage in large thermal reservoirs. During the charging phase, the system effectively operates as a high temperature-ratio heat pump, extracting heat from a cold reservoir and delivering heat to a hot one. In the discharge phase the processes are reversed and it operates as a heat engine. The round-trip efficiency is limited only by process irreversibilities (as opposed to Second Law limitations on the coefficient of performance and the thermal efficiency of the heat pump and heat engine respectively). PTS is currently being developed in both France and England. In both cases, the schemes operate on the Joule-Brayton (gas turbine) cycle, using argon as the working fluid. However, the French scheme proposes the use of turbomachinery for compression and expansion, whereas for that being developed in England reciprocating devices are proposed. The current paper focuses on the impact of the various process irreversibilities on the thermodynamic round-trip efficiency of the scheme. Consideration is given to compression and expansion losses and pressure losses (in pipe-work, valves and thermal reservoirs); heat transfer related irreversibility in the thermal reservoirs is discussed but not included in the analysis. Results are presented demonstrating how the various loss parameters and operating conditions influence the overall performance.

  1. Scheme for Quantum Computing Immune to Decoherence

    NASA Technical Reports Server (NTRS)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report

  2. How might a statistical cloud scheme be coupled to a mass-flux convection scheme?

    SciTech Connect

    Klein, Stephen A.; Pincus, Robert; Hannay, Cecile; Xu, Kuan-man

    2004-09-27

    The coupling of statistical cloud schemes with mass-flux convection schemes is addressed. Source terms representing the impact of convection are derived within the framework of prognostic equations for the width and asymmetry of the probability distribution function of total water mixing ratio. The accuracy of these source terms is quantified by examining output from a cloud resolving model simulation of deep convection. Practical suggestions for inclusion of these source terms in large-scale models are offered.

  3. An authentication scheme for secure access to healthcare services.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  4. New communication schemes based on adaptive synchronization.

    PubMed

    Yu, Wenwu; Cao, Jinde; Wong, Kwok-Wo; Lü, Jinhu

    2007-09-01

    In this paper, adaptive synchronization with unknown parameters is discussed for a unified chaotic system by using the Lyapunov method and the adaptive control approach. Some communication schemes, including chaotic masking, chaotic modulation, and chaotic shift key strategies, are then proposed based on the modified adaptive method. The transmitted signal is masked by chaotic signal or modulated into the system, which effectively blurs the constructed return map and can resist this return map attack. The driving system with unknown parameters and functions is almost completely unknown to the attackers, so it is more secure to apply this method into the communication. Finally, some simulation examples based on the proposed communication schemes and some cryptanalysis works are also given to verify the theoretical analysis in this paper.

  5. Approximate particle spectra in the pyramid scheme

    NASA Astrophysics Data System (ADS)

    Banks, Tom; Torres, T. J.

    2012-12-01

    We construct a minimal model inspired by the general class of pyramid schemes [T. Banks and J.-F. Fortin, J. High Energy Phys. 07 (2009) 046JHEPFG1029-8479], which is consistent with both supersymmetry breaking and electroweak symmetry breaking. In order to do computations, we make unjustified approximations to the low energy Kähler potential. The phenomenological viability of the resultant mass spectrum is then examined and compared with current collider limits. We show that for certain regimes of parameters, the model, and thus generically the pyramid scheme, can accommodate the current collider mass constraints on physics beyond the standard model with a tree-level light Higgs mass near 125 GeV. However, in this regime the model exhibits a little hierarchy problem, and one must permit fine-tunings that are of order 5%.

  6. Multigrid solutions to quasi-elliptic schemes

    NASA Technical Reports Server (NTRS)

    Brandt, A.; Taasan, S.

    1985-01-01

    Quasi-elliptic schemes arise from central differencing or finite element discretization of elliptic systems with odd order derivatives on non-staggered grids. They are somewhat unstable and less accurate then corresponding staggered-grid schemes. When usual multigrid solvers are applied to them, the asymptotic algebraic convergence is necessarily slow. Nevertheless, it is shown by mode analyses and numerical experiments that the usual FMG algorithm is very efficient in solving quasi-elliptic equations to the level of truncation errors. Also, a new type of multigrid algorithm is presented, mode analyzed and tested, for which even the asymptotic algebraic convergence is fast. The essence of that algorithm is applicable to other kinds of problems, including highly indefinite ones.

  7. Signal Processing Schemes for Doppler Global Velocimetry

    NASA Technical Reports Server (NTRS)

    Meyers, James F.; Lee, Joseph W.; Cavone, Angelo A.

    1991-01-01

    Two schemes for processing signals obtained from the Doppler global velocimeter are described. The analog approach is a simple, real time method for obtaining an RS-170 video signal containing the normalized intensity image. Pseudo colors are added using a monochromatic frame grabber producing a standard NTSC video signal that can be monitored and/or recorded. The digital approach is more complicated, but maintains the full resolution of the acquisition cameras with the capabilities to correct the signal image for pixel sensitivity variations and to remove of background light. Prototype circuits for each scheme are described and example results from the investigation of the vortical flow field above a 75-degree delta wing presented.

  8. Trefftz difference schemes on irregular stencils

    SciTech Connect

    Tsukerman, Igor

    2010-04-20

    The recently developed Flexible Local Approximation MEthod (FLAME) produces accurate difference schemes by replacing the usual Taylor expansion with Trefftz functions - local solutions of the underlying differential equation. This paper advances and casts in a general form a significant modification of FLAME proposed recently by Pinheiro and Webb: a least-squares fit instead of the exact match of the approximate solution at the stencil nodes. As a consequence of that, FLAME schemes can now be generated on irregular stencils with the number of nodes substantially greater than the number of approximating functions. The accuracy of the method is preserved but its robustness is improved. For demonstration, the paper presents a number of numerical examples in 2D and 3D: electrostatic (magnetostatic) particle interactions, scattering of electromagnetic (acoustic) waves, and wave propagation in a photonic crystal. The examples explore the role of the grid and stencil size, of the number of approximating functions, and of the irregularity of the stencils.

  9. The Linear Bicharacteristic Scheme for Electromagnetics

    NASA Technical Reports Server (NTRS)

    Beggs, John H.

    2001-01-01

    The upwind leapfrog or Linear Bicharacteristic Scheme (LBS) has previously been implemented and demonstrated on electromagnetic wave propagation problems. This paper extends the Linear Bicharacteristic Scheme for computational electromagnetics to model lossy dielectric and magnetic materials and perfect electrical conductors. This is accomplished by proper implementation of the LBS for homogeneous lossy dielectric and magnetic media and for perfect electrical conductors. Heterogeneous media are modeled through implementation of surface boundary conditions and no special extrapolations or interpolations at dielectric material boundaries are required. Results are presented for one-dimensional model problems on both uniform and nonuniform grids, and the FDTD algorithm is chosen as a convenient reference algorithm for comparison. The results demonstrate that the explicit LBS is a dissipation-free, second-order accurate algorithm which uses a smaller stencil than the FDTD algorithm, yet it has approximately one-third the phase velocity error. The LBS is also more accurate on nonuniform grids.

  10. A multivariable control scheme for robot manipulators

    NASA Technical Reports Server (NTRS)

    Tarokh, M.; Seraji, H.

    1991-01-01

    The article puts forward a simple scheme for multivariable control of robot manipulators to achieve trajectory tracking. The scheme is composed of an inner loop stabilizing controller and an outer loop tracking controller. The inner loop utilizes a multivariable PD controller to stabilize the robot by placing the poles of the linearized robot model at some desired locations. The outer loop employs a multivariable PID controller to achieve input-output decoupling and trajectory tracking. The gains of the PD and PID controllers are related directly to the linearized robot model by simple closed-form expressions. The controller gains are updated on-line to cope with variations in the robot model during gross motion and for payload change. Alternatively, the use of high gain controllers for gross motion and payload change is discussed. Computer simulation results are given for illustration.

  11. CUP-syndrome diagnostic procedure scheme.

    PubMed

    Pujanek, Zuzanna; Burduk, Paweł K

    2013-01-01

    Patients with CUP-Syndrome represent a small percentage of patients treated by ENT doctor. Often, in spite of the implementation detailed diagnostics, detection of the primary tumor fails. Very important element is to follow the correct sequence of tests and taking into account conditions outside ENT. I our article, we would like to propose a diagnostic scheme including interview with patient, laryngological and imaging tests and multi-disciplinary consulting. We hope that this scheme will facilitate the treatment of patients with CUP-Syndrome and increase the efficiency of detection of primary tumor. Copyright © 2013 Polish Otorhinolaryngology - Head and Neck Surgery Society. Published by Elsevier Urban & Partner Sp. z.o.o. All rights reserved.

  12. Improving the accuracy of central difference schemes

    NASA Technical Reports Server (NTRS)

    Turkel, Eli

    1988-01-01

    General difference approximations to the fluid dynamic equations require an artificial viscosity in order to converge to a steady state. This artificial viscosity serves two purposes. One is to suppress high frequency noise which is not damped by the central differences. The second purpose is to introduce an entropy-like condition so that shocks can be captured. These viscosities need a coefficient to measure the amount of viscosity to be added. In the standard scheme, a scalar coefficient is used based on the spectral radius of the Jacobian of the convective flux. However, this can add too much viscosity to the slower waves. Hence, it is suggested that a matrix viscosity be used. This gives an appropriate viscosity for each wave component. With this matrix valued coefficient, the central difference scheme becomes closer to upwind biased methods.

  13. The Scheme of Beam Synchronization in MEIC

    SciTech Connect

    Zhang, Yuhong; Derbenev, Yaroslav S.; Hutton, Andrew M.

    2013-06-01

    Synchronizing colliding beams at single or multiple collision points is a critical R&D issue in the design of a medium energy electron-ion collider (MEIC) at Jefferson Lab. The path-length variation due to changes in the ion energy, which varies over 20 to 100 GeV, could be more than several times the bunch spacing. The scheme adopted in the present MEIC baseline is centered on varying the number of bunches (i.e., harmonic number) stored in the collider ring. This could provide a set of discrete energies for proton or ions such that the beam synchronization condition is satisfied. To cover the ion energy between these synchronized values, we further propose to vary simultaneously the electron ring circumference and the frequency of the RF systems in both collider rings. We also present in this paper the requirement of frequency tunability of SRF cavities to support the scheme.

  14. Iterated upwind schemes for gas dynamics

    NASA Astrophysics Data System (ADS)

    Smolarkiewicz, Piotr K.; Szmelter, Joanna

    2009-01-01

    A class of high-resolution schemes established in integration of anelastic equations is extended to fully compressible flows, and documented for unsteady (and steady) problems through a span of Mach numbers from zero to supersonic. The schemes stem from iterated upwind technology of the multidimensional positive definite advection transport algorithm (MPDATA). The derived algorithms employ standard and modified forms of the equations of gas dynamics for conservation of mass, momentum and either total or internal energy as well as potential temperature. Numerical examples from elementary wave propagation, through computational aerodynamics benchmarks, to atmospheric small- and large-amplitude acoustics with intricate wave-flow interactions verify the approach for both structured and unstructured meshes, and demonstrate its flexibility and robustness.

  15. Multiple Access Schemes for Lunar Missions

    NASA Technical Reports Server (NTRS)

    Deutsch, Leslie; Hamkins, Jon; Stocklin, Frank J.

    2010-01-01

    Two years ago, the NASA Coding, Modulation, and Link Protocol (CMLP) study was completed. The study, led by the authors of this paper, recommended codes, modulation schemes, and desired attributes of link protocols for all space communication links in NASA's future space architecture. Portions of the NASA CMLP team were reassembled to resolve one open issue: the use of multiple access (MA) communication from the lunar surface. The CMLP-MA team analyzed and simulated two candidate multiple access schemes that were identified in the original CMLP study: Code Division MA (CDMA) and Frequency Division MA (FDMA) based on a bandwidth-efficient Continuous Phase Modulation (CPM) with a superimposed Pseudo-Noise (PN) ranging signal (CPM/PN). This paper summarizes the results of the analysis and simulation of the CMLP-MA study and describes the final recommendations.

  16. Multiple Access Schemes for Lunar Missions

    NASA Technical Reports Server (NTRS)

    Deutsch, Leslie; Hamkins, Jon; Stocklin, Frank J.

    2010-01-01

    Two years ago, the NASA Coding, Modulation, and Link Protocol (CMLP) study was completed. The study, led by the authors of this paper, recommended codes, modulation schemes, and desired attributes of link protocols for all space communication links in NASA's future space architecture. Portions of the NASA CMLP team were reassembled to resolve one open issue: the use of multiple access (MA) communication from the lunar surface. The CMLP-MA team analyzed and simulated two candidate multiple access schemes that were identified in the original CMLP study: Code Division MA (CDMA) and Frequency Division MA (FDMA) based on a bandwidth-efficient Continuous Phase Modulation (CPM) with a superimposed Pseudo-Noise (PN) ranging signal (CPM/PN). This paper summarizes the results of the analysis and simulation of the CMLP-MA study and describes the final recommendations.

  17. Automatic-repeat-request error control schemes

    NASA Technical Reports Server (NTRS)

    Lin, S.; Costello, D. J., Jr.; Miller, M. J.

    1983-01-01

    Error detection incorporated with automatic-repeat-request (ARQ) is widely used for error control in data communication systems. This method of error control is simple and provides high system reliability. If a properly chosen code is used for error detection, virtually error-free data transmission can be attained. Various types of ARQ and hybrid ARQ schemes, and error detection using linear block codes are surveyed.

  18. The Emergent Universe scheme and tunneling

    NASA Astrophysics Data System (ADS)

    Labraña, Pedro

    2014-07-01

    We present an alternative scheme for an Emergent Universe scenario, developed previously in Phys. Rev. D 86, 083524 (2012), where the universe is initially in a static state supported by a scalar field located in a false vacuum. The universe begins to evolve when, by quantum tunneling, the scalar field decays into a state of true vacuum. The Emergent Universe models are interesting since they provide specific examples of non-singular inflationary universes.

  19. Development of new flux splitting schemes

    NASA Technical Reports Server (NTRS)

    Liou, MENG-S.; Steffen, Christopher J., Jr.

    1991-01-01

    Maximizing both accuracy and efficiency has been the primary objective in designing a numerical algorithm for CFD. This is especially important for solution of complex three-dimensional systems of Navier-Stokes equations which often include turbulence modeling and chemistry effects. Recently, upwind schemes have been well received for both their capability of resolving discontinuities and their sound theoretical basis in characteristic theory for hyperbolic systems. With this in mind, two new flux splitting techniques are presented for upwind differencing.

  20. Vector Meson Property in Covariant Classification Scheme

    NASA Astrophysics Data System (ADS)

    Oda, Masuho

    2004-08-01

    Recently our collaboration group has proposed the covariant classification shceme of hadrons, leading to possible existence of two ground state vector mesons. One is corresponding to ordinary ρ nonet and the other is extra ρ nonet. We investigate the decay property of ω(1250) and ρ(1250) in the covariant classification scheme. And it is shown that ω(1250) is promising candidate of our extra ω meson.

  1. The Emergent Universe scheme and tunneling

    SciTech Connect

    Labraña, Pedro

    2014-07-23

    We present an alternative scheme for an Emergent Universe scenario, developed previously in Phys. Rev. D 86, 083524 (2012), where the universe is initially in a static state supported by a scalar field located in a false vacuum. The universe begins to evolve when, by quantum tunneling, the scalar field decays into a state of true vacuum. The Emergent Universe models are interesting since they provide specific examples of non-singular inflationary universes.

  2. A continuous buoyancy based convection scheme

    NASA Astrophysics Data System (ADS)

    Guérémy, J.-F.

    2009-04-01

    A new and consistent convection scheme, providing a continuous treatment of this atmospheric process, is described. The main concept ensuring the consistency of the whole system is the buoyancy, key element of any vertical motion. The buoyancy constitutes the forcing term of the convective vertical velocity, which is then used to define the triggering condition, the mass flux, and the rates of entrainment-detrainment. The buoyancy is also used in its vertically integrated form (CAPE) to determine the closure condition. The continuous treatment of convection, from dry thermals to deep precipitating convection, is achieved with the help of a continuous formulation of the entrainment-detrainment rates (depending on the convective vertical velocity) and of the CAPE relaxation time (depending on the convective over-turning time). A Single Column Model (SCM) validation of this scheme is shown, allowing detailed comparisons with observed and explicitly simulated data. Four cases covering the convective spectrum are considered: over ocean, deep convection (TOGA), trade wind shallow convection (BOMEX) and strato-cumulus (FIRE), together with a entire continental diurnal cycle of convection (ARM). The emphasis is put on the characteristics of the scheme which enable a continuous treatment of convection. A General Circulation Model (GCM) 23-year simulation is also presented in order to assess the model climate against the observed one.

  3. Progress on Implementing Additional Physics Schemes into ...

    EPA Pesticide Factsheets

    The U.S. Environmental Protection Agency (USEPA) has a team of scientists developing a next generation air quality modeling system employing the Model for Prediction Across Scales – Atmosphere (MPAS-A) as its meteorological foundation. Several preferred physics schemes and options available in the Weather Research and Forecasting (WRF) model are regularly used by the USEPA with the Community Multiscale Air Quality (CMAQ) model to conduct retrospective air quality simulations. These include the Pleim surface layer, the Pleim-Xiu (PX) land surface model with fractional land use for a 40-class National Land Cover Database (NLCD40), the Asymmetric Convective Model 2 (ACM2) planetary boundary layer scheme, the Kain-Fritsch (KF) convective parameterization with subgrid-scale cloud feedback to the radiation schemes and a scale-aware convective time scale, and analysis nudging four-dimensional data assimilation (FDDA). All of these physics modules and options have already been implemented by the USEPA into MPAS-A v4.0, tested, and evaluated (please see the presentations of R. Gilliam and R. Bullock at this workshop). Since the release of MPAS v5.1 in May 2017, work has been under way to implement these preferred physics options into the MPAS-A v5.1 code. Test simulations of a summer month are being conducted on a global variable resolution mesh with the higher resolution cells centered over the contiguous United States. Driving fields for the FDDA and soil nudging are

  4. Sustainability of effluent irrigation schemes: Measurable definition

    SciTech Connect

    Hu, X.

    1997-09-01

    Traditionally water requirements and nutrient removal capacity by plants are considered as the main design criteria of effluent irrigation schemes. Environmental impacts of schemes on surface and groundwater pollution, which may be controlling factors in some circumstances, have not been considered in the design process. In this paper the implication of the sustainability for effluent irrigation schemes has been identified through investigating the pollutant fate. An index has been developed to measure the sustainability status. A dynamic simulation model of the soil-plant system was used to predict the pollutant export to surface runoff and ground water. Pollutant accumulation in the soil profile was also predicted by the model. The traditional design procedure has been extended using the sustainable index as a design criterion and the simulation model for data generation. The application of sustainable concept and index was demonstrated through a test case. Ground-water pollution was found to be the controlling factor instead of water requirement and nutrient removal capacity in this case.

  5. A hybrid scheme for encryption and watermarking

    NASA Astrophysics Data System (ADS)

    Xu, Xiaowei; Dexter, Scott D.; Eskicioglu, Ahmet M.

    2004-06-01

    Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encryption techniques. In this paper, we present a hybrid image protection scheme to establish a relation between the data encryption key and the watermark. Prepositioned secret sharing allows the reconstruction of different encryption keys by communicating different activating shares for the same prepositioned information. Each activating share is used by the receivers to generate a fresh content decryption key. In the proposed scheme, the activating share is used to carry copyright or usage rights data. The bit stream that represents this data is also embedded in the content as a visual watermark. When the encryption key needs to change, the data source generates a new activating share, and embeds the corresponding watermark into the multimedia stream. Before transmission, the composite stream is encrypted with the key constructed from the new activating share. Each receiver can decrypt the stream after reconstructing the same key, and extract the watermark from the image. Our presentation will include the application of the scheme to a test image, and a discussion on the data hiding capacity, watermark transparency, and robustness to common attacks.

  6. An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments

    NASA Astrophysics Data System (ADS)

    Jeon, Woongryul; Kim, Jeeyeon; Nam, Junghyun; Lee, Youngsook; Won, Dongho

    As anonymity increasingly becomes a necessary and legitimate aim in many applications, a number of anonymous authentication schemes have been suggested over the years. Among the many schemes is Lee and Kwon's password-based authentication scheme for wireless environments. Compared with previous schemes, Lee and Kwon's scheme not only improves anonymity by employing random temporary IDs but also provides user-friendliness by allowing human-memorable passwords. In this letter, we point out that Lee and Kwon's scheme, despite its many merits, is vulnerable to off-line password guessing attacks and a forgery attack. In addition, we show how to eliminate these vulnerabilities.

  7. A weak blind signature scheme based on quantum cryptography

    NASA Astrophysics Data System (ADS)

    Wen, Xiaojun; Niu, Xiamu; Ji, Liping; Tian, Yuan

    2009-02-01

    In this paper, we present a weak blind signature scheme based on the correlation of EPR (Einstein-Padolsky-Rosen) pairs. Different from classical blind signature schemes and current quantum signature schemes, our quantum blind signature scheme could guarantee not only the unconditionally security but also the anonymity of the message owner. To achieve that, quantum key distribution and one-time pad are adopted in our scheme. Experimental analysis proved that our scheme have the characteristics of non-counterfeit, non-disavowal, blindness and traceability. It has a wide application to E-payment system, E-government, E-business, and etc.

  8. Efficient hop by hop buffer class flow control schemes

    NASA Astrophysics Data System (ADS)

    Chen, Moo-Song; Kadaba, Bharath; Grover, George

    Design issues of hop-by-hop buffer class flow-control schemes are discussed. They are: (1) good window size for high-speed and large-propagation-delay environments and (2) the concept of congestion and access fairness. Schemes are proposed for buffer classification and window-size adjustment. A novel buffer classification, the path-based scheme, has the same fairness property but fewer classes than the route-based scheme. The window adjustment shceme, the quasistatic scheme, has similar or slightly worse performance to, but requires much less complexity than, dynamic schemes.

  9. Uncertainty of Microphysics Schemes in CRMs

    NASA Astrophysics Data System (ADS)

    Tao, W. K.; van den Heever, S. C.; Wu, D.; Saleeby, S. M.; Lang, S. E.

    2015-12-01

    Microphysics is the framework through which to understand the links between interactive aerosol, cloud and precipitation processes. These processes play a critical role in the water and energy cycle. CRMs with advanced microphysics schemes have been used to study the interaction between aerosol, cloud and precipitation processes at high resolution. But, there are still many uncertainties associated with these microphysics schemes. This has arisen, in part, from the fact microphysical processes cannot be measured directly; instead, cloud properties, which can be measured, are and have been used to validate model results. The utilization of current and future global high-resolution models is rapidly increasing and are at what has been traditional CRM resolutions and are using microphysics schemes that were developed in traditional CRMs. A potential NASA satellite mission called the Cloud and Precipitation Processes Mission (CaPPM) is currently being planned for submission to the NASA Earth Science Decadal Survey. This mission could provide the necessary global estimates of cloud and precipitation properties with which to evaluate and improve dynamical and microphysical parameterizations and the feedbacks. In order to facilitate the development of this mission, CRM simulations have been conducted to identify microphysical processes responsible for the greatest uncertainties in CRMs. In this talk, we will present results from numerical simulations conducted using two CRMs (NU-WRF and RAMS) with different dynamics, radiation, land surface and microphysics schemes. Specifically, we will conduct sensitivity tests to examine the uncertainty of the some of the key ice processes (i.e. riming, melting, freezing and shedding) in these two-microphysics schemes. The idea is to quantify how these two different models' respond (surface rainfall and its intensity, strength of cloud drafts, LWP/IWP, convective-stratiform-anvil area distribution) to changes of these key ice

  10. Multidimensional explicit difference schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Van Leer, B.

    1984-01-01

    First- and second-order explicit difference schemes are derived for a three-dimensional hyperbolic system of conservation laws, without recourse to dimensional factorization. All schemes are upwind biased and optimally stable.

  11. Multidimensional explicit difference schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Vanleer, B.

    1983-01-01

    First and second order explicit difference schemes are derived for a three dimensional hyperbolic system of conservation laws, without recourse to dimensional factorization. All schemes are upwind (backward) biased and optimally stable.

  12. An efficient and provably secure proxy signature scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Jianhong; Liu, Xue; Gao, Shengnan

    2010-08-01

    Proxy signature is a special signature, it allows an original signer to delegate her signing capability to a proxy signer and the proxy signer can produce a signature on behalf of the original signer. At present, most of proxy signature in essence consists of two signatures. To overcome the problem, we propose a short efficient proxy signature scheme based on a certificateless signature scheme. And we show that the proposed scheme is secure in the random oracle model. The security of the scheme is related to Inverse Computational Diffie-Hellman Problem and the k-CCA problem. Comparison with Huang et.al scheme, our scheme has an advantage over Huang et.al's scheme in terms of the size of proxy signature. Since the length of proxy signature in our scheme is 160bit, it is very suitable for mobile devices.

  13. Minimal dissipation hybrid bicompact schemes for hyperbolic equations

    NASA Astrophysics Data System (ADS)

    Bragin, M. D.; Rogov, B. V.

    2016-06-01

    New monotonicity-preserving hybrid schemes are proposed for multidimensional hyperbolic equations. They are convex combinations of high-order accurate central bicompact schemes and upwind schemes of first-order accuracy in time and space. The weighting coefficients in these combinations depend on the local difference between the solutions produced by the high- and low-order accurate schemes at the current space-time point. The bicompact schemes are third-order accurate in time, while having the fourth order of accuracy and the first difference order in space. At every time level, they can be solved by marching in each spatial variable without using spatial splitting. The upwind schemes have minimal dissipation among all monotone schemes constructed on a minimum space-time stencil. The hybrid schemes constructed has been successfully tested as applied to a number of two-dimensional gas dynamics benchmark problems.

  14. Parallelization of implicit finite difference schemes in computational fluid dynamics

    NASA Technical Reports Server (NTRS)

    Decker, Naomi H.; Naik, Vijay K.; Nicoules, Michel

    1990-01-01

    Implicit finite difference schemes are often the preferred numerical schemes in computational fluid dynamics, requiring less stringent stability bounds than the explicit schemes. Each iteration in an implicit scheme involves global data dependencies in the form of second and higher order recurrences. Efficient parallel implementations of such iterative methods are considerably more difficult and non-intuitive. The parallelization of the implicit schemes that are used for solving the Euler and the thin layer Navier-Stokes equations and that require inversions of large linear systems in the form of block tri-diagonal and/or block penta-diagonal matrices is discussed. Three-dimensional cases are emphasized and schemes that minimize the total execution time are presented. Partitioning and scheduling schemes for alleviating the effects of the global data dependencies are described. An analysis of the communication and the computation aspects of these methods is presented. The effect of the boundary conditions on the parallel schemes is also discussed.

  15. Invariant Discretization Schemes Using Evolution-Projection Techniques

    NASA Astrophysics Data System (ADS)

    Bihlo, Alexander; Nave, Jean-Christophe

    2013-08-01

    Finite difference discretization schemes preserving a subgroup of the maximal Lie invariance group of the one-dimensional linear heat equation are determined. These invariant schemes are constructed using the invariantization procedure for non-invariant schemes of the heat equation in computational coordinates. We propose a new methodology for handling moving discretization grids which are generally indispensable for invariant numerical schemes. The idea is to use the invariant grid equation, which determines the locations of the grid point at the next time level only for a single integration step and then to project the obtained solution to the regular grid using invariant interpolation schemes. This guarantees that the scheme is invariant and allows one to work on the simpler stationary grids. The discretization errors of the invariant schemes are established and their convergence rates are estimated. Numerical tests are carried out to shed some light on the numerical p! roperties of invariant discretization schemes using the proposed evolution-projection strategy.

  16. Scanning schemes in white light photoelasticity - Part II: Novel fringe resolution guided scanning scheme

    NASA Astrophysics Data System (ADS)

    Ramakrishnan, Vivek; Ramesh, K.

    2017-05-01

    Varied spatial resolution of isochromatic fringes over the domain influences the accuracy of fringe order estimation using TFP/RGB photoelasticity. This has been brought out in the first part of the work. The existing scanning schemes do not take this into account, which leads to the propagation of noise from the low spatial resolution zones. In this paper, a method is proposed for creating a whole field map which represents the spatial resolution of the isochromatic fringe pattern. A novel scanning scheme is then proposed whose progression is guided by the spatial resolution of the fringes in the isochromatic image. The efficacy of the scanning scheme is demonstrated using three problems - an inclined crack under bi-axial loading, a thick ring subjected to internal pressure and a stress frozen specimen of an aerospace component. The proposed scheme has use in a range of applications. The scanning scheme is effective even if the model has random zones of noise which is demonstrated using a plate subjected to concentrated load. This aspect is well utilised to extract fringe data from thin slices cut from a stereo-lithographic model that has characteristic random noise due to layered manufacturing.

  17. Security Analysis of Liu-Li Digital Signature Scheme

    NASA Astrophysics Data System (ADS)

    Liu, Chenglian; Zhang, Jianghong; Deng, Shaoyi

    In 2008, Liu and Li proposed a digital signature scheme without using one-way hash function and message redundancy. They claimed their scheme are more efficient in computation and communication for small device. In this paper, we will point out an new attack to certain the Liu-Li scheme is insecure. Then we give an improvement, this scheme is suitable for low power computation and mobile device.

  18. Dually-Perturbed Matsumoto-Imai Signature (DPMS) Scheme

    NASA Astrophysics Data System (ADS)

    Gotaishi, Masahito; Tadaki, Kohtaro; Fujita, Ryo; Tsujii, Shigeo

    A new signature scheme of MPKC is proposed. It is created by perturbing a traditional encryption scheme in two ways. The proposed perturbation polynomials successfully reinforce the Matsumoto-Imai cryptosystem This new signature scheme has a structure very difficult to cryptanalyze. Along with the security against algebraic attacks, its security against existing attacks is discussed. The experimental data imply that the scheme can create a both lightweight and secure signature system.

  19. Tailoring explicit time-marching schemes to improve convergence characteristics

    NASA Technical Reports Server (NTRS)

    Powell, Kenneth G.; Vanleer, Bram

    1990-01-01

    Multi-stage time-stepping schemes, tailored to chosen spatial-differencing operators, are derived and tested. The schemes are constructed to give optimal damping of the high-frequency waves. They are ideal for use with multi-grid acceleration. The concept of characteristic time-stepping, necessary for the extension of the scalar analysis to systems of equations, is presented. The schemes show a marked improvement over Runge-Kutta schemes.

  20. Connection Between the Lattice Boltzmann Equation and the Beam Scheme

    NASA Technical Reports Server (NTRS)

    Xu, Kun; Luo, Li-Shi

    1999-01-01

    In this paper we analyze and compare the lattice Boltzmann equation with the beam scheme in details. We notice the similarity and differences between the lattice Boltzmann equation and the beam scheme. We show that the accuracy of the lattice Boltzmann equation is indeed second order in space. We discuss the advantages and limitations of lattice Boltzmann equation and the beam scheme. Based on our analysis, we propose an improved multi-dimensional beam scheme.

  1. A Gas-Kinetic Scheme for Turbulent Flow

    DTIC Science & Technology

    2014-09-19

    belong to a class of their own of numerical schemes for fluid mechanics. These schemes are neither particle methods, such as DSMC and Molecular...consistent mathematical model of fluid mechanics. Gas-kinetic schemes are more accurate than conventional schemes, and might be able to resolve shock...the heath flux must therefore be corrected for realistic fluids . A number of publications ([Li et al., 2010, Xu et al., 2005, Xuan and Xu, 2012] and

  2. High order discretization schemes for the CIR process

    NASA Astrophysics Data System (ADS)

    Alfonsi, Aurelien

    2010-01-01

    This paper presents weak second and third order schemes for the Cox-Ingersoll-Ross (CIR) process, without any restriction on its parameters. At the same time, it gives a general recursive construction method for getting weak second order schemes that extend the one introduced by Ninomiya and Victoir. Combine both these results, this allows us to propose a second order scheme for more general affine diffusions. Simulation examples are given to illustrate the convergence of these schemes on CIR and Heston models.

  3. Color encryption scheme based on adapted quantum logistic map

    NASA Astrophysics Data System (ADS)

    Zaghloul, Alaa; Zhang, Tiejun; Amin, Mohamed; Abd El-Latif, Ahmed A.

    2014-04-01

    This paper presents a new color image encryption scheme based on quantum chaotic system. In this scheme, a new encryption scheme is accomplished by generating an intermediate chaotic key stream with the help of quantum chaotic logistic map. Then, each pixel is encrypted by the cipher value of the previous pixel and the adapted quantum logistic map. The results show that the proposed scheme has adequate security for the confidentiality of color images.

  4. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under...

  5. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under...

  6. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under...

  7. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under...

  8. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under...

  9. Forgery attack to Kang-Tang digital signature scheme

    NASA Astrophysics Data System (ADS)

    Fang, Jie; Guo, Yongning; Liu, Chenglian

    2014-10-01

    In 2006, Kang and Tang proposed a digital signature scheme without hash functions and message redundancy. They claimed their scheme are more efficient in computation and communication for small device. In this paper, we will point out an new attack to certain the Kang-Tang scheme is insecure.

  10. On the strong monotonicity of the CABARET scheme

    NASA Astrophysics Data System (ADS)

    Ostapenko, V. V.

    2012-03-01

    The strong monotonicity of the CABARET scheme with single flux correction is analyzed as applied to the linear advection equation. It is shown that the scheme is strongly monotone (has the NED property) at Courant numbers r ∈ (0,0,5), for which it is monotone. Test computations illustrating this property of the CABARET scheme are presented.

  11. Analysis of some bivariate non-linear interpolatory subdivision schemes

    NASA Astrophysics Data System (ADS)

    Dadourian, Karine; Liandrat, Jacques

    2008-07-01

    This paper is devoted to the convergence analysis of a class of bivariate subdivision schemes that can be defined as a specific perturbation of a linear subdivision scheme. We study successively the univariate and bivariate case and apply the analysis to the so called Powerp scheme (Serna and Marquina, J Comput Phys 194:632-658, 2004).

  12. Dispersion-relation-preserving schemes for computational aeroacoustics

    NASA Technical Reports Server (NTRS)

    Tam, Christopher K. W.; Webb, Jay C.

    1992-01-01

    Finite difference schemes that have the same dispersion relations as the original partial differential equations are referred to as dispersion-relation-preserving (DRP) schemes. A method to construct time marching DRP schemes by optimizing the finite difference approximations of the space and time derivatives in the wave number and frequency space is presented. A sequence of numerical simulations is then performed.

  13. 7 CFR 1430.610 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.610... Disaster Assistance Payment Program II (DDAP-II) § 1430.610 Misrepresentation and scheme or device. (a) In... this part to any person or operation engaged in a misrepresentation, scheme, or device, must be...

  14. 33 CFR 167.15 - Modification of schemes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    .... (a) A traffic separation scheme or precautionary area described in this Part may be permanently... traffic separation scheme or precautionary area in this Part may be temporarily adjusted by the Commandant... temporary suspension of a section of the scheme, a temporary precautionary area overlaying a lane, or other...

  15. A homomorphic arithmetic scheme on real number with fixed precision

    NASA Astrophysics Data System (ADS)

    Bai, Liwang; Lan, Yuqing

    2017-05-01

    Existing homomorphic encryption schemes are limited in plaintext space, that they cannot be directly applied to actual scenes. Based on the homomorphic encryption scheme of single-bit plaintext, this paper presents a homomorphic arithmetic scheme on multi-bit plaintext, to apply the arithmetic operation of the real number with fixed precision.

  16. Dispersion-relation-preserving schemes for computational aeroacoustics

    NASA Technical Reports Server (NTRS)

    Tam, Christopher K. W.; Webb, Jay C.

    1992-01-01

    Finite difference schemes that have the same dispersion relations as the original partial differential equations are referred to as dispersion-relation-preserving (DRP) schemes. A method to construct time marching DRP schemes by optimizing the finite difference approximations of the space and time derivatives in the wave number and frequency space is presented. A sequence of numerical simulations is then performed.

  17. Taxonomic scheme for the identification of marine bacteria

    NASA Astrophysics Data System (ADS)

    Oliver, James D.

    1982-06-01

    A recently developed taxonomic scheme for the identification of marine bacteria is presented. The scheme is based on numerous reviews and monographs on marine bacteria, as well as Bergey's Manual of Determinative Bacteriology. While fairly extensive, the scheme is designed to identify marine bacteria using relatively few tests.

  18. Developing and Rewarding Excellent Teachers: The Scottish Chartered Teacher Scheme

    ERIC Educational Resources Information Center

    Ingvarson, Lawrence

    2009-01-01

    The Scottish Chartered Teacher Scheme was designed to recognise and reward teachers who attained high standards of practice. The scheme emerged in 2001 as part of an agreement between government, local employing authorities and teacher organisations. Policies such as the chartered teacher scheme aim to benefit students in two main ways: by…

  19. The Pharmaceutical Benefits Scheme 2003-2004.

    PubMed

    Harvey, Ken J

    2005-01-12

    The Pharmaceutical Benefits Scheme (PBS) grew by 8% in 2003-04; a slower rate than the 12.0% pa average growth over the last decade. Nevertheless, the sustainability of the Scheme remained an ongoing concern given an aging population and the continued introduction of useful (but increasingly expensive) new medicines. There was also concern that the Australia-United States Free Trade Agreement could place further pressure on the Scheme. In 2003, as in 2002, the government proposed a 27% increase in PBS patient co-payments and safety-net thresholds in order to transfer more of the cost of the PBS from the government to consumers. While this measure was initially blocked by the Senate, the forthcoming election resulted in the Labor Party eventually supporting this policy. Recommendations of the Pharmaceutical Benefits Advisory Committee to list, not list or defer a decision to list a medicine on the PBS were made publicly available for the first time and the full cost of PBS medicines appeared on medicine labels if the price was greater than the co-payment. Pharmaceutical reform in Victorian public hospitals designed to minimise PBS cost-shifting was evaluated and extended to other States and Territories. Programs promoting the quality use of medicines were further developed coordinated by the National Prescribing Service, Australian Divisions of General Practice and the Pharmacy Guild of Australia. The extensive uptake of computerised prescribing software by GPs produced benefits but also problems. The latter included pharmaceutical promotion occurring at the time of prescribing, failure to incorporate key sources of objective therapeutic information in the software and gross variation in the ability of various programs to detect important drug-drug interactions. These issues remain to be tackled.

  20. Proposal for a Small Scheme Implementation.

    DTIC Science & Technology

    1984-10-01

    5,-s Accession For ...- NTIS GRA&I DTIC TAB Unannounced ,,-- ,.. Justification By Avaii1," lit-- .c-des Dist j Sp-cio 0U . 8STD S. / Un~lasmiffied P’O...8217 IS[CUNITY CLASLSIICATIO#4 O P THIS PA O6I(I~ . 0.1. Eatoure ) Proposal for a Small Scheme Implementation, by "" Richard Schooler and James W...built.in routines. The garbage collector also needs to distinguish pointers from immediate data. To simplify ~.- "’ p . ’.s garbage collection and permit

  1. A Classification Scheme for Glaciological AVA Responses

    NASA Astrophysics Data System (ADS)

    Booth, A.; Emir, E.

    2014-12-01

    A classification scheme is proposed for amplitude vs. angle (AVA) responses as an aid to the interpretation of seismic reflectivity in glaciological research campaigns. AVA responses are a powerful tool in characterising the material properties of glacier ice and its substrate. However, before interpreting AVA data, careful true amplitude processing is required to constrain basal reflectivity and compensate amplitude decay mechanisms, including anelastic attenuation and spherical divergence. These fundamental processing steps can be difficult to design in cases of noisy data, e.g. where a target reflection is contaminated by surface wave energy (in the case of shallow glaciers) or by energy reflected from out of the survey plane. AVA methods have equally powerful usage in estimating the fluid fill of potential hydrocarbon reservoirs. However, such applications seldom use true amplitude data and instead consider qualitative AVA responses using a well-defined classification scheme. Such schemes are often defined in terms of the characteristics of best-fit responses to the observed reflectivity, e.g. the intercept (I) and gradient (G) of a linear approximation to the AVA data. The position of the response on a cross-plot of I and G then offers a diagnostic attribute for certain fluid types. We investigate the advantages in glaciology of emulating this practice, and develop a cross-plot based on the 3-term Shuey AVA approximation (using I, G, and a curvature term C). Model AVA curves define a clear lithification trend: AVA responses to stiff (lithified) substrates fall discretely into one quadrant of the cross-plot, with positive I and negative G, whereas those to fluid-rich substrates plot diagonally opposite (in the negative I and positive G quadrant). The remaining quadrants are unoccupied by plausible single-layer responses and may therefore be diagnostic of complex thin-layer reflectivity, and the magnitude and polarity of the C term serves as a further indicator

  2. Cosmological SUSY Breaking and the Pyramid Scheme

    NASA Astrophysics Data System (ADS)

    Banks, Tom

    2014-12-01

    I review the ideas of holographic space-time (HST), Cosmological SUSY breaking (CSB), and the Pyramid Schemes, which are the only known models of Tera-scale physics consistent with CSB, current particle data, and gauge coupling unification. There is considerable uncertainty in the estimate of the masses of supersymmetric partners of the standard model particles, but the model predicts that the gluino is probably out of reach of the LHC, squarks may be in reach, and the NLSP is a right handed slepton, which should be discovered soon.

  3. Cosmological SUSY breaking and the pyramid scheme

    NASA Astrophysics Data System (ADS)

    Banks, Tom

    2015-04-01

    I review the ideas of holographic spacetime (HST), cosmological SUSY breaking (CSB), and the Pyramid Schemes, which are the only known models of Tera-scale physics consistent with CSB, current particle data, and gauge coupling unification. There is considerable uncertainty in the estimate of the masses of supersymmetric partners of the Standard Model particles, but the model predicts that the gluino is probably out of reach of the LHC, squarks may be in reach, and the NLSP is a right-handed slepton, which should be discovered soon.

  4. Secure Biometric E-Voting Scheme

    NASA Astrophysics Data System (ADS)

    Ahmed, Taha Kh.; Aborizka, Mohamed

    The implementation of the e-voting becomes more substantial with the rapid increase of e-government development. The recent growth in communications and cryptographic techniques facilitate the implementation of e-voting. Many countries introduced e-voting systems; unfortunately most of these systems are not fully functional. In this paper we will present an e-voting scheme that covers most of the e-voting requirements, smart card and biometric recognition technology were implemented to guarantee voter's privacy and authentication.

  5. Numerical Schemes for Rough Parabolic Equations

    SciTech Connect

    Deya, Aurelien

    2012-04-15

    This paper is devoted to the study of numerical approximation schemes for a class of parabolic equations on (0,1) perturbed by a non-linear rough signal. It is the continuation of Deya (Electron. J. Probab. 16:1489-1518, 2011) and Deya et al. (Probab. Theory Relat. Fields, to appear), where the existence and uniqueness of a solution has been established. The approach combines rough paths methods with standard considerations on discretizing stochastic PDEs. The results apply to a geometric 2-rough path, which covers the case of the multidimensional fractional Brownian motion with Hurst index H>1/3.

  6. Investigation of a monochromator scheme for SPEAR

    SciTech Connect

    Wille, K.; Chao, A.W.

    1984-08-01

    The possibility of mono-chromatizing SPEAR for the purpose of increasing the hadronic event rate at the narrow resonances was investigated. By using two pairs of electostatic skew quads in monochromator scheme it is found that the event rate can be increased by a factor of 2 for the mini beta optics assuming the luminosity is kept unchanged. An attempt to increase this enhancement factor by major rearrangements of the ring magnets has encountered serious optical difficulties; although enhancement factor of 8 seems possible in principle, this alternative is not recommended.

  7. Different Synchronization Schemes for Chaotic Rikitake Systems

    NASA Astrophysics Data System (ADS)

    Khan, M. Ali

    2013-06-01

    This paper presents the chaos synchronization by designing a different type of controllers. Firstly, we propose the synchronization of bi-directional coupled chaotic Rikitake systems via hybrid feedback control. Secondly, we study the synchronization of unidirectionally coupled Rikitake systems using hybrid feedback control. Lastly, we investigate the synchronization of unidirectionally coupled Rikitake chaotic systems using tracking control. Comparing all the results, finally, we conclude that tracking control is more effective than feedback control. Simulation results are presented to show the efficiency of synchronization schemes.

  8. A numerical scheme for ionizing shock waves

    SciTech Connect

    Aslan, Necdet . E-mail: naslan@yeditepe.edu.tr; Mond, Michael

    2005-12-10

    A two-dimensional (2D) visual computer code to solve the steady state (SS) or transient shock problems including partially ionizing plasma is presented. Since the flows considered are hypersonic and the resulting temperatures are high, the plasma is partially ionized. Hence the plasma constituents are electrons, ions and neutral atoms. It is assumed that all the above species are in thermal equilibrium, namely, that they all have the same temperature. The ionization degree is calculated from Saha equation as a function of electron density and pressure by means of a nonlinear Newton type root finding algorithms. The code utilizes a wave model and numerical fluctuation distribution (FD) scheme that runs on structured or unstructured triangular meshes. This scheme is based on evaluating the mesh averaged fluctuations arising from a number of waves and distributing them to the nodes of these meshes in an upwind manner. The physical properties (directions, strengths, etc.) of these wave patterns are obtained by a new wave model: ION-A developed from the eigen-system of the flux Jacobian matrices. Since the equation of state (EOS) which is used to close up the conservation laws includes electronic effects, it is a nonlinear function and it must be inverted by iterations to determine the ionization degree as a function of density and temperature. For the time advancement, the scheme utilizes a multi-stage Runge-Kutta (RK) algorithm with time steps carefully evaluated from the maximum possible propagation speed in the solution domain. The code runs interactively with the user and allows to create different meshes to use different initial and boundary conditions and to see changes of desired physical quantities in the form of color and vector graphics. The details of the visual properties of the code has been published before (see [N. Aslan, A visual fluctuation splitting scheme for magneto-hydrodynamics with a new sonic fix and Euler limit, J. Comput. Phys. 197 (2004) 1

  9. A stellar-inertial navigation scheme

    NASA Astrophysics Data System (ADS)

    Yim, Jong-bin; Lim, You-chol; Lyou, Joon

    2005-12-01

    Since inertial sensor errors which increase with time are caused by initial orientation error and sensor errors(accelerometer bias and gyro drift bias), the accuracy of these devices, while still improving, is not adequate for many of today's high-precision, long-duration sea, aircraft, and long-range flight missions. This paper presented a navigation error compensation scheme for Strap-Down Inertial Navigation System(SDINS) using Electro-optical sensor. To be specific, SDINS error model and measurement equation were derived, and Kalman filter was implemented. Simulation results show the boundedness of position and attitude errors.

  10. Apiary B-Factory separation scheme

    SciTech Connect

    Garren, A. ); Sullivan, M. )

    1991-04-01

    A magnetic beam-separation scheme for an asymmetric-energy B-Factory based on the SLAC electron-positron collider PEP is described that has the following properties: the beams collide head-on and are separated magnetically with sufficient clearance at the parasitic crossing points and at the septum, the magnets have large beam-stay-clear apertures, synchrotron radiation produces low detector backgrounds and acceptable heat loads, and the peak {beta}-function values and contributions to the chromaticities in the IR quadrupoles are moderate. 8 figs., 2 tabs.

  11. Rabi resonances in the {lambda} excitation scheme

    SciTech Connect

    Godone, Aldo; Micalizio, Salvatore; Levi, Filippo

    2002-12-01

    We consider the interaction of a three-level system with phase-modulated resonant fields in the {lambda} excitation scheme. We treat theoretically the case of a sinusoidal phase modulation, a phase step perturbation, and a stochastic phase modulation. The appearance of a Rabi resonance both in the spectrum of the optical transmitted signal (electromagnetically induced transparency) and in the spectrum of the microwave emission (coherent population trapping maser) is considered in detail. All the theoretical results are compared with the analogous ones reported for the two-level system and with our experimental observations obtained for the case of rubidium in a buffer gas.

  12. APIARY B-Factory Separation Scheme

    SciTech Connect

    Garren, A.; Sullivan, M.

    1991-05-03

    A magnetic beam-separation scheme for an asymmetric-energy B Factory based on the SLAC electron-positron collider PEP is described that has the following properties: the beams collide head-on and are separated magnetically with sufficient clearance at the parasitic crossing points and at the septum, the magnets have large beam-stay-clear apertures, synchrotron radiation produces low detector backgrounds and acceptable heat loads, and the peak {beta}-function values and contributions to the chromaticities in the IR quadrupoles are moderate.

  13. A Job Classification Scheme for Health Manpower

    PubMed Central

    Weiss, Jeffrey H.

    1968-01-01

    The Census Bureau's occupational classification scheme and concept of the “health services industry” are inadequate tools for analysis of the changing job structure of health manpower. In an attempt to remedy their inadequacies, a new analytical framework—drawing upon the work of James Scoville on the job content of the U.S. economy—was devised. The first stage in formulating this new framework was to determine which jobs should be considered health jobs. The overall health care job family was designed to encompass jobs in which the primary technical focus or function is oriented toward the provision of health services. There are two dimensions to the job classification scheme presented here. The first describes each job in terms of job content; relative income data and minimum education and training requirements were employed as surrogate measures. By this means, health care jobs were grouped by three levels of job content: high, medium, and low. The other dimension describes each job in terms of its technical focus or function; by this means, health care jobs were grouped into nine job families. PMID:5673666

  14. Evaluation of a vibration source detection scheme

    SciTech Connect

    Jendrzejczyk, J.A.; Wambsganss, M.W.; Smith, R.K.

    1992-04-01

    When the Advanced Photon Source (APS) facility is commissioned, there will be many potential sources of local ground motion excitation (near-field sources). Some of these may be of sufficient amplitude and at a specific frequency so as to be detrimental to the stability of the storage ring beamline. A sampling of possible sources is as follows: 2500-hp chillers in the utility building; six cooling-tower fans that are powered by 75-hp electric motors; various water circulation pumps; power supplies, controllers, and transformers; and air-handling units and associated fans. To detect equipment that causes excessive ground excitation at a site as large as the APS, it will be necessary to have a validated source detection scheme. When performing low-amplitude vibration testing in and around Building 335 of Argonne National Laboratory (ANL), we observed a cyclic 8-Hz vibration. The cyclic nature of the signal is apparent in Fig. 1, which represents data measured on the floor at the main level of Building 335 on March 31, 1992. A simple vibration source location scheme, based on triangulation, was evaluated as a means to locate the source of the 8-Hz vibration and is the subject of this technical note. 1 ref.

  15. Coupling Schemes in Terahertz Planar Metamaterials

    DOE PAGES

    Roy Chowdhury, Dibakar; Singh, Ranjan; Taylor, Antoinette J.; ...

    2012-01-01

    We present a review of the different coupling schemes in a planar array of terahertz metamaterials. The gap-to-gap near-field capacitive coupling between split-ring resonators in a unit cell leads to either blue shift or red shift of the fundamental inductive-capacitive ( LC ) resonance, depending on the position of the split gap. The inductive coupling is enhanced by decreasing the inter resonator distance resulting in strong blue shifts of the LC resonance. We observe the LC resonance tuning only when the split-ring resonators are in close proximity of each other; otherwise, they appear to be uncoupled. Conversely, the higher-ordermore » resonances are sensitive to the smallest change in the inter particle distance or split-ring resonator orientation and undergo tremendous resonance line reshaping giving rise to a sharp subradiant resonance mode which produces hot spots useful for sensing applications. Most of the coupling schemes in a metamaterial are based on a near-field effect, though there also exists a mechanism to couple the resonators through the excitation of lowest-order lattice mode which facilitates the long-range radiative or diffractive coupling in the split-ring resonator plane leading to resonance line narrowing of the fundamental as well as the higher order resonance modes.« less

  16. The Linear Bicharacteristic Scheme for Computational Electromagnetics

    NASA Technical Reports Server (NTRS)

    Beggs, John H.; Chan, Siew-Loong

    2000-01-01

    The upwind leapfrog or Linear Bicharacteristic Scheme (LBS) has previously been implemented and demonstrated on electromagnetic wave propagation problems. This paper extends the Linear Bicharacteristic Scheme for computational electromagnetics to treat lossy dielectric and magnetic materials and perfect electrical conductors. This is accomplished by proper implementation of the LBS for homogeneous lossy dielectric and magnetic media, and treatment of perfect electrical conductors (PECs) are shown to follow directly in the limit of high conductivity. Heterogeneous media are treated through implementation of surface boundary conditions and no special extrapolations or interpolations at dielectric material boundaries are required. Results are presented for one-dimensional model problems on both uniform and nonuniform grids, and the FDTD algorithm is chosen as a convenient reference algorithm for comparison. The results demonstrate that the explicit LBS is a dissipation-free, second-order accurate algorithm which uses a smaller stencil than the FDTD algorithm, yet it has approximately one-third the phase velocity error. The LBS is also more accurate on nonuniform grids.

  17. Lightweight SIP/SDP compression scheme (LSSCS)

    NASA Astrophysics Data System (ADS)

    Wu, Jian J.; Demetrescu, Cristian

    2001-10-01

    In UMTS new IP based services with tight delay constraints will be deployed over the W-CDMA air interface such as IP multimedia and interactive services. To integrate the wireline and wireless IP services, 3GPP standard forum adopted the Session Initiation Protocol (SIP) as the call control protocol for the UMTS Release 5, which will implement next generation, all IP networks for real-time QoS services. In the current form the SIP protocol is not suitable for wireless transmission due to its large message size which will need either a big radio pipe for transmission or it will take far much longer to transmit than the current GSM Call Control (CC) message sequence. In this paper we present a novel compression algorithm called Lightweight SIP/SDP Compression Scheme (LSSCS), which acts at the SIP application layer and therefore removes the information redundancy before it is sent to the network and transport layer. A binary octet-aligned header is added to the compressed SIP/SDP message before sending it to the network layer. The receiver uses this binary header as well as the pre-cached information to regenerate the original SIP/SDP message. The key features of the LSSCS compression scheme are presented in this paper along with implementation examples. It is shown that this compression algorithm makes SIP transmission efficient over the radio interface without losing the SIP generality and flexibility.

  18. Analysis of an antijam FH acquisition scheme

    NASA Astrophysics Data System (ADS)

    Miller, Leonard E.; Lee, Jhong S.; French, Robert H.; Torrieri, Don J.

    1992-01-01

    An easily implemented matched filter scheme for acquiring hopping code synchronization of incoming frequency-hopping (FH) signals is analyzed, and its performance is evaluated for two types of jamming: partial-band noise jamming and partial-band multitone jamming. The system is designed to reduce jammer-induced false alarms. The system's matched-filter output is compared to an adaptive threshold that is derived from a measurement of the number of acquisition channels being jammed. Example performance calculations are given for the frequency coverage of the jamming either fixed over the entire acquisition period or hopped, that is, changed for each acquisition pulse. It is shown that the jammer's optimum strategy (the worst case) is to maximize the false-alarm probability without regard for the effect on detection probability, for both partial-band noise and multi-tone jamming. It is also shown that a significantly lower probability of false acquisition results from using an adaptive matched-filter threshold, demonstrating that the strategy studied here is superior to conventional nonadaptive threshold schemes.

  19. A concatenated coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Lin, S.

    1985-01-01

    A concatenated coding scheme for error control in data communications is analyzed. The inner code is used for both error correction and detection, however the outer code is used only for error detection. A retransmission is requested if the outer code detects the presence of errors after the inner code decoding. The probability of undetected error of the above error control scheme is derived and upper bounded. Two specific exmaples are analyzed. In the first example, the inner code is a distance-4 shortened Hamming code with generator polynomial (X+1)(X(6)+X+1) = X(7)+X(6)+X(2)+1 and the outer code is a distance-4 shortened Hamming code with generator polynomial (X+1)X(15+X(14)+X(13)+X(12)+X(4)+X(3)+X(2)+X+1) = X(16)+X(12)+X(5)+1 which is the X.25 standard for packet-switched data network. This example is proposed for error control on NASA telecommand links. In the second example, the inner code is the same as that in the first example but the outer code is a shortened Reed-Solomon code with symbols from GF(2(8)) and generator polynomial (X+1)(X+alpha) where alpha is a primitive element in GF(z(8)).

  20. Finite-difference schemes for anisotropic diffusion

    SciTech Connect

    Es, Bram van; Koren, Barry; Blank, Hugo J. de

    2014-09-01

    In fusion plasmas diffusion tensors are extremely anisotropic due to the high temperature and large magnetic field strength. This causes diffusion, heat conduction, and viscous momentum loss, to effectively be aligned with the magnetic field lines. This alignment leads to different values for the respective diffusive coefficients in the magnetic field direction and in the perpendicular direction, to the extent that heat diffusion coefficients can be up to 10{sup 12} times larger in the parallel direction than in the perpendicular direction. This anisotropy puts stringent requirements on the numerical methods used to approximate the MHD-equations since any misalignment of the grid may cause the perpendicular diffusion to be polluted by the numerical error in approximating the parallel diffusion. Currently the common approach is to apply magnetic field-aligned coordinates, an approach that automatically takes care of the directionality of the diffusive coefficients. This approach runs into problems at x-points and at points where there is magnetic re-connection, since this causes local non-alignment. It is therefore useful to consider numerical schemes that are tolerant to the misalignment of the grid with the magnetic field lines, both to improve existing methods and to help open the possibility of applying regular non-aligned grids. To investigate this, in this paper several discretization schemes are developed and applied to the anisotropic heat diffusion equation on a non-aligned grid.

  1. Extended lattice Boltzmann scheme for droplet combustion.

    PubMed

    Ashna, Mostafa; Rahimian, Mohammad Hassan; Fakhari, Abbas

    2017-05-01

    The available lattice Boltzmann (LB) models for combustion or phase change are focused on either single-phase flow combustion or two-phase flow with evaporation assuming a constant density for both liquid and gas phases. To pave the way towards simulation of spray combustion, we propose a two-phase LB method for modeling combustion of liquid fuel droplets. We develop an LB scheme to model phase change and combustion by taking into account the density variation in the gas phase and accounting for the chemical reaction based on the Cahn-Hilliard free-energy approach. Evaporation of liquid fuel is modeled by adding a source term, which is due to the divergence of the velocity field being nontrivial, in the continuity equation. The low-Mach-number approximation in the governing Navier-Stokes and energy equations is used to incorporate source terms due to heat release from chemical reactions, density variation, and nonluminous radiative heat loss. Additionally, the conservation equation for chemical species is formulated by including a source term due to chemical reaction. To validate the model, we consider the combustion of n-heptane and n-butanol droplets in stagnant air using overall single-step reactions. The diameter history and flame standoff ratio obtained from the proposed LB method are found to be in good agreement with available numerical and experimental data. The present LB scheme is believed to be a promising approach for modeling spray combustion.

  2. Adaptive CFD schemes for aerospace propulsion

    NASA Astrophysics Data System (ADS)

    Ferrero, A.; Larocca, F.

    2017-05-01

    The flow fields which can be observed inside several components of aerospace propulsion systems are characterised by the presence of very localised phenomena (boundary layers, shock waves,...) which can deeply influence the performances of the system. In order to accurately evaluate these effects by means of Computational Fluid Dynamics (CFD) simulations, it is necessary to locally refine the computational mesh. In this way the degrees of freedom related to the discretisation are focused in the most interesting regions and the computational cost of the simulation remains acceptable. In the present work, a discontinuous Galerkin (DG) discretisation is used to numerically solve the equations which describe the flow field. The local nature of the DG reconstruction makes it possible to efficiently exploit several adaptive schemes in which the size of the elements (h-adaptivity) and the order of reconstruction (p-adaptivity) are locally changed. After a review of the main adaptation criteria, some examples related to compressible flows in turbomachinery are presented. An hybrid hp-adaptive algorithm is also proposed and compared with a standard h-adaptive scheme in terms of computational efficiency.

  3. Extended lattice Boltzmann scheme for droplet combustion

    NASA Astrophysics Data System (ADS)

    Ashna, Mostafa; Rahimian, Mohammad Hassan; Fakhari, Abbas

    2017-05-01

    The available lattice Boltzmann (LB) models for combustion or phase change are focused on either single-phase flow combustion or two-phase flow with evaporation assuming a constant density for both liquid and gas phases. To pave the way towards simulation of spray combustion, we propose a two-phase LB method for modeling combustion of liquid fuel droplets. We develop an LB scheme to model phase change and combustion by taking into account the density variation in the gas phase and accounting for the chemical reaction based on the Cahn-Hilliard free-energy approach. Evaporation of liquid fuel is modeled by adding a source term, which is due to the divergence of the velocity field being nontrivial, in the continuity equation. The low-Mach-number approximation in the governing Navier-Stokes and energy equations is used to incorporate source terms due to heat release from chemical reactions, density variation, and nonluminous radiative heat loss. Additionally, the conservation equation for chemical species is formulated by including a source term due to chemical reaction. To validate the model, we consider the combustion of n-heptane and n -butanol droplets in stagnant air using overall single-step reactions. The diameter history and flame standoff ratio obtained from the proposed LB method are found to be in good agreement with available numerical and experimental data. The present LB scheme is believed to be a promising approach for modeling spray combustion.

  4. A scheme for multisource interior tomography

    PubMed Central

    Wang, Ge; Yu, Hengyong; Ye, Yangbo

    2009-01-01

    Currently, x-ray computed tomography (CT) requires source scanning so that projections can be collected from various orientations for image reconstruction. Limited by the scanning time, the temporal resolution of CT is often inadequate when rapid dynamics is involved in an object to be reconstructed. To meet this challenge, here the authors propose a scheme of multisource interior tomography for ultrafast imaging that reconstructs a relatively small region of interest (ROI). Specifically, such a ROI is irradiated in parallel with narrow x-ray beams defined by many source-detector pairs for data acquisition. This ROI can be then reconstructed using the interior tomography approach. To demonstrate the merits of this approach, the authors report interior reconstruction from in vivo lung CT data at a much reduced radiation dose, which is roughly proportional to the ROI size. The results suggest a scheme for ultrafast tomography (such as with a limited number of sources and in a scanning mode) to shorten data acquisition time and to suppress motion blurring. PMID:19746792

  5. Studying ignition schemes on European laser facilities

    NASA Astrophysics Data System (ADS)

    Jacquemot, S.; Amiranoff, F.; Baton, S. D.; Chanteloup, J. C.; Labaune, C.; Koenig, M.; Michel, D. T.; Perez, F.; Schlenvoigt, H. P.; Canaud, B.; Cherfils Clérouin, C.; Debras, G.; Depierreux, S.; Ebrardt, J.; Juraszek, D.; Lafitte, S.; Loiseau, P.; Miquel, J. L.; Philippe, F.; Rousseaux, C.; Blanchot, N.; Edwards, C. B.; Norreys, P.; Atzeni, S.; Schiavi, A.; Breil, J.; Feugeas, J. L.; Hallo, L.; Lafon, M.; Ribeyre, X.; Santos, J. J.; Schurtz, G.; Tikhonchuk, V.; Debayle, A.; Honrubia, J. J.; Temporal, M.; Batani, D.; Davies, J. R.; Fiuza, F.; Fonseca, R. A.; Silva, L. O.; Gizzi, L. A.; Koester, P.; Labate, L.; Badziak, J.; Klimo, O.

    2011-09-01

    Demonstrating ignition and net energy gain in the near future on MJ-class laser facilities will be a major step towards determining the feasibility of Inertial Fusion Energy (IFE), in Europe as in the United States. The current status of the French Laser MégaJoule (LMJ) programme, from the laser facility construction to the indirectly driven central ignition target design, is presented, as well as validating experimental campaigns, conducted, as part of this programme, on various laser facilities. However, the viability of the IFE approach strongly depends on our ability to address the salient questions related to efficiency of the target design and laser driver performances. In the overall framework of the European HiPER project, two alternative schemes both relying on decoupling target compression and fuel heating—fast ignition (FI) and shock ignition (SI)—are currently considered. After a brief presentation of the HiPER project's objectives, FI and SI target designs are discussed. Theoretical analysis and 2D simulations will help to understand the unresolved key issues of the two schemes. Finally, the on-going European experimental effort to demonstrate their viability on currently operated laser facilities is described.

  6. Security analysis of public key watermarking schemes

    NASA Astrophysics Data System (ADS)

    Craver, Scott A.; Katzenbeisser, Stefan

    2001-12-01

    Traditional watermarking systems require the complete disclosure of the watermarking key in the watermark verification process. In most systems an attacker is able to remove the watermark completely once the key is known, thus subverting the intention of copyright protection. To cope with this problem, public-key watermarking schemes were proposed that allow asymmetric watermark detection. Whereas a public key is used to insert watermarks in digital objects, the marks can be verified with a private key. Knowledge of this private key does not allow piracy. We describe two public-key watermarking schemes which are similar in spirit to zero-knowledge proofs. The key idea of one system is to verify a watermark in a blinded version of the document, where the scrambling is determined by the private key. A probabilistic protocol is constructed that allows public watermark detection with probability of 1/2; by iteration, the verifier can get any degree of certainty that the watermark is present. The second system is based on watermark attacks, using controlled counterfeiting to conceal real watermark data safely amid data useless to an attacker.

  7. A closure scheme for chemical master equations.

    PubMed

    Smadbeck, Patrick; Kaznessis, Yiannis N

    2013-08-27

    Probability reigns in biology, with random molecular events dictating the fate of individual organisms, and propelling populations of species through evolution. In principle, the master probability equation provides the most complete model of probabilistic behavior in biomolecular networks. In practice, master equations describing complex reaction networks have remained unsolved for over 70 years. This practical challenge is a reason why master equations, for all their potential, have not inspired biological discovery. Herein, we present a closure scheme that solves the master probability equation of networks of chemical or biochemical reactions. We cast the master equation in terms of ordinary differential equations that describe the time evolution of probability distribution moments. We postulate that a finite number of moments capture all of the necessary information, and compute the probability distribution and higher-order moments by maximizing the information entropy of the system. An accurate order closure is selected, and the dynamic evolution of molecular populations is simulated. Comparison with kinetic Monte Carlo simulations, which merely sample the probability distribution, demonstrates this closure scheme is accurate for several small reaction networks. The importance of this result notwithstanding, a most striking finding is that the steady state of stochastic reaction networks can now be readily computed in a single-step calculation, without the need to simulate the evolution of the probability distribution in time.

  8. A closure scheme for chemical master equations

    PubMed Central

    Smadbeck, Patrick; Kaznessis, Yiannis N.

    2013-01-01

    Probability reigns in biology, with random molecular events dictating the fate of individual organisms, and propelling populations of species through evolution. In principle, the master probability equation provides the most complete model of probabilistic behavior in biomolecular networks. In practice, master equations describing complex reaction networks have remained unsolved for over 70 years. This practical challenge is a reason why master equations, for all their potential, have not inspired biological discovery. Herein, we present a closure scheme that solves the master probability equation of networks of chemical or biochemical reactions. We cast the master equation in terms of ordinary differential equations that describe the time evolution of probability distribution moments. We postulate that a finite number of moments capture all of the necessary information, and compute the probability distribution and higher-order moments by maximizing the information entropy of the system. An accurate order closure is selected, and the dynamic evolution of molecular populations is simulated. Comparison with kinetic Monte Carlo simulations, which merely sample the probability distribution, demonstrates this closure scheme is accurate for several small reaction networks. The importance of this result notwithstanding, a most striking finding is that the steady state of stochastic reaction networks can now be readily computed in a single-step calculation, without the need to simulate the evolution of the probability distribution in time. PMID:23940327

  9. Privacy protection schemes for fingerprint recognition systems

    NASA Astrophysics Data System (ADS)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  10. On the monotonicity of multidimensional finite difference schemes

    NASA Astrophysics Data System (ADS)

    Kovyrkina, O.; Ostapenko, V.

    2016-10-01

    The classical concept of monotonicity, introduced by Godunov for linear one-dimensional difference schemes, is extended to multidimensional case. Necessary and sufficient conditions of monotonicity are obtained for linear multidimensional difference schemes of first order. The constraints on the numerical viscosity are given that ensure the monotonicity of a difference scheme in the multidimensional case. It is proposed a modification of the second order multidimensional CABARET scheme that preserves the monotonicity of one-dimensional discrete solutions and, as a result, ensures higher smoothness in the computation of multidimensional discontinuous solutions. The results of two-dimensional test computations illustrating the advantages of the modified CABARET scheme are presented.

  11. Efficient stop-and-wait type II hybrid ARQ scheme

    NASA Astrophysics Data System (ADS)

    Kallel, S.

    1992-06-01

    The stop-and-wait (SW) Sastry's (1975) ARQ scheme is modified to include a parity retransmission type II hybrid ARQ scheme described by Lin and Yu (1982) and Kallel (1990). In the new scheme, the data packet to be transmitted is encoded with a rate of 1/2 code, and repetitions alternate between the two sequences obtained at the output of the encoder (unlike in the Sastry scheme in which simple repeats of a data packet are transmitted). It is shown that the use of the SW type II hybrid ARQ scheme results in a substantial increase of the throughput.

  12. A group signature scheme based on quantum teleportation

    NASA Astrophysics Data System (ADS)

    Wen, Xiaojun; Tian, Yuan; Ji, Liping; Niu, Xiamu

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  13. Computational schemes for the ground-state pair density.

    PubMed

    Higuchi, K; Higuchi, M

    2009-02-11

    We reconfirm the performance of the initial scheme for calculating the ground-state pair density (Higuchi and Higuchi 2007 Physica B 387 117, 2008 Phys. Rev. B 78 125101) by using the alternative approximation of the correlating kinetic energy functional. It is shown that about 20% of the correlation energy can be reproduced by the initial scheme, irrespective of the approximate form of the correlating kinetic energy functional. On the basis of the initial scheme, various kinds of schemes that go beyond the initial one can be developed. We illustrate two kinds of computational schemes.

  14. A Hybrid MacCormack-type Scheme for Computational Aeroacoustics

    NASA Astrophysics Data System (ADS)

    Yazdani, Soroush

    A new type of MacCormack scheme, using a modified Low Dissipation and Dispersion Runge-Kutta time marching method, is presented. This scheme is using two stages in every step which implements biased spatial differencing stencils and for the remaining stages uses non-dissipative central differencing stencils. Because of using the MacCormack-type scheme in this method, the new scheme carries an inherent artificial dissipation which uses the ease of implementing boundary condition specifications of a two-stage MacCormack scheme.

  15. Quantum group signature scheme based on controlled quantum teleportation

    NASA Astrophysics Data System (ADS)

    Chen, F. L.; Han, Z. F.

    2016-11-01

    Group signature scheme is a method of allowing a member of a group to sign a message anonymously on behalf of the group. The group administrator is in charge of adding group members and has the ability to reveal the original signer in the event of disputes. Based on controlled quantum teleportation with three-particle entangled W states, we propose a new quantum group signature scheme with designated receiver. Security analysis proves that the proposed scheme possesses the characteristics of group signature and resists the usual attacks. Compared with previous proposed schemes, this scheme follows security definition of group signature fully and meets its basic requirements.

  16. Implicit Space-Time Conservation Element and Solution Element Schemes

    NASA Technical Reports Server (NTRS)

    Chang, Sin-Chung; Himansu, Ananda; Wang, Xiao-Yen

    1999-01-01

    Artificial numerical dissipation is in important issue in large Reynolds number computations. In such computations, the artificial dissipation inherent in traditional numerical schemes can overwhelm the physical dissipation and yield inaccurate results on meshes of practical size. In the present work, the space-time conservation element and solution element method is used to construct new and accurate implicit numerical schemes such that artificial numerical dissipation will not overwhelm physical dissipation. Specifically, these schemes have the property that numerical dissipation vanishes when the physical viscosity goes to zero. These new schemes therefore accurately model the physical dissipation even when it is extremely small. The new schemes presented are two highly accurate implicit solvers for a convection-diffusion equation. The two schemes become identical in the pure convection case, and in the pure diffusion case. The implicit schemes are applicable over the whole Reynolds number range, from purely diffusive equations to convection-dominated equations with very small viscosity. The stability and consistency of the schemes are analysed, and some numerical results are presented. It is shown that, in the inviscid case, the new schemes become explicit and their amplification factors are identical to those of the Leapfrog scheme. On the other hand, in the pure diffusion case, their principal amplification factor becomes the amplification factor of the Crank-Nicolson scheme.

  17. Spatial dimming scheme for optical OFDM based visible light communication.

    PubMed

    Yang, Yang; Zeng, Zhimin; Cheng, Julian; Guo, Caili

    2016-12-26

    A new dimming control scheme termed spatial dimming orthogonal frequency division multiplexing (SD-OFDM) is proposed for multiple-input and multiple output OFDM based visible light communication. The basic idea of SD-OFDM is that the illumination can be represented by the number of glared light emitting diodes (LEDs) in an LED lamp. As the biasing level of LEDs does not adjust to represent the required illumination level, the proposed scheme can significantly mitigate the clipping noise compared to analogue dimming schemes. Furthermore, unlike digital dimming schemes that control illumination levels by setting different duty cycles of pulse width modulation, the proposed scheme is always in the "on-state" for varied illumination levels. Both analytical and simulation results indicate that the proposed scheme is an efficient and feasible dimmable scheme.

  18. Total Variation Diminishing (TVD) schemes of uniform accuracy

    NASA Technical Reports Server (NTRS)

    Hartwich, PETER-M.; Hsu, Chung-Hao; Liu, C. H.

    1988-01-01

    Explicit second-order accurate finite-difference schemes for the approximation of hyperbolic conservation laws are presented. These schemes are nonlinear even for the constant coefficient case. They are based on first-order upwind schemes. Their accuracy is enhanced by locally replacing the first-order one-sided differences with either second-order one-sided differences or central differences or a blend thereof. The appropriate local difference stencils are selected such that they give TVD schemes of uniform second-order accuracy in the scalar, or linear systems, case. Like conventional TVD schemes, the new schemes avoid a Gibbs phenomenon at discontinuities of the solution, but they do not switch back to first-order accuracy, in the sense of truncation error, at extrema of the solution. The performance of the new schemes is demonstrated in several numerical tests.

  19. Quantum scheme for secret sharing based on local distinguishability

    NASA Astrophysics Data System (ADS)

    Rahaman, Ramij; Parker, Matthew G.

    2015-02-01

    In this paper, we analyze the (im)possibility of the exact distinguishability of orthogonal multipartite entangled states under restricted local operation and classical communication. Based on this local distinguishability analysis, we propose a quantum secret sharing scheme (which we call LOCC-QSS). Our LOCC-QSS scheme is quite general and cost efficient compared to other schemes. In our scheme, no joint quantum operation is needed to reconstruct the secret. We also present an interesting (2 ,n ) -threshold LOCC-QSS scheme, where any two cooperating players, one from each of two disjoint groups of players, can always reconstruct the secret. This LOCC-QSS scheme is quite uncommon, as most (k ,n ) -threshold quantum secret sharing schemes have the restriction k ≥⌈n/2 ⌉ .

  20. Why sampling scheme matters: the effect of sampling scheme on landscape genetic results

    Treesearch

    Michael K. Schwartz; Kevin S. McKelvey

    2008-01-01

    There has been a recent trend in genetic studies of wild populations where researchers have changed their sampling schemes from sampling pre-defined populations to sampling individuals uniformly across landscapes. This reflects the fact that many species under study are continuously distributed rather than clumped into obvious "populations". Once individual...

  1. A simple language to script and simulate breeding schemes: the breeding scheme language

    USDA-ARS?s Scientific Manuscript database

    It is difficult for plant breeders to determine an optimal breeding strategy given that the problem involves many factors, such as target trait genetic architecture and breeding resource availability. There are many possible breeding schemes for each breeding program. Although simulation study may b...

  2. An efficient compression scheme for bitmap indices

    SciTech Connect

    Wu, Kesheng; Otoo, Ekow J.; Shoshani, Arie

    2004-04-13

    When using an out-of-core indexing method to answer a query, it is generally assumed that the I/O cost dominates the overall query response time. Because of this, most research on indexing methods concentrate on reducing the sizes of indices. For bitmap indices, compression has been used for this purpose. However, in most cases, operations on these compressed bitmaps, mostly bitwise logical operations such as AND, OR, and NOT, spend more time in CPU than in I/O. To speedup these operations, a number of specialized bitmap compression schemes have been developed; the best known of which is the byte-aligned bitmap code (BBC). They are usually faster in performing logical operations than the general purpose compression schemes, but, the time spent in CPU still dominates the total query response time. To reduce the query response time, we designed a CPU-friendly scheme named the word-aligned hybrid (WAH) code. In this paper, we prove that the sizes of WAH compressed bitmap indices are about two words per row for large range of attributes. This size is smaller than typical sizes of commonly used indices, such as a B-tree. Therefore, WAH compressed indices are not only appropriate for low cardinality attributes but also for high cardinality attributes.In the worst case, the time to operate on compressed bitmaps is proportional to the total size of the bitmaps involved. The total size of the bitmaps required to answer a query on one attribute is proportional to the number of hits. These indicate that WAH compressed bitmap indices are optimal. To verify their effectiveness, we generated bitmap indices for four different datasets and measured the response time of many range queries. Tests confirm that sizes of compressed bitmap indices are indeed smaller than B-tree indices, and query processing with WAH compressed indices is much faster than with BBC compressed indices, projection indices and B-tree indices. In addition, we also verified that the average query response time

  3. Improved Timing Scheme for Spaceborne Precipitation Radar

    NASA Technical Reports Server (NTRS)

    Berkun, Andrew; Fischman, Mark

    2004-01-01

    An improved timing scheme has been conceived for operation of a scanning satellite-borne rain-measuring radar system. The scheme allows a real-time-generated solution, which is required for auto targeting. The current timing scheme used in radar satellites involves pre-computing a solution that allows the instrument to catch all transmitted pulses without transmitting and receiving at the same time. Satellite altitude requires many pulses in flight at any time, and the timing solution to prevent transmit and receive operations from colliding is usually found iteratively. The proposed satellite has a large number of scanning beams each with a different range to target and few pulses per beam. Furthermore, the satellite will be self-targeting, so the selection of which beams are used will change from sweep to sweep. The proposed timing solution guarantees no echo collisions, can be generated using simple FPGA-based hardware in real time, and can be mathematically shown to deliver the maximum number of pulses per second, given the timing constraints. The timing solution is computed every sweep, and consists of three phases: (1) a build-up phase, (2) a feedback phase, and (3) a build-down phase. Before the build-up phase can begin, the beams to be transmitted are sorted in numerical order. The numerical order of the beams is also the order from shortest range to longest range. Sorting the list guarantees no pulse collisions. The build-up phase begins by transmitting the first pulse from the first beam on the list. Transmission of this pulse starts a delay counter, which stores the beam number and the time delay to the beginning of the receive window for that beam. The timing generator waits just long enough to complete the transmit pulse plus one receive window, then sends out the second pulse. The second pulse starts a second delay counter, which stores its beam number and time delay. This process continues until an output from the first timer indicates there is less

  4. Replacing the bucket scheme of ECHAM6 with a five soil layer hydrology scheme

    NASA Astrophysics Data System (ADS)

    Hagemann, Stefan

    2010-05-01

    In climate research, the so-called bucket model has been widely spread where the soil water is represented by a single soil moisture reservoir, such as it is still the case in the current operational climate models of the Max Planck Institute for Meteorology (MPI-M), ECHAM6 and REMO. But in the transition of these climate models to comprehensive Earth system models, this single soil moisture layer is no longer sufficient. Here, biosphere processes must be coupled to the hydrological processes using bio-geochemical models. But these models usually need a vertical discrimination of the soil water storage. This was raised as a key issue for bio-geochemical model requirements at the MPI for Biogeochemistry and the MPI for Chemistry within the ENIGMA (Earth System Network of Integrated Modelling and Assessment) network. In addition, the higher vertical discrimination is also needed for the implementation of permafrost related processes, especially soil moisture melting and freezing, which is currently in preparation. Therefore, one objective is to achieve an improved representation of hydrological processes in the MPI-M Earth system models, especially of those that play an important role in the coupling to bio-geochemical processes. To this end, a five soil layer hydrology scheme has been implemented into the JSBACH scheme (the land surface component of ECHAM6) that is consistent with the five temperature layers already included in the ECHAM physics used in JSBACH and REMO. The new scheme will be presented, as well as results from validation simulations conducted with AMIP2 SST forcing at T31 and T63 resolution. The analysis of results will focus on differences between the simulations with and without (i.e. using the bucket scheme) the five soil layer hydrology scheme. It will be investigated why specific differences occur, and areas will be highlighted where the regional climate seems to be sensitive to the soil hydrology.

  5. New scheme for braiding Majorana fermions

    PubMed Central

    Wu, Long-Hua; Liang, Qi-Feng; Hu, Xiao

    2014-01-01

    Non-Abelian statistics can be achieved by exchanging two vortices in topological superconductors with each grabbing a Majorana fermion (MF) as zero-energy quasi-particle at the cores. However, in experiments it is difficult to manipulate vortices. In the present work, we propose a way to braid MFs without moving vortices. The only operation required in the present scheme is to turn on and off local gate voltages, which liberates a MF from its original host vortex and transports it along the prepared track. We solve the time-dependent Bogoliubov–de Gennes equation numerically, and confirm that the MFs are protected provided the switching of gate voltages for exchanging MFs are adiabatic, which takes only several nano seconds given reasonable material parameters. By monitoring the time evolution of MF wave-functions, we show that non-Abelian statistics is achieved. PMID:27877725

  6. Finite element or Galerkin type semidiscrete schemes

    NASA Technical Reports Server (NTRS)

    Durgun, K.

    1983-01-01

    A finite element of Galerkin type semidiscrete method is proposed for numerical solution of a linear hyperbolic partial differential equation. The question of stability is reduced to the stability of a system of ordinary differential equations for which Dahlquist theory applied. Results of separating the part of numerical solution which causes the spurious oscillation near shock-like response of semidiscrete scheme to a step function initial condition are presented. In general all methods produce such oscillatory overshoots on either side of shocks. This overshoot pathology, which displays a behavior similar to Gibb's phenomena of Fourier series, is explained on the basis of dispersion of separated Fourier components which relies on linearized theory to be satisfactory. Expository results represented.

  7. Development and evaluation of packet video schemes

    NASA Technical Reports Server (NTRS)

    Sayood, Khalid; Chen, Y. C.; Hadenfeldt, A. C.

    1990-01-01

    Reflecting the two tasks proposed for the current year, namely a feasibility study of simulating the NASA network, and a study of progressive transmission schemes, are presented. The view of the NASA network, gleaned from the various technical reports made available to use, is provided. Also included is a brief overview of how the current simulator could be modified to accomplish the goal of simulating the NASA network. As the material in this section would be the basis for the actual simulation, it is important to make sure that it is an accurate reflection of the requirements on the simulator. Brief descriptions of the set of progressive transmission algorithms selected for the study are contained. The results available in the literature were obtained under a variety of different assumptions, not all of which are stated. As such, the only way to compare the efficiency and the implementational complexity of the various algorithms is to simulate them.

  8. Relaxation schemes for spectral multigrid methods

    NASA Technical Reports Server (NTRS)

    Phillips, Timothy N.

    1987-01-01

    The effectiveness of relaxation schemes for solving the systems of algebraic equations which arise from spectral discretizations of elliptic equations is examined. Iterative methods are an attractive alternative to direct methods because Fourier transform techniques enable the discrete matrix-vector products to be computed almost as efficiently as for corresponding but sparse finite difference discretizations. Preconditioning is found to be essential for acceptable rates of convergence. Preconditioners based on second-order finite difference methods are used. A comparison is made of the performance of different relaxation methods on model problems with a variety of conditions specified around the boundary. The investigations show that iterations based on incomplete LU decompositions provide the most efficient methods for solving these algebraic systems.

  9. A Scheme for Targeting Optical SETI Observations

    NASA Astrophysics Data System (ADS)

    Shostak, Seth

    2004-06-01

    In optical SETI (OSETI) experiments, it is generally assumed that signals will be deliberate, narrowly targeted beacons sent by extraterrestrial societies to large numbers of candidate star systems. If this is so, then it may be unrealistic to expect a high duty cycle for the received signal. Ergo, an advantage accrues to any OSETI scheme that realistically suggests where and when to search. In this paper, we elaborate a proposal (Castellano, Doyle, &McIntosh 2000) for selecting regions of sky for intensive optical SETI monitoring based on characteristics of our solar system that would be visible at great distance. This can enormously lessen the amount of sky that needs to be searched. In addition, this is an attractive approach for the transmitting society because it both increases the chances of reception and provides a large reduction in energy required. With good astrometric information, the transmitter need be no more powerful than an automobile tail light.

  10. Doping Scheme of Semiconducting Atomic Chains

    NASA Technical Reports Server (NTRS)

    Toshishige, Yamada; Saini, Subhash (Technical Monitor)

    1998-01-01

    Atomic chains, precise structures of atomic scale created on an atomically regulated substrate surface, are candidates for future electronics. A doping scheme for intrinsic semiconducting Mg chains is considered. In order to suppress the unwanted Anderson localization and minimize the deformation of the original band shape, atomic modulation doping is considered, which is to place dopant atoms beside the chain periodically. Group I atoms are donors, and group VI or VII atoms are acceptors. As long as the lattice constant is long so that the s-p band crossing has not occurred, whether dopant atoms behave as donors or acceptors is closely related to the energy level alignment of isolated atomic levels. Band structures are calculated for Br-doped (p-type) and Cs-doped (n-type) Mg chains using the tight-binding theory with universal parameters, and it is shown that the band deformation is minimized and only the Fermi energy position is modified.

  11. The upgraded scheme of Hefei Light Source

    SciTech Connect

    Li Weimin; Xu Hongliang; Wang Lin; Feng Guangyao; Zhang Shancai; Hao Hao

    2010-06-23

    To enhance the performance of Hefei Light Source, which was designed and constructed two decades ago, an upgrade project would be carried out in the near future. The detail upgrade scheme was described in this paper. Firstly, the magnet lattice of storage ring should be reconstructed with 4 DBA cells, whose advantages are lower beam emittance and more straight section available for insertion devices. Secondly, the beam diagnostics, main power supply, transverse and longitudinal multi-bunch feedback, beam control and manipulation system would be upgrade to improve the beam orbit stability. Finally, the injection system of storage ring and injector, which is composed of electron linac and beam transfer line, would be updated in order to assure smooth beam accumulation process under new low emittance lattice. With above improvement, it is hopeful to increase the brilliance of Hefei Light Source by two orders approximately. After three-year upgrade project, the performance of HLS would meet the demands of advanced SR users.

  12. Plastics waste trashes German recycling scheme

    SciTech Connect

    Chynoweth, E.

    1993-06-30

    Plastics waste is causing a major headache for Duales System Deutschland (DSD: Bonn), one of Europe`s groundbreaking national packaging recycling programs. Five of Germany`s states have threatened to withdraw from the plan mainly because of the lack of plastics recycling capacity, says a DSD spokeswoman. {open_quotes}The pace of establishing recycling capacity does not meet the zeal in collection.{close_quotes} she notes. In addition, the organization has been crippled by a lack of funds. It claims that up to half the subscribers to the scheme - who pay a fee to display a green dot on packaging - are either irregular payers or not paying fees in proportion to their use of the green dot. The cost of setting up and paying for plastics recycling - not originally part of DSD`s responsibility - is also hurting the organization.

  13. Task analysis of laparoscopic camera control schemes.

    PubMed

    Ellis, R Darin; Munaco, Anthony J; Reisner, Luke A; Klein, Michael D; Composto, Anthony M; Pandya, Abhilash K; King, Brady W

    2016-12-01

    Minimally invasive surgeries rely on laparoscopic camera views to guide the procedure. Traditionally, an expert surgical assistant operates the camera. In some cases, a robotic system is used to help position the camera, but the surgeon is required to direct all movements of the system. Some prior research has focused on developing automated robotic camera control systems, but that work has been limited to rudimentary control schemes due to a lack of understanding of how the camera should be moved for different surgical tasks. This research used task analysis with a sample of eight expert surgeons to discover and document several salient methods of camera control and their related task contexts. Desired camera placements and behaviours were established for two common surgical subtasks (suturing and knot tying). The results can be used to develop better robotic control algorithms that will be more responsive to surgeons' needs. Copyright © 2015 John Wiley & Sons, Ltd. Copyright © 2015 John Wiley & Sons, Ltd.

  14. The Dynamics of Some Iterative Implicit Schemes

    NASA Technical Reports Server (NTRS)

    Yee, H. C.; Sweby, P. K.

    1994-01-01

    The global asymptotic nonlinear behavior of some standard iterative procedures in solving nonlinear systems of algebraic equations arising from four implicit linear multistep methods (LMMs) in discretizing 2 x 2 systems of first-order autonomous nonlinear ordinary differential equations is analyzed using the theory of dynamical systems. With the aid of parallel Connection Machines (CM-2 and CM-5), the associated bifurcation diagrams as a function of the time step, and the complex behavior of the associated 'numerical basins of attraction' of these iterative implicit schemes are revealed and compared. Studies showed that all of the four implicit LMMs exhibit a drastic distortion and segmentation but less shrinkage of the basin of attraction of the true solution than standard explicit methods. The numerical basins of attraction of a noniterative implicit procedure mimic more closely the basins of attraction of the differential equations than the iterative implicit procedures for the four implicit LMMs.

  15. Multisensor detection schemes for mobile robots

    NASA Astrophysics Data System (ADS)

    Fatemi, A.; Lecocq, H.

    1996-10-01

    In this work, mobile robot distributed detection systems are described that use multiple sources of information to construct an internal representation of its environment. We begin by considering a decision fusion model employing the parallel fusion topology. Based on their observations, local sensors make local binary decisions and transmit them to the decision fusion center where they are combined to yield the global decision. Decisions rules are obtained by using different probabilistic methods. The optimal decision scheme at the fusion center is derived, by optimizing three criterions: the mean square error, the maximum a posterior error, and the Bayesian risk. We, then, consider an optimal data fusion where the local decisions are simply added. Finally, an application to the fusion of ultrasound sonar data is presented and discussed.

  16. Efficient Conservative Reformulation Schemes for Lithium Intercalation

    SciTech Connect

    Urisanga, PC; Rife, D; De, S; Subramanian, VR

    2015-02-18

    Porous electrode theory coupled with transport and reaction mechanisms is a widely used technique to model Li-ion batteries employing an appropriate discretization or approximation for solid phase diffusion with electrode particles. One of the major difficulties in simulating Li-ion battery models is the need to account for solid phase diffusion in a second radial dimension r, which increases the computation time/cost to a great extent. Various methods that reduce the computational cost have been introduced to treat this phenomenon, but most of them do not guarantee mass conservation. The aim of this paper is to introduce an inherently mass conserving yet computationally efficient method for solid phase diffusion based on Lobatto III A quadrature. This paper also presents coupling of the new solid phase reformulation scheme with a macro-homogeneous porous electrode theory based pseudo 20 model for Li-ion battery. (C) The Author(s) 2015. Published by ECS. All rights reserved.

  17. Parasitology: United Kingdom National Quality Assessment Scheme.

    PubMed Central

    Hawthorne, M.; Chiodini, P. L.; Snell, J. J.; Moody, A. H.; Ramsay, A.

    1992-01-01

    AIMS: To assess the results from parasitology laboratories taking part in a quality assessment scheme between 1986 and 1991; and to compare performance with repeat specimens. METHODS: Quality assessment of blood parasitology, including tissue parasites (n = 444; 358 UK, 86 overseas), and faecal parasitology, including extra-intestinal parasites (n = 205; 141 UK, 64 overseas), was performed. RESULTS: Overall, the standard of performance was poor. A questionnaire distributed to participants showed that a wide range of methods was used, some of which were considered inadequate to achieve reliable results. Teaching material was distributed to participants from time to time in an attempt to improve standards. CONCLUSIONS: Since the closure of the IMLS fellowship course in 1972, fewer opportunities for specialised training in parasitology are available: more training is needed. Poor performance in the detection of malarial parasites is mainly attributable to incorrect speciation, misidentification, and lack of equipment such as an eyepiece graticule. PMID:1452791

  18. Investigation of Near Shannon Limit Coding Schemes

    NASA Technical Reports Server (NTRS)

    Kwatra, S. C.; Kim, J.; Mo, Fan

    1999-01-01

    Turbo codes can deliver performance that is very close to the Shannon limit. This report investigates algorithms for convolutional turbo codes and block turbo codes. Both coding schemes can achieve performance near Shannon limit. The performance of the schemes is obtained using computer simulations. There are three sections in this report. First section is the introduction. The fundamental knowledge about coding, block coding and convolutional coding is discussed. In the second section, the basic concepts of convolutional turbo codes are introduced and the performance of turbo codes, especially high rate turbo codes, is provided from the simulation results. After introducing all the parameters that help turbo codes achieve such a good performance, it is concluded that output weight distribution should be the main consideration in designing turbo codes. Based on the output weight distribution, the performance bounds for turbo codes are given. Then, the relationships between the output weight distribution and the factors like generator polynomial, interleaver and puncturing pattern are examined. The criterion for the best selection of system components is provided. The puncturing pattern algorithm is discussed in detail. Different puncturing patterns are compared for each high rate. For most of the high rate codes, the puncturing pattern does not show any significant effect on the code performance if pseudo - random interleaver is used in the system. For some special rate codes with poor performance, an alternative puncturing algorithm is designed which restores their performance close to the Shannon limit. Finally, in section three, for iterative decoding of block codes, the method of building trellis for block codes, the structure of the iterative decoding system and the calculation of extrinsic values are discussed.

  19. Security analysis and improvements of arbitrated quantum signature schemes

    NASA Astrophysics Data System (ADS)

    Zou, Xiangfu; Qiu, Daowen

    2010-10-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  20. Quantum Attack-Resistent Certificateless Multi-Receiver Signcryption Scheme

    PubMed Central

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards. PMID:23967037

  1. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    PubMed

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  2. An improved anonymous authentication scheme for telecare medical information systems.

    PubMed

    Wen, Fengtong; Guo, Dianli

    2014-05-01

    Telecare medical information system (TMIS) constructs an efficient and convenient connection between patients and the medical server. The patients can enjoy medical services through public networks, and hence the protection of patients' privacy is very significant. Very recently, Wu et al. identified Jiang et al.'s authentication scheme had some security drawbacks and proposed an enhanced authentication scheme for TMIS. However, we analyze Wu et al.'s scheme and show that their scheme suffers from server spoofing attack, off-line password guessing attack, impersonation attack. Moreover, Wu et al.'s scheme fails to preserve the claimed patient anonymity and its password change phase is unfriendly and inefficient. Thereby, we present a novel anonymous authentication scheme for telecare medical information systems to eliminate the aforementioned faults. Besides, We demonstrate the completeness of the proposed scheme through the BAN logic. Furthermore, the security of our proposed scheme is proven through Bellare and Rogaways model. Compared with the related existing schemes, our scheme is more secure.

  3. On Convergence of High Order Shock Capturing Difference Schemes

    NASA Astrophysics Data System (ADS)

    Ostapenko, V.

    2010-11-01

    A convergence of high order shock capturing difference schemes is analyzed. Notions of weak finite difference approximations which conserve a sense on discontinuous solutions are introduced. Necessary and sufficient conditions of these approximations are obtained. It is shown that among the explicit two-layer in time conservative difference schemes there are no schemes which can have high order of weak approximation. A compact scheme of the same third order of classical and weak approximations is constructed. There is demonstrated an advantage of this scheme in comparison to TVD scheme at shock-capturing computations. A difference approximation of ɛ Rankine-Hugoniot (RH) conditions is investigated. It is shown that TVD type schemes (in contrast to non-TVD schemes, whose numerical fluxes are smooth enough) can approximate ɛ RH-conditions at most with the first order. Given examples show that non-TVD schemes (in contrast to TVD schemes) can have the second order of integral convergence through the smearing shocks and as a result can conserve a higher accuracy in the post shock regions.

  4. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    PubMed

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  5. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  6. An improved authentication scheme for telecare medicine information systems.

    PubMed

    Wei, Jianghong; Hu, Xuexian; Liu, Wenfen

    2012-12-01

    The telecare medicine information system enables or supports health-care delivery services. In order to safeguard patients' privacy, such as telephone number, medical record number, health information, etc., a secure authentication scheme will thus be in demand. Recently, Wu et al. proposed a smart card based password authentication scheme for the telecare medicine information system. Later, He et al. pointed out that Wu et al.'s scheme could not resist impersonation attacks and insider attacks, and then presented a new scheme. In this paper, we show that both of them fail to achieve two-factor authentication as smart card based password authentication schemes should achieve. We also propose an improved authentication scheme for the telecare medicine information system, and demonstrate that the improved one satisfies the security requirements of two-factor authentication and is also efficient.

  7. Efficient Unrestricted Identity-Based Aggregate Signature Scheme

    PubMed Central

    Yuan, Yumin; Zhan, Qian; Huang, Hua

    2014-01-01

    An aggregate signature scheme allows anyone to compress multiple individual signatures from various users into a single compact signature. The main objective of such a scheme is to reduce the costs on storage, communication and computation. However, among existing aggregate signature schemes in the identity-based setting, some of them fail to achieve constant-length aggregate signature or require a large amount of pairing operations which grows linearly with the number of signers, while others have some limitations on the aggregated signatures. The main challenge in building efficient aggregate signature scheme is to compress signatures into a compact, constant-length signature without any restriction. To address the above drawbacks, by using the bilinear pairings, we propose an efficient unrestricted identity-based aggregate signature. Our scheme achieves both full aggregation and constant pairing computation. We prove that our scheme has existential unforgeability under the computational Diffie-Hellman assumption. PMID:25329777

  8. Efficient unrestricted identity-based aggregate signature scheme.

    PubMed

    Yuan, Yumin; Zhan, Qian; Huang, Hua

    2014-01-01

    An aggregate signature scheme allows anyone to compress multiple individual signatures from various users into a single compact signature. The main objective of such a scheme is to reduce the costs on storage, communication and computation. However, among existing aggregate signature schemes in the identity-based setting, some of them fail to achieve constant-length aggregate signature or require a large amount of pairing operations which grows linearly with the number of signers, while others have some limitations on the aggregated signatures. The main challenge in building efficient aggregate signature scheme is to compress signatures into a compact, constant-length signature without any restriction. To address the above drawbacks, by using the bilinear pairings, we propose an efficient unrestricted identity-based aggregate signature. Our scheme achieves both full aggregation and constant pairing computation. We prove that our scheme has existential unforgeability under the computational Diffie-Hellman assumption.

  9. Hybrid ARQ schemes employing coded modulation and sequence combining

    NASA Astrophysics Data System (ADS)

    Deng, Robert H.

    1994-06-01

    We propose and analyze two hybrid automatic-repeat-request (ARQ) schemes employing bandwidth efficient coded modulation and coded sequence combining. In the first scheme, a trellis-coded modulation (TCM) is used to control channel noise; while in the second scheme a concatenated coded modulation is employed. The concatenated coded modulation is formed by cascading a Reed-Solomon (RS) outer code and a coded modulation (BCM) inner code. In both schemes, the coded modulation decoder, by performing sequence combining and soft-decision maximum likelihood decoding, makes full use of the information available in all received sequences corresponding to a given information message. It is shown, by means of analysis as well as computer simulations, that both schemes are capable of providing high throughput efficiencies over a wide range of signal-to-noise ratios. The schemes are suitable for large file transfers over satellite communication links where high throughput and high reliability are required.

  10. An Efficient Remote Authentication Scheme for Wireless Body Area Network.

    PubMed

    Omala, Anyembe Andrew; Kibiwott, Kittur P; Li, Fagen

    2017-02-01

    Wireless body area network (WBAN) provide a mechanism of transmitting a persons physiological data to application providers e.g. hospital. Given the limited range of connectivity associated with WBAN, an intermediate portable device e.g. smartphone, placed within WBAN's connectivity, forwards the data to a remote server. This data, if not protected from an unauthorized access and modification may be lead to poor diagnosis. In order to ensure security and privacy between WBAN and a server at the application provider, several authentication schemes have been proposed. Recently, Wang and Zhang proposed an authentication scheme for WBAN using bilinear pairing. However, in their scheme, an application provider could easily impersonate a client. In order to overcome this weakness, we propose an efficient remote authentication scheme for WBAN. In terms of performance, our scheme can not only provide a malicious insider security, but also reduce running time of WBAN (client) by 51 % as compared to Wang and Zhang scheme.

  11. A novel quantum group signature scheme without using entangled states

    NASA Astrophysics Data System (ADS)

    Xu, Guang-Bao; Zhang, Ke-Jia

    2015-07-01

    In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

  12. Call Admission Control Scheme Based on Statistical Information

    NASA Astrophysics Data System (ADS)

    Fujiwara, Takayuki; Oki, Eiji; Shiomoto, Kohei

    A call admission control (CAC) scheme based on statistical information is proposed, called the statistical CAC scheme. A conventional scheme needs to manage session information for each link to update the residual bandwidth of a network in real time. This scheme has a scalability problem in terms of network size. The statistical CAC rejects session setup requests in accordance to a pre-computed ratio, called the rejection ratio. The rejection ratio is computed by using statistical information about the bandwidth requested for each link so that the congestion probability is less than an upper bound specified by a network operator. The statistical CAC is more scalable in terms of network size than the conventional scheme because it does not need to keep accommodated session state information. Numerical results show that the statistical CAC, even without exact session state information, only slightly degrades network utilization compared with the conventional scheme.

  13. A generalized well management scheme for reservoir simulation

    SciTech Connect

    Fang, W.Y.; Lo, K.K.

    1995-12-31

    A new generalized well management scheme has been formulated to maximize oil production under multiple facility constraints. The scheme integrates reserve performance, wellbore hydraulics, surface facility constraints and lift-gas allocation o maximize oil production. It predicts well performance based on up-to-date hydraulics and reservoir conditions. The scheme has been implemented in a black oil simulator by using Separable programming and Simplex algorithm. This production optimization scheme has been applied to two full-field models. The oil production of these two full-field models is limited by water, gas and liquid haling limits at both field- and flow station-levels. The gas production is limited by injectivity as well as gas handling limits. For a 12-year production forecast on Field A, the new scheme increased oil production by 3 to 9%. For a 12-year production forecast on field B, the new scheme increased oil production by 7 to 9%.

  14. Copyright protection scheme based on chaos and secret sharing techniques

    NASA Astrophysics Data System (ADS)

    Lou, Der-Chyuan; Shieh, Jieh-Ming; Tso, Hao-Kuan

    2005-11-01

    A copyright protection scheme based on chaos and secret sharing techniques is proposed. Instead of modifying the original image to embed a watermark in it, the proposed scheme extracts a feature from the image first. Then, the extracted feature and the watermark are scrambled by a chaos technique. Finally, the secret sharing technique is used to construct a shadow image. The watermark can be retrieved by performing an XOR operation between the shadow images. The proposed scheme has the following advantages. Firstly, the watermark retrieval does not need the original image. Secondly, the scheme does not need to modify the original image for embedding the watermark. Thirdly, compared with several schemes, the scheme is secure and robust in resisting various attacks.

  15. Developing High-Order Weighted Compact Nonlinear Schemes

    NASA Astrophysics Data System (ADS)

    Deng, Xiaogang; Zhang, Hanxin

    2000-11-01

    The weighted technique is introduced in the compact high-order nonlinear schemes (CNS) and three fourth- and fifth-order weighted compact nonlinear schemes (WCNS) are developed in this paper. By Fourier analysis, the dissipative and dispersive features of WCNS are discussed. In view of the modified wave number, the WCNS are equivalent to fifth-order upwind biased explicit schemes in smooth regions and the interpolations at cell-edges dominate the properties of WCNS. Both flux difference splitting and flux vector splitting methods can be applied in WCNS, though they are finite difference schemes. Boundary and near boundary schemes are developed and the asymptotic stability of WCNS is analyzed. Several numerical results are given which show the good performances of WCNS for discontinuity capture high accuracy for boundary layer calculation, and good convergent rate. We also compare WCNS with MUSCL scheme and spectral solutions. WCNS are more accurate than MUSCL, as expected, especially for heat transfer calculations.

  16. Alternating triangular schemes for convection-diffusion problems

    NASA Astrophysics Data System (ADS)

    Vabishchevich, P. N.; Zakharov, P. E.

    2016-04-01

    Explicit-implicit approximations are used to approximate nonstationary convection-diffusion equations in time. In unconditionally stable two-level schemes, diffusion is taken from the upper time level, while convection, from the lower layer. In the case of three time levels, the resulting explicit-implicit schemes are second-order accurate in time. Explicit alternating triangular (asymmetric) schemes are used for parabolic problems with a self-adjoint elliptic operator. These schemes are unconditionally stable, but conditionally convergent. Three-level modifications of alternating triangular schemes with better approximating properties were proposed earlier. In this work, two- and three-level alternating triangular schemes for solving boundary value problems for nonstationary convection-diffusion equations are constructed. Numerical results are presented for a two-dimensional test problem on triangular meshes, such as Delaunay triangulations and Voronoi diagrams.

  17. Convenient total variation diminishing conditions for nonlinear difference schemes

    NASA Technical Reports Server (NTRS)

    Tadmor, Eitan

    1986-01-01

    Convenient conditions for nonlinear difference schemes to be total-variation diminishing (TVD) are reviewed. It is shown that such schemes share the TVD property, provided their numerical fluxes meet a certain positivity condition at extrema values but can be arbitrary otherwise. The conditions are invariant under different incremental representations of the nonlinear schemes, and thus provide a simplified generalization of the TVD conditions due to Harten and others.

  18. New RSA-Based (Selectively) Convertible Undeniable Signature Schemes

    NASA Astrophysics Data System (ADS)

    Phong, Le Trieu; Kurosawa, Kaoru; Ogata, Wakaha

    In this paper, we design and analyze some new and practical (selectively) convertible undeniable signature (SCUS) schemes in both random oracle and standard model, which enjoy several merits over existing schemes in the literature. In particular, we design the first practical RSA-based SCUS schemes secure in the standard model. On the path, we also introduce two moduli RSA assumptions, including the strong twin RSA assumption, which is the RSA symmetry of the strong twin Diffie-Hellman assumption (Eurocrypt'08).

  19. Scheme for atomic-state teleportation between two bad cavities

    SciTech Connect

    Zheng Shibiao; Guo Guangcan

    2006-03-15

    A scheme is presented for the long-distance teleportation of an unknown atomic state between two separated cavities. Our scheme works in the regime where the atom-cavity coupling strength is smaller than the cavity decay rate. Thus the requirement on the quality factor of the cavities is greatly relaxed. Furthermore, the fidelity of our scheme is not affected by the detection inefficiency and atomic decay. These advantages are important in view of experiments.

  20. Multilevel programmable logic array schemes for microprogrammed automata

    SciTech Connect

    Barkalov, A.A.

    1995-03-01

    Programmable logic arrays (PLAs) provide an efficient tool for implementation of logic schemes of microprogrammed automata (MPA). The number of PLAs in the MPA logic scheme can be minimized by increasing the number of levels. In this paper, we analyze the structures of multilevel schemes of Mealy automata, propose a number of new structures, consider the corresponding correctness conditions, and examine some problems that must be solved in order to satisfy these conditions.

  1. Secret Sharing Schemes from Linear Codes over Finite Rings

    NASA Astrophysics Data System (ADS)

    Qian, Jianfa; Ma, Wenping

    An important concept in secret sharing scheme is the access structure. However, determining the access structure of the secret sharing scheme based on a linear code is a very difficult problem. In this work, we provide a method to construct a class of two-weight linear codes over finite rings. Based on the two-weight codes, we present an access structure of a secret sharing scheme.

  2. An Improved Chaotic Masking Scheme via System-Alternating

    NASA Astrophysics Data System (ADS)

    Wang, Xing-Yuan; Xu, Bing; Ma, Yutian

    2013-10-01

    Aiming at the drawbacks of the chaotic masking scheme, this paper optimizes this conventional scheme by using improved state observer method and system-alternating method, proposes a new secure communication scheme which can improve these drawbacks of chaotic method: (1) Restriction that the power of useful signal must be smaller than that of chaotic signal. (2) Low security. In addition, the model of this whole communication system is constructed under the system simulation environment of Simulink.

  3. A New Low Dissipative High Order Schemes for MHD Equations

    NASA Technical Reports Server (NTRS)

    Yee, H. C.; Sjoegreen, Bjoern; Mansour, Nagi (Technical Monitor)

    2002-01-01

    The goal of this talk is to extend our recently developed highly parallelizable nonlinear stable high order schemes for complex multiscale hydrodynamic applications to the viscous MHD equations. These schemes employed multiresolution wavelets as adaptive numerical dissipation controls to limit the amount and to aid the selection and/or blending of the appropriate types of dissipation to be used. The new scheme is formulated for both the conservative and non-conservative form of the MHD equations in curvilinear grids.

  4. Numerical schemes for a model for nonlinear dispersive waves

    NASA Technical Reports Server (NTRS)

    Bona, J. L.; Pritchard, W. G.; Scott, L. R.

    1985-01-01

    A description is given of a number of numerical schemes to solve an evolution equation (Korteweg-deVries) that arises when modelling the propagation of water waves in a channel. The discussion also includes the results of numerical experiments made with each of the schemes. It is suggested, on the basis of these experiments, that one of the schemes may have (discrete) solitary-wave solutions.

  5. Limitations of Non Model-Based Recognition Schemes

    DTIC Science & Technology

    1991-05-01

    general classes: model-based vs. non model-based schemes. In this paper we establish some limitation on the class of non model-based recognition schemes. A ...perfect, but is allowed to make mistakes and misidentify each object from a substantial fraction of viewing directions. It follows that every...symmetric objects) a nontrivial recognition scheme exists. We define the notion of a discrimination power of a consistent recognition function for a class

  6. Convection Schemes for Use with Curvilinear Coordinate Systems - A Survey.

    DTIC Science & Technology

    1984-06-01

    given by Gourlay and Morris fRef. 86). Finally any symetric combination of portions of the above two schemes is also a valid second-order scheme. For...feature characteristic of splitting methods. Implementations of the schemes L2 and L3 in 3D were given by Gourlay and Morris (Ref. 86) * and are...these sources of error are given. Gourlay and Morris (Ref. 85) discuss the formulation of immediate boundary condition for the time-split methods

  7. A comparison of SPH schemes for the compressible Euler equations

    NASA Astrophysics Data System (ADS)

    Puri, Kunal; Ramachandran, Prabhu

    2014-01-01

    We review the current state-of-the-art Smoothed Particle Hydrodynamics (SPH) schemes for the compressible Euler equations. We identify three prototypical schemes and apply them to a suite of test problems in one and two dimensions. The schemes are in order, standard SPH with an adaptive density kernel estimation (ADKE) technique introduced Sigalotti et al. (2008) [44], the variational SPH formulation of Price (2012) [33] (referred herein as the MPM scheme) and the Godunov type SPH (GSPH) scheme of Inutsuka (2002) [12]. The tests investigate the accuracy of the inviscid discretizations, shock capturing ability and the particle settling behavior. The schemes are found to produce nearly identical results for the 1D shock tube problems with the MPM and GSPH schemes being the most robust. The ADKE scheme requires parameter values which must be tuned to the problem at hand. We propose an addition of an artificial heating term to the GSPH scheme to eliminate unphysical spikes in the thermal energy at the contact discontinuity. The resulting modification is simple and can be readily incorporated in existing codes. In two dimensions, the differences between the schemes is more evident with the quality of results determined by the particle distribution. In particular, the ADKE scheme shows signs of particle clumping and irregular motion for the 2D strong shock and Sedov point explosion tests. The noise in particle data is linked with the particle distribution which remains regular for the Hamiltonian formulations (MPM and GSPH) and becomes irregular for the ADKE scheme. In the interest of reproducibility, we make available our implementation of the algorithms and test problems discussed in this work.

  8. Analysis of Plasma Communication Schemes for Hypersonic Vehicles: Final Report

    DTIC Science & Technology

    2009-02-01

    the ReComm scheme for communications through the plasma sheath surrounding a hypersonic vehicle during re-entry. We demonstrate that the time...physical processes of the ReComm scheme for communications through the plasma sheath surrounding a hypersonic vehicle during re-entry. The ReComm scheme...relation is derived to estimate the plasma heating in the sheath due to plasma waves excited by the antenna. Contents I. Introduction 4 II. Electron

  9. Scheme-Independent Predictions in QCD: Commensurate Scale Relations and Physical Renormalization Schemes

    SciTech Connect

    Brodsky, Stanley J.

    1998-12-04

    Commensurate scale relations are perturbative QCD predictions which relate observable to observable at fixed relative scale, such as the ''generalized Crewther relation'', which connects the Bjorken and Gross-Llewellyn Smith deep inelastic scattering sum rules to measurements of the e{sup +}e{sup {minus}} annihilation cross section. All non-conformal effects are absorbed by fixing the ratio of the respective momentum transfer and energy scales. In the case of fixed-point theories, commensurate scale relations relate both the ratio of couplings and the ratio of scales as the fixed point is approached. The relations between the observables are independent of the choice of intermediate renormalization scheme or other theoretical conventions. Commensurate scale relations also provide an extension of the standard minimal subtraction scheme, which is analytic in the quark masses, has non-ambiguous scale-setting properties, and inherits the physical properties of the effective charge {alpha}{sub V}(Q{sup 2}) defined from the heavy quark potential. The application of the analytic scheme to the calculation of quark-mass-dependent QCD corrections to the Z width is also reviewed.

  10. Scanning schemes in white light Photoelasticity - Part I: Critical assessment of existing schemes

    NASA Astrophysics Data System (ADS)

    Ramakrishnan, Vivek; Ramesh, K.

    2017-05-01

    The use of white light based Three Fringe Photoelasticity (TFP)/RGB Photoelasticity has gained importance in the recent years. With recent advances in TFP, it is possible to resolve fringe orders upto twelve. The main advantage of this technique is that it requires only a single image for isochromatic demodulation, which makes it suitable especially for problems where recording multiple images is difficult. The accuracy of isochromatic data obtained using TFP/RGB Photoelasticity is dependent on the scanning scheme used to refine the data, which is necessary to incorporate fringe order continuity. In this paper, the existing scanning schemes are critically evaluated for their ability to scan the entire model domain, influence of seed point selection and noise propagation. The scanning schemes are assessed using four problems of increasing level of geometric complexity - Circular disc under compression (simply connected), bi-axially loaded cruciform specimen with an inclined crack, a thick ring subjected to internal pressure and a finite plate with a hole (multiply connected).

  11. JOURNAL SCOPE GUIDELINES: Paper classification scheme

    NASA Astrophysics Data System (ADS)

    2005-06-01

    This scheme is used to clarify the journal's scope and enable authors and readers to more easily locate the appropriate section for their work. For each of the sections listed in the scope statement we suggest some more detailed subject areas which help define that subject area. These lists are by no means exhaustive and are intended only as a guide to the type of papers we envisage appearing in each section. We acknowledge that no classification scheme can be perfect and that there are some papers which might be placed in more than one section. We are happy to provide further advice on paper classification to authors upon request (please email jphysa@iop.org). 1. Statistical physics numerical and computational methods statistical mechanics, phase transitions and critical phenomena quantum condensed matter theory Bose-Einstein condensation strongly correlated electron systems exactly solvable models in statistical mechanics lattice models, random walks and combinatorics field-theoretical models in statistical mechanics disordered systems, spin glasses and neural networks nonequilibrium systems network theory 2. Chaotic and complex systems nonlinear dynamics and classical chaos fractals and multifractals quantum chaos classical and quantum transport cellular automata granular systems and self-organization pattern formation biophysical models 3. Mathematical physics combinatorics algebraic structures and number theory matrix theory classical and quantum groups, symmetry and representation theory Lie algebras, special functions and orthogonal polynomials ordinary and partial differential equations difference and functional equations integrable systems soliton theory functional analysis and operator theory inverse problems geometry, differential geometry and topology numerical approximation and analysis geometric integration computational methods 4. Quantum mechanics and quantum information theory coherent states eigenvalue problems supersymmetric quantum mechanics

  12. Studies of Inviscid Flux Schemes for Acoustics and Turbulence Problems

    NASA Technical Reports Server (NTRS)

    Morris, Chris

    2013-01-01

    Five different central difference schemes, based on a conservative differencing form of the Kennedy and Gruber skew-symmetric scheme, were compared with six different upwind schemes based on primitive variable reconstruction and the Roe flux. These eleven schemes were tested on a one-dimensional acoustic standing wave problem, the Taylor-Green vortex problem and a turbulent channel flow problem. The central schemes were generally very accurate and stable, provided the grid stretching rate was kept below 10%. As near-DNS grid resolutions, the results were comparable to reference DNS calculations. At coarser grid resolutions, the need for an LES SGS model became apparent. There was a noticeable improvement moving from CD-2 to CD-4, and higher-order schemes appear to yield clear benefits on coarser grids. The UB-7 and CU-5 upwind schemes also performed very well at near-DNS grid resolutions. The UB-5 upwind scheme does not do as well, but does appear to be suitable for well-resolved DNS. The UF-2 and UB-3 upwind schemes, which have significant dissipation over a wide spectral range, appear to be poorly suited for DNS or LES.

  13. Error function attack of chaos synchronization based encryption schemes.

    PubMed

    Wang, Xingang; Zhan, Meng; Lai, C-H; Gang, Hu

    2004-03-01

    Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the error function attack is presented systematically and used to evaluate system security. We define a quantitative measure (quality factor) of the effective applicability of a chaos encryption scheme, which takes into account the security, the encryption speed, and the robustness against channel noise. A comparison is made of several encryption schemes and it is found that a scheme based on one-way coupled chaotic map lattices performs outstandingly well, as judged from quality factor. Copyright 2004 American Institute of Physics.

  14. Scheme for achieving coherent perfect absorption by anisotropic metamaterials.

    PubMed

    Zhang, Xiujuan; Wu, Ying

    2017-03-06

    We propose a unified scheme to achieve coherent perfect absorption of electromagnetic waves by anisotropic metamaterials. The scheme describes the condition on perfect absorption and offers an inverse design route based on effective medium theory in conjunction with retrieval method to determine practical metamaterial absorbers. The scheme is scalable to frequencies and applicable to various incident angles. Numerical simulations show that perfect absorption is achieved in the designed absorbers over a wide range of incident angles, verifying the scheme. By integrating these absorbers, we further propose an absorber to absorb energy from two coherent point sources.

  15. Comparison of two SVD-based color image compression schemes.

    PubMed

    Li, Ying; Wei, Musheng; Zhang, Fengxia; Zhao, Jianli

    2017-01-01

    Color image compression is a commonly used process to represent image data as few bits as possible, which removes redundancy in the data while maintaining an appropriate level of quality for the user. Color image compression algorithms based on quaternion are very common in recent years. In this paper, we propose a color image compression scheme, based on the real SVD, named real compression scheme. First, we form a new real rectangular matrix C according to the red, green and blue components of the original color image and perform the real SVD for C. Then we select several largest singular values and the corresponding vectors in the left and right unitary matrices to compress the color image. We compare the real compression scheme with quaternion compression scheme by performing quaternion SVD using the real structure-preserving algorithm. We compare the two schemes in terms of operation amount, assignment number, operation speed, PSNR and CR. The experimental results show that with the same numbers of selected singular values, the real compression scheme offers higher CR, much less operation time, but a little bit smaller PSNR than the quaternion compression scheme. When these two schemes have the same CR, the real compression scheme shows more prominent advantages both on the operation time and PSNR.

  16. Comparison of two SVD-based color image compression schemes

    PubMed Central

    Li, Ying; Wei, Musheng; Zhang, Fengxia; Zhao, Jianli

    2017-01-01

    Color image compression is a commonly used process to represent image data as few bits as possible, which removes redundancy in the data while maintaining an appropriate level of quality for the user. Color image compression algorithms based on quaternion are very common in recent years. In this paper, we propose a color image compression scheme, based on the real SVD, named real compression scheme. First, we form a new real rectangular matrix C according to the red, green and blue components of the original color image and perform the real SVD for C. Then we select several largest singular values and the corresponding vectors in the left and right unitary matrices to compress the color image. We compare the real compression scheme with quaternion compression scheme by performing quaternion SVD using the real structure-preserving algorithm. We compare the two schemes in terms of operation amount, assignment number, operation speed, PSNR and CR. The experimental results show that with the same numbers of selected singular values, the real compression scheme offers higher CR, much less operation time, but a little bit smaller PSNR than the quaternion compression scheme. When these two schemes have the same CR, the real compression scheme shows more prominent advantages both on the operation time and PSNR. PMID:28257451

  17. A selective-repeat ARQ scheme with finite receiver buffer

    NASA Astrophysics Data System (ADS)

    Lin, S.; Wang, Y.-M.

    A group automatic repeat request (ARQ) error detection scheme for data communications systems are analyzed theoretically. Three types of ARQ error detection schemes are considered: a stop-and-wait ARQ, a go-back-N ARQ and a selective repeat ARQ. The throughput performance of each scheme was determined mathematically. It is found that the selective repeat ARQ offers much better throughput performance than the other two schemes, particularly when applied to error control in high bit rate channels with considerable round trip delay between the transmission of a data block and acknowledgement.

  18. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    NASA Astrophysics Data System (ADS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-02-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme.

  19. The constant displacement scheme for tracking particles in heterogeneous aquifers

    SciTech Connect

    Wen, X.H.; Gomez-Hernandez, J.J.

    1996-01-01

    Simulation of mass transport by particle tracking or random walk in highly heterogeneous media may be inefficient from a computational point of view if the traditional constant time step scheme is used. A new scheme which adjusts automatically the time step for each particle according to the local pore velocity, so that each particle always travels a constant distance, is shown to be computationally faster for the same degree of accuracy than the constant time step method. Using the constant displacement scheme, transport calculations in a 2-D aquifer model, with nature log-transmissivity variance of 4, can be 8.6 times faster than using the constant time step scheme.

  20. Deducing trapdoor primitives in public key encryption schemes

    NASA Astrophysics Data System (ADS)

    Pandey, Chandra

    2005-03-01

    Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.

  1. A chaos secure communication scheme based on multiplication modulation

    NASA Astrophysics Data System (ADS)

    Fallahi, Kia; Leung, Henry

    2010-02-01

    A secure spread spectrum communication scheme using multiplication modulation is proposed. The proposed system multiplies the message by chaotic signal. The scheme does not need to know the initial condition of the chaotic signals and the receiver is based on an extended Kalman filter (EKF). This signal encryption scheme lends itself to cheap implementation and can therefore be used effectively for ensuring security and privacy in commercial consumer electronics products. To illustrate the effectiveness of the proposed scheme, a numerical example based on Genesio-Tesi system and also Chen dynamical system is presented and the results are compared.

  2. Quantum fully homomorphic encryption scheme based on universal quantum circuit

    NASA Astrophysics Data System (ADS)

    Liang, Min

    2015-08-01

    Fully homomorphic encryption enables arbitrary computation on encrypted data without decrypting the data. Here it is studied in the context of quantum information processing. Based on universal quantum circuit, we present a quantum fully homomorphic encryption (QFHE) scheme, which permits arbitrary quantum transformation on any encrypted data. The QFHE scheme is proved to be perfectly secure. In the scheme, the decryption key is different from the encryption key; however, the encryption key cannot be revealed. Moreover, the evaluation algorithm of the scheme is independent of the encryption key, so it is suitable for delegated quantum computing between two parties.

  3. A cancellable and fuzzy fingerprint scheme for mobile computing security

    NASA Astrophysics Data System (ADS)

    Yang, Wencheng; Xi, Kai; Li, Cai

    2012-09-01

    Fingerprint recognition provides an effective user authentication solution for mobile computing systems. However, as a fingerprint template protection scheme, fingerprint fuzzy vault is subject to cross-matching attacks, since the same finger might be registered for various applications. In this paper, we propose a fingerprint-based biometric security scheme named the cancellable and fuzzy fingerprint scheme, which combines a cancellable non-linear transformation with the client/server version of fuzzy vault, to address the cross-matching attack in a mobile computing system. Experimental results demonstrate that our scheme can provide reliable and secure protection to the mobile computing system while achieving an acceptable matching performance.

  4. A Electronic Voting Scheme Achieved by Using Quantum Proxy Signature

    NASA Astrophysics Data System (ADS)

    Cao, Hai-Jing; Ding, Li-Yuan; Yu, Yao-Feng; Li, Peng-Fei

    2016-09-01

    In this paper, we propose a new electronic voting scheme using Bell entangled states as quantum channels. This scheme is based on quantum proxy signature. The voter Alice, vote management center Bob, teller Charlie and scrutineer Diana only perform single particle measurement to realize the electronic voting process. So the scheme reduces the technical difficulty and increases operation efficiency. It can be easily realized. We use quantum key distribution and one-time pad to guarantee its unconditional security. The scheme uses the physical characteristics of quantum mechanics to guarantee its anonymity, verifiability, unforgetability and undeniability.

  5. Quantum relay schemes for continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Guo, Ying; Liao, Qin; Huang, Duan; Zeng, Guihua

    2017-04-01

    We propose several concatenated quantum relay continuous-variable quantum key distribution schemes based on the parametric amplifier (PA) and the beam splitter (BS). Instead of using only one BS in the traditional relay scheme, the proposed schemes provide two operations that involve both PA and BS, activating the beam splitting and recombining operations in turn. These schemes would benefit the system performance improvement by providing signal amplification and establishing quantum correlations. We show that the different effects of the relay schemes will cause different system performances because of the varied signal-to-noise ratio (SNR) of output fields. The system's secret key rate will be increased when equipping with the PA-BS relay scheme, because the output fields of the PA are entangled with the correlated quantum noises while input fields of the BS are superimposed, subsequently leading to the quantum noise reduction of the total output fields of relay station, while the reversed BS-PA relay scheme has little advantage over the traditional counterpart that contains only one BS in relay data postprocessing because it will not cause any SNR improvement. Moreover, the reinforced PA-PA relay scheme results in a slight improvement due to the increased SNR. These quantum relay schemes can be performed through the beam splitting, the recombining operations, and the relay data postprocessing, such that it would be suitable for secret information exchange in complex networks with intermediate stations.

  6. On a fourth order accurate implicit finite difference scheme for hyperbolic conservation laws. II - Five-point schemes

    NASA Technical Reports Server (NTRS)

    Harten, A.; Tal-Ezer, H.

    1981-01-01

    This paper presents a family of two-level five-point implicit schemes for the solution of one-dimensional systems of hyperbolic conservation laws, which generalized the Crank-Nicholson scheme to fourth order accuracy (4-4) in both time and space. These 4-4 schemes are nondissipative and unconditionally stable. Special attention is given to the system of linear equations associated with these 4-4 implicit schemes. The regularity of this system is analyzed and efficiency of solution-algorithms is examined. A two-datum representation of these 4-4 implicit schemes brings about a compactification of the stencil to three mesh points at each time-level. This compact two-datum representation is particularly useful in deriving boundary treatments. Numerical results are presented to illustrate some properties of the proposed scheme.

  7. Scheme for accelerating quantum tunneling dynamics

    NASA Astrophysics Data System (ADS)

    Khujakulov, Anvar; Nakamura, Katsuhiro

    2016-02-01

    We propose a scheme of the exact fast forwarding of standard quantum dynamics for a charged particle. The present idea allows the acceleration of both the amplitude and the phase of the wave function throughout the fast-forward time range and is distinct from that of Masuda and Nakamura [Proc. R. Soc. A 466, 1135 (2010), 10.1098/rspa.2009.0446], which enabled acceleration of only the amplitude of the wave function on the way. We apply the proposed method to the quantum tunneling phenomena and obtain the electromagnetic field to ensure the rapid penetration of wave functions through a tunneling barrier. Typical examples described here are (1) an exponential wave packet passing through the δ -function barrier and (2) the opened Moshinsky shutter with a δ -function barrier just behind the shutter. We elucidate the tunneling current in the vicinity of the barrier and find a remarkable enhancement of the tunneling rate (tunneling power) due to the fast forwarding. In the case of a very high barrier, in particular, we present the asymptotic analysis and exhibit a suitable driving force to recover a recognizable tunneling current. The analysis is also carried out on the exact acceleration of macroscopic quantum tunneling with use of the nonlinear Schrödinger equation, which accommodates a tunneling barrier.

  8. Suboptimal fractal coding scheme using iterative transformation

    NASA Astrophysics Data System (ADS)

    Kang, Hyun-Soo; Chung, Jae-won

    2001-05-01

    This paper presents a new fractal coding scheme to find a suboptimal transformation by performing an iterative encoding process. The optimal transformation can be defined as the transformation generating the closest attractor to an original image. Unfortunately, it is impossible in practice to find the optimal transformation, due to the heavy computational burden. In this paper, however, by means of some new theorems related with contractive transformations and attractors. It is shown that for some specific cases the optimal or suboptimal transformations can be obtained. The proposed method obtains a suboptimal transformation by performing iterative processes as is done in decoding. Thus, it requires more computation than the conventional method, but it improves the image quality. For a simple case where the optimal transformation can actually be found, the proposed method is experimentally evaluated against both the optimal method and the conventional method. For a general case where the optimal transformation in unavailable due to heavy computational complexity, the proposed method is also evaluated in comparison with the conventional method.

  9. Landau pole in the pyramid scheme

    NASA Astrophysics Data System (ADS)

    Banks, Tom; Fortin, Jean-François; Kathrein, Scott

    2010-12-01

    We revisit the problem of the hidden sector Landau pole in the pyramid scheme. There is a fixed line in the plane of hidden sector gauge coupling and Yukawa couplings between the trianon fields. We postulate that the couplings flow to this line, at a point where the hidden sector gauge coupling is close to the strong coupling edge of its perturbative regime. Below the masses of the heavier trianons, the model quickly flows to a confining NF=NC=3 supersymmetric gauge theory, as required by phenomenological considerations. We study possible discrete R symmetries, which guarantee, among other things, that the basin of attraction of the fixed line has full codimension in the space of R-allowed couplings. The Yukawa couplings required to get the fixed line violate the pyrma-baryon symmetries we invoked in previous work to find a dark matter candidate. Omitting one of them, we have a dark matter candidate, and an acceptable renormalization group flow down from the unification scale, if the confinement scale of the hidden sector group is lowered from 5 to 2 TeV. However, we cannot find anomaly-free symmetries, which guarantee a set of pyrma-baryon violating couplings that eliminate the Landau pole, but do not allow a supersymmetry preserving vacuum of the model. We can do this with only one pyrma-baryon violating coupling, but this lowers the confinement scale to 900 GeV, which may already be ruled out due to light hidden sector baryons.

  10. Multiview image compression based on LDV scheme

    NASA Astrophysics Data System (ADS)

    Battin, Benjamin; Niquin, Cédric; Vautrot, Philippe; Debons, Didier; Lucas, Laurent

    2011-03-01

    In recent years, we have seen several different approaches dealing with multiview compression. First, we can find the H264/MVC extension which generates quite heavy bitstreams when used on n-views autostereoscopic medias and does not allow inter-view reconstruction. Another solution relies on the MVD (MultiView+Depth) scheme which keeps p views (n > p > 1) and their associated depth-maps. This method is not suitable for multiview compression since it does not exploit the redundancy between the p views, moreover occlusion areas cannot be accurately filled. In this paper, we present our method based on the LDV (Layered Depth Video) approach which keeps one reference view with its associated depth-map and the n-1 residual ones required to fill occluded areas. We first perform a global per-pixel matching step (providing a good consistency between each view) in order to generate one unified-color RGB texture (where a unique color is devoted to all pixels corresponding to the same 3D-point, thus avoiding illumination artifacts) and a signed integer disparity texture. Next, we extract the non-redundant information and store it into two textures (a unified-color one and a disparity one) containing the reference and the n-1 residual views. The RGB texture is compressed with a conventional DCT or DWT-based algorithm and the disparity texture with a lossless dictionary algorithm. Then, we will discuss about the signal deformations generated by our approach.

  11. PPLN Device Characterization and Novel Entanglement Schemes

    NASA Astrophysics Data System (ADS)

    Krupa, Sean; Stinaff, Eric; Nippa, David; Oesterling, Lee

    2013-03-01

    Bright sources of entangled photons are of great interest in the quantum information community, and the non-linear optical process of Spontaneous Parametric Downconversion (SPDC) is a well-known means to create entangled photons. Additionally, periodic polling has emerged as a viable choice for quasi-phase matching the downconverted photons rendering them useful for experimentation. Periodically Poled Lithium Niobate (PPLN) is among the best choices for these materials as it optically robust, temperature tunable, and commercially available. The addition of waveguide structures in PPLN devices not only increase its viability as a source of entangled photons but can also become an integral part of the entanglement schemes as well. Thorough characterization of PPLN devices is essential for the optimization of SPDC and their use to create entangled states. We will report characterization results for wave-guided PPLN devices including: waveguide geometry, fiber coupling efficiency, polling period details, and downconversion efficiency. Of particular interest is our device's ability to be used for novel entanglement states involving one or more waveguides.

  12. Date attachable offline electronic cash scheme.

    PubMed

    Fan, Chun-I; Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  13. Environmental endocrine disruptors: A proposed classification scheme

    SciTech Connect

    Fur, P.L. de; Roberts, J.

    1995-12-31

    A number of chemicals known to act on animal systems through the endocrine system have been termed environmental endocrine disruptors. This group includes some of the PCBs and TCDDs, as well as lead, mercury and a large number of pesticides. The common feature is that the chemicals interact with endogenous endocrine systems at the cellular and/or molecular level to alter normal processes that are controlled or regulated by hormones. Although the existence of artificial or environmental estrogens (e.g. chlordecone and DES) has been known for some time, recent data indicate that this phenomenon is widespread. Indeed, anti-androgens have been held responsible for reproductive dysfunction in alligator populations in Florida. But the significance of endocrine disruption was recognized by pesticide manufacturers when insect growth regulators were developed to interfere with hormonal control of growth. Controlling, regulating or managing these chemicals depends in no small part on the ability to identify, screen or otherwise know that a chemical is an endocrine disrupter. Two possible classifications schemes are: using the effects caused in an animal, or animals as an exposure indicator; and using a known screen for the point of contact with the animal. The former would require extensive knowledge of cause and effect relationships in dozens of animal groups; the latter would require a screening tool comparable to an estrogen binding assay. The authors present a possible classification based on chemicals known to disrupt estrogenic, androgenic and ecdysone regulated hormonal systems.

  14. Efficient lossless compression scheme for multispectral images

    NASA Astrophysics Data System (ADS)

    Benazza-Benyahia, Amel; Hamdi, Mohamed; Pesquet, Jean-Christophe

    2001-12-01

    Huge amounts of data are generated thanks to the continuous improvement of remote sensing systems. Archiving this tremendous volume of data is a real challenge which requires lossless compression techniques. Furthermore, progressive coding constitutes a desirable feature for telebrowsing. To this purpose, a compact and pyramidal representation of the input image has to be generated. Separable multiresolution decompositions have already been proposed for multicomponent images allowing each band to be decomposed separately. It seems however more appropriate to exploit also the spectral correlations. For hyperspectral images, the solution is to apply a 3D decomposition according to the spatial and to the spectral dimensions. This approach is not appropriate for multispectral images because of the reduced number of spectral bands. In recent works, we have proposed a nonlinear subband decomposition scheme with perfect reconstruction which exploits efficiently both the spatial and the spectral redundancies contained in multispectral images. In this paper, the problem of coding the coefficients of the resulting subband decomposition is addressed. More precisely, we propose an extension to the vector case of Shapiro's embedded zerotrees of wavelet coefficients (V-EZW) with achieves further saving in the bit stream. Simulations carried out on SPOT images indicate the outperformance of the global compression package we performed.

  15. A physical classification scheme for blazars

    NASA Astrophysics Data System (ADS)

    Landt, Hermine; Padovani, Paolo; Perlman, Eric S.; Giommi, Paolo

    2004-06-01

    Blazars are currently separated into BL Lacertae objects (BL Lacs) and flat spectrum radio quasars based on the strength of their emission lines. This is performed rather arbitrarily by defining a diagonal line in the Ca H&K break value-equivalent width plane, following Marchã et al. We readdress this problem and put the classification scheme for blazars on firm physical grounds. We study ~100 blazars and radio galaxies from the Deep X-ray Radio Blazar Survey (DXRBS) and 2-Jy radio survey and find a significant bimodality for the narrow emission line [OIII]λ5007. This suggests the presence of two physically distinct classes of radio-loud active galactic nuclei (AGN). We show that all radio-loud AGN, blazars and radio galaxies, can be effectively separated into weak- and strong-lined sources using the [OIII]λ5007-[OII]λ3727 equivalent width plane. This plane allows one to disentangle orientation effects from intrinsic variations in radio-loud AGN. Based on DXRBS, the strongly beamed sources of the new class of weak-lined radio-loud AGN are made up of BL Lacs at the ~75 per cent level, whereas those of the strong-lined radio-loud AGN include mostly (~97 per cent) quasars.

  16. Nonlinear inversion schemes for fluorescence optical tomography.

    PubMed

    Freiberger, Manuel; Egger, Herbert; Scharfetter, Hermann

    2010-11-01

    Fluorescence optical tomography is a non-invasive imaging modality that employs the absorption and re-emission of light by fluorescent dyes. The aim is to reconstruct the fluorophore distribution in a body from measurements of light intensities at the boundary. Due to the diffusive nature of light propagation in tissue, fluorescence tomography is a nonlinear and severely ill-posed problem, and some sort of regularization is required for a stable solution. In this paper we investigate reconstruction methods based on Tikhonov regularization with nonlinear penalty terms, namely total-variation regularization and a levelset-type method using a nonlinear parameterization of the unknown function. Moreover, we use the full threedimensional nonlinear forward model, which arises from the governing system of partial differential equations. We discuss the numerical realization of the regularization schemes by Newtontype iterations, present some details of the discretization by finite element methods, and outline the efficient implementation of sensitivity systems via adjoint methods. As we will demonstrate in numerical tests, the proposed nonlinear methods provide better reconstructions than standard methods based on linearized forward models and linear penalty terms. We will additionally illustrate, that the careful discretization of the methods derived on the continuous level allows to obtain reliable, mesh independent reconstruction algorithms.

  17. Date Attachable Offline Electronic Cash Scheme

    PubMed Central

    Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling. PMID:24982931

  18. Medical aid schemes respond to AIDS.

    PubMed

    Taylor, G

    1999-01-01

    The insurance and medical aid industries reacted strongly in the 1980s to alarmist predictions of the likely impact of HIV upon employee benefits. Actuaries and accountants moved quickly to contain the risk, and most medical aid trustees quickly implemented a total exclusion of HIV treatment from their benefits. For more than 1 decade, it was argued that HIV/AIDS is a self-inflicted illness, often categorized with other STDs. In response, healthcare providers simply bypassed insurance restrictions and compensation limits by masking patient diagnoses to reflect pneumonia or other ambiguous, yet fully reimbursable, illnesses. Now, common sense has finally prevailed as a few managed healthcare programs are stepping forward to break the impasse. The largest such program is Aid for AIDS, run by Pharmaceutical Benefit Management Ltd. for schemes within the Medscheme Group. The Group built an entirely new, secure unit off-site from their normal branches to guarantee the confidentiality of patients' records and diagnoses, while treatment guidelines have been issued to every practicing physician in the country.

  19. A community training scheme in cardiopulmonary resuscitation.

    PubMed Central

    Vincent, R; Martin, B; Williams, G; Quinn, E; Robertson, G; Chamberlain, D A

    1984-01-01

    Community instruction in basic life support and resuscitation techniques has been offered in Brighton Health District since 1978. Classes are held frequently for the general public and businesses, schools, and other organisations. First aid care for unconscious patients, the treatment of respiratory obstruction or failure, and the recognition and management of cardiac arrest is taught in a single two hour session. Over 20 000 people have been taught, up to 40 at a time in multiple groups of six to eight, by lay instructors usually supervised by ambulancemen trained to "paramedic" standards. Fifty four incidents have been reported to us in which techniques learnt in the classes have been implemented. Five patients recovered after first aid support but subsequently did not seek medical treatment. Of the 34 patients reviewed in hospital, at least 20 survived to be discharged. We believe that intervention may have been life saving in 16 instances. The benefit of cardiopulmonary resuscitation for victims who may have been asystolic is, however, difficult to quantify because the outcome without intervention cannot be predicted accurately. Community training in basic life support should be considered in association with ambulances equipped for resuscitation and hospital intensive care and cardiac care units as an integrated service for the victims of sudden circulatory or respiratory emergencies. The results achieved so far in Brighton and in other more advanced schemes, particularly in the United States of America, may encourage other health authorities to adopt similar programmes. PMID:6421403

  20. An efficient training scheme for supermodels

    NASA Astrophysics Data System (ADS)

    Schevenhoven, Francine J.; Selten, Frank M.

    2017-06-01

    Weather and climate models have improved steadily over time as witnessed by objective skill scores, although significant model errors remain. Given these imperfect models, predictions might be improved by combining them dynamically into a so-called supermodel. In this paper a new training scheme to construct such a supermodel is explored using a technique called cross pollination in time (CPT). In the CPT approach the models exchange states during the prediction. The number of possible predictions grows quickly with time, and a strategy to retain only a small number of predictions, called pruning, needs to be developed. The method is explored using low-order dynamical systems and applied to a global atmospheric model. The results indicate that the CPT training is efficient and leads to a supermodel with improved forecast quality as compared to the individual models. Due to its computational efficiency, the technique is suited for application to state-of-the art high-dimensional weather and climate models.

  1. Testing hydrodynamics schemes in galaxy disc simulations

    NASA Astrophysics Data System (ADS)

    Few, C. G.; Dobbs, C.; Pettitt, A.; Konstandin, L.

    2016-08-01

    We examine how three fundamentally different numerical hydrodynamics codes follow the evolution of an isothermal galactic disc with an external spiral potential. We compare an adaptive mesh refinement code (RAMSES), a smoothed particle hydrodynamics code (SPHNG), and a volume-discretized mesh-less code (GIZMO). Using standard refinement criteria, we find that RAMSES produces a disc that is less vertically concentrated and does not reach such high densities as the SPHNG or GIZMO runs. The gas surface density in the spiral arms increases at a lower rate for the RAMSES simulations compared to the other codes. There is also a greater degree of substructure in the SPHNG and GIZMO runs and secondary spiral arms are more pronounced. By resolving the Jeans length with a greater number of grid cells, we achieve more similar results to the Lagrangian codes used in this study. Other alterations to the refinement scheme (adding extra levels of refinement and refining based on local density gradients) are less successful in reducing the disparity between RAMSES and SPHNG/GIZMO. Although more similar, SPHNG displays different density distributions and vertical mass profiles to all modes of GIZMO (including the smoothed particle hydrodynamics version). This suggests differences also arise which are not intrinsic to the particular method but rather due to its implementation. The discrepancies between codes (in particular, the densities reached in the spiral arms) could potentially result in differences in the locations and time-scales for gravitational collapse, and therefore impact star formation activity in more complex galaxy disc simulations.

  2. The new cooperative medical scheme in China.

    PubMed

    You, Xuedan; Kobayashi, Yasuki

    2009-06-01

    The New Cooperative Medical Scheme (NCMS) is a heavily subsidized voluntary health insurance program established in 2003 to reduce the risk of catastrophic health spending for rural residents in China. In this review, we present the current collection of knowledge available regarding the performance of NCMS on the aspects of revenue collection, risk pooling, reimbursement rules and provider payment. The available evidence suggests that NCMS has substantially improved health care access and utilization among the participants; however, it appears to have no statistically significant effect on average household out-of-pocket health spending and catastrophic expenditure risk. As NCMS is rolled out to other counties, it must be careful to generalize the findings reported in the published papers and reports, because the early pilot counties were not randomly selected and there are a lot of local adaptations. In addition, we expect that NCMS could be an important opportunity to establish some trust-based institutions in the best interest of the participants to monitor provider quality and control cost inflation. Rigorous evaluations, based on richer and latest micro-level data, could considerably strengthen the evidence base for the performance and impact of NCMS.

  3. On schemes of combinatorial transcription logic.

    PubMed

    Buchler, Nicolas E; Gerland, Ulrich; Hwa, Terence

    2003-04-29

    Cells receive a wide variety of cellular and environmental signals, which are often processed combinatorially to generate specific genetic responses. Here we explore theoretically the potentials and limitations of combinatorial signal integration at the level of cis-regulatory transcription control. Our analysis suggests that many complex transcription-control functions of the type encountered in higher eukaryotes are already implementable within the much simpler bacterial transcription system. Using a quantitative model of bacterial transcription and invoking only specific protein-DNA interaction and weak glue-like interaction between regulatory proteins, we show explicit schemes to implement regulatory logic functions of increasing complexity by appropriately selecting the strengths and arranging the relative positions of the relevant protein-binding DNA sequences in the cis-regulatory region. The architectures that emerge are naturally modular and evolvable. Our results suggest that the transcription regulatory apparatus is a "programmable" computing machine, belonging formally to the class of Boltzmann machines. Crucial to our results is the ability to regulate gene expression at a distance. In bacteria, this can be achieved for isolated genes via DNA looping controlled by the dimerization of DNA-bound proteins. However, if adopted extensively in the genome, long-distance interaction can cause unintentional intergenic cross talk, a detrimental side effect difficult to overcome by the known bacterial transcription-regulation systems. This may be a key factor limiting the genome-wide adoption of complex transcription control in bacteria. Implications of our findings for combinatorial transcription control in eukaryotes are discussed.

  4. Splitting based finite volume schemes for ideal MHD equations

    NASA Astrophysics Data System (ADS)

    Fuchs, F. G.; Mishra, S.; Risebro, N. H.

    2009-02-01

    We design finite volume schemes for the equations of ideal magnetohydrodynamics (MHD) and based on splitting these equations into a fluid part and a magnetic induction part. The fluid part leads to an extended Euler system with magnetic forces as source terms. This set of equations are approximated by suitable two- and three-wave HLL solvers. The magnetic part is modeled by the magnetic induction equations which are approximated using stable upwind schemes devised in a recent paper [F. Fuchs, K.H. Karlsen, S. Mishra, N.H. Risebro, Stable upwind schemes for the Magnetic Induction equation. Math. Model. Num. Anal., Available on conservation laws preprint server, submitted for publication, URL: ]. These two sets of schemes can be combined either component by component, or by using an operator splitting procedure to obtain a finite volume scheme for the MHD equations. The resulting schemes are simple to design and implement. These schemes are compared with existing HLL type and Roe type schemes for MHD equations in a series of numerical experiments. These tests reveal that the proposed schemes are robust and have a greater numerical resolution than HLL type solvers, particularly in several space dimensions. In fact, the numerical resolution is comparable to that of the Roe scheme on most test problems with the computational cost being at the level of a HLL type solver. Furthermore, the schemes are remarkably stable even at very fine mesh resolutions and handle the divergence constraint efficiently with low divergence errors.

  5. An optimized spectral difference scheme for CAA problems

    NASA Astrophysics Data System (ADS)

    Gao, Junhui; Yang, Zhigang; Li, Xiaodong

    2012-05-01

    In the implementation of spectral difference (SD) method, the conserved variables at the flux points are calculated from the solution points using extrapolation or interpolation schemes. The errors incurred in using extrapolation and interpolation would result in instability. On the other hand, the difference between the left and right conserved variables at the edge interface will introduce dissipation to the SD method when applying a Riemann solver to compute the flux at the element interface. In this paper, an optimization of the extrapolation and interpolation schemes for the fourth order SD method on quadrilateral element is carried out in the wavenumber space through minimizing their dispersion error over a selected band of wavenumbers. The optimized coefficients of the extrapolation and interpolation are presented. And the dispersion error of the original and optimized schemes is plotted and compared. An improvement of the dispersion error over the resolvable wavenumber range of SD method is obtained. The stability of the optimized fourth order SD scheme is analyzed. It is found that the stability of the 4th order scheme with Chebyshev-Gauss-Lobatto flux points, which is originally weakly unstable, has been improved through the optimization. The weak instability is eliminated completely if an additional second order filter is applied on selected flux points. One and two dimensional linear wave propagation analyses are carried out for the optimized scheme. It is found that in the resolvable wavenumber range the new SD scheme is less dispersive and less dissipative than the original scheme, and the new scheme is less anisotropic for 2D wave propagation. The optimized SD solver is validated with four computational aeroacoustics (CAA) workshop benchmark problems. The numerical results with optimized schemes agree much better with the analytical data than those with the original schemes.

  6. New User Support in the University Network with DACS Scheme

    ERIC Educational Resources Information Center

    Odagiri, Kazuya; Yaegashi, Rihito; Tadauchi, Masaharu; Ishii, Naohiro

    2007-01-01

    Purpose: The purpose of this paper is to propose and examine the new user support in university network. Design/methodology/approach: The new user support is realized by use of DACS (Destination Addressing Control System) Scheme which manages a whole network system through communication control on a client computer. This DACS Scheme has been…

  7. Second-order accurate nonoscillatory schemes for scalar conservation laws

    NASA Technical Reports Server (NTRS)

    Huynh, Hung T.

    1989-01-01

    Explicit finite difference schemes for the computation of weak solutions of nonlinear scalar conservation laws is presented and analyzed. These schemes are uniformly second-order accurate and nonoscillatory in the sense that the number of extrema of the discrete solution is not increasing in time.

  8. Stable Difference Schemes for the Neutron Transport Equation

    NASA Astrophysics Data System (ADS)

    Ashyralyev, Allaberen; Taskin, Abdulgafur

    2011-09-01

    The initial boundary value problem for the neutron transport equation is considered. The first and second orders of accuracy difference schemes for the approximate solution of this problem are presented. In applications, the stability estimates for solutions of difference schemes for the approximate solution of the neutron transport equation are obtained. Numerical techniques are developed and algorithms are tested on an example in MATLAB.

  9. Second-order accurate difference schemes on highly irregular meshes

    SciTech Connect

    Manteuffel, T.A.; White, A.B. Jr.

    1988-01-01

    In this paper compact-as-possible second-order accurate difference schemes will be constructed for boundary-value problems of arbitrary order on highly irregular meshes. It will be shown that for equations of order (K) these schemes will have truncation error of order (3/endash/K). This phenomena is known as supraconvergence. 7 refs.

  10. A simple quantum voting scheme with multi-qubit entanglement.

    PubMed

    Xue, Peng; Zhang, Xin

    2017-08-08

    We propose a simple quantum voting scenario with a set of pairs of particles in a multi-particle entangled state. This scenario is suitable for large scale general votings. We also provide a proof of security of our scheme against the most general type of attack by generalizing Shor and Preskill's proof of security of the other schemes.

  11. Evaluation in an Autonomous Learning Scheme. Melanges Pedagogiques, 1977.

    ERIC Educational Resources Information Center

    Henner-Stanchina, C.; Holec, H.

    This document consists of a discussion of the place and nature of evaluation within the autonomous learning scheme developed by the Centre de Recherches et d'Applications Pedagogiques en Langues (C.R.A.P.E.L.). The center's commitment to the development of an autonomous learning scheme dates back several years. It is the outcome of an attempt to…

  12. Resolution-optimised nonlinear scheme for secondary derivatives

    NASA Astrophysics Data System (ADS)

    Li, Li; Yu, Changping; Chen, Zhe; Li, Xinliang

    2016-02-01

    A 5-point-stencil optimised nonlinear scheme with spectral-like resolution within the whole wave number range for secondary derivatives is devised. The proposed scheme can compensate for the dissipation deficiency of traditional linear schemes and suppress the spurious energy accumulation that occurs at high wave numbers, both of which are frequently encountered in large eddy simulation. The new scheme is composed of a linear fourth-order central scheme term and an artificial viscosity term. These two terms are connected by a nonlinear weight. The proposed nonlinear weight is designed based on Fourier analysis, rather than Taylor analysis, to guarantee a spectral-like resolution. Moreover, the accuracy is not affected by the optimisation, and the new scheme reaches fourth-order accuracy. The new scheme is tested numerically using the one-dimensional diffusion problem, one-dimensional steady viscous Burger's shock, two-dimensional vortex decaying, three-dimensional isotropic decaying turbulence and fully developed turbulent channel flow. All the tests confirm that the new scheme has spectral-like resolution and can improve the accuracy of the energy spectrum, dissipation rate and high-order statistics of turbulent flows.

  13. 7 CFR 623.21 - Scheme and device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 623.21 Section 623.21 Agriculture Regulations of the Department of Agriculture (Continued) NATURAL RESOURCES CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE WATER RESOURCES EMERGENCY WETLANDS RESERVE PROGRAM § 623.21 Scheme and device. (a) If it is...

  14. 7 CFR 625.19 - Scheme and device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 625.19 Section 625.19 Agriculture Regulations of the Department of Agriculture (Continued) NATURAL RESOURCES CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE WATER RESOURCES HEALTHY FORESTS RESERVE PROGRAM § 625.19 Scheme and device. (a) If it is...

  15. Quantum secret sharing schemes and reversibility of quantum operations

    SciTech Connect

    Ogawa, Tomohiro; Sasaki, Akira; Iwamoto, Mitsugu; Yamamoto, Hirosuke

    2005-09-15

    Quantum secret sharing schemes encrypting a quantum state into a multipartite entangled state are treated. The lower bound on the dimension of each share given by Gottesman [Phys. Rev. A 61, 042311 (2000)] is revisited based on a relation between the reversibility of quantum operations and the Holevo information. We also propose a threshold ramp quantum secret sharing scheme and evaluate its coding efficiency.

  16. A modified symplectic PRK scheme for seismic wave modeling

    NASA Astrophysics Data System (ADS)

    Liu, Shaolin; Yang, Dinghui; Ma, Jian

    2017-02-01

    A new scheme for the temporal discretization of the seismic wave equation is constructed based on symplectic geometric theory and a modified strategy. The ordinary differential equation in terms of time, which is obtained after spatial discretization via the spectral-element method, is transformed into a Hamiltonian system. A symplectic partitioned Runge-Kutta (PRK) scheme is used to solve the Hamiltonian system. A term related to the multiplication of the spatial discretization operator with the seismic wave velocity vector is added into the symplectic PRK scheme to create a modified symplectic PRK scheme. The symplectic coefficients of the new scheme are determined via Taylor series expansion. The positive coefficients of the scheme indicate that its long-term computational capability is more powerful than that of conventional symplectic schemes. An exhaustive theoretical analysis reveals that the new scheme is highly stable and has low numerical dispersion. The results of three numerical experiments demonstrate the high efficiency of this method for seismic wave modeling.

  17. 15 CFR Appendix I to Part 921 - Biogeographic Classification Scheme

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 3 2013-01-01 2013-01-01 false Biogeographic Classification Scheme I... Part 921—Biogeographic Classification Scheme Acadian 1. Northern of Maine (Eastport to the Sheepscot.... Jefferson and south.) 10. West Florida (Ft. Jefferson to Cedar Key.) Louisianian 11. Panhandle Coast (Cedar...

  18. 15 CFR Appendix I to Part 921 - Biogeographic Classification Scheme

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 3 2012-01-01 2012-01-01 false Biogeographic Classification Scheme I... Part 921—Biogeographic Classification Scheme Acadian 1. Northern of Maine (Eastport to the Sheepscot.... Jefferson and south.) 10. West Florida (Ft. Jefferson to Cedar Key.) Louisianian 11. Panhandle Coast (Cedar...

  19. 15 CFR Appendix I to Part 921 - Biogeographic Classification Scheme

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Biogeographic Classification Scheme I... Part 921—Biogeographic Classification Scheme Acadian 1. Northern of Maine (Eastport to the Sheepscot.... Jefferson and south.) 10. West Florida (Ft. Jefferson to Cedar Key.) Louisianian 11. Panhandle Coast (Cedar...

  20. 15 CFR Appendix I to Part 921 - Biogeographic Classification Scheme

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 3 2014-01-01 2014-01-01 false Biogeographic Classification Scheme I... Part 921—Biogeographic Classification Scheme Acadian 1. Northern of Maine (Eastport to the Sheepscot.... Jefferson and south.) 10. West Florida (Ft. Jefferson to Cedar Key.) Louisianian 11. Panhandle Coast (Cedar...

  1. 15 CFR Appendix I to Part 921 - Biogeographic Classification Scheme

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 3 2011-01-01 2011-01-01 false Biogeographic Classification Scheme I... Part 921—Biogeographic Classification Scheme Acadian 1. Northern of Maine (Eastport to the Sheepscot.... Jefferson and south.) 10. West Florida (Ft. Jefferson to Cedar Key.) Louisianian 11. Panhandle Coast (Cedar...

  2. State of the Art in the Cramer Classification Scheme and ...

    EPA Pesticide Factsheets

    Slide presentation at the SOT FDA Colloquium on State of the Art in the Cramer Classification Scheme and Threshold of Toxicological Concern in College Park, MD. Slide presentation at the SOT FDA Colloquium on State of the Art in the Cramer Classification Scheme and Threshold of Toxicological Concern in College Park, MD.

  3. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device. (a...

  4. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device. (a...

  5. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device. (a...

  6. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device. (a...

  7. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device. (a...

  8. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 1 2014-01-01 2014-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture Office of the Secretary of Agriculture HIGHLY ERODIBLE LAND AND WETLAND CONSERVATION General Provisions § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person...

  9. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 1 2013-01-01 2013-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture Office of the Secretary of Agriculture HIGHLY ERODIBLE LAND AND WETLAND CONSERVATION General Provisions § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person...

  10. 7 CFR 1467.19 - Scheme and device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Scheme and device. 1467.19 Section 1467.19 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS WETLANDS RESERVE PROGRAM § 1467.19 Scheme...

  11. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 1 2011-01-01 2011-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture Office of the Secretary of Agriculture HIGHLY ERODIBLE LAND AND WETLAND CONSERVATION General Provisions § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person...

  12. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture Office of the Secretary of Agriculture HIGHLY ERODIBLE LAND AND WETLAND CONSERVATION General Provisions § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person...

  13. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 1 2012-01-01 2012-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture Office of the Secretary of Agriculture HIGHLY ERODIBLE LAND AND WETLAND CONSERVATION General Provisions § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person...

  14. Dropping out of Ethiopia's community-based health insurance scheme.

    PubMed

    Mebratie, Anagaw D; Sparrow, Robert; Yilma, Zelalem; Alemu, Getnet; Bedi, Arjun S

    2015-12-01

    Low contract renewal rates have been identified as one of the challenges facing the development of community-based health insurance (CBHI) schemes. This article uses longitudinal household survey data gathered in 2012 and 2013 to examine dropout in the case of Ethiopia's pilot CBHI scheme. We treat dropout as a function of scheme affordability, health status, scheme understanding and quality of care. The scheme saw enrolment increase from 41% 1 year after inception to 48% a year later. An impressive 82% of those who enrolled in the first year renewed their subscriptions, while 25% who had not enrolled joined the scheme. The analysis shows that socioeconomic status, a greater understanding of health insurance and experience with and knowledge of the CBHI scheme are associated with lower dropout rates. While there are concerns about the quality of care and the treatment meted out to the insured by providers, the overall picture is that returns from the scheme are overwhelmingly positive. For the bulk of households, premiums do not seem to be onerous, basic understanding of health insurance is high and almost all those who are currently enrolled signalled their desire to renew contracts.

  15. Stable explicit schemes for equations of Schroedinger type

    NASA Technical Reports Server (NTRS)

    Mickens, Ronald E.

    1989-01-01

    A method for constructing explicit finite-difference schemes which can be used to solve Schroedinger-type partial-differential equations is presented. A forward Euler scheme that is conditionally stable is given by the procedure. The results presented are based on the analysis of the simplest Schroedinger type equation.

  16. Evaluation of the Danish Leave Schemes. Summary of a Report.

    ERIC Educational Resources Information Center

    Andersen, Dines; Appeldorn, Alice; Weise, Hanne

    An evaluation examined how the Danish leave schemes, an offer to employed and unemployed persons who qualify for unemployment benefits, were functioning and to what extent the objectives have been achieved. It was found that 60 percent of those taking leave had previously been unemployed; women accounted for two-thirds of those joining the scheme;…

  17. Convergence Acceleration for Multistage Time-Stepping Schemes

    NASA Technical Reports Server (NTRS)

    Swanson, R. C.; Turkel, Eli L.; Rossow, C-C; Vasta, V. N.

    2006-01-01

    The convergence of a Runge-Kutta (RK) scheme with multigrid is accelerated by preconditioning with a fully implicit operator. With the extended stability of the Runge-Kutta scheme, CFL numbers as high as 1000 could be used. The implicit preconditioner addresses the stiffness in the discrete equations associated with stretched meshes. Numerical dissipation operators (based on the Roe scheme, a matrix formulation, and the CUSP scheme) as well as the number of RK stages are considered in evaluating the RK/implicit scheme. Both the numerical and computational efficiency of the scheme with the different dissipation operators are discussed. The RK/implicit scheme is used to solve the two-dimensional (2-D) and three-dimensional (3-D) compressible, Reynolds-averaged Navier-Stokes equations. In two dimensions, turbulent flows over an airfoil at subsonic and transonic conditions are computed. The effects of mesh cell aspect ratio on convergence are investigated for Reynolds numbers between 5.7 x 10(exp 6) and 100.0 x 10(exp 6). Results are also obtained for a transonic wing flow. For both 2-D and 3-D problems, the computational time of a well-tuned standard RK scheme is reduced at least a factor of four.

  18. LDPC-PPM Coding Scheme for Optical Communication

    NASA Technical Reports Server (NTRS)

    Barsoum, Maged; Moision, Bruce; Divsalar, Dariush; Fitz, Michael

    2009-01-01

    In a proposed coding-and-modulation/demodulation-and-decoding scheme for a free-space optical communication system, an error-correcting code of the low-density parity-check (LDPC) type would be concatenated with a modulation code that consists of a mapping of bits to pulse-position-modulation (PPM) symbols. Hence, the scheme is denoted LDPC-PPM. This scheme could be considered a competitor of a related prior scheme in which an outer convolutional error-correcting code is concatenated with an interleaving operation, a bit-accumulation operation, and a PPM inner code. Both the prior and present schemes can be characterized as serially concatenated pulse-position modulation (SCPPM) coding schemes. Figure 1 represents a free-space optical communication system based on either the present LDPC-PPM scheme or the prior SCPPM scheme. At the transmitting terminal, the original data (u) are processed by an encoder into blocks of bits (a), and the encoded data are mapped to PPM of an optical signal (c). For the purpose of design and analysis, the optical channel in which the PPM signal propagates is modeled as a Poisson point process. At the receiving terminal, the arriving optical signal (y) is demodulated to obtain an estimate (a^) of the coded data, which is then processed by a decoder to obtain an estimate (u^) of the original data.

  19. 7 CFR 1469.36 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1469.36 Section 1469.36 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT... General Administration § 1469.36 Misrepresentation and scheme or device. (a) If the Department determines...

  20. 7 CFR 1470.36 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1470.36 Section 1470.36 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT... General Administration § 1470.36 Misrepresentation and scheme or device. (a) If NRCS determines that an...

  1. 7 CFR 1421.305 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1421.305... the 2008 Through 2012 Crop of Wheat, Barley, Oats, and Triticale § 1421.305 Misrepresentation and... producer engaged in a misrepresentation, scheme, or device, or to any other person as a result of the...

  2. 7 CFR 760.819 - Misrepresentation, scheme, or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation, scheme, or device. 760.819 Section 760.819 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY....819 Misrepresentation, scheme, or device. (a) A person is ineligible to receive assistance under this...

  3. 7 CFR 1468.35 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1468.35 Section 1468.35 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT... Administration § 1468.35 Misrepresentation and scheme or device. (a) A participant who is determined to have...

  4. 7 CFR 1465.35 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1465.35 Section 1465.35 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT... ASSISTANCE General Administration § 1465.35 Misrepresentation and scheme or device. (a) A participant who is...

  5. 7 CFR 1466.35 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1466.35 Section 1466.35 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT... PROGRAM General Administration § 1466.35 Misrepresentation and scheme or device. (a) A person, joint...

  6. Maternal healthcare financing: Gujarat's Chiranjeevi Scheme and its beneficiaries.

    PubMed

    Bhat, Ramesh; Mavalankar, Dileep V; Singh, Prabal V; Singh, Neelu

    2009-04-01

    Maternal mortality is an important public-health issue in India, specifically in Gujarat. Contributing factors are the Government's inability to operationalize the First Referral Units and to provide an adequate level of skilled birth attendants, especially to the poor. In response, the Gujarat state has developed a unique public-private partnership called the Chiranjeevi Scheme. This scheme focuses on institutional delivery, specifically emergency obstetric care for the poor. The objective of the study was to explore the targeting of the scheme, its coverage, and socioeconomic profile of the beneficiaries and to assess financial protection offered by the scheme, if any, in Dahod, one of the initial pilot districts of Gujarat. A household-level survey of beneficiaries (n=262) and non-users (n=394) indicated that the scheme is well-targeted to the poor but many poor people do not use the services. The beneficiaries saved more than Rs 3000 (US$ 75) in delivery-related expenses and were generally satisfied with the scheme. The study provided insights on how to improve the scheme further. Such a financing scheme could be replicated in other states and countries to address the cost barrier, especially in areas where high numbers of private specialists are available.

  7. A FRACTAL-BASED STOCHASTIC INTERPOLATION SCHEME IN SUBSURFACE HYDROLOGY

    EPA Science Inventory

    The need for a realistic and rational method for interpolating sparse data sets is widespread. Real porosity and hydraulic conductivity data do not vary smoothly over space, so an interpolation scheme that preserves irregularity is desirable. Such a scheme based on the properties...

  8. A high-speed distortionless predictive image-compression scheme

    NASA Technical Reports Server (NTRS)

    Cheung, K.-M.; Smyth, P.; Wang, H.

    1990-01-01

    A high-speed distortionless predictive image-compression scheme that is based on differential pulse code modulation output modeling combined with efficient source-code design is introduced. Experimental results show that this scheme achieves compression that is very close to the difference entropy of the source.

  9. 7 CFR 625.20 - Scheme and device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 6 2012-01-01 2012-01-01 false Scheme and device. 625.20 Section 625.20 Agriculture Regulations of the Department of Agriculture (Continued) NATURAL RESOURCES CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE WATER RESOURCES HEALTHY FORESTS RESERVE PROGRAM § 625.20 Scheme and device. (a) If it is...

  10. 7 CFR 625.20 - Scheme and device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 6 2011-01-01 2011-01-01 false Scheme and device. 625.20 Section 625.20 Agriculture Regulations of the Department of Agriculture (Continued) NATURAL RESOURCES CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE WATER RESOURCES HEALTHY FORESTS RESERVE PROGRAM § 625.20 Scheme and device. (a) If it is...

  11. 7 CFR 625.20 - Scheme and device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 6 2014-01-01 2014-01-01 false Scheme and device. 625.20 Section 625.20 Agriculture Regulations of the Department of Agriculture (Continued) NATURAL RESOURCES CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE WATER RESOURCES HEALTHY FORESTS RESERVE PROGRAM § 625.20 Scheme and device. (a) If it is...

  12. 7 CFR 625.20 - Scheme and device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 6 2013-01-01 2013-01-01 false Scheme and device. 625.20 Section 625.20 Agriculture Regulations of the Department of Agriculture (Continued) NATURAL RESOURCES CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE WATER RESOURCES HEALTHY FORESTS RESERVE PROGRAM § 625.20 Scheme and device. (a) If it is...

  13. Ranking Schemes in Hybrid Boolean Systems: A New Approach.

    ERIC Educational Resources Information Center

    Savoy, Jacques

    1997-01-01

    Suggests a new ranking scheme especially adapted for hypertext environments in order to produce more effective retrieval results and still use Boolean search strategies. Topics include Boolean ranking schemes; single-term indexing and term weighting; fuzzy set theory extension; and citation indexing. (64 references) (Author/LRW)

  14. New User Support in the University Network with DACS Scheme

    ERIC Educational Resources Information Center

    Odagiri, Kazuya; Yaegashi, Rihito; Tadauchi, Masaharu; Ishii, Naohiro

    2007-01-01

    Purpose: The purpose of this paper is to propose and examine the new user support in university network. Design/methodology/approach: The new user support is realized by use of DACS (Destination Addressing Control System) Scheme which manages a whole network system through communication control on a client computer. This DACS Scheme has been…

  15. Performance improvement of robots using a learning control scheme

    NASA Technical Reports Server (NTRS)

    Krishna, Ramuhalli; Chiang, Pen-Tai; Yang, Jackson C. S.

    1987-01-01

    Many applications of robots require that the same task be repeated a number of times. In such applications, the errors associated with one cycle are also repeated every cycle of the operation. An off-line learning control scheme is used here to modify the command function which would result in smaller errors in the next operation. The learning scheme is based on a knowledge of the errors and error rates associated with each cycle. Necessary conditions for the iterative scheme to converge to zero errors are derived analytically considering a second order servosystem model. Computer simulations show that the errors are reduced at a faster rate if the error rate is included in the iteration scheme. The results also indicate that the scheme may increase the magnitude of errors if the rate information is not included in the iteration scheme. Modification of the command input using a phase and gain adjustment is also proposed to reduce the errors with one attempt. The scheme is then applied to a computer model of a robot system similar to PUMA 560. Improved performance of the robot is shown by considering various cases of trajectory tracing. The scheme can be successfully used to improve the performance of actual robots within the limitations of the repeatability and noise characteristics of the robot.

  16. Increasing Employability: An Evaluation of the Fullemploy Training Scheme.

    ERIC Educational Resources Information Center

    Pearn, M. A.; Munene, J.

    The Fullemploy Training Scheme is an experiment designed to overcome problems encountered by disadvantaged youth in Britain's Manpower Services Commission's job training program. The aim of the scheme is to bring minority disadvantaged young people into a special office skills training course which would combine vocational training with…

  17. A Pilot CAI Scheme for the Malaysian Secondary Education System.

    ERIC Educational Resources Information Center

    Rao, A. Kanakaratnam; Rao, G. S.

    1982-01-01

    A multi-phase computer aided instruction (CAI) scheme for Malaysian Secondary Schools and Matriculation Centres attached to local universities is presented as an aid for improving instruction and for solving some problems presently faced by the Malaysian Secondary Education System. Some approaches for successful implementation of a CAI scheme are…

  18. On the novel chaotic secure communication scheme design

    NASA Astrophysics Data System (ADS)

    Wang, B.; Zhong, S. M.; Dong, X. C.

    2016-10-01

    In this paper, the problem on the chaotic secure communication is discussed. First a new dual channel transmission mechanism is presented and used in secure communication scheme design, then the channel-switching techniques are adopted to further improve the security of information transmission. Finally some typical numerical simulations are carried out to demonstrate the effectiveness of the proposed secure communication scheme.

  19. A Scale of Cognitive Development: Validating Perry's Scheme.

    ERIC Educational Resources Information Center

    Fago, George C.

    When William G. Perry (1968) developed his scheme of nine stages of cognitive development, most of which are experienced during the college years, he did not attempt to quantify it. Subsequently, T. D. Erwin (1983) constructed a scale that attempted to quantify the Perry scheme. His findings supported the overall conception of student development…

  20. Distinguishing Schemes and Tasks in Children's Development of Multiplicative Reasoning

    ERIC Educational Resources Information Center

    Tzur, Ron; Johnson, Heather L.; McClintock, Evan; Kenney, Rachael H.; Xin, Yan P.; Si, Luo; Woordward, Jerry; Hord, Casey; Jin, Xianyan

    2013-01-01

    We present a synthesis of findings from constructivist teaching experiments regarding six schemes children construct for reasoning multiplicatively and tasks to promote them. We provide a task-generating platform game, depictions of each scheme, and supporting tasks. Tasks must be distinguished from children's thinking, and learning situations…

  1. A FRACTAL-BASED STOCHASTIC INTERPOLATION SCHEME IN SUBSURFACE HYDROLOGY

    EPA Science Inventory

    The need for a realistic and rational method for interpolating sparse data sets is widespread. Real porosity and hydraulic conductivity data do not vary smoothly over space, so an interpolation scheme that preserves irregularity is desirable. Such a scheme based on the properties...

  2. New Concepts in Instrumentation Development to Measure the Perry Scheme.

    ERIC Educational Resources Information Center

    Taylor, Marcia

    The Perry scheme of intellectual and ethical development has become widely used in a range of academic disciplines and such areas as career training and faculty consultation. However, current measurement techniques for the scheme, whether interview format or paper and pencil measures, do not adequately address issues related to assessing cognitive…

  3. An improved SPH scheme for cosmological simulations

    NASA Astrophysics Data System (ADS)

    Beck, A. M.; Murante, G.; Arth, A.; Remus, R.-S.; Teklu, A. F.; Donnert, J. M. F.; Planelles, S.; Beck, M. C.; Förster, P.; Imgrund, M.; Dolag, K.; Borgani, S.

    2016-01-01

    We present an implementation of smoothed particle hydrodynamics (SPH) with improved accuracy for simulations of galaxies and the large-scale structure. In particular, we implement and test a vast majority of SPH improvement in the developer version of GADGET-3. We use the Wendland kernel functions, a particle wake-up time-step limiting mechanism and a time-dependent scheme for artificial viscosity including high-order gradient computation and shear flow limiter. Additionally, we include a novel prescription for time-dependent artificial conduction, which corrects for gravitationally induced pressure gradients and improves the SPH performance in capturing the development of gas-dynamical instabilities. We extensively test our new implementation in a wide range of hydrodynamical standard tests including weak and strong shocks as well as shear flows, turbulent spectra, gas mixing, hydrostatic equilibria and self-gravitating gas clouds. We jointly employ all modifications; however, when necessary we study the performance of individual code modules. We approximate hydrodynamical states more accurately and with significantly less noise than standard GADGET-SPH. Furthermore, the new implementation promotes the mixing of entropy between different fluid phases, also within cosmological simulations. Finally, we study the performance of the hydrodynamical solver in the context of radiative galaxy formation and non-radiative galaxy cluster formation. We find galactic discs to be colder and more extended and galaxy clusters showing entropy cores instead of steadily declining entropy profiles. In summary, we demonstrate that our improved SPH implementation overcomes most of the undesirable limitations of standard GADGET-SPH, thus becoming the core of an efficient code for large cosmological simulations.

  4. A scheme for forecasting severe space weather

    NASA Astrophysics Data System (ADS)

    Balan, N.; Ebihara, Y.; Skoug, R.; Shiokawa, K.; Batista, I. S.; Tulasi Ram, S.; Omura, Y.; Nakamura, T.; Fok, M.-C.

    2017-03-01

    A scheme is suggested and tested for forecasting severe space weather (SvSW) using solar wind velocity (V) and the north-south component (Bz) of the interplanetary magnetic field (IMF) measured using the ACE (Advanced Composition Explorer) satellite from 1998 to 2016. SvSW has caused all known electric power outages and telegraph system failures. Earlier SvSW events such as the Carrington event of 1859, Quebec event of 1989 and an event in 1958 are included with information from the literature. Dst storms are used as references to identify 89 major space weather events (DstMin ≤ -100 nT) in 1998-2016. The coincidence of high coronal mass ejection (CME) front (or CME shock) velocity ΔV (sudden increase in V over the background by over 275 km/s) and sufficiently large Bz southward at the time of the ΔV increase is associated with SvSW; and their product (ΔV × Bz) is found to exhibit a large negative spike at the speed increase. Such a product (ΔV × Bz) exceeding a threshold seems suitable for forecasting SvSW. However, the coincidence of high V (not containing ΔV) and large Bz southward does not correspond to SvSW, indicating the importance of the impulsive action of large Bz southward and high ΔV coming through when they coincide. The need for the coincidence is verified using the CRCM (Comprehensive Ring Current Model), which produces extreme Dst storms ( < -250 nT) characterizing SvSW when there is coincidence.

  5. On the Control of the Fixed Charge Densities in Al2O3-Based Silicon Surface Passivation Schemes.

    PubMed

    Simon, Daniel K; Jordan, Paul M; Mikolajick, Thomas; Dirnstorfer, Ingo

    2015-12-30

    A controlled field-effect passivation by a well-defined density of fixed charges is crucial for modern solar cell surface passivation schemes. Al2O3 nanolayers grown by atomic layer deposition contain negative fixed charges. Electrical measurements on slant-etched layers reveal that these charges are located within a 1 nm distance to the interface with the Si substrate. When inserting additional interface layers, the fixed charge density can be continuously adjusted from 3.5 × 10(12) cm(-2) (negative polarity) to 0.0 and up to 4.0 × 10(12) cm(-2) (positive polarity). A HfO2 interface layer of one or more monolayers reduces the negative fixed charges in Al2O3 to zero. The role of HfO2 is described as an inert spacer controlling the distance between Al2O3 and the Si substrate. It is suggested that this spacer alters the nonstoichiometric initial Al2O3 growth regime, which is responsible for the charge formation. On the basis of this charge-free HfO2/Al2O3 stack, negative or positive fixed charges can be formed by introducing additional thin Al2O3 or SiO2 layers between the Si substrate and this HfO2/Al2O3 capping layer. All stacks provide very good passivation of the silicon surface. The measured effective carrier lifetimes are between 1 and 30 ms. This charge control in Al2O3 nanolayers allows the construction of zero-fixed-charge passivation layers as well as layers with tailored fixed charge densities for future solar cell concepts and other field-effect based devices.

  6. On Approximate Factorization Schemes for Solving the Full Potential Equation

    NASA Technical Reports Server (NTRS)

    Holst, Terry L.

    1997-01-01

    An approximate factorization scheme based on the AF2 algorithm is presented for solving the three-dimensional full potential equation for the transonic flow about isolated wings. Two spatial discretization variations are presented, one using a hybrid first-order/second-order-accurate scheme and the second using a fully second-order-accurate scheme. The present algorithm utilizes a C-H grid topology to map the flow field about the wing. One version of the AF2 iteration scheme is used on the upper wing surface and another slightly modified version is used on the lower surface. These two algorithm variations are then connected at the wing leading edge using a local iteration technique. The resulting scheme has improved linear stability characteristics and improved time-like damping characteristics relative to previous implementations of the AF2 algorithm. The presentation is highlighted with a grid refinement study and a number of numerical results.

  7. A Proxy Signature Scheme Based on Coding Theory

    NASA Astrophysics Data System (ADS)

    Jannati, Hoda; Falahati, Abolfazl

    Proxy signature helps the proxy signer to sign messages on behalf of the original signer. This signature is used when the original signer is not available to sign a specific document. In this paper, we introduce a new proxy signature scheme based on Stern's identification scheme whose security depends on syndrome decoding problem. The proposed scheme is the first code-based proxy signature and can be used in a quantum computer. In this scheme, the operations to perform are linear and very simple thus the signature is performed quickly and can be implemented using smart card in a quite efficient way. The proposed scheme also satisfies unforgeability, undeniability, non-transferability and distinguishability properties which are the security requirements for a proxy signature.

  8. Factorizable Upwind Schemes: The Triangular Unstructured Grid Formulation

    NASA Technical Reports Server (NTRS)

    Sidilkover, David; Nielsen, Eric J.

    2001-01-01

    The upwind factorizable schemes for the equations of fluid were introduced recently. They facilitate achieving the Textbook Multigrid Efficiency (TME) and are expected also to result in the solvers of unparalleled robustness. The approach itself is very general. Therefore, it may well become a general framework for the large-scale, Computational Fluid Dynamics. In this paper we outline the triangular grid formulation of the factorizable schemes. The derivation is based on the fact that the factorizable schemes can be expressed entirely using vector notation. without explicitly mentioning a particular coordinate frame. We, describe the resulting discrete scheme in detail and present some computational results verifying the basic properties of the scheme/solver.

  9. A new antiproton beam transfer scheme without coalescing

    SciTech Connect

    Weiren Chou et al.

    2003-06-04

    An effective way to increase the luminosity in the Fermilab Tevatron collider program Run2 is to improve the overall antiproton transfer efficiency. During antiproton coalescing in the Main Injector (MI), about 10-15% particles get lost. This loss could be avoided in a new antiproton transfer scheme that removes coalescing from the process. Moreover, this scheme would also eliminate emittance dilution due to coalescing. This scheme uses a 2.5 MHz RF system to transfer antiprotons from the Accumulator to the Main Injector. It is then followed by a bunch rotation in the MI to shorten the bunch length so that it can be captured by a 53 MHz RF bucket. Calculations and ESME simulations show that this scheme works. No new hardware is needed to implement this scheme.

  10. Improved-efficiency DSMC collision-partner selection schemes.

    SciTech Connect

    Gallis, Michail A.; Torczynski, John Robert

    2010-11-01

    The effect of collision-partner selection schemes on the accuracy and the efficiency of the Direct Simulation Monte Carlo (DSMC) method of Bird is investigated. Several schemes to reduce the total discretization error as a function of the mean collision separation and the mean collision time are examined. These include the historically first sub-cell scheme, the more recent nearest-neighbor scheme, and various near-neighbor schemes, which are evaluated for their effect on the thermal conductivity for Fourier flow. Their convergence characteristics as a function of spatial and temporal discretization and the number of simulators per cell are compared to the convergence characteristics of the sophisticated and standard DSMC algorithms. Improved performance is obtained if the population from which possible collision partners are selected is an appropriate fraction of the population of the cell.

  11. A privacy enhanced authentication scheme for telecare medical information systems.

    PubMed

    Jiang, Qi; Ma, Jianfeng; Ma, Zhuo; Li, Guangsong

    2013-02-01

    The telecare medical information system (TMIS) aims to establish telecare services and enable the public to access medical services or medical information at remote sites. Authentication and key agreement is essential to ensure data integrity, confidentiality, and availability for TMIS. Most recently, Chen et al. proposed an efficient and secure dynamic ID-based authentication scheme for TMIS, and claimed that their scheme achieves user anonymity. However, we observe that Chen et al.'s scheme achieves neither anonymity nor untraceability, and is subject to the identity guessing attack and tracking attack. In order to protect user privacy, we propose an enhanced authentication scheme which achieves user anonymity and untraceablity. It is a secure and efficient authentication scheme with user privacy preservation which is practical for TMIS.

  12. A Secure and Efficient Threshold Group Signature Scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Yansheng; Wang, Xueming; Qiu, Gege

    The paper presents a secure and efficient threshold group signature scheme aiming at two problems of current threshold group signature schemes: conspiracy attack and inefficiency. Scheme proposed in this paper takes strategy of separating designed clerk who is responsible for collecting and authenticating each individual signature from group, the designed clerk don't participate in distribution of group secret key and has his own public key and private key, designed clerk needs to sign part information of threshold group signature after collecting signatures. Thus verifier has to verify signature of the group after validating signature of the designed clerk. This scheme is proved to be secure against conspiracy attack at last and is more efficient by comparing with other schemes.

  13. An Anonymous Voting Scheme based on Confirmation Numbers

    NASA Astrophysics Data System (ADS)

    Alam, Kazi Md. Rokibul; Tamura, Shinsuke; Taniguchi, Shuji; Yanase, Tatsuro

    This paper proposes a new electronic voting (e-voting) scheme that fulfills all the security requirements of e-voting i.e. privacy, accuracy, universal verifiability, fairness, receipt-freeness, incoercibility, dispute-freeness, robustness, practicality and scalability; usually some of which are found to be traded. When compared with other existing schemes, this scheme requires much more simple computations and weaker assumptions about trustworthiness of individual election authorities. The key mechanism is the one that uses confirmation numbers involved in individual votes to make votes verifiable while disabling all entities including voters themselves to know the linkages between voters and their votes. Many existing e-voting schemes extensively deploy zero-knowledge proof (ZKP) to achieve verifiability. However, ZKP is expensive and complicated. The confirmation numbers attain the verifiability requirement in a much more simple and intuitive way, then the scheme becomes scalable and practical.

  14. Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification

    PubMed Central

    Pang, Liaojun; Li, Huixian; Gao, Lu; Wang, Yumin

    2013-01-01

    Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer’s anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer’s and the recipient’s anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer’s and the recipient’s anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant. Key words: Multi-recipient signcryption; Signcryption; Complete Anonymity; Public verification. PMID:23675490

  15. Completely anonymous multi-recipient signcryption scheme with public verification.

    PubMed

    Pang, Liaojun; Li, Huixian; Gao, Lu; Wang, Yumin

    2013-01-01

    Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer's anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer's and the recipient's anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer's and the recipient's anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant.

  16. A fast iterative scheme for the linearized Boltzmann equation

    NASA Astrophysics Data System (ADS)

    Wu, Lei; Zhang, Jun; Liu, Haihu; Zhang, Yonghao; Reese, Jason M.

    2017-06-01

    Iterative schemes to find steady-state solutions to the Boltzmann equation are efficient for highly rarefied gas flows, but can be very slow to converge in the near-continuum flow regime. In this paper, a synthetic iterative scheme is developed to speed up the solution of the linearized Boltzmann equation by penalizing the collision operator L into the form L = (L + Nδh) - Nδh, where δ is the gas rarefaction parameter, h is the velocity distribution function, and N is a tuning parameter controlling the convergence rate. The velocity distribution function is first solved by the conventional iterative scheme, then it is corrected such that the macroscopic flow velocity is governed by a diffusion-type equation that is asymptotic-preserving into the Navier-Stokes limit. The efficiency of this new scheme is assessed by calculating the eigenvalue of the iteration, as well as solving for Poiseuille and thermal transpiration flows. We find that the fastest convergence of our synthetic scheme for the linearized Boltzmann equation is achieved when Nδ is close to the average collision frequency. The synthetic iterative scheme is significantly faster than the conventional iterative scheme in both the transition and the near-continuum gas flow regimes. Moreover, due to its asymptotic-preserving properties, the synthetic iterative scheme does not need high spatial resolution in the near-continuum flow regime, which makes it even faster than the conventional iterative scheme. Using this synthetic scheme, with the fast spectral approximation of the linearized Boltzmann collision operator, Poiseuille and thermal transpiration flows between two parallel plates, through channels of circular/rectangular cross sections and various porous media are calculated over the whole range of gas rarefaction. Finally, the flow of a Ne-Ar gas mixture is solved based on the linearized Boltzmann equation with the Lennard-Jones intermolecular potential for the first time, and the difference

  17. Validation of Microphysical Schemes in a CRM Using TRMM Satellite

    NASA Astrophysics Data System (ADS)

    Li, X.; Tao, W.; Matsui, T.; Liu, C.; Masunaga, H.

    2007-12-01

    The microphysical scheme in the Goddard Cumulus Ensemble (GCE) model has been the most heavily developed component in the past decade. The cloud-resolving model now has microphysical schemes ranging from the original Lin type bulk scheme, to improved bulk schemes, to a two-moment scheme, to a detailed bin spectral scheme. Even with the most sophisticated bin scheme, many uncertainties still exist, especially in ice phase microphysics. In this study, we take advantages of the long-term TRMM observations, especially the cloud profiles observed by the precipitation radar (PR), to validate microphysical schemes in the simulations of Mesoscale Convective Systems (MCSs). Two contrasting cases, a midlatitude summertime continental MCS with leading convection and trailing stratiform region, and an oceanic MCS in tropical western Pacific are studied. The simulated cloud structures and particle sizes are fed into a forward radiative transfer model to simulate the TRMM satellite sensors, i.e., the PR, the TRMM microwave imager (TMI) and the visible and infrared scanner (VIRS). MCS cases that match the structure and strength of the simulated systems over the 10-year period are used to construct statistics of different sensors. These statistics are then compared with the synthetic satellite data obtained from the forward radiative transfer calculations. It is found that the GCE model simulates the contrasts between the continental and oceanic case reasonably well, with less ice scattering in the oceanic case comparing with the continental case. However, the simulated ice scattering signals for both PR and TMI are generally stronger than the observations, especially for the bulk scheme and at the upper levels in the stratiform region. This indicates larger, denser snow/graupel particles at these levels. Adjusting microphysical schemes in the GCE model according the observations, especially the 3D cloud structure observed by TRMM PR, result in a much better agreement.

  18. An efficient class of WENO schemes with adaptive order

    NASA Astrophysics Data System (ADS)

    Balsara, Dinshaw S.; Garain, Sudip; Shu, Chi-Wang

    2016-12-01

    Finite difference WENO schemes have established themselves as very worthy performers for entire classes of applications that involve hyperbolic conservation laws. In this paper we report on two major advances that make finite difference WENO schemes more efficient. The first advance consists of realizing that WENO schemes require us to carry out stencil operations very efficiently. In this paper we show that the reconstructed polynomials for any one-dimensional stencil can be expressed most efficiently and economically in Legendre polynomials. By using Legendre basis, we show that the reconstruction polynomials and their corresponding smoothness indicators can be written very compactly. The smoothness indicators are written as a sum of perfect squares. Since this is a computationally expensive step, the efficiency of finite difference WENO schemes is enhanced by the innovation which is reported here. The second advance consists of realizing that one can make a non-linear hybridization between a large, centered, very high accuracy stencil and a lower order WENO scheme that is nevertheless very stable and capable of capturing physically meaningful extrema. This yields a class of adaptive order WENO schemes, which we call WENO-AO (for adaptive order). Thus we arrive at a WENO-AO(5,3) scheme that is at best fifth order accurate by virtue of its centered stencil with five zones and at worst third order accurate by virtue of being non-linearly hybridized with an r = 3 CWENO scheme. The process can be extended to arrive at a WENO-AO(7,3) scheme that is at best seventh order accurate by virtue of its centered stencil with seven zones and at worst third order accurate. We then recursively combine the above two schemes to arrive at a WENO-AO(7,5,3) scheme which can achieve seventh order accuracy when that is possible; graciously drop down to fifth order accuracy when that is the best one can do; and also operate stably with an r = 3 CWENO scheme when that is the only thing

  19. Generalized energy and potential enstrophy conserving finite difference schemes for the shallow water equations

    NASA Technical Reports Server (NTRS)

    Abramopoulos, Frank

    1988-01-01

    The conditions under which finite difference schemes for the shallow water equations can conserve both total energy and potential enstrophy are considered. A method of deriving such schemes using operator formalism is developed. Several such schemes are derived for the A-, B- and C-grids. The derived schemes include second-order schemes and pseudo-fourth-order schemes. The simplest B-grid pseudo-fourth-order schemes are presented.

  20. Generalized energy and potential enstrophy conserving finite difference schemes for the shallow water equations

    NASA Technical Reports Server (NTRS)

    Abramopoulos, Frank

    1988-01-01

    The conditions under which finite difference schemes for the shallow water equations can conserve both total energy and potential enstrophy are considered. A method of deriving such schemes using operator formalism is developed. Several such schemes are derived for the A-, B- and C-grids. The derived schemes include second-order schemes and pseudo-fourth-order schemes. The simplest B-grid pseudo-fourth-order schemes are presented.

  1. Design of an extensive information representation scheme for clinical narratives.

    PubMed

    Deléger, Louise; Campillos, Leonardo; Ligozat, Anne-Laure; Névéol, Aurélie

    2017-09-11

    Knowledge representation frameworks are essential to the understanding of complex biomedical processes, and to the analysis of biomedical texts that describe them. Combined with natural language processing (NLP), they have the potential to contribute to retrospective studies by unlocking important phenotyping information contained in the narrative content of electronic health records (EHRs). This work aims to develop an extensive information representation scheme for clinical information contained in EHR narratives, and to support secondary use of EHR narrative data to answer clinical questions. We review recent work that proposed information representation schemes and applied them to the analysis of clinical narratives. We then propose a unifying scheme that supports the extraction of information to address a large variety of clinical questions. We devised a new information representation scheme for clinical narratives that comprises 13 entities, 11 attributes and 37 relations. The associated annotation guidelines can be used to consistently apply the scheme to clinical narratives and are https://cabernet.limsi.fr/annotation_guide_for_the_merlot_french_clinical_corpus-Sept2016.pdf . The information scheme includes many elements of the major schemes described in the clinical natural language processing literature, as well as a uniquely detailed set of relations.

  2. Optimised prefactored compact schemes for linear wave propagation phenomena

    NASA Astrophysics Data System (ADS)

    Rona, A.; Spisso, I.; Hall, E.; Bernardini, M.; Pirozzoli, S.

    2017-01-01

    A family of space- and time-optimised prefactored compact schemes are developed that minimise the computational cost for given levels of numerical error in wave propagation phenomena, with special reference to aerodynamic sound. This work extends the approach of Pirozzoli [1] to the MacCormack type prefactored compact high-order schemes developed by Hixon [2], in which their shorter Padé stencil from the prefactorisation leads to a simpler enforcement of numerical boundary conditions. An explicit low-storage multi-step Runge-Kutta integration advances the states in time. Theoretical predictions for spatial and temporal error bounds are derived for the cost-optimised schemes and compared against benchmark schemes of current use in computational aeroacoustic applications in terms of computational cost for a given relative numerical error value. One- and two-dimensional test cases are presented to examine the effectiveness of the cost-optimised schemes for practical flow computations. An effectiveness up to about 50% higher than the standard schemes is verified for the linear one-dimensional advection solver, which is a popular baseline solver kernel for computational physics problems. A substantial error reduction for a given cost is also obtained in the more complex case of a two-dimensional acoustic pulse propagation, provided the optimised schemes are made to operate close to their nominal design points.

  3. Study on the numerical schemes for hypersonic flow simulation

    NASA Astrophysics Data System (ADS)

    Nagdewe, S. P.; Shevare, G. R.; Kim, Heuy-Dong

    2009-10-01

    Hypersonic flow is full of complex physical and chemical processes, hence its investigation needs careful analysis of existing schemes and choosing a suitable scheme or designing a brand new scheme. The present study deals with two numerical schemes Harten, Lax, and van Leer with Contact (HLLC) and advection upstream splitting method (AUSM) to effectively simulate hypersonic flow fields, and accurately predict shock waves with minimal diffusion. In present computations, hypersonic flows have been modeled as a system of hyperbolic equations with one additional equation for non-equilibrium energy and relaxing source terms. Real gas effects, which appear typically in hypersonic flows, have been simulated through energy relaxation method. HLLC and AUSM methods are modified to incorporate the conservation laws for non-equilibrium energy. Numerical implementation have shown that non-equilibrium energy convect with mass, and hence has no bearing on the basic numerical scheme. The numerical simulation carried out shows good comparison with experimental data available in literature. Both numerical schemes have shown identical results at equilibrium. Present study has demonstrated that real gas effects in hypersonic flows can be modeled through energy relaxation method along with either AUSM or HLLC numerical scheme.

  4. Efficient Non-interactive Universally Composable String-Commitment Schemes

    NASA Astrophysics Data System (ADS)

    Nishimaki, Ryo; Fujisaki, Eiichiro; Tanaka, Keisuke

    The universal composability (UC) for commitment is a very strong security notion. It guarantees that commitment schemes remain secure even if they are composed with arbitrary protocols and polynomially many copies of the schemes are run concurrently. Several UC commitment schemes in the common reference string (CRS) model have been proposed, but, they are either interactive commitment or bit-commitment (not string-commitment) schemes. We propose new non-interactive string-commitment schemes that achieve UC security in the CRS model assuming the difficulty of the decisional Diffie-Hellman problem or the decisional composite residuosity problem, but our schemes are not reusable. The main building blocks of our constructions are all-but-one trapdoor functions (ABO-TDFs) introduced by Peikert and Waters in STOC 2008 to construct secure public-key encryption schemes. Our main idea is to use the homomorphic properties of the function indices of the all-but-one trapdoor functions and to extend the functions to probabilistic ones by using re-randomization of ciphertexts. This is a new application of ABO-TDFs.

  5. Upwind schemes and bifurcating solutions in real gas computations

    NASA Technical Reports Server (NTRS)

    Suresh, Ambady; Liou, Meng-Sing

    1992-01-01

    The area of high speed flow is seeing a renewed interest due to advanced propulsion concepts such as the National Aerospace Plane (NASP), Space Shuttle, and future civil transport concepts. Upwind schemes to solve such flows have become increasingly popular in the last decade due to their excellent shock capturing properties. In the first part of this paper the authors present the extension of the Osher scheme to equilibrium and non-equilibrium gases. For simplicity, the source terms are treated explicitly. Computations based on the above scheme are presented to demonstrate the feasibility, accuracy and efficiency of the proposed scheme. One of the test problems is a Chapman-Jouguet detonation problem for which numerical solutions have been known to bifurcate into spurious weak detonation solutions on coarse grids. Results indicate that the numerical solution obtained depends both on the upwinding scheme used and the limiter employed to obtain second order accuracy. For example, the Osher scheme gives the correct CJ solution when the super-bee limiter is used, but gives the spurious solution when the Van Leer limiter is used. With the Roe scheme the spurious solution is obtained for all limiters.

  6. A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity.

    PubMed

    Pang, Liaojun; Yan, Xuxia; Zhao, Huiyang; Hu, Yufei; Li, Huixian

    2016-01-01

    Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided.

  7. Payment schemes and cost efficiency: evidence from Swiss public hospitals.

    PubMed

    Meyer, Stefan

    2015-03-01

    This paper aims at analysing the impact of prospective payment schemes on cost efficiency of acute care hospitals in Switzerland. We study a panel of 121 public hospitals subject to one of four payment schemes. While several hospitals are still reimbursed on a per diem basis for the treatment of patients, most face flat per-case rates-or mixed schemes, which combine both elements of reimbursement. Thus, unlike previous studies, we are able to simultaneously analyse and isolate the cost-efficiency effects of different payment schemes. By means of stochastic frontier analysis, we first estimate a hospital cost frontier. Using the two-stage approach proposed by Battese and Coelli (Empir Econ 20:325-332, 1995), we then analyse the impact of these payment schemes on the cost efficiency of hospitals. Controlling for hospital characteristics, local market conditions in the 26 Swiss states (cantons), and a time trend, we show that, compared to per diem, hospitals which are reimbursed by flat payment schemes perform better in terms of cost efficiency. Our results suggest that mixed schemes create incentives for cost containment as well, although to a lesser extent. In addition, our findings indicate that cost-efficient hospitals are primarily located in cantons with competitive markets, as measured by the Herfindahl-Hirschman index in inpatient care. Furthermore, our econometric model shows that we obtain biased estimates from frontier analysis if we do not account for heteroscedasticity in the inefficiency term.

  8. Upwind schemes and bifurcating solutions in real gas computations

    NASA Technical Reports Server (NTRS)

    Suresh, Ambady; Liou, Meng-Sing

    1992-01-01

    The area of high speed flow is seeing a renewed interest due to advanced propulsion concepts such as the National Aerospace Plane (NASP), Space Shuttle, and future civil transport concepts. Upwind schemes to solve such flows have become increasingly popular in the last decade due to their excellent shock capturing properties. In the first part of this paper the authors present the extension of the Osher scheme to equilibrium and non-equilibrium gases. For simplicity, the source terms are treated explicitly. Computations based on the above scheme are presented to demonstrate the feasibility, accuracy and efficiency of the proposed scheme. One of the test problems is a Chapman-Jouguet detonation problem for which numerical solutions have been known to bifurcate into spurious weak detonation solutions on coarse grids. Results indicate that the numerical solution obtained depends both on the upwinding scheme used and the limiter employed to obtain second order accuracy. For example, the Osher scheme gives the correct CJ solution when the super-bee limiter is used, but gives the spurious solution when the Van Leer limiter is used. With the Roe scheme the spurious solution is obtained for all limiters.

  9. A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity

    PubMed Central

    Pang, Liaojun; Yan, Xuxia; Zhao, Huiyang; Hu, Yufei; Li, Huixian

    2016-01-01

    Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender’s anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided. PMID:27832105

  10. The GP retainer scheme: report of a national survey.

    PubMed

    Lockyer, Lesley; Young, Pat; Main, Paul Gn; Morison, Jim

    2014-11-01

    The current context of organisational change and new working patterns, together with the high cost of medical training, mean it is of vital importance that the NHS retains its trained workforce. The GP retainer scheme supports doctors who for reasons of personal circumstance are restricted in their ability to compete for employment in medicine, and aims to facilitate the retention of their skills and confidence. This national study evaluates the experiences and views of current and past GP retainers and provides a rigorous assessment of the retainer scheme. It is a mixed method study: an online questionnaire was completed by 318 current and ex-retainers across the UK; follow-up telephone interviews were conducted with 30 respondents. The study finds that the GP retainer scheme is effective in retaining GPs through times of transition and provides evidence to support the continuing funding of the scheme across the UK. The scheme is beneficial for doctors who also have a role in caring for young children and is also highly valued by a minority of GP retainers who are using it to return to work after illness, or to practice in a more limited role, due to chronic illness or disability. This study found variations in the implementation of the educational entitlement which is fundamental to the scheme. A minority of retainers experienced problems with the implementation of the scheme and recommendations are made for improvements.

  11. Fragile watermarking scheme for H.264 video authentication

    NASA Astrophysics Data System (ADS)

    Wang, Chuen-Ching; Hsu, Yu-Chang

    2010-02-01

    A novel H.264 advanced video coding fragile watermarking method is proposed that enables the authenticity and integrity of the video streams to be verified. The effectiveness of the proposed scheme is demonstrated by way of experimental simulations. The results show that by embedding the watermark information in the last nonzero-quantized coefficient in each discrete cosine transform block, the proposed scheme induces no more than a minor distortion of the video content. In addition, we show that the proposed scheme is able to detect unauthorized changes in the watermarked video content without the original video. The experimental results demonstrate the feasibility of the proposed video authentication system.

  12. Threshold signature scheme based on factoring and discrete logarithms

    NASA Astrophysics Data System (ADS)

    Mohamad, S. A.; Ismail, E. S.

    2012-09-01

    Recently, many documents or messages from an organization need to be signed by more than one person. For that reason, many threshold signatures based on various problems in number theory have been developed. In this paper, a threshold signature scheme based on two most popular number theory problems, namely factoring and discrete logarithms, was proposed. The advantage of this new scheme is based on the fact that it is very hard to solve both factoring and discrete logarithms problems simultaneously. This scheme is also shown secure against several attacks and requires a reasonable time complexity in both signing and verifying phase.

  13. A New Scheme for Probabilistic Teleportation and Its Potential Applications

    NASA Astrophysics Data System (ADS)

    Wei, Jia-Hua; Dai, Hong-Yi; Zhang, Ming

    2013-12-01

    We propose a novel scheme to probabilistically teleport an unknown two-level quantum state when the information of the partially entangled state is only available for the sender. This is in contrast with the fact that the receiver must know the non-maximally entangled state in previous typical schemes for the teleportation. Additionally, we illustrate two potential applications of the novel scheme for probabilistic teleportation from a sender to a receiver with the help of an assistant, who plays distinct roles under different communication conditions, and our results show that the novel proposal could enlarge the applied range of probabilistic teleportation.

  14. Triangle based TVD schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Durlofsky, Louis J.; Osher, Stanley; Engquist, Bjorn

    1990-01-01

    A triangle based total variation diminishing (TVD) scheme for the numerical approximation of hyperbolic conservation laws in two space dimensions is constructed. The novelty of the scheme lies in the nature of the preprocessing of the cell averaged data, which is accomplished via a nearest neighbor linear interpolation followed by a slope limiting procedures. Two such limiting procedures are suggested. The resulting method is considerably more simple than other triangle based non-oscillatory approximations which, like this scheme, approximate the flux up to second order accuracy. Numerical results for linear advection and Burgers' equation are presented.

  15. HDG schemes for stationary convection-diffusion problems

    NASA Astrophysics Data System (ADS)

    Dautov, R. Z.; Fedotov, E. M.

    2016-11-01

    For stationary linear convection-diffusion problems, we construct and study a hybridized scheme of the discontinuous Galerkin method on the basis of an extended mixed statement of the problem. Discrete schemes can be used for the solution of equations degenerating in the leading part and are stated via approximations to the solution of the problem, its gradient, the flow, and the restriction of the solution to the boundaries of elements. For the spaces of finite elements, we represent minimal conditions responsible for the solvability, stability and accuracy of the schemes.

  16. The Implicit and Explicit alpha-mu Schemes

    NASA Technical Reports Server (NTRS)

    Chang, Sin-Chung; Himansu, Ananda

    1997-01-01

    Artificial numerical dissipation is an important issue in large Reynolds number computations. In such computations, the artificial dissipation inherent in traditional numerical schemes can overwhelm the physical dissipation and yield inaccurate results on meshes of practical size. In the present work, the space-time conservation element and solution element method is used to construct new and accurate numerical schemes such that artificial numerical dissipation will not overwhelm physical dissipation. Specifically, these schemes have the property that numerical dissipation vanishes when the physical viscosity goes to zero. These new schemes therefore accurately model the physical dissipation even when it is extremely small. The method of space-time conservation element and solution element, currently under development, is a nontraditional numerical method for solving conservation laws. The method is developed on the basis of local and global flux conservation in a space-time domain, in which space and time are treated in a unified manner. Explicit solvers for model and fluid dynamic conservation laws have previously been investigated. In this paper, we introduce a new concept in the design of implicit schemes, and use it to construct two highly accurate solvers for a convection-diffusion equation. The two schemes become identical in the pure convection case, and in the pure diffusion case. The implicit schemes are applicable over the whole Reynolds number range, from purely diffusive equations to purely inviscid (convective) equations. The stability and consistency of the schemes are analyzed, and some numerical results are presented. It is shown that, in the inviscid case, the new schemes become explicit and their amplification factors are identical to those of the Leapfrog scheme. On the other hand, in the pure diffusion case, their principal amplification factor becomes the amplification factor of the Crank-Nicolson scheme. We also construct an explicit solver

  17. Implicit schemes and parallel computing in unstructured grid CFD

    NASA Technical Reports Server (NTRS)

    Venkatakrishnam, V.

    1995-01-01

    The development of implicit schemes for obtaining steady state solutions to the Euler and Navier-Stokes equations on unstructured grids is outlined. Applications are presented that compare the convergence characteristics of various implicit methods. Next, the development of explicit and implicit schemes to compute unsteady flows on unstructured grids is discussed. Next, the issues involved in parallelizing finite volume schemes on unstructured meshes in an MIMD (multiple instruction/multiple data stream) fashion are outlined. Techniques for partitioning unstructured grids among processors and for extracting parallelism in explicit and implicit solvers are discussed. Finally, some dynamic load balancing ideas, which are useful in adaptive transient computations, are presented.

  18. Should Australia introduce a vaccine injury compensation scheme?

    PubMed

    Isaacs, D

    2004-01-01

    At least a dozen countries or states in the world have introduced vaccine injury compensation schemes. This paper argues that the Australian Government should introduce such a scheme, which may reduce litigation, and may improve consumer and provider confidence. The most important justification, however, is an ethical argument from justice and equity: introduction of a vaccine injury compensation scheme acknowledges the unique situation that routine childhood immunization is a public health measure, given and accepted in good faith, that may occasionally damage the recipient.

  19. Accuracy of schemes with nonuniform meshes for compressible fluid flows

    NASA Technical Reports Server (NTRS)

    Turkel, E.

    1985-01-01

    The accuracy of the space discretization for time-dependent problems when a nonuniform mesh is used is considered. Many schemes reduce to first-order accuracy while a popular finite volume scheme is even inconsistent for general grids. This accuracy is based on physical variables. However, when accuracy is measured in computational variables then second-order accuracy can be obtained. This is meaningful only if the mesh accurately reflects the properties of the solution. In addition, the stability properties of some improved accurate schemes are analyzed and it can be shown that they also allow for larger time steps when Runge-Kutta type methods are used to advance in time.

  20. An efficient quantum scheme for Private Set Intersection

    NASA Astrophysics Data System (ADS)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    Private Set Intersection allows a client to privately compute set intersection with the collaboration of the server, which is one of the most fundamental and key problems within the multiparty collaborative computation of protecting the privacy of the parties. In this paper, we first present a cheat-sensitive quantum scheme for Private Set Intersection. Compared with classical schemes, our scheme has lower communication complexity, which is independent of the size of the server's set. Therefore, it is very suitable for big data services in Cloud or large-scale client-server networks.