Science.gov

Sample records for multiple access schemes

  1. Multiple Access Schemes for Lunar Missions

    NASA Technical Reports Server (NTRS)

    Deutsch, Leslie; Hamkins, Jon; Stocklin, Frank J.

    2010-01-01

    Two years ago, the NASA Coding, Modulation, and Link Protocol (CMLP) study was completed. The study, led by the authors of this paper, recommended codes, modulation schemes, and desired attributes of link protocols for all space communication links in NASA's future space architecture. Portions of the NASA CMLP team were reassembled to resolve one open issue: the use of multiple access (MA) communication from the lunar surface. The CMLP-MA team analyzed and simulated two candidate multiple access schemes that were identified in the original CMLP study: Code Division MA (CDMA) and Frequency Division MA (FDMA) based on a bandwidth-efficient Continuous Phase Modulation (CPM) with a superimposed Pseudo-Noise (PN) ranging signal (CPM/PN). This paper summarizes the results of the analysis and simulation of the CMLP-MA study and describes the final recommendations.

  2. A study of multiple access schemes in satellite control network

    NASA Astrophysics Data System (ADS)

    Mo, Zijian; Wang, Zhonghai; Xiang, Xingyu; Wang, Gang; Chen, Genshe; Nguyen, Tien; Pham, Khanh; Blasch, Erik

    2016-05-01

    Satellite Control Networks (SCN) have provided launch control for space lift vehicles; tracking, telemetry and commanding (TTC) for on-orbit satellites; and, test support for space experiments since the 1960s. Currently, SCNs encounter a new challenge: how to maintain the high reliability of services when sharing the spectrum with emerging commercial services. To achieve this goal, the capability of multiple satellites reception is deserved as an update/modernization of SCN in the future. In this paper, we conducts an investigation of multiple access techniques in SCN scenario, e.g., frequency division multiple access (FDMA) and coded division multiple access (CDMA). First, we introduce two upgrade options of SCN based on FDMA and CDMA techniques. Correspondingly, we also provide their performance analysis, especially the system improvement in spectrum efficiency and interference mitigation. Finally, to determine the optimum upgrade option, this work uses CRISP, i.e., Cost, Risk, Installation, Supportability and Performance, as the baseline approach for a comprehensive trade study of these two options. Extensive numerical and simulation results are presented to illustrate the theoretical development.

  3. L-band and SHF multiple access schemes for the MSAT system

    NASA Technical Reports Server (NTRS)

    Razi, Michael; Shoamanesh, Alireza; Azarbar, Bahman

    1988-01-01

    The first generation of the Canadian Mobile Satellite (MSAT) system, planned to be operational in the early 1990s, will provide voice and data services to land, aeronautical, and maritime mobile terminals within the Canadian land mass and its territorial waters. The system will be managed by a centralized Demand Assignment Multiple Access (DAMA) control system. Users will request a communication channel by communicating with the DAMA Control System (DCS) via the appropriate signalling channels. Several access techniques for both L-band and SHF signalling channels have been investigated. For the L-band, Slotted Aloha (SA) and Reservation Aloha (RA), combined with a token scheme, are discussed here. The results of Telesat studies to date indicate that SA, when combined with token scheme, provides the most efficient access and resource management tool in a mobile propagation environment. For SHF signalling channels, slim time division multiple access (TDMA) and SA have been considered as the most suitable candidate schemes. In view of the operational environment of the SHF links, provision of a very short channel access delay and a relatively high packet success rate are highly desirable. Studies carried out generally favor slim-TDMA as the most suitable approach for SHF signalling channels.

  4. Color coded multiple access scheme for bidirectional multiuser visible light communications in smart home technologies

    NASA Astrophysics Data System (ADS)

    Tiwari, Samrat Vikramaditya; Sewaiwar, Atul; Chung, Yeon-Ho

    2015-10-01

    In optical wireless communications, multiple channel transmission is an attractive solution to enhancing capacity and system performance. A new modulation scheme called color coded multiple access (CCMA) for bidirectional multiuser visible light communications (VLC) is presented for smart home applications. The proposed scheme uses red, green and blue (RGB) light emitting diodes (LED) for downlink and phosphor based white LED (P-LED) for uplink to establish a bidirectional VLC and also employs orthogonal codes to support multiple users and devices. The downlink transmission for data user devices and smart home devices is provided using red and green colors from the RGB LEDs, respectively, while uplink transmission from both types of devices is performed using the blue color from P-LEDs. Simulations are conducted to verify the performance of the proposed scheme. It is found that the proposed bidirectional multiuser scheme is efficient in terms of data rate and performance. In addition, since the proposed scheme uses RGB signals for downlink data transmission, it provides flicker-free illumination that would lend itself to multiuser VLC system for smart home applications.

  5. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    NASA Astrophysics Data System (ADS)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  6. Performance evaluation of modulation and multiple access schemes in ultraviolet optical wireless connections for two atmosphere thickness cases.

    PubMed

    Raptis, Nikos; Pikasis, Evangelos; Syvridis, Dimitris

    2016-08-01

    The exploitation of optical wireless communication channels in a non-line-of-sight regime is studied for point-to-point and networking configurations considering the use of light-emitting diodes. Two environments with different scattering center densities are considered, assuming operation at 265 nm. The bit error rate performance of both pulsed and multicarrier modulation schemes is examined, using numerical approaches. In the networking scenario, a central node only receives data, one node transmits useful data, and the rest of them act as interferers. The performance of the desirable node's transmissions is evaluated. The access to the medium is controlled by a code division multiple access scheme. PMID:27505663

  7. Performance evaluation of modulation and multiple access schemes in ultraviolet optical wireless connections for two atmosphere thickness cases.

    PubMed

    Raptis, Nikos; Pikasis, Evangelos; Syvridis, Dimitris

    2016-08-01

    The exploitation of optical wireless communication channels in a non-line-of-sight regime is studied for point-to-point and networking configurations considering the use of light-emitting diodes. Two environments with different scattering center densities are considered, assuming operation at 265 nm. The bit error rate performance of both pulsed and multicarrier modulation schemes is examined, using numerical approaches. In the networking scenario, a central node only receives data, one node transmits useful data, and the rest of them act as interferers. The performance of the desirable node's transmissions is evaluated. The access to the medium is controlled by a code division multiple access scheme.

  8. All-optical multiplexing schemes for multiple access networks based on wavelet packet filter banks

    NASA Astrophysics Data System (ADS)

    Cincotti, Gabriella; Svaluto Moreolo, Michela; Neri, Alessandro

    2004-08-01

    All optical architectures for Wavelet Packet Division Multiplexing (WPDM) are presented, that can be used in multiple access networks to increase the number of simultaneous users. Wavelet waveform coding spreads data signals both in time and frequency domains, with a large capacity improvement with respect to standard Optical-Code Division Multiple Access (O-CDMA) systems. In addition, the orthogonal property of the wavelet atoms ensures low InterSymbol Interference (ISI) and Multiple Access Interference (MAI) noises. To exploit the large bandwidth capacity of optical fibres, the Optical-Electrical-Optical (O-E-O) conversion is completely avoided, and we designed an all optical system that realizes the WPDM fully in the optical domain. A single Planar Lightwave Circuit (PLC) device multiplies/demultiplies N different users and a diffractive or an integrated optical device performs the waveform coding/decoding. The Wavelet Packet (WP) encoder/decoder is realized as a tree of lattice-form delay-line filters, and can be integrated on a single device along with the optical waveform modulator, resulting in a compact planar optical system. In addition, we show that different choices of WP encoders/decoders are possible to further enhance the system performances.

  9. Mobile multiple access study

    NASA Technical Reports Server (NTRS)

    1977-01-01

    Multiple access techniques (FDMA, CDMA, TDMA) for the mobile user and attempts to identify the current best technique are discussed. Traffic loading is considered as well as voice and data modulation and spacecraft and system design. Emphasis is placed on developing mobile terminal cost estimates for the selected design. In addition, design examples are presented for the alternative techniques of multiple access in order to compare with the selected technique.

  10. Multiple Access Trade Study

    NASA Technical Reports Server (NTRS)

    Motamedi, Masoud

    1990-01-01

    The Personal Access Satellite System (PASS) strawman design uses a hybrid Time Division Multiple Access (TDMA)/Frequency Division Multiple Access (FDMA) implementation. TDMA is used for the forward direction (from Suppliers to Users), and FDMA for the return direction (from Users to Suppliers). An alternative architecture is proposed that will require minimal real time coordination and yet provide a fast access method by using random access Code Division Multiple Access (CDMA). The CDMA system issues are addressed such as connecting suppliers and users, both of whom may be located anywhere in the CONUS, when the user terminals are constrained in size and weight; and providing efficient traffic routing under highly variable traffic requirements. It is assumed that bandwidth efficiency is not of paramount importance. CDMA or Spread Spectrum Multiple Access (SSMA) communication is a method in which a group of carriers operate at the same nominal center frequency but are separable from each other by the low cross correlation of the spreading codes used. Interference and multipath rejection capability, ease of selective addressing and message screening, low density power spectra for signal hiding and security, and high resolution ranging are among the benefits of spread spectrum communications.

  11. Multiple access mass storage network

    SciTech Connect

    Wentz, D.L. Jr.

    1980-01-01

    The Multi-Access Storage Subnetwork (MASS) is the latest addition to the Octopus computer network at Lawrence Livermore Laboratory. The subnetwork provides shared mass storage for the Laboratory's multiple-host computer configuration. A Control Data Corp. 38500 Mass Storage facility is interfaces by MASS to the large, scientific worker computers to provide an on-line capacity of 1 trillion bits of user-accessible data. The MASS architecture offers a very high performance approach to the management of large data storage, as well as a high degree of reliability needed for operation in the Laboratory's timesharing environment. MASS combines state-of-the-art digital hardware with an innovative system philosophy. The key LLL design features of the subnetwork that contribute to the high performance include the following: a data transmission scheme that provides a 40-Mbit/s channel over distances of up to 1000 ft, a large metal-oxide-semiconductor (MOS) memory buffer controlled by a 24-port memory multiplexer with an aggregate data rate of 280 Mbit/s, and a set of high-speed microprocessor-based controllers driving the commercial mass storage units. Reliability of the system is provided by a completely redundant network, including two control minicomputer systems. Also enhancing reliability is error detection and correction in the MOS memory. A hardware-generated checksum is carried with each file throughout the entire network to ensure integrity of user files. 6 figures, 1 table.

  12. Multiple Access in Ultra-Wideband Communications Using Multiple Pulses

    SciTech Connect

    Nekoogar, F; Dowla, F

    2003-04-11

    Multiple access (MA) in UWB communication is an area of active research. To date several time-division or code-division pulse amplitude modulation (PAM) or pulse position modulation (PPM) schemes have been proposed to separate multiple users in UWB communications. Conventionally, all users employ the same pulse shape and modulate the transmit pulse based on changing amplitude or position. One concern with using the same pulse for all channels is that the multiple access interference (MAI) increases as the number of users increase. This is due to increased cross-correlation between similar pulses of the different channels, raising thus the noise floor in such systems. In this paper we introduce and study the performance of a new MA scheme in the context of multiple orthogonal transmitted-reference (T-R) short duration (nsec) chirp pulses in the presence of multipath and additive white Gaussian noise (AWGN).

  13. Regularization schemes and the multiplicative anomaly

    NASA Astrophysics Data System (ADS)

    Evans, T. S.

    1999-06-01

    Elizalde, Vanzo, and Zerbini have shown that the effective action of two free Euclidean scalar fields in flat space contains a `multiplicative anomaly' when ζ-function regularization is used. This is related to the Wodzicki residue. I show that there is no anomaly when using a wide range of other regularization schemes and that the anomaly can be removed by an unusual choice of renormalization scales. I define new types of anomalies and show that they have similar properties. Thus multiplicative anomalies encode no novel physics. They merely illustrate some dangerous aspects of ζ-function and Schwinger proper time regularization schemes.

  14. Multiple access capacity trade-offs for a Ka-band personal access satellite system

    NASA Technical Reports Server (NTRS)

    Dessouky, Khaled; Motamedi, Masoud

    1990-01-01

    System capability is critical to the economic viability of a personal satellite communication system. Ka band has significant potential to support a high capacity multiple access system because of the availability of bandwidth. System design tradeoffs are performed and multiple access schemes are compared with the design goal of achieving the highest capacity and efficiency. Conclusions regarding the efficiency of the different schemes and the achievable capacities are given.

  15. Harmonic generation with multiple wiggler schemes

    SciTech Connect

    Bonifacio, R.; De Salvo, L.; Pierini, P.

    1995-02-01

    In this paper the authors give a simple theoretical description of the basic physics of the single pass high gain free electron laser (FEL), describing in some detail the FEL bunching properties and the harmonic generation technique with a multiple-wiggler scheme or a high gain optical klystron configuration.

  16. Optimal coding schemes for conflict-free channel access

    NASA Astrophysics Data System (ADS)

    Browning, Douglas W.; Thomas, John B.

    1989-10-01

    A method is proposed for conflict-free access of a broadcast channel. The method uses a variable-length coding scheme to determine which user gains access to the channel. For an idle channel, an equation for optimal expected overhead is derived and a coding scheme that produces optimal codes is presented. Algorithms for generating optimal codes for access on a busy channel are discussed. Suboptimal schemes are found that perform in a nearly optimal fashion. The method is shown to be superior in performance to previously developed conflict-free channel access schemes.

  17. Exhausting Multiple Hemodialysis Access Failures

    PubMed Central

    Bolleke, Erjola; Seferi, Saimir; Rroji, Merita; Idrizi, Alma; Barbullushi, Myftar; Thereska, Nestor

    2014-01-01

    ABSTRACT Introduction: Vascular access is often considered the Achilles heel the of hemodialysis because of its impact on morbidity, all cause mortality and finally costs of these patients. The most common complication of permanent hemodialysis (HD) vascular access is thrombosis, with some cases being related to hypercoagulability states. Antiphospholipid antibody syndrome (APAS) is a cause of increased thrombotic tendency, and this may complicate the management of such patients on HD. Case report: We describe a 41-year-old woman with end stage renal disease (ESRD) from Adult Polycystic Kidney Disease who was referred to our tertiary care center for treatment and selection of renal replacement therapy form. It was thought to initiate with peritoneal dialysis considering her actual conditions. She was putted on hemodialysis for several sessions, and a subclavian cathether was her first vascular access. The surgeon created an arterio-venous fistula which did not mature. After the implantation of the peritoneal cathether she started peritoneal dialysis and continued living with that for 2 years. She felt exhausted and because of a grave peritonitis episode accompanied with procedure failure and a long hospitalization she was transferred to hemodialysis. Renal transplantation was not possible because she didn’t have a kidney donation. She was maintained on regular HD, but her dialysis care was complicated by recurrent vascular access failures. She had multiple interventions for arterio-venous fistulas and grafts but almost all of them failed due to thrombosis to the extent that only one access site was available for her routine renal replacement treatment. A thorough thrombophilia screen confirmed the presence of antiphospholipid antibodies. A diagnosis of APAS was made and she was anticoagulated with warfarin. The AVG made in this last available site is still working from 18 months. If it fails we have no answers and solutions for her. Conclusion: The presence of

  18. An authentication scheme for secure access to healthcare services.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  19. An authentication scheme for secure access to healthcare services.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS. PMID:23828650

  20. Performance of Multiple Pulse Multiple Delay Modulated UWB Signals in a Multiple Access Indoor Wireless Channel

    SciTech Connect

    Nekoogar, F

    2003-06-12

    In this paper, the performance of a two user UWB multiple access (UWB-MA) system based on multiple-pulse multiple-delay (MPMD) modulation scheme in an indoor wireless channel is evaluated by computer simulations. The indoor multipath propagation channel model used in this study is based on the modified statistical Saleh-Valenzuela model proposed by Foerester and Li from Intel. The simulation results indicate that the multipath performance of MPMD modulated signals in a multiple access system outperforms the nonmultipath case as the number of autocorrelation function (ACF) sampling points increases for each user. This is an unusual but important result, since MPMD receiver exploits multipath phenomenon in indoor wireless channels to increase the BER performance, hence the transmission rate in a UWB-MA system.

  1. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  2. Ka-band geostationary satellite spacing requirements and access schemes

    NASA Technical Reports Server (NTRS)

    Caron, Mario; Hindson, Daniel J.

    1995-01-01

    Geostationary satellite systems for wideband personal communications applications have been proposed. This paper looks at the geostationary satellite spacing requirement to meet the ITU-R sharing criterion for FDMA and CDMA access schemes. CDMA capacity equation is first developed. Then the basis for the interference analysis between two systems with an overlapping coverage area is developed for the cases of identical and different access schemes and for bandwidth and power limited systems. An example of an interference analysis between two systems is fully carried out. The paper also points out the inherent problems when comparing systems with different access schemes. It is found that under certain scenarios, CDMA can allow a closer spacing between satellites.

  3. On board processing for future satellite communications systems: Comparison of FDM, TDM and hybrid accessing schemes

    NASA Technical Reports Server (NTRS)

    Berk, G.; Jean, P. N.; Rotholz, E.

    1982-01-01

    Several satellite uplink and downlink accessing schemes for customer premises service are compared. Four conceptual system designs are presented: satellite-routed frequency division multiple access (FDMA), satellite-switched time division multiple access (TDMA), processor-routed TDMA, and frequency-routed TDMA, operating in the 30/20 GHz band. The designs are compared on the basis of estimated satellite weight, system capacity, power consumption, and cost. The systems are analyzed for fixed multibeam coverage of the continental United States. Analysis shows that the system capacity is limited by the available satellite resources and by the terminal size and cost.

  4. Distinguishing Schemes and Tasks in Children's Development of Multiplicative Reasoning

    ERIC Educational Resources Information Center

    Tzur, Ron; Johnson, Heather L.; McClintock, Evan; Kenney, Rachael H.; Xin, Yan P.; Si, Luo; Woordward, Jerry; Hord, Casey; Jin, Xianyan

    2013-01-01

    We present a synthesis of findings from constructivist teaching experiments regarding six schemes children construct for reasoning multiplicatively and tasks to promote them. We provide a task-generating platform game, depictions of each scheme, and supporting tasks. Tasks must be distinguished from children's thinking, and learning situations…

  5. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  6. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems. PMID:23392626

  7. Quantum internet using code division multiple access.

    PubMed

    Zhang, Jing; Liu, Yu-xi; Ozdemir, Sahin Kaya; Wu, Re-Bing; Gao, Feifei; Wang, Xiang-Bin; Yang, Lan; Nori, Franco

    2013-01-01

    A crucial open problem inS large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels.

  8. Quantum internet using code division multiple access

    PubMed Central

    Zhang, Jing; Liu, Yu-xi; Özdemir, Şahin Kaya; Wu, Re-Bing; Gao, Feifei; Wang, Xiang-Bin; Yang, Lan; Nori, Franco

    2013-01-01

    A crucial open problem inS large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels. PMID:23860488

  9. An optimized quantum information splitting scheme with multiple controllers

    NASA Astrophysics Data System (ADS)

    Jiang, Min

    2016-09-01

    We propose an efficient scheme for splitting multi-qudit information with cooperative control of multiple agents. Each controller is assigned one controlling qudit, and he can monitor the state sharing of all multi-qudit information. Compared with the existing schemes, our scheme requires less resource consumption and approaches higher communication efficiency. In addition, our proposal involves only generalized Bell-state measurement, single-qudit measurement, one-qudit gates and a unitary-reduction operation, which makes it flexible and achievable for physical implementation.

  10. Satellite multiple access systems for mobile communication

    NASA Technical Reports Server (NTRS)

    Lewis, J. L.

    1979-01-01

    This paper considers multiple access techniques for a mobile radio system which incorporates a geosynchronous orbiting satellite repeater through which mobile terminals communicate. The communication capacities of FDMA, TDMA and CDMA systems are examined for a 4 MHz bandwidth system to serve up to 10,000 users. An FDMA system with multibeam coverage is analyzed in detail. The system includes an order-wire network for demand-access control and reassignment of satellite channels. Satellite and terminal configurations are developed to a block diagram level and system costs and implementation requirements are discussed.

  11. Transparent data service with multiple wireless access

    NASA Technical Reports Server (NTRS)

    Dean, Richard A.; Levesque, Allen H.

    1993-01-01

    The rapid introduction of digital wireless networks is an important part of the emerging digital communications scene. The introduction of Digital Cellular, LEO and GEO Satellites, and Personal Communications Services poses both a challenge and an opportunity for the data user. On the one hand wireless access will introduce significant new portable data services such as personal notebooks, paging, E-mail, and fax that will put the information age in the user's pocket. On the other hand the challenge of creating a seamless and transparent environment for the user in multiple access environments and across multiple network connections is formidable. A summary of the issues associated with developing techniques and standards that can support transparent and seamless data services is presented. The introduction of data services into the radio world represents a unique mix of RF channel problems, data protocol issues, and network issues. These problems require that experts from each of these disciplines fuse the individual technologies to support these services.

  12. Multiple fiber Bragg grating sensor system using code-division multiple access.

    PubMed

    Lee, Hojoon

    2002-09-01

    We propose and demonstrate experimentally a multiple fiber Bragg grating sensor system that uses a LED as a light source and adapts the code-division multiple access method to separate individual sensor signals. We measured static and dynamic strains and cross-talk levels among sensor signals. With our proposed scheme, a low-cost sensor system can be designed with a fast response speed. Cross-talk levels between sensor signals are found to be below the -30-dB level.

  13. A one-shot access scheme for a multicast switch

    NASA Astrophysics Data System (ADS)

    Chen, Xing; Hayes, Jeremiah F.; Ali, M. K. Mehmet

    The capability of handling multipoint connections is essential for many communication needs. Input port queueing along with a contention resolution algorithm is used to resolve output request conflict. A study of the performance of a one-shot access scheme for a multicast packet switch is presented. The analysis is based on an assumption of random traffic, modeled by a Bernoulli process of packet arrival and Bernoulli trials of copy distribution patterns. Input port queueing along with random-selection policy is used to resolve the output request conflict. The primary performance measurement is the packet delay. A key assumption is that all copies of the same packet must be switched in the same slot. This one-shot discipline is easier to implement than one which disperses transmission over several time slots in small or medium size switching. Simulation results agree almost perfectly with the analysis.

  14. Performance of random multiple access transmission system

    NASA Technical Reports Server (NTRS)

    Phinainitisart, N.; Wu, W. W.

    1990-01-01

    The performance of the Random Multiple Access (RMA) technique, applied to a direct terminal-to-terminal link with a large number of potential users, is determined. The average signal-to-noise ratio (SNR) is derived. Under Gaussian assumption, the approximation of the probability of error is given. The analysis shows that the system performance is affected by the sequence length, the number of simultaneous users, and the number of cochannel symbols, but is not sensitive to the thermal noise. The performance of using very small aperture antenna for both transmitting and receiving without a hub station is given.

  15. Quantum teleportation scheme by selecting one of multiple output ports

    NASA Astrophysics Data System (ADS)

    Ishizaka, Satoshi; Hiroshima, Tohya

    2009-04-01

    The scheme of quantum teleportation, where Bob has multiple (N) output ports and obtains the teleported state by simply selecting one of the N ports, is thoroughly studied. We consider both the deterministic version and probabilistic version of the teleportation scheme aiming to teleport an unknown state of a qubit. Moreover, we consider two cases for each version: (i) the state employed for the teleportation is fixed to a maximally entangled state and (ii) the state is also optimized as well as Alice’s measurement. We analytically determine the optimal protocols for all the four cases and show the corresponding optimal fidelity or optimal success probability. All these protocols can achieve the perfect teleportation in the asymptotic limit of N→∞ . The entanglement properties of the teleportation scheme are also discussed.

  16. Microgravity gradiometry measurement schemes with multiple-pathway atom interferometers

    NASA Astrophysics Data System (ADS)

    Ashwood, E.; Edwards, M.; Clark, C. W.

    2015-05-01

    We propose a new atom-interferometric scheme for measuring the value and derivatives of the gravitational field in the microgravity environment found in the Cold-Atom Laboratory to be deployed to the International Space Station. The operation of the proposed atom interferometer consists of splitting a harmonically confined Bose-Einstein condensate into multiple pieces using a sequence of laser pulses. In a perfect harmonic oscillator potential all of the condensate pieces will come to rest at the same time. At this point, the harmonic trap is turned off. The nearly motionless condensate clouds then accumulate different phases due to their respective accelerations at different points in space. The trap is then turned back on bringing all of the clouds together at the same time at which point they are again split producing multiple interference patterns. We have simulated some of these interferometric schemes using a Lagrangian variational approximation to the 3D time-dependent Gross-Pitaevskii equation. We have used this method to facilitate rapid interferometer design and to understand how these interference patterns can be used to measure the gravitational field and its derivatives. We also compare the sensitivity of the different interferometric schemes. Supported by NSF grants PHY-1068761 and ARO Atomtronics MURI.

  17. Dispersion-flattened-fiber based optical thresholder for multiple-access-interference suppression in OCDMA system.

    PubMed

    Wang, Xu; Hamanaka, Taro; Wada, Naoya; Kitayama, Ken-Ichi

    2005-07-11

    An optical thresholding technique based on super-continuum generation in dispersion flattened fiber is proposed and experimentally demonstrated to enable data-rate detection in optical code division multiple access networks. The proposed scheme exhibits an excellent discrimination between a desired signal and interference signals with features of pulse reshaping, low insertion loss, polarization independency as well as reasonable operation power.

  18. Optical multiple access techniques for on-board routing

    NASA Astrophysics Data System (ADS)

    Mendez, Antonio J.; Park, Eugene; Gagliardi, Robert M.

    1992-03-01

    The purpose of this research contract was to design and analyze an optical multiple access system, based on Code Division Multiple Access (CDMA) techniques, for on board routing applications on a future communication satellite. The optical multiple access system was to effect the functions of a circuit switch under the control of an autonomous network controller and to serve eight (8) concurrent users at a point to point (port to port) data rate of 180 Mb/s. (At the start of this program, the bit error rate requirement (BER) was undefined, so it was treated as a design variable during the contract effort.) CDMA was selected over other multiple access techniques because it lends itself to bursty, asynchronous, concurrent communication and potentially can be implemented with off the shelf, reliable optical transceivers compatible with long term unattended operations. Temporal, temporal/spatial hybrids and single pulse per row (SPR, sometimes termed 'sonar matrices') matrix types of CDMA designs were considered. The design, analysis, and trade offs required by the statement of work selected a temporal/spatial CDMA scheme which has SPR properties as the preferred solution. This selected design can be implemented for feasibility demonstration with off the shelf components (which are identified in the bill of materials of the contract Final Report). The photonic network architecture of the selected design is based on M(8,4,4) matrix codes. The network requires eight multimode laser transmitters with laser pulses of 0.93 ns operating at 180 Mb/s and 9-13 dBm peak power, and 8 PIN diode receivers with sensitivity of -27 dBm for the 0.93 ns pulses. The wavelength is not critical, but 830 nm technology readily meets the requirements. The passive optical components of the photonic network are all multimode and off the shelf. Bit error rate (BER) computations, based on both electronic noise and intercode crosstalk, predict a raw BER of (10 exp -3) when all eight users are

  19. Optical multiple access techniques for on-board routing

    NASA Technical Reports Server (NTRS)

    Mendez, Antonio J.; Park, Eugene; Gagliardi, Robert M.

    1992-01-01

    The purpose of this research contract was to design and analyze an optical multiple access system, based on Code Division Multiple Access (CDMA) techniques, for on board routing applications on a future communication satellite. The optical multiple access system was to effect the functions of a circuit switch under the control of an autonomous network controller and to serve eight (8) concurrent users at a point to point (port to port) data rate of 180 Mb/s. (At the start of this program, the bit error rate requirement (BER) was undefined, so it was treated as a design variable during the contract effort.) CDMA was selected over other multiple access techniques because it lends itself to bursty, asynchronous, concurrent communication and potentially can be implemented with off the shelf, reliable optical transceivers compatible with long term unattended operations. Temporal, temporal/spatial hybrids and single pulse per row (SPR, sometimes termed 'sonar matrices') matrix types of CDMA designs were considered. The design, analysis, and trade offs required by the statement of work selected a temporal/spatial CDMA scheme which has SPR properties as the preferred solution. This selected design can be implemented for feasibility demonstration with off the shelf components (which are identified in the bill of materials of the contract Final Report). The photonic network architecture of the selected design is based on M(8,4,4) matrix codes. The network requires eight multimode laser transmitters with laser pulses of 0.93 ns operating at 180 Mb/s and 9-13 dBm peak power, and 8 PIN diode receivers with sensitivity of -27 dBm for the 0.93 ns pulses. The wavelength is not critical, but 830 nm technology readily meets the requirements. The passive optical components of the photonic network are all multimode and off the shelf. Bit error rate (BER) computations, based on both electronic noise and intercode crosstalk, predict a raw BER of (10 exp -3) when all eight users are

  20. A Novel Dynamic Channel Access Scheme Using Overlap FFT Filter-Bank for Cognitive Radio

    NASA Astrophysics Data System (ADS)

    Tanabe, Motohiro; Umehira, Masahiro; Ishihara, Koichi; Takatori, Yasushi

    An OFDMA based channel access scheme is proposed for dynamic spectrum access to utilize frequency spectrum efficiently. Though the OFDMA based scheme is flexible enough to change the bandwidth and channel of the transmitted signals, the OFDMA signal has large PAPR (Peak to Average Power Ratio). In addition, if the OFDMA receiver does not use a filter to extract sub-carriers before FFT (Fast Fourier Transform) processing, the designated sub-carriers suffer large interference from the adjacent channel signals in the FFT processing on the receiving side. To solve the problems such as PAPR and adjacent channel interference encountered in the OFDMA based scheme, this paper proposes a novel dynamic channel access scheme using overlap FFT filter-bank based on single carrier modulation. It also shows performance evaluation results of the proposed scheme by computer simulation.

  1. Attitude determination using an adaptive multiple model filtering Scheme

    NASA Astrophysics Data System (ADS)

    Lam, Quang; Ray, Surendra N.

    1995-05-01

    Attitude determination has been considered as a permanent topic of active research and perhaps remaining as a forever-lasting interest for spacecraft system designers. Its role is to provide a reference for controls such as pointing the directional antennas or solar panels, stabilizing the spacecraft or maneuvering the spacecraft to a new orbit. Least Square Estimation (LSE) technique was utilized to provide attitude determination for the Nimbus 6 and G. Despite its poor performance (estimation accuracy consideration), LSE was considered as an effective and practical approach to meet the urgent need and requirement back in the 70's. One reason for this poor performance associated with the LSE scheme is the lack of dynamic filtering or 'compensation'. In other words, the scheme is based totally on the measurements and no attempts were made to model the dynamic equations of motion of the spacecraft. We propose an adaptive filtering approach which employs a bank of Kalman filters to perform robust attitude estimation. The proposed approach, whose architecture is depicted, is essentially based on the latest proof on the interactive multiple model design framework to handle the unknown of the system noise characteristics or statistics. The concept fundamentally employs a bank of Kalman filter or submodel, instead of using fixed values for the system noise statistics for each submodel (per operating condition) as the traditional multiple model approach does, we use an on-line dynamic system noise identifier to 'identify' the system noise level (statistics) and update the filter noise statistics using 'live' information from the sensor model. The advanced noise identifier, whose architecture is also shown, is implemented using an advanced system identifier. To insure the robust performance for the proposed advanced system identifier, it is also further reinforced by a learning system which is implemented (in the outer loop) using neural networks to identify other unknown

  2. Spread-spectrum multiple access using wideband noncoherent MFSK

    NASA Astrophysics Data System (ADS)

    Ha, Tri T.; Pratt, Timothy; Maggenti, Mark A.

    1987-11-01

    Two spread-spectrum multiple access systems which use wideband M-ary frequency shift keying (FSK) (MFSK) as the primary modulation are presented. A bit error rate performance analysis is presented and system throughput is calculated for sample C band and Ku band satellite systems. Sample link analyses are included to illustrate power and adjacent satellite interference considerations in practical multiple access systems.

  3. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    NASA Astrophysics Data System (ADS)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  4. An efficient and secure attribute based signcryption scheme with LSSS access structure.

    PubMed

    Hong, Hanshu; Sun, Zhixin

    2016-01-01

    Attribute based encryption (ABE) and attribute based signature (ABS) provide flexible access control with authentication for data sharing between users, but realizing both functions will bring about too much computation burden. In this paper, we combine the advantages of CP-ABE with ABS and propose a ciphertext policy attribute based signcryption scheme. In our scheme, only legal receivers can decrypt the ciphertext and verify the signature signed by data owner. Furthermore, we use linear secret sharing scheme instead of tree structure to avoid the frequent calls of recursive algorithm. By security and performance analysis, we prove that our scheme is secure as well as gains higher efficiency. PMID:27330910

  5. Advanced multiple access concepts in mobile satellite systems

    NASA Technical Reports Server (NTRS)

    Ananasso, Fulvio

    1990-01-01

    Some multiple access strategies for Mobile Satellite Systems (MSS) are discussed. These strategies were investigated in the context of three separate studies conducted for the International Maritime Satellite Organization (INMARSAT) and the European Space Agency (ESA). Satellite-Switched Frequency Division Multiple Access (SS-FDMA), Code Division Multiple Access (CDMA), and Frequency-Addressable Beam architectures are addressed, discussing both system and technology aspects and outlining advantages and drawbacks of either solution with associated relevant hardware issues. An attempt is made to compare the considered option from the standpoint of user terminal/space segment complexity, synchronization requirements, spectral efficiency, and interference rejection.

  6. Contemplation on marking scheme for Type X multiple choice questions, and an illustration of a practically applicable scheme

    PubMed Central

    Siddiqui, Nazeem Ishrat; Bhavsar, Vinayak H.; Bhavsar, Arnav V.; Bose, Sukhwant

    2016-01-01

    Ever since its inception 100 years back, multiple choice items have been widely used as a method of assessment. It has certain inherent limitations such as inability to test higher cognitive skills, element of guesswork while answering, and issues related with marking schemes. Various marking schemes have been proposed in the past but they are not balanced, skewed, and complex, which are based on mathematical calculations which are typically not within the grasp of medical personnel. Type X questions has many advantages being easy to construct, can test multiple concepts/application/facets of a topic, cognitive skill of various level of hierarchy can be tested, and unlike Type K items, they are free from complicated coding. In spite of these advantages, they are not in common use due to complicated marking schemes. This is the reason we explored the aspects of methods of evaluation of multiple correct options multiple choice questions and came up with the simple, practically applicable, nonstringent but logical scoring system for the same. The rationale of the illustrated marking scheme is that it takes into consideration the distracter recognition ability of the examinee rather than relying on the ability only to select the correct response. Thus, examinee's true knowledge is tested, and he is rewarded accordingly for selecting a correct answer and omitting a distracter. The scheme also penalizes for not recognizing a distracter thus controlling guessing behavior. It is emphasized that if the illustrated scoring scheme is adopted, then Type X questions would come in common practice. PMID:27127312

  7. Design of pulse waveform for waveform division multiple access UWB wireless communication system.

    PubMed

    Yin, Zhendong; Wang, Zhirui; Liu, Xiaohui; Wu, Zhilu

    2014-01-01

    A new multiple access scheme, Waveform Division Multiple Access (WDMA) based on the orthogonal wavelet function, is presented. After studying the correlation properties of different categories of single wavelet functions, the one with the best correlation property will be chosen as the foundation for combined waveform. In the communication system, each user is assigned to different combined orthogonal waveform. Demonstrated by simulation, combined waveform is more suitable than single wavelet function to be a communication medium in WDMA system. Due to the excellent orthogonality, the bit error rate (BER) of multiuser with combined waveforms is so close to that of single user in a synchronous system. That is to say, the multiple access interference (MAI) is almost eliminated. Furthermore, even in an asynchronous system without multiuser detection after matched filters, the result is still pretty ideal and satisfactory by using the third combination mode that will be mentioned in the study.

  8. One electron-controlled multiple-valued dynamic random-access-memory

    NASA Astrophysics Data System (ADS)

    Kye, H. W.; Song, B. N.; Lee, S. E.; Kim, J. S.; Shin, S. J.; Choi, J. B.; Yu, Y.-S.; Takahashi, Y.

    2016-02-01

    We propose a new architecture for a dynamic random-access-memory (DRAM) capable of storing multiple values by using a single-electron transistor (SET). The gate of a SET is designed to be connected to a plurality of DRAM unit cells that are arrayed at intersections of word lines and bitlines. In this SET-DRAM hybrid scheme, the multiple switching characteristics of SET enables multiple value data stored in a DRAM unit cell, and this increases the storage functionality of the device. Moreover, since refreshing data requires only a small amount of SET driving current, this enables device operating with low standby power consumption.

  9. Assessment methodology of protection schemes for next generation optical access networks

    NASA Astrophysics Data System (ADS)

    Mas Machuca, Carmen; Wosinska, Lena; Chen, Jiajia

    2015-12-01

    Optical access networks are evolving towards next generation solutions offering much higher bandwidth per end point. Moreover, the uninterrupted access to the network services is becoming crucial and therefore operators are now considering protecting their access networks. However, the cost factor is still very important due to the relatively low cost sharing in access segment. For this purpose, this paper proposes an assessment methodology that can be used to compare different protection schemes and help to identify the suitable solution for a given scenario. The assessment criteria includes some reliability measures such as Failure Impact Factor (FIF) and connection availability, as well as cost parameters such as the investment required in greenfield and brownfield scenarios and the increase in power consumption compared to the unprotected network. The proposed criteria have been used to compare 7 representative protection schemes shown in literature, which differ mainly in the number of protected network elements and the technology used for protection (fiber, wireless, etc.). The considered protection schemes have been applied to a hybrid wavelength division multiplexing/time division multiplexing Passive Optical Network (Hybrid PON) architecture in an urban area. It has been shown that it is difficult to identify the absolute best scheme with respect to all the considered criteria. However, depending on the requirements from the operator regarding the targeted reliability performance in the network, an appropriate protection scheme can be recommended for either a greenfield or a brownfield scenario.

  10. An efficient key-management scheme for hierarchical access control in e-medicine system.

    PubMed

    Wu, Shuhua; Chen, Kefei

    2012-08-01

    In e-medicine system, the sharing of patients' medical histories scattered among medical institutions through the Internet is highly desirable. The most immediate cryptographic need certainly is an efficient key management method to solve dynamic access problems in a user hierarchy. In this paper, we propose a practical solution for dynamic access problem in a user hierarchy based on hybrid cryptosystems. When compared with Nikooghadam et al.'s scheme proposed most recently, the time complexity and the required storage space is reduced significantly. Moreover, it provides provable security, and is easy to implement. Therefore, our scheme is more suitable for e-medicine system.

  11. New scheme of variable optical buffer for IP packets used in access control of HORNET

    NASA Astrophysics Data System (ADS)

    Fang, Nian; Wang, Lutang; Huang, Zhaoming

    2002-09-01

    A new scheme of variable optical buffer for IP packets is reported. It may be used in access control of HORNET (Hybrid Optoelectronic Ring NETwork), to avoid collision of added packet and the packet already on the ring and improve the loss ratio of the packets. In this scheme, a new multi-wavelength fiber loop memory technique is employed. This architecture uses the wavelength converter (WC) to specify the packets delay and wavelength conversion is accomplished by the technique of four-wave-mixing (FWM) with a semiconductor optical amplifier (SOA). The range of delay is 10 to 9990 bytes periods. First, architecture, operation principle, characteristics and applications of this scheme of variable optical buffer are introduced. Next, a new unslotted CSMA/CA MAC scheme based on the variable optical buffer is briefly introduced too. Finally, the simulation results are presented.

  12. Comparison of multiple atmospheric chemistry schemes in C-IFS

    NASA Astrophysics Data System (ADS)

    Flemming, Johannes; Huijnen, Vincent; Arteta, Joaquim; Stein, Olaf; Inness, Antje; Josse, Beatrice; Schultz, Martin; Peuch, Vincent-Henri

    2013-04-01

    As part of the MACCII -project (EU-FP7) ECMWF's integrated forecast system (IFS) is being extended by modules for chemistry, deposition and emission of reactive gases. This integration of the chemistry complements the integration of aerosol processes in IFS (Composition-IFS). C-IFS provides global forecasts and analysis of atmospheric composition. Its main motivation is to utilize the IFS for the assimilation of satellite observation of atmospheric composition. Furthermore, the integration of chemistry packages directly into IFS will achieve better consistency in terms of the treatment of physical processes and has the potential for simulating interactions between atmospheric composition and meteorology. Atmospheric chemistry in C-IFS can be represented by the modified CB05 scheme as implemented in the TM5 model and the RACMOBUS scheme as implemented in the MOCAGE model. An implementation of the scheme of the MOZART 3.5 model is ongoing. We will present the latest progress in the development and application of C-IFS. We will focus on the comparison of the different chemistry schemes in an otherwise identical C-IFS model setup (emissions, meteorology) as well as in their original Chemistry and Transport Model setup.

  13. Fiber-based multiple-access frequency synchronization via 1f-2f dissemination

    NASA Astrophysics Data System (ADS)

    Zhu, Xi; Wang, Bo; Gao, Chao; Wang, Li-Jun

    2016-09-01

    Considering the reference frequency dissemination requirements of the Square Kilometre Array telescope (SKA) project, on the basis of the 1f-2f precision frequency synchronization scheme, we propose and demonstrate a fiber-based multiple-access frequency synchronization scheme. The dissemination reference frequency can be recovered at arbitrary nodes along the entire fiber link. It can be applied to antennas close proximity to the SKA central station, and will lead to a better SKA frequency synchronization network. As a performance test, we recover the disseminated 100-MHz reference frequency at an arbitrary node chosen as being 5 km away from the transmitting site. Relative frequency stabilities of 2.0×10-14/s and 1.6×10-16/104s are obtained. We also experimentally verify the feasibility of a frequency dissemination link with three access points. Project supported by the National Key Scientific Instrument and Equipment Development Project of China (Grant No. 2013YQ09094303).

  14. Novel MDM-PON scheme utilizing self-homodyne detection for high-speed/capacity access networks.

    PubMed

    Chen, Yuanxiang; Li, Juhao; Zhu, Paikun; Wu, Zhongying; Zhou, Peng; Tian, Yu; Ren, Fang; Yu, Jinyi; Ge, Dawei; Chen, Jingbiao; He, Yongqi; Chen, Zhangyuan

    2015-12-14

    In this paper, we propose a cost-effective, energy-saving mode-division-multiplexing passive optical network (MDM-PON) scheme utilizing self-homodyne detection for high-speed/capacity access network based on low modal-crosstalk few-mode fiber (FMF) and all-fiber mode multiplexer/demultiplexer (MUX/DEMUX). In the proposed scheme, one of the spatial modes is used to transmit a portion of signal carrier (namely pilot-tone) as the local oscillator (LO), while the others are used for signal-bearing channels. At the receiver, the pilot-tone and the signal can be separated without strong crosstalk and sent to the receiver for coherent detection. The spectral efficiency (SE) is significantly enhanced when multiple spatial channels are used. Meanwhile, the self-homodyne detection scheme can effectively suppress laser phase noise, which relaxes the requirement for the lasers line-width at the optical line terminal or optical network units (OLT/ONUs). The digital signal processing (DSP) at the receiver is also simplified since it removes the need for frequency offset compensation and complex phase correction, which reduces the computational complexity and energy consumption. Polarization division multiplexing (PDM) that offers doubled SE is also supported by the scheme. The proposed scheme is scalable to multi-wavelength application when wavelength MUX/DEMUX is utilized. Utilizing the proposed scheme, we demonstrate a proof of concept 4 × 40-Gb/s orthogonal frequency division multiplexing (OFDM) transmission over 55-km FMF using low modal-crosstalk two-mode FMF and MUX/DEMUX with error free operation. Compared with back to back case, less than 1-dB Q-factor penalty is observed after 55-km FMF of the four channels. Signal power and pilot-tone power are also optimized to achieve the optimal transmission performance. PMID:26698996

  15. Access to Treatment for Diabetes and Hypertension in Rural Cambodia: Performance of Existing Social Health Protection Schemes

    PubMed Central

    Bigdeli, Maryam; Jacobs, Bart; Men, Chean Rithy; Nilsen, Kristine; Van Damme, Wim

    2016-01-01

    Background Non-communicable diseases (NCD) pose challenges to Cambodia’s health system. Medicines for NCD are on the National Essential Medicines List but no clinical guidelines support their utilization. Two social health protection schemes aimed at the informal sector population exist (Health Equity Funds and Insurance) together with two disease-specific interventions (a Peer Educator Network and Chronic Diseases Clinics) targeted at NCD patients. This study examines performance of these various schemes in relation to NCD. Methods Cross-sectional household survey among 709 individuals self-reporting diabetes and/or hypertension in three geographical locations in rural Cambodia using a structured questionnaire investigating diagnostic and treatment pathways, health seeking behaviour, health expenditures, and financial coping mechanisms. Results Two third of respondents with NCD were female and 55% did not belong to any scheme. The majority (59%) were diagnosed in the private sector and only 56% were on allopathic treatment that was mainly sought in the private sector (49%). Outpatient treatment cost was higher in the private sector and when using multiple providers of care. The majority were indebted, 11% due to health-related expenses. Contrary to social health protection schemes, disease-specific interventions offered better access to allopathic treatment and provided medicines in accordance with NEML. Conclusion The benefit packages of existing social health protection schemes and services in the public health sector should be adjusted to cater for the needs of people living with NCD in rural Cambodia. Initiatives that offer active disease management strategies and promote patients and community participation appear more successful in increasing treatment adherence and decreasing the risk of financial hardship. PMID:26815916

  16. Distributed magnetic field positioning system using code division multiple access

    NASA Technical Reports Server (NTRS)

    Prigge, Eric A. (Inventor)

    2003-01-01

    An apparatus and methods for a magnetic field positioning system use a fundamentally different, and advantageous, signal structure and multiple access method, known as Code Division Multiple Access (CDMA). This signal architecture, when combined with processing methods, leads to advantages over the existing technologies, especially when applied to a system with a large number of magnetic field generators (beacons). Beacons at known positions generate coded magnetic fields, and a magnetic sensor measures a sum field and decomposes it into component fields to determine the sensor position and orientation. The apparatus and methods can have a large `building-sized` coverage area. The system allows for numerous beacons to be distributed throughout an area at a number of different locations. A method to estimate position and attitude, with no prior knowledge, uses dipole fields produced by these beacons in different locations.

  17. Alternative multiple-access techniques for mobile satellite systems

    NASA Technical Reports Server (NTRS)

    Smith, Patrick O.; Geraniotis, Evaggelos

    1989-01-01

    The use of Code Division Multiple Access (CDMA) to satisfy the diverse requirements of a generic (land, maritime, aeronautical) mobile satellite system (MSS) network design is discussed. Comparisons between CDMA and Frequency Division Multiple Access (FDMA) show that a CDMA network design can support significantly more voice channel allocations than FDMA when relatively simple CDMA correlation receivers are employed, provided that there is sufficient space segment equivalent isotropically radiated power (EIRP). The use of more advanced CDMA receivers can improve the spectral and power efficiency. Although the use of CDMA may not gain immediate and widespread support in the international MSS community, provision for the use of CDMA for a domestic system in the U.S., and possibly for a regional system throughout North America, is likely.

  18. Code division multiple access signaling for modulated reflector technology

    DOEpatents

    Briles, Scott D.

    2012-05-01

    A method and apparatus for utilizing code division multiple access in modulated reflectance transmissions comprises the steps of generating a phase-modulated reflectance data bit stream; modifying the modulated reflectance data bit stream; providing the modified modulated reflectance data bit stream to a switch that connects an antenna to an infinite impedance in the event a "+1" is to be sent, or connects the antenna to ground in the event a "0" or a "-1" is to be sent.

  19. Next generation communications satellites: Multiple access and network studies

    NASA Technical Reports Server (NTRS)

    Stern, T. E.; Schwartz, M.; Meadows, H. E.; Ahmadi, H. K.; Gadre, J. G.; Gopal, I. S.; Matsmo, K.

    1980-01-01

    Following an overview of issues involved in the choice of promising system architectures for efficient communication with multiple small inexpensive Earth stations serving hetergeneous user populations, performance evaluation via analysis and simulation for six SS/TDMA (satellite-switched/time-division multiple access) system architectures is discussed. These configurations are chosen to exemplify the essential alternatives available in system design. Although the performance evaluation analyses are of fairly general applicability, whenever possible they are considered in the context of NASA's 30/20 GHz studies. Packet switched systems are considered, with the assumption that only a part of transponder capacit is devoted to packets, the integration of circuit and packet switched traffic being reserved for further study. Three types of station access are distinguished: fixed (FA), demand (DA), and random access (RA). Similarly, switching in the satellite can be assigned on a fixed (FS) or demand (DS) basis, or replaced by a buffered store-and-forward system (SF) onboard the satellite. Since not all access/switching combinations are practical, six systems are analyzed in detail: three FS SYSTEMS, FA/FS, DA/ES, RA/FS; one DS system, DA/DS; and two SF systems, FA/SF, DA/SF. Results are presented primarily in terms of delay-throughput characteristics.

  20. Digital Image Encryption Scheme Based on Multiple Chaotic Systems

    NASA Astrophysics Data System (ADS)

    Abd El-Latif, Ahmed A.; Li, Li; Zhang, Tiejun; Wang, Ning; Song, Xianhua; Niu, Xiamu

    2012-06-01

    Image encryption is a challenging task due to the significant level of sophistication achieved by forgerers and other cybercriminals. Advanced encryption methods for secure transmission, storage, and retrieval of digital images are increasingly needed for a number of military, medical, homeland security, and other applications. In this paper, we introduce a new digital image encryption algorithm. The new algorithm employs multiple chaotic systems and cryptographic primitive operations within the encryption process, which are efficiently implemented on modern processors, and adopts round keys for encryption using a chaotic map. Experiments conducted show that the proposed algorithm possesses robust security features such as fairly uniform distribution, high sensitivity to both keys and plainimages, almost ideal entropy, and the ability to highly de-correlate adjacent pixels in the cipherimages. Furthermore, it has a large key space, which greatly increases its security for image encryption applications.

  1. Heterodyne detection using spectral line pairing for spectral phase encoding optical code division multiple access and dynamic dispersion compensation.

    PubMed

    Yang, Yi; Foster, Mark; Khurgin, Jacob B; Cooper, A Brinton

    2012-07-30

    A novel coherent optical code-division multiple access (OCDMA) scheme is proposed that uses spectral line pairing to generate signals suitable for heterodyne decoding. Both signal and local reference are transmitted via a single optical fiber and a simple balanced receiver performs sourceless heterodyne detection, canceling speckle noise and multiple-access interference (MAI). To validate the idea, a 16 user fully loaded phase encoded system is simulated. Effects of fiber dispersion on system performance are studied as well. Both second and third order dispersion management is achieved by using a spectral phase encoder to adjust phase shifts of spectral components at the optical network unit (ONU).

  2. A novel interacting multiple model based network intrusion detection scheme

    NASA Astrophysics Data System (ADS)

    Xin, Ruichi; Venkatasubramanian, Vijay; Leung, Henry

    2006-04-01

    In today's information age, information and network security are of primary importance to any organization. Network intrusion is a serious threat to security of computers and data networks. In internet protocol (IP) based network, intrusions originate in different kinds of packets/messages contained in the open system interconnection (OSI) layer 3 or higher layers. Network intrusion detection and prevention systems observe the layer 3 packets (or layer 4 to 7 messages) to screen for intrusions and security threats. Signature based methods use a pre-existing database that document intrusion patterns as perceived in the layer 3 to 7 protocol traffics and match the incoming traffic for potential intrusion attacks. Alternately, network traffic data can be modeled and any huge anomaly from the established traffic pattern can be detected as network intrusion. The latter method, also known as anomaly based detection is gaining popularity for its versatility in learning new patterns and discovering new attacks. It is apparent that for a reliable performance, an accurate model of the network data needs to be established. In this paper, we illustrate using collected data that network traffic is seldom stationary. We propose the use of multiple models to accurately represent the traffic data. The improvement in reliability of the proposed model is verified by measuring the detection and false alarm rates on several datasets.

  3. Improvement of a quantum broadcasting multiple blind signature scheme based on quantum teleportation

    NASA Astrophysics Data System (ADS)

    Zhang, Wei; Qiu, Daowen; Zou, Xiangfu

    2016-06-01

    Recently, a broadcasting multiple blind signature scheme based on quantum teleportation has been proposed for the first time. It is claimed to have unconditional security and properties of quantum multiple signature and quantum blind signature. In this paper, we analyze the security of the protocol and show that each signatory can learn the signed message by a single-particle measurement and the signed message can be modified at random by any attacker according to the scheme. Furthermore, there are some participant attacks and external attacks existing in the scheme. Finally, we present an improved scheme and show that it can resist all of the mentioned attacks. Additionally, the secret keys can be used again and again, making it more efficient and practical.

  4. Analysis of an FBMC/OQAM scheme for asynchronous access in wireless communications

    NASA Astrophysics Data System (ADS)

    Mattera, Davide; Tanda, Mario; Bellanger, Maurice

    2015-12-01

    The OFDM/OQAM transceiver belongs to the filter-bank-based multicarrier (FBMC) family and, unlike OFDM schemes, it is particularly able to meet the requirements of the physical layer of cognitive radio networks such as high level of adjacent channel leakage ratio and asynchronous communications. The paper proposes and analyzes a new implementation structure, named frequency spreading, for the OFDM/OQAM transceiver. On flat channels, it is equivalent to the standard one in terms of input-output relations, though more complex. On multipath channels, it offers a crucial advantage in terms of equalization, which is performed in the frequency domain, leading to high performance and no additional delay. With its flexibility and level of performance, the analyzed scheme has the potential to outperform OFDM in the asynchronous access context and in cognitive radio networks.

  5. A Comparative Study of Multiplexing Schemes for Next Generation Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Imtiaz, Waqas A.; Khan, Yousaf; Shah, Pir Mehar Ali; Zeeshan, M.

    2014-09-01

    Passive optical network (PON) is a high bandwidth, economical solution which can provide the necessary bandwidth to end-users. Wavelength division multiplexed passive optical networks (WDM PONs) and time division multiplexed passive optical networks (TDM PONs) are considered as an evolutionary step for next-generation optical access (NGOA) networks. However they fail to provide highest transmission capacity, efficient bandwidth access, and robust dispersion tolerance. Thus future PONs are considered on simpler, efficient and potentially scalable, optical code division multiplexed (OCDM) PONs. This paper compares the performance of existing PONs with OCDM PON to determine a suitable scheme for NGOA networks. Two system parameter are used in this paper: fiber length, and bit rate. Performance analysis using Optisystem shows that; for a sufficient system performance parameters i.e. bit error rate (BER) ≤ 10-9, and maximum quality factor (Q) ≥ 6, OCDMA PON efficiently performs upto 50 km with 10 Gbit/s per ONU.

  6. Multitasking for flows about multiple body configurations using the chimera grid scheme

    NASA Technical Reports Server (NTRS)

    Dougherty, F. C.; Morgan, R. L.

    1987-01-01

    The multitasking of a finite-difference scheme using multiple overset meshes is described. In this chimera, or multiple overset mesh approach, a multiple body configuration is mapped using a major grid about the main component of the configuration, with minor overset meshes used to map each additional component. This type of code is well suited to multitasking. Both steady and unsteady two dimensional computations are run on parallel processors on a CRAY-X/MP 48, usually with one mesh per processor. Flow field results are compared with single processor results to demonstrate the feasibility of running multiple mesh codes on parallel processors and to show the increase in efficiency.

  7. Chip-interleaved optical code division multiple access relying on a photon-counting iterative successive interference canceller for free-space optical channels.

    PubMed

    Zhou, Xiaolin; Zheng, Xiaowei; Zhang, Rong; Hanzo, Lajos

    2013-07-01

    In this paper, we design a novel Poisson photon-counting based iterative successive interference cancellation (SIC) scheme for transmission over free-space optical (FSO) channels in the presence of both multiple access interference (MAI) as well as Gamma-Gamma atmospheric turbulence fading, shot-noise and background light. Our simulation results demonstrate that the proposed scheme exhibits a strong MAI suppression capability. Importantly, an order of magnitude of BER improvements may be achieved compared to the conventional chip-level optical code-division multiple-access (OCDMA) photon-counting detector.

  8. Diffuse optical tomography based on multiple access coding

    NASA Astrophysics Data System (ADS)

    Wang, Xuefeng; Wang, Yuanqing; Su, Jinshan; Xu, Fan

    2016-04-01

    Diffuse optical tomography (DOT) has the advantages of being a non-invasive, non-radiation emitting and low-cost biological tissue imaging method, and many recent studies have employed this technology. By improving the spatial resolution and developing a new method for constantly improving the flexibility of the experimental device, the system can perform data acquisition rapidly and conveniently. We propose a method for rapid data acquisition based on multiple access coding; it can acquire data in parallel, and the system can greatly improve the temporal resolution of the data acquisition step in diffuse optical tomography thereafter. We simulate the encoding and decoding process of the source-detector pair and successfully isolate the source signal from mixed signals. The DOT image reconstruction highlight the effectiveness of the system.

  9. S-band multiple-access interference study for advanced tracking and data relay satellite systems

    NASA Technical Reports Server (NTRS)

    Peng, Wei-Chung; Yang, Chau-Chin

    1990-01-01

    The results of a study on the effect of mutual interference among S-band multiple access (SMA) system users of advanced tracking and data relay satellite system (ATDRSS) are presented. In the ATDRSS era, the SMA system is required to support data rates ranging from 10 kb/s to 3 Mb/s. The system will consist of four advanced tracking and data relay satellites (ATDRS) each supporting up to five telemetry links. All users have 10 MHz bandwidth with their carrier frequency equal to 2.2875 GHz. A hybrid SDMA/CDMA scheme is used to mitigate the effect of the interference among system users. SMA system interference probability is evaluated with CLASS software. User link margin degradation due to mutual interference between two users is evaluated. System interference probability is evaluated for the projected 1996 mission model, a reference mission model, and a modified reference mission model.

  10. Multiple-image encryption scheme with a single-pixel detector

    NASA Astrophysics Data System (ADS)

    Yuan, Sheng; Liu, Xuemei; Zhou, Xin; Li, Zhongyang

    2016-08-01

    A multiple-image encryption (MIE) scheme with a single-pixel detector has been proposed according to the principle of ghost imaging. In this scheme, each of the spatially coherent laser beams is modified by a set of phase-mask keys and illuminates on a secret image. All of the transmitted lights are recorded together by a single-pixel (bucket) detector to obtain a ciphertext, but anyone of the secret images can be decrypted from the ciphertext independently without any mutually overlapped despite some noise in them. The MIE scheme will bring convenience for data storage and transmission, especially in the case that different secret images need to be distributed to different authorized users, because the ciphertext is a real-valued function and this scheme can effectively avoid the secret images being extracted mutually. The basic principle of the MIE scheme is described theoretically and verified by computer simulations. Finally, the feasibility, robustness and encryption capacity are also tested numerically.

  11. Asynchronous detection of optical code division multiple access signals using a bandwidth-efficient and wavelength-aware receiver.

    PubMed

    Fok, Mable P; Deng, Yanhua; Prucnal, Paul R

    2010-04-01

    We experimentally demonstrate what we believe to be a novel detection scheme for interfacing asynchronous optical code division multiple access (CDMA) signals with an electronic clock and data recovery system that operates only at the baseband bandwidth. This allows using a large optical bandwidth expansion factor in which the optical chip rate is much larger than the bandwidth of the optoelectronic receiver. The received optical CDMA signal is launched into a four-wave-mixing-based wavelength-aware all-optical front end that rejects multiaccess interference, followed by an amplitude-noise suppression stage comprised of a semiconductor optical amplifier. The clean signal is then converted into a non-return-to-zero-like signal by a baseband receiver. Using the proposed detection scheme, asynchronous transmission and detection of optical CDMA signals is implemented. With the novel detection scheme, the classic CDMA near-far problem is mitigated, and error-free detection is easily obtained.

  12. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  13. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    NASA Astrophysics Data System (ADS)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol

  14. A new numerical scheme for computer simulation of multiple cracking in ceramic films during constrained sintering

    NASA Astrophysics Data System (ADS)

    Li, Fan; Pan, Jingzhe; Cocks, Alan

    2012-04-01

    Heterogeneities in a green film made from a powder compact is considered to be one of the major reasons for the generation of sintering cracks. Stresses are generated in a film due to the constraint of the substrate. Instabilities in the sintering process can occur at sites of these heterogeneities resulting in the generation of multiple cracks, which can propagate through the thickness of the film. The classical finite element method is fundamentally ill-suited to studying this multiple-cracking problem. This paper presents a simple and robust numerical method for the computer modelling of sintering and multiple cracking. The method is based on the so-called material point method, which was initially developed for large deformation problems in plasticity. A parallel computing algorithm is implemented and a simple scheme for modelling the initiation and propagation of multiple cracks is proposed. The numerical scheme is then validated by simulating a simple geometric problem for which an analytical solution can be obtained. Finally, the robust performance of the numerical method is demonstrated by modelling the sintering response of a film which contains different types of heterogeneities.

  15. Assessment of multiple sustainability demands for wastewater treatment alternatives: a refined evaluation scheme and case study.

    PubMed

    Wang, Xu; Liu, Junxin; Ren, Nan-Qi; Yu, Han-Qing; Lee, Duu-Jong; Guo, Xuesong

    2012-05-15

    Current estimation schemes as decision support tools for the selection of wastewater treatment alternatives focus primarily on the treatment efficiency, effluent quality, and environmental consequences for receiving water bodies. However, these schemes generally do not quantify the potential to convert pollutants in wastewater to recoverable resources. This study proposes a refined evaluation scheme for choices of wastewater treatment processes that quantifies not only adverse environmental effects but also bioenergy and nutrient recovery indices. An original means of data processing was established and clear estimate indicators were consequently obtained to allow a smooth overall estimation. An array of wastewater treatment alternatives that meet three effluent limits were used as case studies to demonstrate how the present scheme works, simultaneously, to identify optimum choices. It is concluded in the overall estimation that the lower sustainability of wastewater treatment contributed by increasingly stringent discharge demands was offset and mitigated by the resource-recovery scenarios involved, and the scenario of recovering nutrients via excess-sludge composting was of more benefit. Thus, before tightening wastewater discharge requirements, one should bear in mind the situation of multiple sustainability by setting a goal to achieve not only the greatest reduction in environmental burden but also the maximum resource-recovery benefits. PMID:22530769

  16. Fourth Annual International Acquisitions Workshop: Access to Multiple Media Worldwide

    NASA Technical Reports Server (NTRS)

    1994-01-01

    Topics discussed during the workshop include: (1) Multinational-Multiple media collections and activities spanning many countries; (2) Multiple media in North American trade and commerce; (3) African spotlight; (4) Europe-Multiple media in national libraries and services; (5) Scandinavian spotlight; (6) Internet update; (7) Multiple media in US federal agencies; (8) Open-source multiple media in US federal agencies; and (9) Multiple media at US federal technical agencies-NIST and NOAA.

  17. Confined turbulent fluid-particle flow modeling using multiple-realization particle trajectory schemes

    NASA Technical Reports Server (NTRS)

    Adeniji-Fashola, A. A.

    1988-01-01

    A multiple-realization particle trajectory scheme has been developed and applied to the numerical prediction of confined turbulent fluid-particle flows. The example flows investigated include the vertical pipe upflow experimental data of Tsuji et al. and the experimental data of Leavitt for a coaxial jet flow, comprising a particle-laden central jet and a clean annular jet, into a large recirculation chamber. The results obtained from the numerical scheme agree well with the experimental data, lending confidence to the modeling approach. The multiple-realization particle trajectory turbulent flow modeling scheme is believed to be a more elegant and accurate approach to the extension of single-particle hydrodynamics to dilute multi-particle systems than the more commonly employed two-fluid modeling approach. It is also better able to incorporate additional force items such as lift, virtual mass and Bassett history terms directly into the particle equation of motion as appropriate. This makes it a suitable candidate for particle migration studies and an extension to situations involving liquid particulate phases with possible propulsion applications, such as in spray combustion, follows naturally.

  18. Proceedings of the Mobile Satellite System Architectures and Multiple Access Techniques Workshop

    NASA Technical Reports Server (NTRS)

    Dessouky, Khaled

    1989-01-01

    The Mobile Satellite System Architectures and Multiple Access Techniques Workshop served as a forum for the debate of system and network architecture issues. Particular emphasis was on those issues relating to the choice of multiple access technique(s) for the Mobile Satellite Service (MSS). These proceedings contain articles that expand upon the 12 presentations given in the workshop. Contrasting views on Frequency Division Multiple Access (FDMA), Code Division Multiple Access (CDMA), and Time Division Multiple Access (TDMA)-based architectures are presented, and system issues relating to signaling, spacecraft design, and network management constraints are addressed. An overview article that summarizes the issues raised in the numerous discussion periods of the workshop is also included.

  19. The Multiple Sclerosis Risk Sharing Scheme Monitoring Study – early results and lessons for the future

    PubMed Central

    Pickin, Mark; Cooper, Cindy L; Chater, Timothy; O'Hagan, Anthony; Abrams, Keith R; Cooper, Nicola J; Boggild, Mike; Palace, Jackie; Ebers, George; Chilcott, James B; Tappenden, Paul; Nicholl, Jon

    2009-01-01

    Background Risk sharing schemes represent an innovative and important approach to the problems of rationing and achieving cost-effectiveness in high cost or controversial health interventions. This study aimed to assess the feasibility of risk sharing schemes, looking at long term clinical outcomes, to determine the price at which high cost treatments would be acceptable to the NHS. Methods This case study of the first NHS risk sharing scheme, a long term prospective cohort study of beta interferon and glatiramer acetate in multiple sclerosis (MS) patients in 71 specialist MS centres in UK NHS hospitals, recruited adults with relapsing forms of MS, meeting Association of British Neurologists (ABN) criteria for disease modifying therapy. Outcome measures were: success of recruitment and follow up over the first three years, analysis of baseline and initial follow up data and the prospect of estimating the long term cost-effectiveness of these treatments. Results Centres consented 5560 patients. Of the 4240 patients who had been in the study for a least one year, annual review data were available for 3730 (88.0%). Of the patients who had been in the study for at least two years and three years, subsequent annual review data were available for 2055 (78.5%) and 265 (71.8%) patients respectively. Baseline characteristics and a small but statistically significant progression of disease were similar to those reported in previous pivotal studies. Conclusion Successful recruitment, follow up and early data analysis suggest that risk sharing schemes should be able to deliver their objectives. However, important issues of analysis, and political and commercial conflicts of interest still need to be addressed. PMID:19126193

  20. Runoff estimates across large regions using multiple data sources and regional model calibration schemes

    NASA Astrophysics Data System (ADS)

    Zhang, Y.; Wang, B.; Vaze, J.; Chiew, F. H.; Guerschman, J. P.; McVicar, T.

    2012-12-01

    Estimating runoff in ungauged or poorly gauged catchments is one of the most challenging tasks in surface water hydrology. This study focuses on runoff estimates across large regions using multiple data sources together with different regional model calibration schemes. First, 228 gauged catchments widely located across south-east Australia (~1.4 million km2) are selected. Half of the catchments are randomly selected for regional model calibrations and the remainder used for cross-validations. Four rainfall-runoff and landscape hydrological models (Xinanjiang, AWBM, Sacramento and AWRA-L) are regionally calibrated against multiple data sources, including recorded daily streamflow, gridded monthly remotely-sensed actual evapotranspiration (ETa) and gridded daily remotely-sensed soil moisture (SM) data. The modeling results are assessed against recorded streamflow, remotely sensed ETa and remotely-sensed SM in other half of the catchments. Results indicate that the multi-objective calibrations are better than the traditional model calibration solely against streamflow data, in terms of overall model performance in simulating daily runoff, monthly actual ET and daily SM in the validation catchments. The runoff prediction results using the regional model calibration schemes perform similarly to (or slightly better than) the traditional regionalization approach, i.e., the nearest neighbor (or spatial proximity) approach. However, the regional model calibration approach has an important advantage for runoff estimates across large regions where gauging stations are relatively sparse.

  1. HiCoDG: A Hierarchical Data-Gathering Scheme Using Cooperative Multiple Mobile Elements †

    PubMed Central

    Van Le, Duc; Oh, Hoon; Yoon, Seokhoon

    2014-01-01

    In this paper, we study mobile element (ME)-based data-gathering schemes in wireless sensor networks. Due to the physical speed limits of mobile elements, the existing data-gathering schemes that use mobile elements can suffer from high data-gathering latency. In order to address this problem, this paper proposes a new hierarchical and cooperative data-gathering (HiCoDG) scheme that enables multiple mobile elements to cooperate with each other to collect and relay data. In HiCoDG, two types of mobile elements are used: the mobile collector (MC) and the mobile relay (MR). MCs collect data from sensors and forward them to the MR, which will deliver them to the sink. In this work, we also formulated an integer linear programming (ILP) optimization problem to find the optimal trajectories for MCs and the MR, such that the traveling distance of MEs is minimized. Two variants of HiCoDG, intermediate station (IS)-based and cooperative movement scheduling (CMS)-based, are proposed to facilitate cooperative data forwarding from MCs to the MR. An analytical model for estimating the average data-gathering latency in HiCoDG was also designed. Simulations were performed to compare the performance of the IS and CMS variants, as well as a multiple traveling salesman problem (mTSP)-based approach. The simulation results show that HiCoDG outperforms mTSP in terms of latency. The results also show that CMS can achieve the lowest latency with low energy consumption. PMID:25526356

  2. HiCoDG: a hierarchical data-gathering scheme using cooperative multiple mobile elements.

    PubMed

    Van Le, Duc; Oh, Hoon; Yoon, Seokhoon

    2014-12-17

    In this paper, we study mobile element (ME)-based data-gathering schemes in wireless sensor networks. Due to the physical speed limits of mobile elements, the existing data-gathering schemes that use mobile elements can suffer from high data-gathering latency. In order to address this problem, this paper proposes a new hierarchical and cooperative data-gathering (HiCoDG) scheme that enables multiple mobile elements to cooperate with each other to collect and relay data. In HiCoDG, two types of mobile elements are used: the mobile collector (MC) and the mobile relay (MR). MCs collect data from sensors and forward them to the MR, which will deliver them to the sink. In this work, we also formulated an integer linear programming (ILP) optimization problem to find the optimal trajectories for MCs and the MR, such that the traveling distance of MEs is minimized. Two variants of HiCoDG, intermediate station (IS)-based and cooperative movement scheduling (CMS)-based, are proposed to facilitate cooperative data forwarding from MCs to the MR. An analytical model for estimating the average data-gathering latency in HiCoDG was also designed. Simulations were performed to compare the performance of the IS and CMS variants, as well as a multiple traveling salesman problem (mTSP)-based approach. The simulation results show that HiCoDG outperforms mTSP in terms of latency. The results also show that CMS can achieve the lowest latency with low energy consumption.

  3. Performance analysis of commercial multiple-input-multiple-output access point in distributed antenna system.

    PubMed

    Fan, Yuting; Aighobahi, Anthony E; Gomes, Nathan J; Xu, Kun; Li, Jianqiang

    2015-03-23

    In this paper, we experimentally investigate the throughput of IEEE 802.11n 2x2 multiple-input-multiple-output (MIMO) signals in a radio-over-fiber-based distributed antenna system (DAS) with different fiber lengths and power imbalance. Both a MIMO-supported access point (AP) and a spatial-diversity-supported AP were separately employed in the experiments. Throughput measurements were carried out with wireless users at different locations in a typical office environment. For the different fiber length effect, the results indicate that MIMO signals can maintain high throughput when the fiber length difference between the two remote antenna units (RAUs) is under 100 m and falls quickly when the length difference is greater. For the spatial diversity signals, high throughput can be maintained even when the difference is 150 m. On the other hand, the separation of the MIMO antennas allows additional freedom in placing the antennas in strategic locations for overall improved system performance, although it may also lead to received power imbalance problems. The results show that the throughput performance drops in specific positions when the received power imbalance is above around 13 dB. Hence, there is a trade-off between the extent of the wireless coverage for moderate bit-rates and the area over which peak bit-rates can be achieved. PMID:25837089

  4. Performance analysis of commercial multiple-input-multiple-output access point in distributed antenna system.

    PubMed

    Fan, Yuting; Aighobahi, Anthony E; Gomes, Nathan J; Xu, Kun; Li, Jianqiang

    2015-03-23

    In this paper, we experimentally investigate the throughput of IEEE 802.11n 2x2 multiple-input-multiple-output (MIMO) signals in a radio-over-fiber-based distributed antenna system (DAS) with different fiber lengths and power imbalance. Both a MIMO-supported access point (AP) and a spatial-diversity-supported AP were separately employed in the experiments. Throughput measurements were carried out with wireless users at different locations in a typical office environment. For the different fiber length effect, the results indicate that MIMO signals can maintain high throughput when the fiber length difference between the two remote antenna units (RAUs) is under 100 m and falls quickly when the length difference is greater. For the spatial diversity signals, high throughput can be maintained even when the difference is 150 m. On the other hand, the separation of the MIMO antennas allows additional freedom in placing the antennas in strategic locations for overall improved system performance, although it may also lead to received power imbalance problems. The results show that the throughput performance drops in specific positions when the received power imbalance is above around 13 dB. Hence, there is a trade-off between the extent of the wireless coverage for moderate bit-rates and the area over which peak bit-rates can be achieved.

  5. Has the Rajiv Aarogyasri Community Health Insurance Scheme of Andhra Pradesh Addressed the Educational Divide in Accessing Health Care?

    PubMed Central

    Rao, Mala; Singh, Prabal Vikram; Katyal, Anuradha; Samarth, Amit; Bergkvist, Sofi; Renton, Adrian; Netuveli, Gopalakrishnan

    2016-01-01

    Background Equity of access to healthcare remains a major challenge with families continuing to face financial and non-financial barriers to services. Lack of education has been shown to be a key risk factor for 'catastrophic' health expenditure (CHE), in many countries including India. Consequently, ways to address the education divide need to be explored. We aimed to assess whether the innovative state-funded Rajiv Aarogyasri Community Health Insurance Scheme of Andhra Pradesh state launched in 2007, has achieved equity of access to hospital inpatient care among households with varying levels of education. Methods We used the National Sample Survey Organization 2004 survey as our baseline and the same survey design to collect post-intervention data from 8623 households in the state in 2012. Two outcomes, hospitalisation and CHE for inpatient care, were estimated using education as a measure of socio-economic status and transforming levels of education into ridit scores. We derived relative indices of inequality by regressing the outcome measures on education, transformed as a ridit score, using logistic regression models with appropriate weights and accounting for the complex survey design. Findings Between 2004 and 2012, there was a 39% reduction in the likelihood of the most educated person being hospitalised compared to the least educated, with reductions observed in all households as well as those that had used the Aarogyasri. For CHE the inequality disappeared in 2012 in both groups. Sub-group analyses by economic status, social groups and rural-urban residence showed a decrease in relative indices of inequality in most groups. Nevertheless, inequalities in hospitalisation and CHE persisted across most groups. Conclusion During the time of the Aarogyasri scheme implementation inequalities in access to hospital care were substantially reduced but not eliminated across the education divide. Universal access to education and schemes such as Aarogyasri have the

  6. Optical Multiple Access Network (OMAN) for advanced processing satellite applications

    NASA Technical Reports Server (NTRS)

    Mendez, Antonio J.; Gagliardi, Robert M.; Park, Eugene; Ivancic, William D.; Sherman, Bradley D.

    1991-01-01

    An OMAN breadboard for exploring advanced processing satellite circuit switch applications is introduced. Network architecture, hardware trade offs, and multiple user interference issues are presented. The breadboard test set up and experimental results are discussed.

  7. Design of an image encryption scheme based on a multiple chaotic map

    NASA Astrophysics Data System (ADS)

    Tong, Xiao-Jun

    2013-07-01

    In order to solve the problem that chaos is degenerated in limited computer precision and Cat map is the small key space, this paper presents a chaotic map based on topological conjugacy and the chaotic characteristics are proved by Devaney definition. In order to produce a large key space, a Cat map named block Cat map is also designed for permutation process based on multiple-dimensional chaotic maps. The image encryption algorithm is based on permutation-substitution, and each key is controlled by different chaotic maps. The entropy analysis, differential analysis, weak-keys analysis, statistical analysis, cipher random analysis, and cipher sensibility analysis depending on key and plaintext are introduced to test the security of the new image encryption scheme. Through the comparison to the proposed scheme with AES, DES and Logistic encryption methods, we come to the conclusion that the image encryption method solves the problem of low precision of one dimensional chaotic function and has higher speed and higher security.

  8. A double-moment multiple-phase four-class bulk ice scheme, Part 1: Description

    NASA Technical Reports Server (NTRS)

    Ferrier, Brad Shoenberg

    1994-01-01

    A detailed ice-phase bulk microphysical scheme has been developed for simulating the hydrometeor distributions of convective and stratiform precipitation in different large-scale environmental conditions. The proposed scheme involves 90 distinct microphysical processes, which predict the mixing ratios and the number concentrations of small ice crystals, snow, graupel, and frozen drops/hail, as well as the mixing ratios of liquid water on wet precipitation ice (snow, graupel, frozen drops). The number of adjustable coefficients has been significantly reduced in comparison with other bulk schemes. Additional improvements have been made to the parameterization in the following areas: (1) representing small ice crystals with nonzero terminal fall velocities and dispersive size distributions, (2) accurate and computationally efficient calculations of precipitation collection processes, (3) reformulating the collection equation to prevent unrealistically large accretion rates, (4) more realistic conversion by riming between different classes of precipitation ice, (5) preventing unrealistically large rates of raindrop freezing and freezing of liquid water on ice, (6) detailed treatment of various rime-splintering ice multiplication mechanisms, (7) a simple representation of the Hobbs-Rangno ice enhancement process, (8) aggregation of small ice crystals and snow, and (9) allowing explicit competition between cloud water condensation and ice deposition rates rather than using saturation adjustment techniques. For the purposes of conserving the higher moments of the particle distributions, preserving the spectral widths (or slopes) of the particle spectra is shown to be more important than strict conservation of particle number concentration when parameterizing changes in ice-particle number concentrations due to melting, vapor transfer processes (sublimation of dry ice, evaporation from wet ice), and conversion between different hydrometeor species. The microphysical scheme

  9. An Integrated Approach for Accessing Multiple Datasets through LANCE

    NASA Astrophysics Data System (ADS)

    Murphy, K. J.; Teague, M.; Conover, H.; Regner, K.; Beaumont, B.; Masuoka, E.; Vollmer, B.; Theobald, M.; Durbin, P.; Michael, K.; Boller, R. A.; Schmaltz, J. E.; Davies, D.; Horricks, K.; Ilavajhala, S.; Thompson, C. K.; Bingham, A.

    2011-12-01

    The NASA/GSFC Land Atmospheres Near-real time Capability for EOS (LANCE) provides imagery for approximately 40 data products from MODIS, AIRS, AMSR-E and OMI to support the applications community in the study of a variety of phenomena. Thirty-six of these products are available within 2.5 hours of observation at the spacecraft. The data set includes the population density data provided by the EOSDIS Socio-Economic Data and Applications Center (SEDAC). The purpose of this paper is to describe the variety of tools that have been developed by LANCE to support user access to the imagery. The long-standing Rapid Response system has been integrated into LANCE and is a major vehicle for the distribution of the imagery to end users. There are presently approximately 10,000 anonymous users per month accessing these imagery. The products are grouped into 14 applications categories such as Smoke Plumes, Pollution, Fires, Agriculture and the selection of any category will make relevant subsets of the 40 products available as possible overlays in an interactive Web Client utilizing Web Mapping Service (WMS) to support user investigations (http://lance2.modaps.eosdis.nasa.gov/wms/). For example, selecting Severe Storms will include 6 products for MODIS, OMI, AIRS, and AMSR-E plus the SEDAC population density data. The client and WMS were developed using open-source technologies such as OpenLayers and MapServer and provides a uniform, browser-based access to data products. All overlays are downloadable in PNG, JPEG, or GeoTiff form up to 200MB per request. The WMS was beta-tested with the user community and substantial performance improvements were made through the use of such techniques as tile-caching. LANCE established a partnership with Physical Oceanography Distributed Active Archive Center (PO DAAC) to develop an alternative presentation for the 40 data products known as the State of the Earth (SOTE). This provides a Google Earth-based interface to the products grouped in

  10. Concept for Multiple-Access Free-Space Laser Communications

    NASA Technical Reports Server (NTRS)

    Wilson, Keith

    2004-01-01

    A design concept for a proposed airborne or spaceborne free-space optical-communication terminal provides for simultaneous reception of signals from multiple other opticalcommunication terminals aboard aircraft or spacecraft that carry scientific instruments and fly at lower altitudes. The concept reflects the need for rapid acquisition and tracking of the signals coming from the lower-altitude terminals as they move across the field of view.

  11. Novel Scheme of Carrier Tri-reuse and Distribution Fiber Protection Based on Round Shift Method in Optical Access Network

    NASA Astrophysics Data System (ADS)

    Chen, Haibin; Gan, Chaoqin; Yin, Maojun; Ni, Cuiping

    2015-06-01

    A novel architecture of optical access network based on round shift method is proposed. Round shift method is composed by round service mode of carriers and cycle characteristic of 2×N arrayed waveguide grating (AWG). By utilizing the round service mode, every carrier is tri-reused to provide service for three different optical network units. Besides, in remote node, the 2×3N AWG can be replaced by three 2×N AWGs and AWGs' channel spacing is increased. So, the demand on RN's AWGs is decreased. Furthermore, based on the cycle characteristic of 2×N AWG, a 1+1 protection scheme is presented to provide independent protection for distribution fibers. Simulation and analysis show the proposed scheme works well.

  12. Next generation communications satellites: multiple access and network studies

    NASA Technical Reports Server (NTRS)

    Meadows, H. E.; Schwartz, M.; Stern, T. E.; Ganguly, S.; Kraimeche, B.; Matsuo, K.; Gopal, I.

    1982-01-01

    Efficient resource allocation and network design for satellite systems serving heterogeneous user populations with large numbers of small direct-to-user Earth stations are discussed. Focus is on TDMA systems involving a high degree of frequency reuse by means of satellite-switched multiple beams (SSMB) with varying degrees of onboard processing. Algorithms for the efficient utilization of the satellite resources were developed. The effect of skewed traffic, overlapping beams and batched arrivals in packet-switched SSMB systems, integration of stream and bursty traffic, and optimal circuit scheduling in SSMB systems: performance bounds and computational complexity are discussed.

  13. Multiple Access in Ultra-Wideband Communications Using Multiple Pulses and the Use of Least Squares Filters

    SciTech Connect

    Nekoogar, F

    2003-06-19

    Multiple access (MA) in UWB communication has recently been studied in the context of multiple transmitted-reference short duration chirp pulses in the presence of additive white Gaussian noise (AWGN). The transmitted-reference (TR) receiver was extended in previous studies using multiple orthogonal pulses. Improved performance was observed in simulations by sampling the receiver autocorrelation function (ACF) at both zero- and non-zero lags. Sampling of non-zero ACF lags of orthogonal pulses is a novel approach. Method of using least squares filtering techniques for further tolerance against noise and interference for the TR method is proposed.

  14. Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.

    PubMed

    Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei

    2016-05-01

    This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration. PMID:27010391

  15. A comparison of Frequency Domain Multiple Access (FDMA) and Time Domain Multiple Access (TDMA) approaches to satellite service for low data rate Earth stations

    NASA Technical Reports Server (NTRS)

    Stevens, G.

    1983-01-01

    A technological and economic assessment is made of providing low data rate service to small earth stations by satellite at Ka-band. Various Frequency Domain Multiple Access (FDMA) and Time Domain Multiple Access (TDMA) scenarios are examined and compared on the basis of cost to the end user. Very small stations (1 to 2 meters in diameter) are found not to be viable alternatives to available terrestrial services. However, medium size (3 to 5 meters) earth stations appear to be very competitive if a minimum throughput of about 1.5 Mbs is maintained. This constrains the use of such terminals to large users and shared use by smaller users. No advantage was found to the use of FDMA. TDMA had a slight advantage from a total system viewpoint and a very significant advantage in the space segment (about 1/3 the required payload weight for an equivalent capacity).

  16. Implementation of an optimal stomatal conductance scheme in the Australian Community Climate Earth Systems Simulator (ACCESS1.3b)

    NASA Astrophysics Data System (ADS)

    Kala, J.; De Kauwe, M. G.; Pitman, A. J.; Lorenz, R.; Medlyn, B. E.; Wang, Y.-P.; Lin, Y.-S.; Abramowitz, G.

    2015-12-01

    We implement a new stomatal conductance scheme, based on the optimality approach, within the Community Atmosphere Biosphere Land Exchange (CABLEv2.0.1) land surface model. Coupled land-atmosphere simulations are then performed using CABLEv2.0.1 within the Australian Community Climate and Earth Systems Simulator (ACCESSv1.3b) with prescribed sea surface temperatures. As in most land surface models, the default stomatal conductance scheme only accounts for differences in model parameters in relation to the photosynthetic pathway but not in relation to plant functional types. The new scheme allows model parameters to vary by plant functional type, based on a global synthesis of observations of stomatal conductance under different climate regimes over a wide range of species. We show that the new scheme reduces the latent heat flux from the land surface over the boreal forests during the Northern Hemisphere summer by 0.5-1.0 mm day-1. This leads to warmer daily maximum and minimum temperatures by up to 1.0 °C and warmer extreme maximum temperatures by up to 1.5 °C. These changes generally improve the climate model's climatology of warm extremes and improve existing biases by 10-20 %. The bias in minimum temperatures is however degraded but, overall, this is outweighed by the improvement in maximum temperatures as there is a net improvement in the diurnal temperature range in this region. In other regions such as parts of South and North America where ACCESSv1.3b has known large positive biases in both maximum and minimum temperatures (~ 5 to 10 °C), the new scheme degrades this bias by up to 1 °C. We conclude that, although several large biases remain in ACCESSv1.3b for temperature extremes, the improvements in the global climate model over large parts of the boreal forests during the Northern Hemisphere summer which result from the new stomatal scheme, constrained by a global synthesis of experimental data, provide a valuable advance in the long-term development

  17. Cometary cores with multiple structure from the oort cloud and the general scheme of origin of unusually active comets

    SciTech Connect

    Davydov, V.D.

    1986-03-01

    A newly conceived scheme is constructed which synthesizes consistent solutions to several principal problems concerning multiple-core comets: a power mechanism, a place and epoch of formation of the multiple core structure, the qualitative differences between current structure and younger structure, the origin of two types of cometary orbits, and a trigger mechanism for recent ignition of cometary activity of a multiple core. This scheme uses a new explanation of the ejection of dust (including icy dust) from various cometary cores as evidence that the material of multiple-core comets may be collisionally ablated at the expense of the comet-centered orbital energy of a multitude of massive boulders (see Kosm. Issled., No. 6 (1984)). Natural mechanisms are shown which preserve this important feature of multiple cores. The concept consists of the following elements: evolution of a system of satellites of the core toward a colli sionless structure; preservation of internal kinetic energy in the collisionless system over astro nomically lengthy time scales; tidal initiation of a collisional mechanism with the first revolution of the ancient multiple core in the zone of visibility. It is possible that such revoltions correspond to the existence of especially active comets in nearly parabolic orbits. Multiple structure in the core of active short-period comets might be descended from a nearly parabolic comet (if the theory holds on perturbational multistage transformation of near-parabolic orbits into contemporary short-period orbits).

  18. Multiple spindles and cellularization during microsporogenesis in an artificially induced tetraploid accession of Brachiaria ruziziensis (Gramineae).

    PubMed

    Risso-Pascotto, Claudicéia; Pagliarini, Maria Suely; do Valle, Cacilda Borges

    2005-01-01

    The genus Brachiaria is characterized by a majority of polyploid accessions--mainly tetraploid--and apomictic reproduction. Sexuality is found among diploids. To overcome incompatibility barriers, accessions with the same ploidy level are necessarily used in hybridization. Thus, sexual diploid accessions were tetraploidized to be used as female genitors. This paper reports microsporogenesis in an artificially induced tetraploid accession of Brachiaria ruziziensis. Chromosome pairing at diakinesis ranged from univalents to tetravalents, with predominance of bivalents. Irregular chromosome segregation was frequent in both meiotic divisions. During the first division, multiple spindles showing different arrangements were recorded. The spindle position determined the plane of first cytokinesis and the number of chromosomes determined the size of the cell. Meiotic products were characterized by polyads with spores of different sizes. Pollen sterility was estimated at 61.38%. The limitations of using this accession in the breeding program are discussed. PMID:15365762

  19. Lexical access changes in patients with multiple sclerosis: a two-year follow-up study.

    PubMed

    Sepulcre, Jorge; Peraita, Herminia; Goni, Joaquin; Arrondo, Gonzalo; Martincorena, Inigo; Duque, Beatriz; Velez de Mendizabal, Nieves; Masdeu, Joseph C; Villoslada, Pablo

    2011-02-01

    The aim of the study was to analyze lexical access strategies in patients with multiple sclerosis (MS) and their changes over time. We studied lexical access strategies during semantic and phonemic verbal fluency tests and also confrontation naming in a 2-year prospective cohort of 45 MS patients and 20 healthy controls. At baseline, switching lexical access strategy (both in semantic and in phonemic verbal fluency tests) and confrontation naming were significantly impaired in MS patients compared with controls. After 2 years follow-up, switching score decreased, and cluster size increased over time in semantic verbal fluency tasks, suggesting a failure in the retrieval of lexical information rather than an impairment of the lexical pool. In conclusion, these findings underline the significant presence of lexical access problems in patients with MS and could point out their key role in the alterations of high-level communications abilities in MS. PMID:20835944

  20. Study on the energy-efficient scheme based on the interconnection of optical-network-units for next generation optical access network

    NASA Astrophysics Data System (ADS)

    Lv, Yunxin; Jiang, Ning; Qiu, Kun; Xue, Chenpeng

    2014-12-01

    An energy-efficient scheme based on the interconnection of optical network unit (ONU) is introduced, which can significantly reduce the energy consumption of the low-traffic operation. The energy consumption model for the ONU-interconnected optical access network (OAN) based on the electronic switch (ES) technology is established, and the energy efficiency of the proposed scheme is analyzed and compared with that of the OAN using optical switch (OS). The simulation results demonstrate that the ONU-interconnected scheme can efficiently reduce the energy consumption of OAN, and it shows a good energy consumption performance under daily traffic model.

  1. System performances of optical space code-division multiple-access-based fiber-optic two-dimensional parallel data link.

    PubMed

    Nakamura, M; Kitayama, K

    1998-05-10

    Optical space code-division multiple access is a scheme to multiplex and link data between two-dimensional processors such as smart pixels and spatial light modulators or arrays of optical sources like vertical-cavity surface-emitting lasers. We examine the multiplexing characteristics of optical space code-division multiple access by using optical orthogonal signature patterns. The probability density function of interference noise in interfering optical orthogonal signature patterns is calculated. The bit-error rate is derived from the result and plotted as a function of receiver threshold, code length, code weight, and number of users. Furthermore, we propose a prethresholding method to suppress the interference noise, and we experimentally verify that the method works effectively in improving system performance.

  2. Dynamical downscaling of regional climate over eastern China using RSM with multiple physics scheme ensembles

    NASA Astrophysics Data System (ADS)

    Peishu, Zong; Jianping, Tang; Shuyu, Wang; Lingyun, Xie; Jianwei, Yu; Yunqian, Zhu; Xiaorui, Niu; Chao, Li

    2016-06-01

    The parameterization of physical processes is one of the critical elements to properly simulate the regional climate over eastern China. It is essential to conduct detailed analyses on the effect of physical parameterization schemes on regional climate simulation, to provide more reliable regional climate change information. In this paper, we evaluate the 25-year (1983-2007) summer monsoon climate characteristics of precipitation and surface air temperature by using the regional spectral model (RSM) with different physical schemes. The ensemble results using the reliability ensemble averaging (REA) method are also assessed. The result shows that the RSM model has the capacity to reproduce the spatial patterns, the variations, and the temporal tendency of surface air temperature and precipitation over eastern China. And it tends to predict better climatology characteristics over the Yangtze River basin and the South China. The impact of different physical schemes on RSM simulations is also investigated. Generally, the CLD3 cloud water prediction scheme tends to produce larger precipitation because of its overestimation of the low-level moisture. The systematic biases derived from the KF2 cumulus scheme are larger than those from the RAS scheme. The scale-selective bias correction (SSBC) method improves the simulation of the temporal and spatial characteristics of surface air temperature and precipitation and advances the circulation simulation capacity. The REA ensemble results show significant improvement in simulating temperature and precipitation distribution, which have much higher correlation coefficient and lower root mean square error. The REA result of selected experiments is better than that of nonselected experiments, indicating the necessity of choosing better ensemble samples for ensemble.

  3. An Innovative Approach to Scheme Learning Map Considering Tradeoff Multiple Objectives

    ERIC Educational Resources Information Center

    Lin, Yu-Shih; Chang, Yi-Chun; Chu, Chih-Ping

    2016-01-01

    An important issue in personalized learning is to provide learners with customized learning according to their learning characteristics. This paper focused attention on scheming learning map as follows. The learning goal can be achieved via different pathways based on alternative materials, which have the relationships of prerequisite, dependence,…

  4. Study of spread spectrum multiple access systems for satellite communications with overlay on current services

    NASA Technical Reports Server (NTRS)

    Ha, Tri T.; Pratt, Timothy

    1989-01-01

    The feasibility of using spread spectrum techniques to provide a low-cost multiple access system for a very large number of low data terminals was investigated. Two applications of spread spectrum technology to very small aperture terminal (VSAT) satellite communication networks are presented. Two spread spectrum multiple access systems which use a form of noncoherent M-ary FSK (MFSK) as the primary modulation are described and the throughput analyzed. The analysis considers such factors as satellite power constraints and adjacent satellite interference. Also considered is the effect of on-board processing on the multiple access efficiency and the feasibility of overlaying low data rate spread spectrum signals on existing satellite traffic as a form of frequency reuse is investigated. The use of chirp is examined for spread spectrum communications. In a chirp communication system, each data bit is converted into one or more up or down sweeps of frequency, which spread the RF energy across a broad range of frequencies. Several different forms of chirp communication systems are considered, and a multiple-chirp coded system is proposed for overlay service. The mutual interference problem is examined in detail and a performance analysis undertaken for the case of a chirp data channel overlaid on a video channel.

  5. Study of spread spectrum multiple access systems for satellite communications with overlay on current services

    NASA Astrophysics Data System (ADS)

    Ha, Tri T.; Pratt, Timothy

    1989-05-01

    The feasibility of using spread spectrum techniques to provide a low-cost multiple access system for a very large number of low data terminals was investigated. Two applications of spread spectrum technology to very small aperture terminal (VSAT) satellite communication networks are presented. Two spread spectrum multiple access systems which use a form of noncoherent M-ary FSK (MFSK) as the primary modulation are described and the throughput analyzed. The analysis considers such factors as satellite power constraints and adjacent satellite interference. Also considered is the effect of on-board processing on the multiple access efficiency and the feasibility of overlaying low data rate spread spectrum signals on existing satellite traffic as a form of frequency reuse is investigated. The use of chirp is examined for spread spectrum communications. In a chirp communication system, each data bit is converted into one or more up or down sweeps of frequency, which spread the RF energy across a broad range of frequencies. Several different forms of chirp communication systems are considered, and a multiple-chirp coded system is proposed for overlay service. The mutual interference problem is examined in detail and a performance analysis undertaken for the case of a chirp data channel overlaid on a video channel.

  6. Universal optical line terminal encoding and decoding architecture in two-code keying for noncoherent spectral amplitude coding optical code division multiple access systems

    NASA Astrophysics Data System (ADS)

    Yeh, Bih-Chyun; Lin, Cheing-Hong; Yang, De-Nian

    2014-01-01

    We propose a new code family, called extended shifted prime codes, and the universal encoding architecture for spectral amplitude coding optical code division multiple access systems using a two-code keying scheme. The proposed system can eliminate multiuser interference and suppress phase-induced intensity noise. In addition, we design the ESP codes to be an encoding/decoding architecture based on the array waveguide grating architecture and reduce the power loss and the complexity of the optical line terminal. The numerical results demonstrate that the proposed system with ESP codes outperforms the existing one-dimensional shifted prime codes system.

  7. Fairness for Non-Orthogonal Multiple Access in 5G Systems

    NASA Astrophysics Data System (ADS)

    Timotheou, Stelios; Krikidis, Ioannis

    2015-10-01

    In non-orthogonal multiple access (NOMA) downlink, multiple data flows are superimposed in the power domain and user decoding is based on successive interference cancellation. NOMA's performance highly depends on the power split among the data flows and the associated power allocation (PA) problem. In this letter, we study NOMA from a fairness standpoint and we investigate PA techniques that ensure fairness for the downlink users under i) instantaneous channel state information (CSI) at the transmitter, and ii) average CSI. Although the formulated problems are non-convex, we have developed low-complexity polynomial algorithms that yield the optimal solution in both cases considered.

  8. Multiple-access phased array antenna simulator for a digital beam forming system investigation

    NASA Technical Reports Server (NTRS)

    Kerczewski, Robert J.; Yu, John; Walton, Joanne C.; Perl, Thomas D.; Andro, Monty; Alexovich, Robert E.

    1992-01-01

    Future versions of data relay satellite systems are currently being planned by NASA. Being given consideration for implementation are on-board digital beamforming techniques which will allow multiple users to simultaneously access a single S-band phased array antenna system. To investigate the potential performance of such a system, a laboratory simulator has been developed at NASA's Lewis Research Center. This paper describes the system simulator, and in particular, the requirements, design, and performance of a key subsystem, the phased array antenna simulator, which provides realistic inputs to the digital processor including multiple signals, noise, and nonlinearities.

  9. Study of optoelectronic switch for satellite-switched time-division multiple access

    NASA Technical Reports Server (NTRS)

    Su, Shing-Fong; Jou, Liz; Lenart, Joe

    1987-01-01

    The use of optoelectronic switching for satellite switched time division multiple access will improve the isolation and reduce the crosstalk of an IF switch matrix. The results are presented of a study on optoelectronic switching. Tasks include literature search, system requirements study, candidate switching architecture analysis, and switch model optimization. The results show that the power divided and crossbar switching architectures are good candidates for an IF switch matrix.

  10. Strict optical orthogonal codes for purely asynchronous code-division multiple-access applications.

    PubMed

    Zhang, J G

    1996-12-10

    Strict optical orthogonal codes are presented for purely asynchronous optical code-division multiple-access (CDMA) applications. The proposed code can strictly guarantee the peaks of its cross-correlation functions and the sidelobes of any of its autocorrelation functions to have a value of 1 in purely asynchronous data communications. The basic theory of the proposed codes is given. An experiment on optical CDMA systems is also demonstrated to verify the characteristics of the proposed code.

  11. Cascaded holographic polymer reflection grating filters for optical-code-division multiple-access applications.

    PubMed

    Kostuk, Raymond K; Maeda, Wendi; Chen, Chia-Hung; Djordjevic, Ivan; Vasic, Bane

    2005-12-10

    We evaluate the use of edge-illuminated holographic Bragg filters formed in phenanthrenequinone-doped poly(methyl methacrylate) for optical-code-division multiple-access (OCDMA) coding and decoding applications. Experimental cascaded Bragg filters are formed to select two different wavelengths with a fixed distance between the gratings and are directly coupled to a fiber-measurement system. The configuration and tolerances of the cascaded gratings are shown to be practical for time-wavelength OCDMA applications.

  12. Novel Field Effect Diode Type Vertical Capacitorless One Transistor Dynamic Random Access Memory Cell with Negative Hold Bit Line Bias Scheme for Improving the Hold Characteristics

    NASA Astrophysics Data System (ADS)

    Imamoto, Takuya; Endoh, Tetsuo

    2013-04-01

    In this paper, the novel field effect diode (FED) type vertical capacitorless one transistor dynamic random access memory (1T-DRAM) cell with negative hold bit line (BL) voltage (VBL) scheme is proposed. In comparison with the conventional planar type, the proposed vertical type with negative hold VBL scheme shows excellent static and disturb retention time. The proposed vertical type memory cell with negative hold VBL scheme achieves 1,000 times longer static retention time and 104 times longer BL disturb retention time at 85 °C than that of the conventional planar type. Furthermore, the proposed vertical type memory cell has a small cell size of 4F2 due to its stacked vertical structure. The proposed FED type vertical capacitorless 1T-DRAM cell with negative hold VBL scheme is shown to be an excellent candidate for stand-alone and embedded memory applications and extends scaling limitations.

  13. Computation of three-dimensional vortex flows past wings using the EULER Equations and a multiple-grid scheme

    NASA Astrophysics Data System (ADS)

    Koeck, Ch.; Chattot, J. J.

    A numerical method for solving the EULER Equations is presented, which is well suited to the computation or flows containing strong shock waves, and complex vortex structures. The EULER equations system is written in a pseudo-unsteady form, with constant total enthalpy ; it is integrated step by step in time with the explicit finite-volume scheme of Ron-Ho NI. Convergence speeding-up is achieved using NI's multiple-grid procedure. The farfield boundary conditions are treated with the compatibility relations technique. The computed examples presented concern the ONERA-M6 wing, and a sharp leading-edged delta wing, the DILLNER wing.

  14. Persons with Multiple Disabilities Exercise Adaptive Response Schemes with the Help of Technology-Based Programs: Three Single-Case Studies

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Oliva, Doretta; Campodonico, Francesca; Lang, Russell

    2012-01-01

    The present three single-case studies assessed the effectiveness of technology-based programs to help three persons with multiple disabilities exercise adaptive response schemes independently. The response schemes included (a) left and right head movements for a man who kept his head increasingly static on his wheelchair's headrest (Study I), (b)…

  15. Pentagraph image fusion scheme for motion blur prevention using multiple monochromatic images.

    PubMed

    Volfman, Alon A; Mendlovic, David; Raz, Ariel

    2016-04-10

    This paper introduces the pentagraph image fusion (PIF) scheme for motion-related blur prevention in images. The PIF algorithm processes five monochromatic images into a single, low-noise, no-blur color image. The images are acquired using a new photography scheme, sequential filter photography (SFP), where instead of using a stationary Bayer pattern color filter array in front of the image sensor, a tunable color filter array is used. Using this approach, several monochromatic images are captured one by one and later fused into one color image. The SFP introduces various advantages such as higher resolution, better SNR, and the ability to control both exposure time and color filter separately for each image. The PIF algorithm harnesses all the advantages of SFP for the first time, to the best of our knowledge, in the field of blur-free image acquisition. Five images are taken with controllable exposure time and color filter, three images for the color bands, and two high-signal panchromatic images. These images are fused together to be a single, low-noise, no-blur color image. The algorithm presents a generic approach of dealing with both local and global motion blur and does not require any user intervention.

  16. Conjunctive and compromised data fusion schemes for identification of multiple notches in an aluminium plate using Lamb wave signals.

    PubMed

    Lu, Ye; Ye, Lin; Wang, Dong; Wang, Xiaoming; Su, Zhongqing

    2010-09-01

    Conjunctive and compromised data fusion schemes were applied to aggregate perceptions from individual actuator-sensor paths, for the purpose of evaluating positions of multiple notches in an aluminum plate, with the signatures extracted from the scattered Lamb wave signals captured by sensors. An active sensor network consisting of piezoelectric (lead zirconium tantalate, PZT) wafers was employed to activate and capture Lamb wave signals, where two-level configurations hierarchically provided global and local evaluations of the location of damage. A signal processing algorithm featuring signal correlation was proposed to facilitate accurate extraction of the arrival time of damage-scattered waves in the time domain. The diagnostic results demonstrate that the proposed approach is capable of identifying the locations of multiple notches with good accuracy.

  17. Optimization schemes for efficient multiple exciton generation and extraction in colloidal quantum dots

    NASA Astrophysics Data System (ADS)

    Damtie, Fikeraddis A.; Karki, Khadga J.; Pullerits, Tõnu; Wacker, Andreas

    2016-08-01

    Multiple exciton generation (MEG) is a process in which more than one electron hole pair is generated per absorbed photon. It allows us to increase the efficiency of solar energy harvesting. Experimental studies have shown the multiple exciton generation yield of 1.2 in isolated colloidal quantum dots. However real photoelectric devices require the extraction of electron hole pairs to electric contacts. We provide a systematic study of the corresponding quantum coherent processes including extraction and injection and show that a proper design of extraction and injection rates enhances the yield significantly up to values around 1.6.

  18. The rigorous stochastic matrix multiplication scheme for the calculations of reduced equilibrium density matrices of open multilevel quantum systems

    SciTech Connect

    Chen, Xin

    2014-04-21

    Understanding the roles of the temporary and spatial structures of quantum functional noise in open multilevel quantum molecular systems attracts a lot of theoretical interests. I want to establish a rigorous and general framework for functional quantum noises from the constructive and computational perspectives, i.e., how to generate the random trajectories to reproduce the kernel and path ordering of the influence functional with effective Monte Carlo methods for arbitrary spectral densities. This construction approach aims to unify the existing stochastic models to rigorously describe the temporary and spatial structure of Gaussian quantum noises. In this paper, I review the Euclidean imaginary time influence functional and propose the stochastic matrix multiplication scheme to calculate reduced equilibrium density matrices (REDM). In addition, I review and discuss the Feynman-Vernon influence functional according to the Gaussian quadratic integral, particularly its imaginary part which is critical to the rigorous description of the quantum detailed balance. As a result, I establish the conditions under which the influence functional can be interpreted as the average of exponential functional operator over real-valued Gaussian processes for open multilevel quantum systems. I also show the difference between the local and nonlocal phonons within this framework. With the stochastic matrix multiplication scheme, I compare the normalized REDM with the Boltzmann equilibrium distribution for open multilevel quantum systems.

  19. B0 insensitive multiple-quantum resolved sodium imaging using a phase-rotation scheme

    NASA Astrophysics Data System (ADS)

    Fiege, Daniel P.; Romanzetti, Sandro; Tse, Desmond H. Y.; Brenner, Daniel; Celik, Avdo; Felder, Jörg; Jon Shah, N.

    2013-03-01

    Triple-quantum filtering has been suggested as a mechanism to differentiate signals from different physiological compartments. However, the filtering method is sensitive to static field inhomogeneities because different coherence pathways may interfere destructively. Previously suggested methods employed additional phase-cycles to separately acquire pathways. Whilst this removes the signal dropouts, it reduces the signal-to-noise per unit time. In this work we suggest the use of a phase-rotation scheme to simultaneously acquire all coherence pathways and then separate them via Fourier transform. Hence the method yields single-, double- and triple-quantum filtered images. The phase-rotation requires a minimum of 36 instead of six cycling steps. However, destructive interference is circumvented whilst maintaining full signal-to-noise efficiency for all coherences.

  20. Multiple number and letter comparison: directionality and accessibility in numeric and alphabetic memories.

    PubMed

    Jou, Jerwen

    2003-01-01

    In 3 experiments, subjects made comparativejudgments on a set of 2 numbers or letters, 3 numbers or letters, or 5 numbers or letters. Numeric and alphabetic serial order memories were contrasted. Three aspects of serial order memory processes were identified: computational complexity, directionality, and accessibility. Computational complexity is the number of algorithmic steps involved in identifying a target. Directional bias is measured as the speed differences in identifying serial targets of equal computational complexity in a stimulus array. Memory accessibility is measured as the numeric and alphabetic serial position effects. Subjects had a slight directional bias favoring backward ordering for single digits but no bias in 2-digit number ordering, in contrast to a strong forward directional advantage in letter ordering. The speed of number access was found to steadily and evenly decrease along the numeric scale, in contrast to a systematic pattern of variations in alphabet access along the alphabetic scale. Finally, the middle item effect (the middle item in a multi-item array is identified most slowly) found in Jou's (1997) multiple-letter comparison study was generalized to numbers.

  1. Gigabit Ethernet signal transmission using asynchronous optical code division multiple access.

    PubMed

    Ma, Philip Y; Fok, Mable P; Shastri, Bhavin J; Wu, Ben; Prucnal, Paul R

    2015-12-15

    We propose and experimentally demonstrate a novel architecture for interfacing and transmitting a Gigabit Ethernet (GbE) signal using asynchronous incoherent optical code division multiple access (OCDMA). This is the first such asynchronous incoherent OCDMA system carrying GbE data being demonstrated to be working among multi-users where each user is operating with an independent clock/data rate and is granted random access to the network. Three major components, the GbE interface, the OCDMA transmitter, and the OCDMA receiver are discussed in detail. The performance of the system is studied and characterized through measuring eye diagrams, bit-error rate and packet loss rate in real-time file transfer. Our Letter also addresses the near-far problem and realizes asynchronous transmission and detection of signal.

  2. Spatial-phase code-division multiple-access system with multiplexed Fourier holography switching for reconfigurable optical interconnection.

    PubMed

    Takasago, K; Takekawa, M; Shirakawa, A; Kannari, F

    2000-05-10

    A new, to our knowledge, space-variant optical interconnection system based on a spatial-phase code-division multiple-access technique with multiplexed Fourier holography is described. In this technique a signal beam is spread over wide spatial frequencies by an M-sequence pseudorandom phase code. At a receiver side a selected signal beam is properly decoded, and at the same time its spatial pattern is shaped with a Fourier hologram, which is recorded by light that is encoded with the same M-sequence phase mask as the desired signal beam and by light whose spatial beam pattern is shaped to a signal routing pattern. Using the multiplexed holography, we can simultaneously route multisignal flows into individually specified receiver elements. The routing pattern can also be varied by means of switching the encoding phase code or replacing the hologram. We demonstrated a proof-of-principle experiment with a doubly multiplexed hologram that enables simultaneous routing of two signal beams. Using a numerical model, we showed that the proposed scheme can manage more than 250 routing patterns for one signal flow with one multiplexed hologram at a signal-to-noise ratio of ~5.

  3. An efficient sparse matrix multiplication scheme for the CYBER 205 computer

    NASA Technical Reports Server (NTRS)

    Lambiotte, Jules J., Jr.

    1988-01-01

    This paper describes the development of an efficient algorithm for computing the product of a matrix and vector on a CYBER 205 vector computer. The desire to provide software which allows the user to choose between the often conflicting goals of minimizing central processing unit (CPU) time or storage requirements has led to a diagonal-based algorithm in which one of four types of storage is selected for each diagonal. The candidate storage types employed were chosen to be efficient on the CYBER 205 for diagonals which have nonzero structure which is dense, moderately sparse, very sparse and short, or very sparse and long; however, for many densities, no diagonal type is most efficient with respect to both resource requirements, and a trade-off must be made. For each diagonal, an initialization subroutine estimates the CPU time and storage required for each storage type based on results from previously performed numerical experimentation. These requirements are adjusted by weights provided by the user which reflect the relative importance the user places on the two resources. The adjusted resource requirements are then compared to select the most efficient storage and computational scheme.

  4. Analysis of multiple access techniques in multi-satellite and multi-spot mobile satellite systems

    NASA Technical Reports Server (NTRS)

    Corazza, Giovanni E.; Ferrarelli, Carlo; Vatalaro, Francesco

    1995-01-01

    In this paper the analysis of mobile satellite systems adopting constellations of multi-spot satellites over non-geostationary orbits is addressed. A link design procedure is outlined, taking into account system spectrum efficiency, probability of bit error and outage probability. A semi-analytic approach to the evaluation of outage probability in the presence of fading and imperfect power control is described, and applied to single channel per carrier (SCPC) and code division multiple access (CDMA) techniques. Some results are shown for the Globalstar, Iridium and Odyssey orbital configurations.

  5. Code extraction from encoded signal in time-spreading optical code division multiple access.

    PubMed

    Si, Zhijian; Yin, Feifei; Xin, Ming; Chen, Hongwei; Chen, Minghua; Xie, Shizhong

    2010-01-15

    A vulnerability that allows eavesdroppers to extract the code from the waveform of the noiselike encoded signal of an isolated user in a standard time-spreading optical code division multiple access communication system using bipolar phase code is experimentally demonstrated. The principle is based on fine structure in the encoded signal. Each dip in the waveform corresponds to a transition of the bipolar code. Eavesdroppers can get the code by analyzing the chip numbers between any two transitions; then a decoder identical to the legal user's can be fabricated, and they can get the properly decoded signal.

  6. Conflict resolution protocols for random multiple-access channels with binary feedback

    NASA Astrophysics Data System (ADS)

    Berger, T.; Mehravari, N.

    The problem of conflict resolution in a random multiple-access, time-slotted, packet-switched channel with binary feedback is considered. Conflict resolution algorithms (CRA) for two different types of binary feedback which informs the users only about whether or not there was a collision in the previous slot achieves a throughput of 0.442. The CRA proposed for the case in which the feedback informs the users about whether or not the previous slot was empty achieves a throughput of 0.279.

  7. A Code Phase Division Multiple Access (CPDMA) technique for VSAT satellite communications

    NASA Technical Reports Server (NTRS)

    Bruno, R.; Mcomber, R.; Weinberg, A.

    1991-01-01

    A reference concept and implementation relevant to the application of Code Phase Division Multiple Access (CPDMA) to a high capacity satellite communication system providing 16 Kbps single hop channels between Very Small Aperture Terminals (VSAT's) is described. The description includes a potential implementation of an onboard CPDMA bulk demodulator/converter utilizing programmable charge coupled device (CCD) technology projected to be available in the early 1990's. A high level description of the system architecture and operations, identification of key functional and performance requirements of the system elements, and analysis results of end-to-end system performance relative to key figures of merit such as spectral efficiency are also provided.

  8. Three Persons with Multiple Disabilities Accessing Environmental Stimuli and Asking for Social Contact through Microswitch and VOCA Technology

    ERIC Educational Resources Information Center

    Lancioni, G. E.; O'Reilly, M. F.; Singh, N. N.; Sigafoos, J.; Oliva, D.; Severini, L.

    2008-01-01

    Background: Direct access to environmental stimuli and opportunity to ask for social contact/attention may be considered highly relevant objectives for persons with multiple disabilities. We assessed the possibility of enabling three of these persons (two children and one adolescent) to combine two micro switches (for accessing environmental…

  9. A high capacity multiple watermarking scheme based on Fourier descriptor and Sudoku

    NASA Astrophysics Data System (ADS)

    Zhang, Li; Zheng, Huimin

    2015-12-01

    Digital watermark is a type of technology to hide some significant information which is mainly used to protect digital data. A high capacity multiple watermarking method is proposed, which adapts the Fourier descriptor to pre-process the watermarks, while a Sudoku puzzle is used as a reference matrix in embedding process and a key in extraction process. It can dramatically reduce the required capacity by applying Fourier descriptor. Meanwhile, the security of watermarks can be guaranteed due to the Sudoku puzzle. Unlike previous algorithms applying Sudoku puzzle in spatial domain, the proposed algorithm works in transformed domain by applying LWT2.In addition, the proposed algorithm can detect the temper location accurately. The experimental results demonstrated that the goals mentioned above have been achieved.

  10. Efficient traffic grooming with dynamic ONU grouping for multiple-OLT-based access network

    NASA Astrophysics Data System (ADS)

    Zhang, Shizong; Gu, Rentao; Ji, Yuefeng; Wang, Hongxiang

    2015-12-01

    Fast bandwidth growth urges large-scale high-density access scenarios, where the multiple Passive Optical Networking (PON) system clustered deployment can be adopted as an appropriate solution to fulfill the huge bandwidth demands, especially for a future 5G mobile network. However, the lack of interaction between different optical line terminals (OLTs) results in part of the bandwidth resources waste. To increase the bandwidth efficiency, as well as reduce bandwidth pressure at the edge of a network, we propose a centralized flexible PON architecture based on Time- and Wavelength-Division Multiplexing PON (TWDM PON). It can provide flexible affiliation for optical network units (ONUs) and different OLTs to support access network traffic localization. Specifically, a dynamic ONU grouping algorithm (DGA) is provided to obtain the minimal OLT outbound traffic. Simulation results show that DGA obtains an average 25.23% traffic gain increment under different OLT numbers within a small ONU number situation, and the traffic gain will increase dramatically with the increment of the ONU number. As the DGA can be deployed easily as an application running above the centralized control plane, the proposed architecture can be helpful to improve the network efficiency for future traffic-intensive access scenarios.

  11. A carrier sensed multiple access protocol for high data base rate ring networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank

    1990-01-01

    The results of the study of a simple but effective media access protocol for high data rate networks are presented. The protocol is based on the fact that at high data rates networks can contain multiple messages simultaneously over their span, and that in a ring, nodes used to detect the presence of a message arriving from the immediate upstream neighbor. When an incoming signal is detected, the node must either abort or truncate a message it is presently sending. Thus, the protocol with local carrier sensing and multiple access is designated CSMA/RN. The performance of CSMA/RN with TTattempt and truncate is studied using analytic and simulation models. Three performance factors, wait or access time, service time and response or end-to-end travel time are presented. The service time is basically a function of the network rate, it changes by a factor of 1 between no load and full load. Wait time, which is zero for no load, remains small for load factors up to 70 percent of full load. Response time, which adds travel time while on the network to wait and service time, is mainly a function of network length, especially for longer distance networks. Simulation results are shown for CSMA/RN where messages are removed at the destination. A wide range of local and metropolitan area network parameters including variations in message size, network length, and node count are studied. Finally, a scaling factor based upon the ratio of message to network length demonstrates that the results, and hence, the CSMA/RN protocol, are applicable to wide area networks.

  12. 39% access time improvement, 11% energy reduction, 32 kbit 1-read/1-write 2-port static random-access memory using two-stage read boost and write-boost after read sensing scheme

    NASA Astrophysics Data System (ADS)

    Yamamoto, Yasue; Moriwaki, Shinichi; Kawasumi, Atsushi; Miyano, Shinji; Shinohara, Hirofumi

    2016-04-01

    We propose novel circuit techniques for 1 clock (1CLK) 1 read/1 write (1R/1W) 2-port static random-access memories (SRAMs) to improve read access time (tAC) and write margins at low voltages. Two-stage read boost (TSR-BST) and write word line boost (WWL-BST) after the read sensing schemes have been proposed. TSR-BST reduces the worst read bit line (RBL) delay by 61% and RBL amplitude by 10% at V DD = 0.5 V, which improves tAC by 39% and reduces energy dissipation by 11% at V DD = 0.55 V. WWL-BST after read sensing scheme improves minimum operating voltage (V min) by 140 mV. A 32 kbit 1CLK 1R/1W 2-port SRAM with TSR-BST and WWL-BST has been developed using a 40 nm CMOS.

  13. Adaptation of AMO-FBMC-OQAM in optical access network for accommodating asynchronous multiple access in OFDM-based uplink transmission

    NASA Astrophysics Data System (ADS)

    Jung, Sun-Young; Jung, Sang-Min; Han, Sang-Kook

    2015-01-01

    Exponentially expanding various applications in company with proliferation of mobile devices make mobile traffic exploded annually. For future access network, bandwidth efficient and asynchronous signals converged transmission technique is required in optical network to meet a huge bandwidth demand, while integrating various services and satisfying multiple access in perceived network resource. Orthogonal frequency division multiplexing (OFDM) is highly bandwidth efficient parallel transmission technique based on orthogonal subcarriers. OFDM has been widely studied in wired-/wireless communication and became a Long term evolution (LTE) standard. Consequently, OFDM also has been actively researched in optical network. However, OFDM is vulnerable frequency and phase offset essentially because of its sinc-shaped side lobes, therefore tight synchronism is necessary to maintain orthogonality. Moreover, redundant cyclic prefix (CP) is required in dispersive channel. Additionally, side lobes act as interference among users in multiple access. Thus, it practically hinders from supporting integration of various services and multiple access based on OFDM optical transmission In this paper, adaptively modulated optical filter bank multicarrier system with offset QAM (AMO-FBMC-OQAM) is introduced and experimentally investigated in uplink optical transmission to relax multiple access interference (MAI), while improving bandwidth efficiency. Side lobes are effectively suppressed by using FBMC, therefore the system becomes robust to path difference and imbalance among optical network units (ONUs), which increase bandwidth efficiency by reducing redundancy. In comparison with OFDM, a signal performance and an efficiency of frequency utilization are improved in the same experimental condition. It enables optical network to effectively support heterogeneous services and multiple access.

  14. Analysis of the TDRS multiple access system for possible use as an attitude control system sensor

    NASA Technical Reports Server (NTRS)

    Blevins, Bruce Allyn; Sank, Victor J.

    1993-01-01

    A member of the constellation of TDR satellites (TDRS) has experienced a failure of its prime earth sensor. Failure of the remaining earth sensor could result in the inability of the satellite to control its attitude and provide user services. Loss of the satellite would be a serious event. The multiple access (MA) antenna array on the TDRS has been proposed for use as a backup sensor for the attitude control system. This paper describes our analysis of the performance of the MA array as an interferometer used for accurate attitude determination. A least squares fit of a plane to the MA phase information appears to represent the TDRS body roll and pitch within about 0.1 deg. This is sufficient for SGL pointing and MA and SSA user services. Analytic improvements that include ionospheric correction may yield sufficient accuracy for KSA user services.

  15. All-optical code-division multiple-access applications: 2(n) extended-prime codes.

    PubMed

    Zhang, J G; Kwong, W C; Mann, S

    1997-09-10

    A new family of 2(n) codes, called 2(n) extended-prime codes, is proposed for all-optical code-division multiple-access networks. Such 2(n) codes are derived from so-called extended-prime codes so that their cross-correlation functions are not greater than 1, as opposed to 2 for recently proposed 2(n) prime codes. As a result, a larger number of active users can now be supported by the new codes for a given bit-error rate than can be by 2(n) prime codes, while power-efficient, waveguide-integrable all-serial coding and correlating configurations proposed for the 2(n) prime codes can still be employed.

  16. Filter multiplexing by use of spatial Code Division Multiple Access approach.

    PubMed

    Solomon, Jonathan; Zalevsky, Zeev; Mendlovic, David; Monreal, Javier Garcia

    2003-02-10

    The increasing popularity of optical communication has also brought a demand for a broader bandwidth. The trend, naturally, was to implement methods from traditional electronic communication. One of the most effective traditional methods is Code Division Multiple Access. In this research, we suggest the use of this approach for spatial coding applied to images. The approach is to multiplex several filters into one plane while keeping their mutual orthogonality. It is shown that if the filters are limited by their bandwidth, the output of all the filters can be sampled in the original image resolution and fully recovered through an all-optical setup. The theoretical analysis of such a setup is verified in an experimental demonstration.

  17. Code-division multiple-access multiuser demodulator by using quantum fluctuations.

    PubMed

    Otsubo, Yosuke; Inoue, Jun-Ichi; Nagata, Kenji; Okada, Masato

    2014-07-01

    We examine the average-case performance of a code-division multiple-access (CDMA) multiuser demodulator in which quantum fluctuations are utilized to demodulate the original message within the context of Bayesian inference. The quantum fluctuations are built into the system as a transverse field in the infinite-range Ising spin glass model. We evaluate the performance measurements by using statistical mechanics. We confirm that the CDMA multiuser modulator using quantum fluctuations achieve roughly the same performance as the conventional CDMA multiuser modulator through thermal fluctuations on average. We also find that the relationship between the quality of the original information retrieval and the amplitude of the transverse field is somehow a "universal feature" in typical probabilistic information processing, viz., in image restoration, error-correcting codes, and CDMA multiuser demodulation.

  18. Outline of a multiple-access communication network based on adaptive arrays

    NASA Technical Reports Server (NTRS)

    Zohar, S.

    1982-01-01

    Attention is given to a narrow-band communication system consisting of a central station trying to receive signals simultaneously from K spatially distinct mobile users sharing the same frequencies. One example of such a system is a group of aircraft and ships transmitting messages to a communication satellite. A reasonable approach to such a multiple access system may be based on equipping the central station with an n-element antenna array where n is equal to or greater than K. The array employs K sets of n weights to segregate the signals received from the K users. The weights are determined by direct computation based on position information transmitted by the users. A description is presented of an improved technique which makes it possible to reduce significantly the number of required computer operations in comparison to currently known techniques.

  19. Satellite-matrix-switched, time-division-multiple-access network simulator

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Andro, Monty; Nagy, Lawrence A.; Budinger, James M.; Shalkhauser, Mary JO

    1989-01-01

    A versatile experimental Ka-band network simulator has been implemented at the NASA Lewis Research Center to demonstrate and evaluate a satellite-matrix-switched, time-division-multiple-access (SMS-TDMA) network and to evaluate future digital ground terminals and radiofrequency (RF) components. The simulator was implemented by using proof-of-concept RF components developed under NASA contracts and digital ground terminal and link simulation hardware developed at Lewis. This simulator provides many unique capabilities such as satellite range delay and variation simulation and rain fade simulation. All network parameters (e.g., signal-to-noise ratio, satellite range variation rate, burst density, and rain fade) are controlled and monitored by a central computer. The simulator is presently configured as a three-ground-terminal SMS-TDMA network.

  20. An asymptotically nonadaptive algorithm for conflict resolution in multiple-access channels

    NASA Astrophysics Data System (ADS)

    Komlos, J.; Greenberg, A. G.

    1985-03-01

    A basic problem in the decentralized control of a multiple access channel is to resolve the conflicts that arise when several stations transmit simultaneously to the channel. Capetanakis, Hayes, and Tsybakov and Mikhailov found a deterministic tree algorithm that resolves conflicts among k stations from an ensemble of n in time (Theta) /k + k log(n/k)/ in the worst case. In this algorithm, at each step, the choice of which stations to enable to transmit depends crucially on feedback information provided by the channel. It is shown that if k is given a priori then such conflicts can be resolved in time (Theta) /k + k log(n/k)/ using an algorithm in which the corresponding choices do not depend on feedback.

  1. System and method for integrating and accessing multiple data sources within a data warehouse architecture

    DOEpatents

    Musick, Charles R.; Critchlow, Terence; Ganesh, Madhaven; Slezak, Tom; Fidelis, Krzysztof

    2006-12-19

    A system and method is disclosed for integrating and accessing multiple data sources within a data warehouse architecture. The metadata formed by the present method provide a way to declaratively present domain specific knowledge, obtained by analyzing data sources, in a consistent and useable way. Four types of information are represented by the metadata: abstract concepts, databases, transformations and mappings. A mediator generator automatically generates data management computer code based on the metadata. The resulting code defines a translation library and a mediator class. The translation library provides a data representation for domain specific knowledge represented in a data warehouse, including "get" and "set" methods for attributes that call transformation methods and derive a value of an attribute if it is missing. The mediator class defines methods that take "distinguished" high-level objects as input and traverse their data structures and enter information into the data warehouse.

  2. Optical Shared Memory Computing and Multiple Access Protocols for Photonic Networks

    NASA Astrophysics Data System (ADS)

    Li, Kuang-Yu.

    In this research we investigate potential applications of optics in massively parallel computer systems, especially focusing on design issues in three-dimensional optical data storage and free-space photonic networks. An optical implementation of a shared memory uses a single photorefractive crystal and can realize the set of memory modules in a digital shared memory computer. A complete instruction set consists of R sc EAD, W sc RITE, S sc ELECTIVE E sc RASE, and R sc EFRESH, which can be applied to any memory module independent of (and in parallel with) instructions to the other memory modules. In addition, a memory module can execute a sequence of R sc EAD operations simultaneously with the execution of a W sc RITE operation to accommodate differences in optical recording and readout times common to optical volume storage media. An experimental shared memory system is demonstrated and its projected performance is analyzed. A multiplexing technique is presented to significantly reduce both grating- and beam-degeneracy crosstalk in volume holographic systems, by incorporating space, angle, and wavelength as the multiplexing parameters. In this approach, each hologram, which results from the interference between a single input node and an object array, partially overlaps with the other holograms in its neighborhood. This technique can offer improved interconnection density, optical throughput, signal fidelity, and space-bandwidth product utilization. Design principles and numerical simulation results are presented. A free-space photonic cellular hypercube parallel computer, with emphasis on the design of a collisionless multiple access protocol, is presented. This design incorporates wavelength-, space-, and time-multiplexing to achieve multiple access, wavelength reuse, dense connectivity, collisionless communications, and a simple control mechanism. Analytic models based on semi-Markov processes are employed to analyze this protocol. The performance of the

  3. Multiple Coaxial Catheter System for Reliable Access in Interventional Stroke Therapy

    SciTech Connect

    Kulcsar, Zsolt Yilmaz, Hasan; Bonvin, Christophe; Lovblad, Karl O.; Ruefenacht, Daniel A.

    2010-12-15

    In some patients with acute cerebral vessel occlusion, navigating mechanical thrombectomy systems is difficult due to tortuous anatomy of the aortic arch, carotid arteries, or vertebral arteries. Our purpose was to describe a multiple coaxial catheter system used for mechanical revascularization that helps navigation and manipulations in tortuous vessels. A triple or quadruple coaxial catheter system was built in 28 consecutive cases presenting with acute ischemic stroke. All cases were treated by mechanical thrombectomy with the Penumbra System. In cases of unsuccessful thrombo-aspiration, additional thrombolysis or angioplasty with stent placement was used for improving recanalization. The catheter system consisted of an outermost 8-Fr and an intermediate 6-Fr guiding catheter, containing the inner Penumbra reperfusion catheters. The largest, 4.1-Fr, reperfusion catheter was navigated over a Prowler Select Plus microcatheter. The catheter system provided access to reach the cerebral lesions and provided stability for the mechanically demanding manipulations of thromboaspiration and stent navigation in all cases. Apart from their mechanical role, the specific parts of the system could also provide access to different types of interventions, like carotid stenting through the 8-Fr guiding catheter and intracranial stenting and thrombolysis through the Prowler Select Plus microcatheter. In this series, there were no complications related to the catheter system. In conclusion, building up a triple or quadruple coaxial system proved to be safe and efficient in our experience for the mechanical thrombectomy treatment of acute ischemic stroke.

  4. Massive MIMO for Wireless Sensing With a Coherent Multiple Access Channel

    NASA Astrophysics Data System (ADS)

    Jiang, Feng; Chen, Jie; Swindlehurst, A. Lee; Lopez-Salcedo, Jose A.

    2015-06-01

    We consider the detection and estimation of a zero-mean Gaussian signal in a wireless sensor network with a coherent multiple access channel, when the fusion center (FC) is configured with a large number of antennas and the wireless channels between the sensor nodes and FC experience Rayleigh fading. For the detection problem, we study the Neyman-Pearson (NP) Detector and Energy Detector (ED), and find optimal values for the sensor transmission gains. For the NP detector which requires channel state information (CSI), we show that detection performance remains asymptotically constant with the number of FC antennas if the sensor transmit power decreases proportionally with the increase in the number of antennas. Performance bounds show that the benefit of multiple antennas at the FC disappears as the transmit power grows. The results of the NP detector are also generalized to the linear minimum mean squared error estimator. For the ED which does not require CSI, we derive optimal gains that maximize the deflection coefficient of the detector, and we show that a constant deflection can be asymptotically achieved if the sensor transmit power scales as the inverse square root of the number of FC antennas. Unlike the NP detector, for high sensor power the multi-antenna ED is observed to empirically have significantly better performance than the single-antenna implementation. A number of simulation results are included to validate the analysis.

  5. Suppression of optical beat interference-noise in orthogonal frequency division multiple access-passive optical network link using self-homodyne balanced detection

    NASA Astrophysics Data System (ADS)

    Won, Yong-Yuk; Jung, Sang-Min; Han, Sang-Kook

    2014-08-01

    A new technique, which reduces optical beat interference (OBI) noise in orthogonal frequency division multiple access-passive optical network (OFDMA-PON) links, is proposed. A self-homodyne balanced detection, which uses a single laser for the optical line terminal (OLT) as well as for the optical network unit (ONU), reduces OBI noise and also improves the signal to noise ratio (SNR) of the discrete multi-tone (DMT) signal. The proposed scheme is verified by transmitting quadrature phase shift keying (QPSK)-modulated DMT signal over a 20-km single mode fiber. The optical signal to noise ratio (OSNR), that is required for BER of 10-5, is reduced by 2 dB in the balanced detection compared with a single channel due to the cancellation of OBI noise in conjunction with the local laser.

  6. Numerical framework and performance of the new multiple-phase cloud microphysics scheme in RegCM4.5: precipitation, cloud microphysics, and cloud radiative effects

    NASA Astrophysics Data System (ADS)

    Nogherotto, Rita; Tompkins, Adrian Mark; Giuliani, Graziano; Coppola, Erika; Giorgi, Filippo

    2016-07-01

    We implement and evaluate a new parameterization scheme for stratiform cloud microphysics and precipitation within regional climate model RegCM4. This new parameterization is based on a multiple-phase one-moment cloud microphysics scheme built upon the implicit numerical framework recently developed and implemented in the ECMWF operational forecasting model. The parameterization solves five prognostic equations for water vapour, cloud liquid water, rain, cloud ice, and snow mixing ratios. Compared to the pre-existing scheme, it allows a proper treatment of mixed-phase clouds and a more physically realistic representation of cloud microphysics and precipitation. Various fields from a 10-year long integration of RegCM4 run in tropical band mode with the new scheme are compared with their counterparts using the previous cloud scheme and are evaluated against satellite observations. In addition, an assessment using the Cloud Feedback Model Intercomparison Project (CFMIP) Observational Simulator Package (COSP) for a 1-year sub-period provides additional information for evaluating the cloud optical properties against satellite data. The new microphysics parameterization yields an improved simulation of cloud fields, and in particular it removes the overestimation of upper level cloud characteristics of the previous scheme, increasing the agreement with observations and leading to an amelioration of a long-standing problem in the RegCM system. The vertical cloud profile produced by the new scheme leads to a considerably improvement of the representation of the longwave and shortwave components of the cloud radiative forcing.

  7. Transparent mediation-based access to multiple yeast data sources using an ontology driven interface

    PubMed Central

    2012-01-01

    Background Saccharomyces cerevisiae is recognized as a model system representing a simple eukaryote whose genome can be easily manipulated. Information solicited by scientists on its biological entities (Proteins, Genes, RNAs...) is scattered within several data sources like SGD, Yeastract, CYGD-MIPS, BioGrid, PhosphoGrid, etc. Because of the heterogeneity of these sources, querying them separately and then manually combining the returned results is a complex and time-consuming task for biologists most of whom are not bioinformatics expert. It also reduces and limits the use that can be made on the available data. Results To provide transparent and simultaneous access to yeast sources, we have developed YeastMed: an XML and mediator-based system. In this paper, we present our approach in developing this system which takes advantage of SB-KOM to perform the query transformation needed and a set of Data Services to reach the integrated data sources. The system is composed of a set of modules that depend heavily on XML and Semantic Web technologies. User queries are expressed in terms of a domain ontology through a simple form-based web interface. Conclusions YeastMed is the first mediation-based system specific for integrating yeast data sources. It was conceived mainly to help biologists to find simultaneously relevant data from multiple data sources. It has a biologist-friendly interface easy to use. The system is available at http://www.khaos.uma.es/yeastmed/. PMID:22372975

  8. Carrier Estimation Using Classic Spectral Estimation Techniques for the Proposed Demand Assignment Multiple Access Service

    NASA Technical Reports Server (NTRS)

    Scaife, Bradley James

    1999-01-01

    In any satellite communication, the Doppler shift associated with the satellite's position and velocity must be calculated in order to determine the carrier frequency. If the satellite state vector is unknown then some estimate must be formed of the Doppler-shifted carrier frequency. One elementary technique is to examine the signal spectrum and base the estimate on the dominant spectral component. If, however, the carrier is spread (as in most satellite communications) this technique may fail unless the chip rate-to-data rate ratio (processing gain) associated with the carrier is small. In this case, there may be enough spectral energy to allow peak detection against a noise background. In this thesis, we present a method to estimate the frequency (without knowledge of the Doppler shift) of a spread-spectrum carrier assuming a small processing gain and binary-phase shift keying (BPSK) modulation. Our method relies on an averaged discrete Fourier transform along with peak detection on spectral match filtered data. We provide theory and simulation results indicating the accuracy of this method. In addition, we will describe an all-digital hardware design based around a Motorola DSP56303 and high-speed A/D which implements this technique in real-time. The hardware design is to be used in NMSU's implementation of NASA's demand assignment, multiple access (DAMA) service.

  9. Entanglement distribution over quantum code-division multiple-access networks

    NASA Astrophysics Data System (ADS)

    Zhu, Chang-long; Yang, Nan; Liu, Yu-xi; Nori, Franco; Zhang, Jing

    2015-10-01

    We present a method for quantum entanglement distribution over a so-called code-division multiple-access network, in which two pairs of users share the same quantum channel to transmit information. The main idea of this method is to use different broadband chaotic phase shifts, generated by electro-optic modulators and chaotic Colpitts circuits, to encode the information-bearing quantum signals coming from different users and then recover the masked quantum signals at the receiver side by imposing opposite chaotic phase shifts. The chaotic phase shifts given to different pairs of users are almost uncorrelated due to the randomness of chaos and thus the quantum signals from different pair of users can be distinguished even when they are sent via the same quantum channel. It is shown that two maximally entangled states can be generated between two pairs of users by our method mediated by bright coherent lights, which can be more easily implemented in experiments compared with single-photon lights. Our method is robust under the channel noises if only the decay rates of the information-bearing fields induced by the channel noises are not quite high. Our study opens up new perspectives for addressing and transmitting quantum information in future quantum networks.

  10. An Ultrasonic Multiple-Access Ranging Core Based on Frequency Shift Keying Towards Indoor Localization.

    PubMed

    Segers, Laurent; Van Bavegem, David; De Winne, Sam; Braeken, An; Touhafi, Abdellah; Steenhaut, Kris

    2015-07-30

    This paper describes a new approach and implementation methodology for indoor ranging based on the time difference of arrival using code division multiple access with ultrasound signals. A novel implementation based on a field programmable gate array using finite impulse response filters and an optimized correlation demodulator implementation for ultrasound orthogonal signals is developed. Orthogonal codes are modulated onto ultrasound signals using frequency shift keying with carrier frequencies of 24.5 kHz and 26 kHz. This implementation enhances the possibilities for real-time, embedded and low-power tracking of several simultaneous transmitters. Due to the high degree of parallelism offered by field programmable gate arrays, up to four transmitters can be tracked simultaneously. The implementation requires at most 30% of the available logic gates of a Spartan-6 XC6SLX45 device and is evaluated on accuracy and precision through several ranging topologies. In the first topology, the distance between one transmitter and one receiver is evaluated. Afterwards, ranging analyses are applied between two simultaneous transmitters and one receiver. Ultimately, the position of the receiver against four transmitters using trilateration is also demonstrated. Results show enhanced distance measurements with distances ranging from a few centimeters up to 17 m, while keeping a centimeter-level accuracy.

  11. Interference suppression for code-division multiple-access communications in an underwater acoustic channel.

    PubMed

    Yang, T C; Yang, Wen-Bin

    2009-07-01

    In a code-division multiple-access communications network, the signal from a nearby user often creates a strong interference for the signal from a distant user. This is known as the near-far problem. Power control of source levels is ineffective in an underwater acoustic channel due to the slow sound speed. Interference rejection based on code orthogonality is ineffective using matched-filter processing due to the fact that multipath arrivals effectively destroy the code orthogonality and that the signal arrival times between different users are not synchronized. An algorithm, called hyperspace cancellation by coordinate zeroing, is used in this paper to remove/suppress interference. Using a fast Walsh-Hadamard transform (FWHT) based on the interferer's code sequence, the interference signal is enhanced and removed by coordinate zeroing. The residual signal is transformed back using an inverse FWHT. The filtered data, with the interference signal largely removed, are processed using the desired signal code sequence. Two methods previously developed for direct-sequence spread-spectrum communications in an underwater channel are used to extract the transmitted symbols. Low bit error rate (<10(-2)) is found with the at-sea data for signal-to-interference ratio as low as -8 to -11 dB.

  12. An Ultrasonic Multiple-Access Ranging Core Based on Frequency Shift Keying Towards Indoor Localization

    PubMed Central

    Segers, Laurent; Van Bavegem, David; De Winne, Sam; Braeken, An; Touhafi, Abdellah; Steenhaut, Kris

    2015-01-01

    This paper describes a new approach and implementation methodology for indoor ranging based on the time difference of arrival using code division multiple access with ultrasound signals. A novel implementation based on a field programmable gate array using finite impulse response filters and an optimized correlation demodulator implementation for ultrasound orthogonal signals is developed. Orthogonal codes are modulated onto ultrasound signals using frequency shift keying with carrier frequencies of 24.5 kHz and 26 kHz. This implementation enhances the possibilities for real-time, embedded and low-power tracking of several simultaneous transmitters. Due to the high degree of parallelism offered by field programmable gate arrays, up to four transmitters can be tracked simultaneously. The implementation requires at most 30% of the available logic gates of a Spartan-6 XC6SLX45 device and is evaluated on accuracy and precision through several ranging topologies. In the first topology, the distance between one transmitter and one receiver is evaluated. Afterwards, ranging analyses are applied between two simultaneous transmitters and one receiver. Ultimately, the position of the receiver against four transmitters using trilateration is also demonstrated. Results show enhanced distance measurements with distances ranging from a few centimeters up to 17 m, while keeping a centimeter-level accuracy. PMID:26263986

  13. Satellite range delay simulator for a matrix-switched time division multiple-access network simulator

    NASA Technical Reports Server (NTRS)

    Nagy, Lawrence A.

    1989-01-01

    The Systems Integration, Test, and Evaluation (SITE) facility at NASA Lewis Research Center is presently configured as a satellite-switched time division multiple access (SS-TDMA) network simulator. The purpose of SITE is to demonstrate and evaluate advanced communication satellite technologies, presently embodied by POC components developed under NASA contracts in addition to other hardware, such as ground terminals, designed and built in-house at NASA Lewis. Each ground terminal in a satellite communications system will experience a different aspect of the satellite's motion due mainly to daily tidal effects and station keeping, hence a different duration and rate of variation in the range delay. As a result of this and other effects such as local oscillator instability, each ground terminal must constantly adjust its transmit burst timing so that data bursts from separate ground terminals arrive at the satellite in their assigned time slots, preventing overlap and keeping the system in synchronism. On the receiving end, ground terminals must synchronize their local clocks using reference transmissions received through the satellite link. A feature of the SITE facility is its capability to simulate the varying propagation delays and associated Doppler frequency shifts that the ground terminals in the network have to cope with. Delay is achieved by means of two NASA Lewis designed and built range delay simulator (RDS) systems, each independently controlled locally with front panel switches or remotely by an experiment control and monitor (EC/M) computer.

  14. The impact of changing the land surface scheme in ACCESS(v1.0/1.1) on the surface climatology

    NASA Astrophysics Data System (ADS)

    Kowalczyk, Eva A.; Stevens, Lauren E.; Law, Rachel M.; Harman, Ian N.; Dix, Martin; Franklin, Charmaine N.; Wang, Ying-Ping

    2016-08-01

    The Community Atmosphere Biosphere Land Exchange (CABLE) model has been coupled to the UK Met Office Unified Model (UM) within the existing framework of the Australian Community Climate and Earth System Simulator (ACCESS), replacing the Met Office Surface Exchange Scheme (MOSES). Here we investigate how features of the CABLE model impact on present-day surface climate using ACCESS atmosphere-only simulations. The main differences attributed to CABLE include a warmer winter and a cooler summer in the Northern Hemisphere (NH), earlier NH spring runoff from snowmelt, and smaller seasonal and diurnal temperature ranges. The cooler NH summer temperatures in canopy-covered regions are more consistent with observations and are attributed to two factors. Firstly, CABLE accounts for aerodynamic and radiative interactions between the canopy and the ground below; this placement of the canopy above the ground eliminates the need for a separate bare ground tile in canopy-covered areas. Secondly, CABLE simulates larger evapotranspiration fluxes and a slightly larger daytime cloud cover fraction. Warmer NH winter temperatures result from the parameterization of cold climate processes in CABLE in snow-covered areas. In particular, prognostic snow density increases through the winter and lowers the diurnally resolved snow albedo; variable snow thermal conductivity prevents early winter heat loss but allows more heat to enter the ground as the snow season progresses; liquid precipitation freezing within the snowpack delays the building of the snowpack in autumn and accelerates snow melting in spring. Overall we find that the ACCESS simulation of surface air temperature benefits from the specific representation of the turbulent transport within and just above the canopy in the roughness sublayer as well as the more complex snow scheme in CABLE relative to MOSES.

  15. Students with Multiple Disabilities Using Technology-Based Programs to Choose and Access Stimulus Events Alone or with Caregiver Participation

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Oliva, Doretta; Cingolani, Eleonora

    2009-01-01

    The first of these two studies extended preliminary evidence on the use of technology-based programs for enabling students with severe and profound multiple disabilities to choose and access environmental stimuli on their own. Each of the three participants had two microswitches linked to specific sets of stimuli through a computer system. The…

  16. Persons with Multiple Disabilities Use Forehead and Smile Responses to Access or Choose among Technology-Aided Stimulation Events

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Alberti, Gloria; Bellini, Domencio; Oliva, Doretta; Boccasini, Adele; La Martire, Maria L.; Signorino, Mario

    2013-01-01

    A variety of technology-aided programs have been developed to help persons with congenital or acquired multiple disabilities access preferred stimuli or choose among stimulus options. The application of those programs may pose problems when the participants have very limited behavior repertoires and are unable to use conventional responses and…

  17. Integrated photonic decoder with complementary code processing and balanced detection for two-dimensional optical code division multiple access.

    PubMed

    Takiguchi, K; Okuno, M; Takahashi, H; Moriwaki, O

    2007-04-01

    We propose a novel integrated photonic decoder for two-dimensional (time spreading, wavelength hopping) optical code division multiple access. The decoder is composed of multiplexers-demultiplexers, variable delay lines, and a coupler, which processes complementary codes and utilizes balanced detection to reduce unwanted cross-correlation interference. We successfully carried out a 10 Gbit/s transmission that demonstrated its effectiveness.

  18. Enabling Two Persons with Multiple Disabilities to Access Environmental Stimuli and Ask for Social Contact through Microswitches and a VOCA

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; O'Reilly, Mark F.; Singh, Nirbhay N.; Sigafoos, Jeff; Oliva, Doretta; Severini, Laura

    2008-01-01

    This study assessed the combination of two microswitches with a voice output communication aid (VOCA) with two persons (an adolescent and a young adult) with multiple disabilities. The microswitches allowed the participants to obtain direct access to preferred environmental stimuli; the VOCA enabled them to ask for caregiver's attention.…

  19. Multiple Intimate Partner Violence Experiences: Knowledge, Access, Utilization and Barriers to Utilization of Resources by Women of the African Diaspora

    PubMed Central

    Sabri, Bushra; Huerta, Julia; Alexander, Kamila A.; St.Vil, Noelle M.; Campbell, Jacquelyn C.; Callwood, Gloria B.

    2016-01-01

    Objective This study examined knowledge, access, utilization, and barriers to use of resources among Black women exposed to multiple types of intimate partner violence in Baltimore, Maryland and the U.S. Virgin Islands (USVI). Methods We analyzed quantitative survey data collected by 163 women recruited from primary care, prenatal or family planning clinics in Baltimore and the USVI. In addition we analyzed qualitative data from in-depth interviews with 11 women. Quantitative data were analyzed using descriptive statistics and qualitative data were analyzed using thematic analysis. Results A substantial proportion of Black women with multiple types of violence experiences lacked knowledge of, did not have access to, and did not use resources. Barriers to resource use were identified at the individual, relationship, and community levels. Conclusion There is need for programs to develop awareness, promote access and utilization of resources, and eliminate barriers to resource use among abused Black women. PMID:26548679

  20. Multiple-Site Hemodynamic Analysis of Doppler Ultrasound with an Adaptive Color Relation Classifier for Arteriovenous Access Occlusion Evaluation

    PubMed Central

    Wu, Jian-Xing; Du, Yi-Chun; Wu, Ming-Jui; Li, Chien-Ming; Lin, Chia-Hung; Chen, Tainsong

    2014-01-01

    This study proposes multiple-site hemodynamic analysis of Doppler ultrasound with an adaptive color relation classifier for arteriovenous access occlusion evaluation in routine examinations. The hemodynamic analysis is used to express the properties of blood flow through a vital access or a tube, using dimensionless numbers. An acoustic measurement is carried out to detect the peak-systolic and peak-diastolic velocities of blood flow from the arterial anastomosis sites (A) to the venous anastomosis sites (V). The ratio of the supracritical Reynolds (Resupra) number and the resistive (Res) index quantitates the degrees of stenosis (DOS) at multiple measurement sites. Then, an adaptive color relation classifier is designed as a nonlinear estimate model to survey the occlusion level in monthly examinations. For 30 long-term follow-up patients, the experimental results show the proposed screening model efficiently evaluates access occlusion. PMID:24892039

  1. Persons with multiple disabilities exercise adaptive response schemes with the help of technology-based programs: three single-case studies.

    PubMed

    Lancioni, Giulio E; Singh, Nirbhay N; O'Reilly, Mark F; Sigafoos, Jeff; Oliva, Doretta; Campodonico, Francesca; Lang, Russell

    2012-01-01

    The present three single-case studies assessed the effectiveness of technology-based programs to help three persons with multiple disabilities exercise adaptive response schemes independently. The response schemes included (a) left and right head movements for a man who kept his head increasingly static on his wheelchair's headrest (Study I), (b) left- and right-arm movements for a woman who tended to hold both arms/hands tight against her body (Study II), and (c) touching object cues on a computer screen for a girl who rarely used her residual vision for orienting/guiding her hand responses. The technology involved microswitches/sensors to detect the response schemes and a computer/control system to record their occurrences and activate preferred stimuli contingent on them. Results showed large increases in the response schemes targeted for each of the three participants during the intervention phases of the studies. The importance of using technology-based programs as tools for enabling persons with profound and multiple disabilities to practice relevant responses independently was discussed.

  2. An MRI-based classification scheme to predict passive access of 5 to 50-nm large nanoparticles to tumors

    PubMed Central

    Karageorgis, Anastassia; Dufort, Sandrine; Sancey, Lucie; Henry, Maxime; Hirsjärvi, Samuli; Passirani, Catherine; Benoit, Jean-Pierre; Gravier, Julien; Texier, Isabelle; Montigon, Olivier; Benmerad, Mériem; Siroux, Valérie; Barbier, Emmanuel L.; Coll, Jean-Luc

    2016-01-01

    Nanoparticles are useful tools in oncology because of their capacity to passively accumulate in tumors in particular via the enhanced permeability and retention (EPR) effect. However, the importance and reliability of this effect remains controversial and quite often unpredictable. In this preclinical study, we used optical imaging to detect the accumulation of three types of fluorescent nanoparticles in eight different subcutaneous and orthotopic tumor models, and dynamic contrast-enhanced and vessel size index Magnetic Resonance Imaging (MRI) to measure the functional parameters of these tumors. The results demonstrate that the permeability and blood volume fraction determined by MRI are useful parameters for predicting the capacity of a tumor to accumulate nanoparticles. Translated to a clinical situation, this strategy could help anticipate the EPR effect of a particular tumor and thus its accessibility to nanomedicines. PMID:26892874

  3. Helping members of a community-based health insurance scheme access quality inpatient care through development of a preferred provider system in rural Gujarat

    PubMed Central

    RANSON, M. KENT; SINHA, TARA; GANDHI, FENIL; JAYSWAL, RUPAL; MILLS, ANNE J.

    2007-01-01

    We describe and analyse the experience of piloting a preferred provider system (PPS) for rural members of Vimo SEWA, a fixed-indemnity, community-based health insurance (CBHI) scheme run by the Self-Employed Women’s Association (SEWA). The objectives of the PPS were (i) to facilitate access to hospitalization by providing financial benefits at the time of service utilization; (ii) to shift the burden of compiling a claim away from members and towards Vimo SEWA staff; and (iii) to direct members to inpatient facilities of acceptable quality. The PPS was launched between August and October 2004, in 8 subdistricts covering 15 000 insured. The impact of the scheme was analysed using data from a household survey of claimants and qualitative data from in-depth interviews and focus group discussions. The PPS appears to have been successful in terms of two of the three primary objectives—it has transferred much of the burden of compiling a health insurance claim onto Vimo SEWA staff, and it has directed members to inpatient facilities with acceptable levels of technical quality (defined in terms of structural indicators). However, even under the PPS, user fees pose a financial barrier, as the insured have to mobilize funds to cover the costs of medicines, supplies, registration fee, etc. before receipt of cash payment from Vimo SEWA. Other barriers to the success of the PPS were the geographic inaccessibility of some of the selected hospitals, lack of awareness about the PPS among members and a variety of administrative problems. This pilot project provides useful lessons relating to strategic purchasing by CBHI schemes and, more broadly, managed care in India. In particular, the pragmatic approach taken to assessing hospitals and identifying preferred providers is likely to be useful elsewhere. PMID:17203684

  4. Performance Study of Hybrid DS/FFH Spread-Spectrum Systems in the Presence of Frequency-Selective Fading and Multiple-Access Interference

    SciTech Connect

    Olama, Mohammed M; Smith, Stephen Fulton; Kuruganti, Phani Teja; Ma, Xiao

    2012-01-01

    Hybrid spread-spectrum (HSS) systems have recently received considerable interest in commercial, Smart Grid, and military communication systems because they accommodate high data rates with high link integrity, even in the presence of significant multipath effects and interfering signals. A highly useful form of this modulation scheme is the specific code-related combination of standard direct-sequence spread spectrum (DSSS) with fast frequency-hopping (FFH) spread spectrum, denoted hybrid DS/FFH, wherein multiple frequency hops occur within a single data-bit time. In this paper we perform a simulation-based study of the DS/FFH performance as compared to the existing standard DSSS and FHSS wireless networks. The performance metrics are bit-error probability and multiple-access capability. The parameter space of DS/FFH, including the DS spreading rate, frequency hopping rate, carrier frequencies, and numbers of users, is explored to show its performance under frequency-selective Rayleigh fading environments and multiuser interference. Direct digital synthesizers to achieve fast hopping speeds are also considered in our study.

  5. Improved Iterative Decoding of Network-Channel Codes for Multiple-Access Relay Channel.

    PubMed

    Majumder, Saikat; Verma, Shrish

    2015-01-01

    Cooperative communication using relay nodes is one of the most effective means of exploiting space diversity for low cost nodes in wireless network. In cooperative communication, users, besides communicating their own information, also relay the information of other users. In this paper we investigate a scheme where cooperation is achieved using a common relay node which performs network coding to provide space diversity for two information nodes transmitting to a base station. We propose a scheme which uses Reed-Solomon error correcting code for encoding the information bit at the user nodes and convolutional code as network code, instead of XOR based network coding. Based on this encoder, we propose iterative soft decoding of joint network-channel code by treating it as a concatenated Reed-Solomon convolutional code. Simulation results show significant improvement in performance compared to existing scheme based on compound codes.

  6. Improved Iterative Decoding of Network-Channel Codes for Multiple-Access Relay Channel

    PubMed Central

    Majumder, Saikat; Verma, Shrish

    2015-01-01

    Cooperative communication using relay nodes is one of the most effective means of exploiting space diversity for low cost nodes in wireless network. In cooperative communication, users, besides communicating their own information, also relay the information of other users. In this paper we investigate a scheme where cooperation is achieved using a common relay node which performs network coding to provide space diversity for two information nodes transmitting to a base station. We propose a scheme which uses Reed-Solomon error correcting code for encoding the information bit at the user nodes and convolutional code as network code, instead of XOR based network coding. Based on this encoder, we propose iterative soft decoding of joint network-channel code by treating it as a concatenated Reed-Solomon convolutional code. Simulation results show significant improvement in performance compared to existing scheme based on compound codes. PMID:27347526

  7. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    SciTech Connect

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors, as

  8. Data Management for Flexible Access - Implementation and Lessons Learned from work with Multiple User Communities

    NASA Astrophysics Data System (ADS)

    Benedict, K. K.; Scott, S.; Hudspeth, W. B.

    2012-12-01

    There is no shortage of community-specific and generic data discovery and download platforms and protocols (e.g. CUAHSI HIS, DataONE, GeoNetwork Open Source, GeoPortal, OGC CSW, OAI PMH), documentation standards (e.g. FGDC, ISO 19115, EML, Dublin Core), data access and visualization standards and models (e.g. OGC WxS, OpenDAP), and general-purpose web service models (i.e. REST & SOAP) upon which Geo-informatics cyberinfrastructure (CI) may be built. When attempting to develop a robust platform that may service a wide variety of users and use cases the challenge is one of identifying which existing platform (if any) may support those current needs while also allowing for future expansion for additional capabilities. In the case of the implementation of a data storage, discovery and delivery platform to support the multiple projects at the Earth Data Analysis Center at UNM, no single platform or protocol met the joint requirements of two initial applications (the New Mexico Resource Geographic Information System [http://rgis.unm.edu] and the New Mexico EPSCoR Data Portal [http://nmepscor.org/dataportal]) and furthermore none met anticipated additional requirements as new applications of the platform emerged. As a result of this assessment three years ago EDAC embarked on the development of the Geographic Storage, Transformation, and Retrieval Engine (GSToRE) platform as a general purpose platform upon which n-tiered geospatially enabled data intensive applications could be built. When initially released in 2010 the focus was on the publication of dynamically generated Open Geospatial Consortium services based upon a PostgreSQL/PostGIS backend database. The identification of additional service interface requirements (implementation of the DataONE API and CUAHSI WaterML services), use cases provided by the NM EPSCoR education working group, and expanded metadata publication needs have led to a significant update to the underlying data management tier for GSToRE - the

  9. A satellite mobile communication system based on Band-Limited Quasi-Synchronous Code Division Multiple Access (BLQS-CDMA)

    NASA Technical Reports Server (NTRS)

    Degaudenzi, R.; Elia, C.; Viola, R.

    1990-01-01

    Discussed here is a new approach to code division multiple access applied to a mobile system for voice (and data) services based on Band Limited Quasi Synchronous Code Division Multiple Access (BLQS-CDMA). The system requires users to be chip synchronized to reduce the contribution of self-interference and to make use of voice activation in order to increase the satellite power efficiency. In order to achieve spectral efficiency, Nyquist chip pulse shaping is used with no detection performance impairment. The synchronization problems are solved in the forward link by distributing a master code, whereas carrier forced activation and closed loop control techniques have been adopted in the return link. System performance sensitivity to nonlinear amplification and timing/frequency synchronization errors are analyzed.

  10. Nonadditivity of quantum and classical capacities for entanglement breaking multiple-access channels and the butterfly network

    SciTech Connect

    Grudka, Andrzej; Horodecki, Pawel

    2010-06-15

    We analyze quantum network primitives which are entanglement breaking. We show superadditivity of quantum and classical capacity regions for quantum multiple-access channels and the quantum butterfly network. Since the effects are especially visible at high noise they suggest that quantum information effects may be particularly helpful in the case of the networks with occasional high noise rates. The present effects provide a qualitative borderline between superadditivities of bipartite and multipartite systems.

  11. MSA-PAD: DNA multiple sequence alignment framework based on PFAM accessed domain information.

    PubMed

    Balech, Bachir; Vicario, Saverio; Donvito, Giacinto; Monaco, Alfonso; Notarangelo, Pasquale; Pesole, Graziano

    2015-08-01

    Here we present the MSA-PAD application, a DNA multiple sequence alignment framework that uses PFAM protein domain information to align DNA sequences encoding either single or multiple protein domains. MSA-PAD has two alignment options: gene and genome mode. PMID:25819080

  12. Computer vector multiprocessing control with multiple access memory and priority conflict resolution method

    SciTech Connect

    Chen, S.S.; Schiffleger, A.J.

    1990-02-13

    This patent describes a multiprocessor memory system. It comprises: a central memory comprised of a plurality of independently addressable memory banks organized into a plurality of sections each accessible through a plurality of access paths; a plurality of processing machines; each of the processing machine including a plurality of ports for generating memory references to any one of the central memory sections; and conflict resolution means interfacing each of the ports to each of the central memory sections through the central memory access paths. The resolution means for receiving references from the ports and coordinating and controlling the procession of the references along to the access paths. The conflict resolution means comprising a plurality of conflict resolution circuits corresponding in number to the memory sections, each of the circuits receiving the references to its corresponding section from any one of the ports and selectively conveying the references to the access paths for the corresponding section. The circuits each including; means for checking the readiness of the memory banks to be referenced and holding a reference to a busy one of the banks until the bank is ready to be referenced; means for detecting when more than one of the references is pending to the same bank simultaneously and holding all but one of the simultaneously pending references; and means communicating with the ports and the other of the conflict resolution circuits to cause one of the ports referencing the memory to suspend generation of further references when a reference from the referencing port is being held.

  13. A chimera grid scheme. [multiple overset body-conforming mesh system for finite difference adaptation to complex aircraft configurations

    NASA Technical Reports Server (NTRS)

    Steger, J. L.; Dougherty, F. C.; Benek, J. A.

    1983-01-01

    A mesh system composed of multiple overset body-conforming grids is described for adapting finite-difference procedures to complex aircraft configurations. In this so-called 'chimera mesh,' a major grid is generated about a main component of the configuration and overset minor grids are used to resolve all other features. Methods for connecting overset multiple grids and modifications of flow-simulation algorithms are discussed. Computational tests in two dimensions indicate that the use of multiple overset grids can simplify the task of grid generation without an adverse effect on flow-field algorithms and computer code complexity.

  14. Multi-pulse frequency shifted (MPFS) multiple access modulation for ultra wideband

    DOEpatents

    Nekoogar, Faranak; Dowla, Farid U.

    2012-01-24

    The multi-pulse frequency shifted technique uses mutually orthogonal short duration pulses o transmit and receive information in a UWB multiuser communication system. The multiuser system uses the same pulse shape with different frequencies for the reference and data for each user. Different users have a different pulse shape (mutually orthogonal to each other) and different transmit and reference frequencies. At the receiver, the reference pulse is frequency shifted to match the data pulse and a correlation scheme followed by a hard decision block detects the data.

  15. A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.

    PubMed

    Lang, Jun

    2012-01-30

    In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.

  16. Increasing Access to Clinical Trials and Innovative Therapy for Teenagers and Young Adults with Cancer - A Multiple Stakeholders and Multiple Steps Process.

    PubMed

    Gaspar, Nathalie; Fern, Lorna

    2016-01-01

    The inclusion of teenagers and young adults (TYAs) in cancer clinical trials is focal point for many countries with a specific TYA program. This objective has arisen from data which suggests that lower trial entry may, in part, contribute to lesser survival gains observed in this group when compared to children and some older adult cancers. In this chapter, we discuss obstacles to clinical trials and innovative therapies for TYA. Limited clinical trial availability is discussed in the context of the rarity of TYA cancers and our limited understanding of cancer biology in this group, other obstacles include inappropriate age eligibility criteria, limited accessibility to available trials, a lack of physicians and patients awareness and poor acceptability of trial design. We propose several strategies which could be applied to overcome these obstacles, some ready for implementation and others which require further exploration. Strengthening pediatric and adult oncology collaboration at the individual level and through oncology societies will undoubtedly positively impact accrual to trials for TYA, as will abolishing the use of age as a barrier to drug and trial access. This will allow us to create biologically driven trials and facilitate early new drug access and the creation of biobank collections to drive our understanding of the biology of cancers in this age group. Involving multiple stakeholders in trial design will facilitate acceptable trials to both healthcare professionals and young people themselves. The support of the multidisciplinary TYA team and a culture of research embedded within this are the keys to improving access and participation of TYA in cancer trials. PMID:27595355

  17. BioZone Exploting Source-Capability Information for Integrated Access to Multiple Bioinformatics Data Sources

    SciTech Connect

    Liu, L; Buttler, D; Paques, H; Pu, C; Critchlow

    2002-01-28

    Modern Bioinformatics data sources are widely used by molecular biologists for homology searching and new drug discovery. User-friendly and yet responsive access is one of the most desirable properties for integrated access to the rapidly growing, heterogeneous, and distributed collection of data sources. The increasing volume and diversity of digital information related to bioinformatics (such as genomes, protein sequences, protein structures, etc.) have led to a growing problem that conventional data management systems do not have, namely finding which information sources out of many candidate choices are the most relevant and most accessible to answer a given user query. We refer to this problem as the query routing problem. In this paper we introduce the notation and issues of query routing, and present a practical solution for designing a scalable query routing system based on multi-level progressive pruning strategies. The key idea is to create and maintain source-capability profiles independently, and to provide algorithms that can dynamically discover relevant information sources for a given query through the smart use of source profiles. Compared to the keyword-based indexing techniques adopted in most of the search engines and software, our approach offers fine-granularity of interest matching, thus it is more powerful and effective for handling queries with complex conditions.

  18. On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users

    NASA Astrophysics Data System (ADS)

    Ding, Zhiguo; Yang, Zheng; Fan, Pingzhi; Poor, H. Vincent

    2014-12-01

    In this letter, the performance of non-orthogonal multiple access (NOMA) is investigated in a cellular downlink scenario with randomly deployed users. The developed analytical results show that NOMA can achieve superior performance in terms of ergodic sum rates; however, the outage performance of NOMA depends critically on the choices of the users' targeted data rates and allocated power. In particular, a wrong choice of the targeted data rates and allocated power can lead to a situation in which the user's outage probability is always one, i.e. the user's targeted quality of service will never be met.

  19. Source coherence impairments in a direct detection direct sequence optical code-division multiple-access system.

    PubMed

    Fsaifes, Ihsan; Lepers, Catherine; Lourdiane, Mounia; Gallion, Philippe; Beugin, Vincent; Guignard, Philippe

    2007-02-01

    We demonstrate that direct sequence optical code- division multiple-access (DS-OCDMA) encoders and decoders using sampled fiber Bragg gratings (S-FBGs) behave as multipath interferometers. In that case, chip pulses of the prime sequence codes generated by spreading in time-coherent data pulses can result from multiple reflections in the interferometers that can superimpose within a chip time duration. We show that the autocorrelation function has to be considered as the sum of complex amplitudes of the combined chip as the laser source coherence time is much greater than the integration time of the photodetector. To reduce the sensitivity of the DS-OCDMA system to the coherence time of the laser source, we analyze the use of sparse and nonperiodic quadratic congruence and extended quadratic congruence codes.

  20. 47 CFR 76.2000 - Exclusive access to multiple dwelling units generally.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... to multiple dwelling units generally. (a) Prohibition. No cable operator or other provider of MVPD... contours 76.5 Boundaries, TV markets 76.53 Broadcast, Sports 76.67 Broadcast station, TV 76.5 C Cable TV... other TV signals 76.60 Carriage of TV stations, Mandatory 76.56 Carriage of TV stations,...

  1. 47 CFR 76.2000 - Exclusive access to multiple dwelling units generally.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... to multiple dwelling units generally. (a) Prohibition. No cable operator or other provider of MVPD... contours 76.5 Boundaries, TV markets 76.53 Broadcast, Sports 76.67 Broadcast station, TV 76.5 C Cable TV... other TV signals 76.60 Carriage of TV stations, Mandatory 76.56 Carriage of TV stations,...

  2. 47 CFR 76.2000 - Exclusive access to multiple dwelling units generally.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... to multiple dwelling units generally. (a) Prohibition. No cable operator or other provider of MVPD... contours 76.5 Boundaries, TV markets 76.53 Broadcast, Sports 76.67 Broadcast station, TV 76.5 C Cable TV... other TV signals 76.60 Carriage of TV stations, Mandatory 76.56 Carriage of TV stations,...

  3. Cache oblivious storage and access heuristics for blocked matrix-matrix multiplication

    SciTech Connect

    Bock, Nicolas; Rubensson, Emanuel H; Niklasson, Anders M N; Challacombe, Matt; Salek, Pawel

    2008-01-01

    The authors investigate effects of ordering in blocked matrix-matrix multiplication. They find that submatrices do not have to be stored contiguously in memory in order to achieve near optimal performance. They also find a good choice of execution order of submatrix operations can lead to a speedup of up to four times for small block sizes.

  4. Ancestral state reconstruction reveals multiple independent evolution of diagnostic morphological characters in the "Higher Oribatida" (Acari), conflicting with current classification schemes

    PubMed Central

    2010-01-01

    Background The use of molecular genetic data in phylogenetic systematics has revolutionized this field of research in that several taxonomic groupings defined by traditional taxonomic approaches have been rejected by molecular data. The taxonomic classification of the oribatid mite group Circumdehiscentiae ("Higher Oribatida") is largely based on morphological characters and several different classification schemes, all based upon the validity of diagnostic morphological characters, have been proposed by various authors. The aims of this study were to test the appropriateness of the current taxonomic classification schemes for the Circumdehiscentiae and to trace the evolution of the main diagnostic traits (the four nymphal traits scalps, centrodorsal setae, sclerits and wrinkled cuticle plus octotaxic system and pteromorphs both in adults) on the basis of a molecular phylogenetic hypothesis by means of parsimony, likelihood and Bayesian approaches. Results The molecular phylogeny based on three nuclear markers (28S rDNA, ef-1α, hsp82) revealed considerable discrepancies to the traditional classification of the five "circumdehiscent" subdivisions, suggesting paraphyly of the three families Scutoverticidae, Ameronothridae, Cymbaeremaeidae and also of the genus Achipteria. Ancestral state reconstructions of six common diagnostic characters and statistical evaluation of alternative phylogenetic hypotheses also partially rejected the current morphology-based classification and suggested multiple convergent evolution (both gain and loss) of some traits, after a period of rapid cladogenesis, rendering several subgroups paraphyletic. Conclusions Phylogenetic studies revealed non-monophyly of three families and one genus as a result of a lack of adequate synapomorphic morphological characters, calling for further detailed investigations in a framework of integrative taxonomy. Character histories of six morphological traits indicate that their evolution followed a rather

  5. Performance of asynchronous fiber-optic code division multiple access system based on three-dimensional wavelength/time/space codes and its link analysis.

    PubMed

    Singh, Jaswinder

    2010-03-10

    A novel family of three-dimensional (3-D) wavelength/time/space codes for asynchronous optical code-division-multiple-access (CDMA) systems with "zero" off-peak autocorrelation and "unity" cross correlation is reported. Antipodal signaling and differential detection is employed in the system. A maximum of [(W x T+1) x W] codes are generated for unity cross correlation, where W and T are the number of wavelengths and time chips used in the code and are prime. The conditions for violation of the cross-correlation constraint are discussed. The expressions for number of generated codes are determined for various code dimensions. It is found that the maximum number of codes are generated for S < or = min(W,T), where W and T are prime and S is the number of space channels. The performance of these codes is compared to the earlier reported two-dimensional (2-D)/3-D codes for asynchronous systems. The codes have a code-set-size to code-size ratio greater than W/S. For instance, with a code size of 2065 (59 x 7 x 5), a total of 12,213 users can be supported, and 130 simultaneous users at a bit-error rate (BER) of 10(-9). An arrayed-waveguide-grating-based reconfigurable encoder/decoder design for 2-D implementation for the 3-D codes is presented so that the need for multiple star couplers and fiber ribbons is eliminated. The hardware requirements of the coders used for various modulation/detection schemes are given. The effect of insertion loss in the coders is shown to be significantly reduced with loss compensation by using an amplifier after encoding. An optical CDMA system for four users is simulated and the results presented show the improvement in performance with the use of loss compensation.

  6. Ultrasonic Multiple-Access Ranging System Using Spread Spectrum and MEMS Technology for Indoor Localization

    PubMed Central

    Segers, Laurent; Tiete, Jelmer; Braeken, An; Touhafi, Abdellah

    2014-01-01

    Indoor localization of persons and objects poses a great engineering challenge. Previously developed localization systems demonstrate the use of wideband techniques in ultrasound ranging systems. Direct sequence and frequency hopping spread spectrum ultrasound signals have been proven to achieve a high level of accuracy. A novel ranging method using the frequency hopping spread spectrum with finite impulse response filtering will be investigated and compared against the direct sequence spread spectrum. In the first setup, distances are estimated in a single-access environment, while in the second setup, two senders and one receiver are used. During the experiments, the micro-electromechanical systems are used as ultrasonic sensors, while the senders were implemented using field programmable gate arrays. Results show that in a single-access environment, the direct sequence spread spectrum method offers slightly better accuracy and precision performance compared to the frequency hopping spread spectrum. When two senders are used, measurements point out that the frequency hopping spread spectrum is more robust to near-far effects than the direct sequence spread spectrum. PMID:24553084

  7. Performance of a Frequency-Hopped Real-Time Remote Control System in a Multiple Access Scenario

    NASA Astrophysics Data System (ADS)

    Cervantes, Frank

    A recent trend is observed in the context of the radio-controlled aircrafts and automobiles within the hobby grade category and Unmanned Aerial Vehicles (UAV) applications moving to the well-known Industrial, Scientific and Medical (ISM) band. Based on this technological fact, the present thesis evaluates an individual user performance by featuring a multiple-user scenario where several point-to-point co-located real-time Remote Control (RC) applications operate using Frequency Hopping Spread Spectrum (FHSS) as a medium access technique in order to handle interference efficiently. Commercial-off-the-shelf wireless transceivers ready to operate in the ISM band are considered as the operational platform supporting the above-mentioned applications. The impact of channel impairments and of different critical system engineering issues, such as working with real clock oscillators and variable packet duty cycle, are considered. Based on the previous, simulation results allowed us to evaluate the range of variation for those parameters for an acceptable system performance under Multiple Access (MA) environments.

  8. ECR Browser: A Tool For Visualizing And Accessing Data From Comparisons Of Multiple Vertebrate Genomes

    SciTech Connect

    Loots, G G; Ovcharenko, I; Stubbs, L; Nobrega, M A

    2004-01-06

    The increasing number of vertebrate genomes being sequenced in draft or finished form provide a unique opportunity to study and decode the language of DNA sequence through comparative genome alignments. However, novel tools and strategies are required to accommodate this increasing volume of genomic information and to facilitate experimental annotation of genome function. Here we present the ECR Browser, a tool that provides an easy and dynamic access to whole genome alignments of human, mouse, rat and fish sequences. This web-based tool (http://ecrbrowser.dcode.org) provides the starting point for discovery of novel genes, identification of distant gene regulatory elements and prediction of transcription factor binding sites. The genome alignment portal of the ECR Browser also permits fast and automated alignment of any user-submitted sequence to the genome of choice. The interconnection of the ECR browser with other DNA sequence analysis tools creates a unique portal for studying and exploring vertebrate genomes.

  9. Access to Care for Multiple Sclerosis in Times of Economic Crisis in Greece – the HOPE II Study

    PubMed Central

    Souliotis, Kyriakos; Alexopoulou, Elena; Papageorgiou, Manto; Politi, Anastasia; Litsa, Panagiota; Contiades, Xenophon

    2016-01-01

    Background: While there is currently no cure for multiple sclerosis (MS), treatment with biologic disease-modifying drugs (bDMDs) can reduce the impact of the condition on the lives of patients. In Greece, the regulatory change in the distribution system of bDMDs, limited their administration through the designated pharmacies of the National Organization for Healthcare Services Provision (EOPYY) or the National Health System (ESY) hospitals, thus potentially impacting access to MS treatment. In this context, the aim of this paper was to assess the barriers to bDMDs, by recording MS patients’ experiences. Methods: A survey research was conducted between January and February 2014 in Athens and 5 other major Greek cities with the methods of personal and telephone interview. A structured questionnaire was used to elicit socio-economic and medical information, information related to obstacles in accessing bDMDs and medical treatment, from MS patients that visited EOPYY pharmacies during the study period. Results: During the last year 69% of 179 participants reported that the distribution system of bDMDs has improved. Thirteen percent of participants encountered problems in accessing their medication, and 16.9% of participants in accessing their physician, with the obstacles being more pronounced for non-Athens residents. Frequent obstacles to bDMDs were the distance from EOPYY pharmacies and difficulties in obtaining a diagnosis from an EOPYY/ESY physician, while obstacles to medical care were delays in appointment booking and travel difficulties. Conclusion: Even though the major weaknesses of the distribution system of bDMDs have improved, further amelioration of the system could be achieved through the home delivery of medicines to patients living in remote areas, and through the development of a national MS registry. PMID:26927393

  10. Locally accessible conformations of proteins: multiple molecular dynamics simulations of crambin.

    PubMed Central

    Caves, L. S.; Evanseck, J. D.; Karplus, M.

    1998-01-01

    Multiple molecular dynamics (MD) simulations of crambin with different initial atomic velocities are used to sample conformations in the vicinity of the native structure. Individual trajectories of length up to 5 ns sample only a fraction of the conformational distribution generated by ten independent 120 ps trajectories at 300 K. The backbone atom conformational space distribution is analyzed using principal components analysis (PCA). Four different major conformational regions are found. In general, a trajectory samples only one region and few transitions between the regions are observed. Consequently, the averages of structural and dynamic properties over the ten trajectories differ significantly from those obtained from individual trajectories. The nature of the conformational sampling has important consequences for the utilization of MD simulations for a wide range of problems, such as comparisons with X-ray or NMR data. The overall average structure is significantly closer to the X-ray structure than any of the individual trajectory average structures. The high frequency (less than 10 ps) atomic fluctuations from the ten trajectories tend to be similar, but the lower frequency (100 ps) motions are different. To improve conformational sampling in molecular dynamics simulations of proteins, as in nucleic acids, multiple trajectories with different initial conditions should be used rather than a single long trajectory. PMID:9541397

  11. Post-Coma Persons with Extensive Multiple Disabilities Use Microswitch Technology to Access Selected Stimulus Events or Operate a Radio Device

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Alberti, Gloria; Oliva, Doretta; Megna, Gianfranco; Iliceto, Carla; Damiani, Sabino; Ricci, Irene; Spica, Antonella

    2011-01-01

    The present two studies extended research evidence on the use of microswitch technology by post-coma persons with multiple disabilities. Specifically, Study I examined whether three adults with a diagnosis of minimally conscious state and multiple disabilities could use microswitches as tools to access brief, selected stimulus events. Study II…

  12. Multiple social identities and stereotype threat: imbalance, accessibility, and working memory.

    PubMed

    Rydell, Robert J; McConnell, Allen R; Beilock, Sian L

    2009-05-01

    In 4 experiments, the authors showed that concurrently making positive and negative self-relevant stereotypes available about performance in the same ability domain can eliminate stereotype threat effects. Replicating past work, the authors demonstrated that introducing negative stereotypes about women's math performance activated participants' female social identity and hurt their math performance (i.e., stereotype threat) by reducing working memory. Moving beyond past work, it was also demonstrated that concomitantly presenting a positive self-relevant stereotype (e.g., college students are good at math) increased the relative accessibility of females' college student identity and inhibited their gender identity, eliminating attendant working memory deficits and contingent math performance decrements. Furthermore, subtle manipulations in questions presented in the demographic section of a math test eliminated stereotype threat effects that result from women reporting their gender before completing the test. This work identifies the motivated processes through which people's social identities became active in situations in which self-relevant stereotypes about a stigmatized group membership and a nonstigmatized group membership were available. In addition, it demonstrates the downstream consequences of this pattern of activation on working memory and performance.

  13. Mathematical models for cochannel interference in FH/MFSK multiple-access systems

    NASA Technical Reports Server (NTRS)

    Yan, T.-Y.; Wang, C. C.

    1984-01-01

    FH/MFSK has been proposed for a multiuser spread spectrum digital communication system to combat both self-jamming and intentional jamming. An independence assumption at the energy detector outputs is used to evaluate such a system for a digitized voice mobile radio system (Yue, 1981). This paper presents a correlated model and compares its performance to an independence model under the symbol error probability criterion. A Gaussian process model is also developed for comparison. It is found that the conventional Gaussian approximation is inadequate in predicting the number of users that can be accommodated by an FH/MFSK system using the conventional receiver. Furthermore, for the cases evaluated, the independence model provides an excellent approximation to the correlated model. Additionally, a conditional Chernoff bound is presented for the more general case of frequency-hopping systems with multiple hops per symbol.

  14. IPAT: a freely accessible software tool for analyzing multiple patent documents with inbuilt landscape visualizer.

    PubMed

    Ajay, Dara; Gangwal, Rahul P; Sangamwar, Abhay T

    2015-01-01

    Intelligent Patent Analysis Tool (IPAT) is an online data retrieval tool, operated based on text mining algorithm to extract specific patent information in a predetermined pattern into an Excel sheet. The software is designed and developed to retrieve and analyze technology information from multiple patent documents and generate various patent landscape graphs and charts. The software is C# coded in visual studio 2010, which extracts the publicly available patent information from the web pages like Google Patent and simultaneously study the various technology trends based on user-defined parameters. In other words, IPAT combined with the manual categorization will act as an excellent technology assessment tool in competitive intelligence and due diligence for predicting the future R&D forecast.

  15. IPAT: a freely accessible software tool for analyzing multiple patent documents with inbuilt landscape visualizer.

    PubMed

    Ajay, Dara; Gangwal, Rahul P; Sangamwar, Abhay T

    2015-01-01

    Intelligent Patent Analysis Tool (IPAT) is an online data retrieval tool, operated based on text mining algorithm to extract specific patent information in a predetermined pattern into an Excel sheet. The software is designed and developed to retrieve and analyze technology information from multiple patent documents and generate various patent landscape graphs and charts. The software is C# coded in visual studio 2010, which extracts the publicly available patent information from the web pages like Google Patent and simultaneously study the various technology trends based on user-defined parameters. In other words, IPAT combined with the manual categorization will act as an excellent technology assessment tool in competitive intelligence and due diligence for predicting the future R&D forecast. PMID:26452016

  16. Radiances simulated in the presence of clouds by use of a fast radiative transfer model and a multiple-scattering scheme.

    PubMed

    Amorati, Roberta; Rizzi, Rolando

    2002-03-20

    A fast-forward radiative transfer (RTF) model is presented that includes cloud-radiation interaction for any number of cloud layers. Layer cloud fraction and transmittance are treated separately and combined with that of gaseous transmittances. RTF is tested against a reference procedure that uses line-by-line gaseous transmittances and solves the radiative transfer equation by use of the adding-doubling method to handle multiple-scattering conditions properly. The comparison is carried out for channels 8, 12, and 14 of the High Resolution Infrared Radiation Sounder (HIRS/2) and for the geostationary satellite METEOSAT thermal infrared and water vapor channels. Fairly large differences in simulated radiances by the two schemes are found in clear conditions for upper- and mid-tropospheric channels; the cause of the differences is discussed. For cloudy situations an improved layer source function is shown to be required when rapid changes in atmospheric transmission are experienced within the model layers. The roles of scattering processes are discussed; results with and without scattering, both obtained by use of a reference code, are compared. Overall, the presented results show that the fast model is capable of reproducing the cloudy results of the much more complex and time-consuming reference scheme. PMID:11921787

  17. Radiances simulated in the presence of clouds by use of a fast radiative transfer model and a multiple-scattering scheme.

    PubMed

    Amorati, Roberta; Rizzi, Rolando

    2002-03-20

    A fast-forward radiative transfer (RTF) model is presented that includes cloud-radiation interaction for any number of cloud layers. Layer cloud fraction and transmittance are treated separately and combined with that of gaseous transmittances. RTF is tested against a reference procedure that uses line-by-line gaseous transmittances and solves the radiative transfer equation by use of the adding-doubling method to handle multiple-scattering conditions properly. The comparison is carried out for channels 8, 12, and 14 of the High Resolution Infrared Radiation Sounder (HIRS/2) and for the geostationary satellite METEOSAT thermal infrared and water vapor channels. Fairly large differences in simulated radiances by the two schemes are found in clear conditions for upper- and mid-tropospheric channels; the cause of the differences is discussed. For cloudy situations an improved layer source function is shown to be required when rapid changes in atmospheric transmission are experienced within the model layers. The roles of scattering processes are discussed; results with and without scattering, both obtained by use of a reference code, are compared. Overall, the presented results show that the fast model is capable of reproducing the cloudy results of the much more complex and time-consuming reference scheme.

  18. Host choice and multiple blood feeding behaviour of malaria vectors and other anophelines in Mwea rice scheme, Kenya

    PubMed Central

    Muriu, Simon M; Muturi, Ephantus J; Shililu, Josephat I; Mbogo, Charles M; Mwangangi, Joseph M; Jacob, Benjamin G; Irungu, Lucy W; Mukabana, Richard W; Githure, John I; Novak, Robert J

    2008-01-01

    Background Studies were conducted between April 2004 and February 2006 to determine the blood-feeding pattern of Anopheles mosquitoes in Mwea Kenya. Methods Samples were collected indoors by pyrethrum spay catch and outdoors by Centers for Disease Control light traps and processed for blood meal analysis by an Enzyme-linked Immunosorbent Assay. Results A total of 3,333 blood-fed Anopheles mosquitoes representing four Anopheles species were collected and 2,796 of the samples were assayed, with Anopheles arabiensis comprising 76.2% (n = 2,542) followed in decreasing order by Anopheles coustani 8.9% (n = 297), Anopheles pharoensis 8.2% (n = 272) and Anopheles funestus 6.7% (n = 222). All mosquito species had a high preference for bovine (range 56.3–71.4%) over human (range 1.1–23.9%) or goat (0.1–2.2%) blood meals. Some individuals from all the four species were found to contain mixed blood meals. The bovine blood index (BBI) for An. arabiensis was significantly higher for populations collected indoors (71.8%), than populations collected outdoors (41.3%), but the human blood index (HBI) did not differ significantly between the two populations. In contrast, BBI for indoor collected An. funestus (51.4%) was significantly lower than for outdoor collected populations (78.0%) and the HBI was significantly higher indoors (28.7%) than outdoors (2.4%). Anthropophily of An. funestus was lowest within the rice scheme, moderate in unplanned rice agro-ecosystem, and highest within the non-irrigated agro-ecosystem. Anthropophily of An. arabiensis was significantly higher in the non-irrigated agro-ecosystem than in the other agro-ecosystems. Conclusion These findings suggest that rice cultivation has an effect on host choice by Anopheles mosquitoes. The study further indicate that zooprophylaxis may be a potential strategy for malaria control, but there is need to assess how domestic animals may influence arboviruses epidemiology before adapting the strategy. PMID:18312667

  19. Using multiple hydrogen bonding cross-linkers to access reversibly responsive three dimensional graphene oxide architecture

    NASA Astrophysics Data System (ADS)

    Han, Junkai; Shen, Yongtao; Feng, Wei

    2016-07-01

    Three-dimensional (3D) graphene materials have attracted a lot of attention for efficiently utilizing inherent properties of graphene sheets. However, 3D graphene materials reported in the previous literature are constructed through covalent or weak non-covalent interactions, causing permanent structure/property changes. In this paper, a novel 3D graphene material of dynamic interactions between lamellas with 2-ureido-4[1H]-pyrimidinone as a supra-molecular motif has been synthesized. This 3D graphene material shows enhanced sheet interactions while the cross-linking takes place. With proper solvent stimulation, the integrated 3D graphene material can disassemble as isolated sheets. The driving force for the 3D structure assembly or disassembly is considered to be the forming or breaking of the multiple hydrogen bonding pairs. Furthermore, the 3D material is used as an intelligent dye adsorber to adsorb methylene blue and release it. The controllable and reversible characteristic of this 3D graphene material may open an avenue to the synthesis and application of novel intelligent materials.Three-dimensional (3D) graphene materials have attracted a lot of attention for efficiently utilizing inherent properties of graphene sheets. However, 3D graphene materials reported in the previous literature are constructed through covalent or weak non-covalent interactions, causing permanent structure/property changes. In this paper, a novel 3D graphene material of dynamic interactions between lamellas with 2-ureido-4[1H]-pyrimidinone as a supra-molecular motif has been synthesized. This 3D graphene material shows enhanced sheet interactions while the cross-linking takes place. With proper solvent stimulation, the integrated 3D graphene material can disassemble as isolated sheets. The driving force for the 3D structure assembly or disassembly is considered to be the forming or breaking of the multiple hydrogen bonding pairs. Furthermore, the 3D material is used as an

  20. Demonstration of a novel optical code-division multiple-access system at 800 megachips per second.

    PubMed

    Vethanayagam, N; Macdonald, R I

    1991-07-01

    A novel optical code-division multiple-access system using Alberta codes and complementary correlation is demonstrated at 800 megachips per second. Completely passive optical multiplexing and demultiplexing is performed throughout the process. Complementary correlation permits code orthogonality because bipolar electrical signals are generated from unipolar optical ones. The correlator is implemented optoelectronically with an array of metal-semiconductor-metal photodiodes. We show that the bit-error-rate performance of the system is not degraded by interfering signals and that zero cross talk is nominally achieved. An unusual property of such systems is confirmed: The bit error rate on a channel can be reduced by the presence of an interfering channel if the two transmitters are not chip asynchronous.

  1. Replica Analysis of Multiuser Detection for Code Division Multiple Access with M-Ary Phase-Shift Keying

    NASA Astrophysics Data System (ADS)

    Kato, Hiroyuki; Okada, Masato; Miyoshi, Seiji

    2013-07-01

    We analyze the performance of the maximizer of the posterior marginals (MPM) detector for code division multiple access (CDMA) multiuser detection with M-ary phase shift keying (M-ary PSK) in the large system limit by the replica method. The obtained theory agrees with computer simulation reasonably well. We also derive the theory in the case of the large M limit and discuss the dependence of the properties of M-ary PSK CDMA communication on M. We show that the waterfall phenomenon occurs for both the finite and infinite values of M. We also show that a value of M for which the decoded phase information on the original user symbol becomes minimum exists. Furthermore, we discuss the relationship between the theory based on the replica method and that based on self-consistent signal-to-noise analysis (SCSNA).

  2. Performance Analysis of Direct-Sequence Code-Division Multiple-Access Communications with Asymmetric Quadrature Phase-Shift-Keying Modulation

    NASA Technical Reports Server (NTRS)

    Wang, C.-W.; Stark, W.

    2005-01-01

    This article considers a quaternary direct-sequence code-division multiple-access (DS-CDMA) communication system with asymmetric quadrature phase-shift-keying (AQPSK) modulation for unequal error protection (UEP) capability. Both time synchronous and asynchronous cases are investigated. An expression for the probability distribution of the multiple-access interference is derived. The exact bit-error performance and the approximate performance using a Gaussian approximation and random signature sequences are evaluated by extending the techniques used for uniform quadrature phase-shift-keying (QPSK) and binary phase-shift-keying (BPSK) DS-CDMA systems. Finally, a general system model with unequal user power and the near-far problem is considered and analyzed. The results show that, for a system with UEP capability, the less protected data bits are more sensitive to the near-far effect that occurs in a multiple-access environment than are the more protected bits.

  3. A novel IPTV program multiplex access system to EPON

    NASA Astrophysics Data System (ADS)

    Xu, Xian; Liu, Deming; He, Wei; Lu, Xi

    2007-11-01

    With the rapid development of high speed networks, such as Ethernet Passive Optical Network (EPON), traffic patterns in access networks have evolved from traditional text-oriented service to the mixed text-, voice- and video- based services, leading to so called "Triple Play". For supporting IPTV service in EPON access network infrastructure, in this article we propose a novel IPTV program multiplex access system to EPON, which enables multiple IPTV program source servers to seamlessly access to IPTV service access port of optical line terminal (OLT) in EPON. There are two multiplex schemes, namely static multiplex scheme and dynamic multiplex scheme, in implementing the program multiplexing. Static multiplex scheme is to multiplex all the IPTV programs and forward them to the OLT, regardless of the need of end-users. While dynamic multiplex scheme can dynamically multiplex and forward IPTV programs according to what the end-users actually demand and those watched by no end-user would not be multiplexed. By comparing these two schemes, a reduced traffic of EPON can be achieved by using dynamic multiplex scheme, especially when most end-users are watching the same few IPTV programs. Both schemes are implemented in our system, with their hardware and software designs described.

  4. Delay analysis of an integrated voice and data access protocol with collision detection for multimedia satellite networks

    NASA Astrophysics Data System (ADS)

    Poon, Charles C. K.; Suda, Tatsuya

    1992-03-01

    The novel multiple-access scheme for multimedia satellite networks presented is based on a combination of FDMA and TDMA, integrating both circuit and packet-switching techniques. While the circuit-switching method is used to transmit such stream-type traffic as real-time voice communications, packet-switching is used to transmit such 'bursty' traffic as interactive data. A ground radio network is assumed for control signaling; the tone sense multiple access/partial collision detection scheme is implemented on this network to enhance the integrated access scheme's performance.

  5. A secure double-image sharing scheme based on Shamir's three-pass protocol and 2D Sine Logistic modulation map in discrete multiple-parameter fractional angular transform domain

    NASA Astrophysics Data System (ADS)

    Sui, Liansheng; Duan, Kuaikuai; Liang, Junli

    2016-05-01

    A secure double-image sharing scheme is proposed by using the Shamir's three-pass protocol in the discrete multiple-parameter fractional angular transform domain. First, an enlarged image is formed by assembling two plain images successively in the horizontal direction and scrambled in the chaotic permutation process, in which the sequences of chaotic pairs are generated by the two-dimensional Sine Logistic modulation map. Second, the scrambled image is divided into two components which are used to constitute a complex image. One component is normalized and regarded as the phase part of the complex image as well as other is considered as the amplitude part. Finally, the complex image is shared between the sender and the receiver by using the Shamir's three-pass protocol, in which the discrete multiple-parameter fractional angular transform is used as the encryption function due to its commutative property. The proposed double-image sharing scheme has an obvious advantage that the key management is convenient without distributing the random phase mask keys in advance. Moreover, the security of the image sharing scheme is enhanced with the help of extra parameters of the discrete multiple-parameter fractional angular transform. To the best of our knowledge, this is the first report on integrating the Shamir's three-pass protocol with double-image sharing scheme in the information security field. Simulation results and security analysis verify the feasibility and effectiveness of the proposed scheme.

  6. Analysis of longitudinal trials with protocol deviation: a framework for relevant, accessible assumptions, and inference via multiple imputation.

    PubMed

    Carpenter, James R; Roger, James H; Kenward, Michael G

    2013-01-01

    Protocol deviations, for example, due to early withdrawal and noncompliance, are unavoidable in clinical trials. Such deviations often result in missing data. Additional assumptions are then needed for the analysis, and these cannot be definitively verified from the data at hand. Thus, as recognized by recent regulatory guidelines and reports, clarity about these assumptions and their implications is vital for both the primary analysis and framing relevant sensitivity analysis. This article focuses on clinical trials with longitudinal quantitative outcome data. For the target population, we define two estimands, the de jure estimand, "does the treatment work under the best case scenario," and the de facto estimand, "what would be the effect seen in practice." We then carefully define the concept of a deviation from the protocol relevant to the estimand, or for short a deviation. Each patient's postrandomization data can then be divided into predeviation data and postdeviation data. We set out an accessible framework for contextually appropriate assumptions relevant to de facto and de jure estimands, that is, assumptions about the joint distribution of pre- and postdeviation data relevant to the clinical question at hand. We then show how, under these assumptions, multiple imputation provides a practical approach to estimation and inference. We illustrate with data from a longitudinal clinical trial in patients with chronic asthma. PMID:24138436

  7. Satellite range delay simulator for a matrix-switched time division multiple-access network simulation system

    NASA Technical Reports Server (NTRS)

    Nagy, Lawrence A.

    1990-01-01

    The Systems Integration, Test, and Evaluation (SITE) facility at NASA Lewis Research Center is presently configured as a satellite-switched time division multiple access (SS-TDMA) network simulator. The purpose of SITE is to demonstrate and evaluate advanced communication satellite technologies, presently embodied by POC components developed under NASA contracts in addition to other hardware, such as ground terminals, designed and built in-house at NASA Lewis. Each ground terminal in a satellite communications system will experience a different aspect of the satellite's motion due mainly to daily tidal effects and station keeping, hence a different duration and rate of variation in the range delay. As a result of this and other effects such as local oscillator instability, each ground terminal must constantly adjust its transmit burst timing so that data bursts from separate ground terminals arrive at the satellite in their assigned time slots, preventing overlap and keeping the system in synchronism. On the receiving end, ground terminals must synchronize their local clocks using reference transmissions received through the satellite link. A feature of the SITE facility is its capability to simulate the varying propagation delays and associated Doppler frequency shifts that the ground terminals in the network have to cope with. Delay is ahcieved by means of two NASA Lewis designed and built range delay simulator (RDS) systems, each independently controlled locally with front panel switches or remotely by an experiment control and monitor (EC/M) computer.

  8. Comparison of nutrient intakes from two selected diet plans considered healthful versus the cutoff points for green lights as defined by the UK's multiple traffic light scheme.

    PubMed

    Green, H; Fern, E

    2016-02-01

    This study compared nutrient intakes from 7-day menus for the US MyPlate and DASH Eating Plan versus the cutoff points for green lights defined by the UK's multiple traffic light (MTL) scheme. For both diets, the foods achieved green lights for saturated fat and salt, and for beverages for total fat, saturated fat and salt. The other nutrients achieved amber lights but were within the range of the two diets. By contrast, the MTL threshold for salt in beverages was outside the range of the diets. The values for salt in beverages in the MyPlate and Dash diet plans were 0.06±0.07 and 0.19±0.01 (s.d.) g/100 ml, which are both considerably lower compared with the cutoff of 0.3 g/100 ml for an MTL green light. Adjusting the green MTL threshold values to the median values for a healthful diet could help make MTL labelling a more valid way of helping consumers choose a healthful diet.

  9. Libraries and the Pickle (PCLE) of Content Management Schemes: Survey of Pending Copyright Policy Battles and Their Implications for School Libraries, Free Speech, Access to Information, and Democracy.

    ERIC Educational Resources Information Center

    Minow, Mary; Wilson, Cicely Reed

    2003-01-01

    Explains the copyright policy battles now pending in Congress and the courts, with a discussion of what they mean for free speech, access to information, and democratic culture in school libraries. (MES)

  10. Persons with Multiple Disabilities Accessing Stimulation and Requesting Social Contact via Microswitch and VOCA Devices: New Research Evaluation and Social Validation

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; O'Reilly, Mark F.; Singh, Nirbhay N.; Sigafoos, Jeff; Didden, Robert; Oliva, Doretta; Campodonico, Francesca; de Pace, Claudia; Chiapparino, Claudia; Groeneweg, Jop

    2009-01-01

    The first of these two studies assessed whether 11 participants with multiple disabilities of 5.3-18.2 (M = 10.7) years of age would succeed in combining a microswitch for accessing preferred environmental stimuli and a Voice Output Communication Aid (VOCA) for requesting social contact. The second study conducted a social validation assessment of…

  11. Effects of concurrent access to multiple ethanol concentrations and repeated deprivations on alcohol intake of high-alcohol-drinking (HAD) rats.

    PubMed

    Rodd, Zachary A; Bell, Richard L; Kuc, Kelly A; Murphy, James M; Lumeng, Lawrence; McBride, William J

    2009-04-01

    High-alcohol-drinking rats, given access to 10% ethanol, expressed an alcohol deprivation effect (ADE) only after multiple deprivations. In alcohol-preferring (P) rats, concurrent access to multiple ethanol concentrations combined with repeated cycles of EtOH access and deprivation produced excessive ethanol drinking. The current study was undertaken to examine the effects of repeated alcohol deprivations with concurrent access to multiple concentrations of ethanol on ethanol intake of HAD replicate lines of rats. HAD-1 and HAD-2 rats received access to 10, 20 and 30% (v/v) ethanol for 6 weeks. Rats from each replicate line were assigned to: (1) a non-deprived group; (2) a group initially deprived of ethanol for 2 weeks; or (3) a group initially deprived for 8 weeks. Following the restoration of the ethanol solutions, cycle of 2 weeks of ethanol exposure and 2 weeks of alcohol deprivation was repeated three times for a total of four deprivations. Following the initial ethanol deprivation period, deprived groups significantly increased ethanol intakes during the initial 24-hour re-exposure period. Multiple deprivations increased ethanol intakes, shifted preference to higher ethanol concentrations and prolonged the duration of the elevated ethanol intakes for up to 5 days. In addition, repeated deprivations increased ethanol intake in the first 2-hour re-exposure period as high as 5-7 g/kg (which are equivalent to amounts consumed in 24 hours by HAD rats), and produced blood ethanol levels in excess of 150 mg%. The results indicate that HAD rats exhibit 'loss-of-control' of alcohol drinking with repeated deprivations when multiple ethanol concentrations are available.

  12. Analysis of tumor template from multiple compartments in a blood sample provides complementary access to peripheral tumor biomarkers

    PubMed Central

    Strauss, William M.; Carter, Chris; Simmons, Jill; Klem, Erich; Goodman, Nathan; Vahidi, Behrad; Romero, Juan; Masterman-Smith, Michael; O'Regan, Ruth; Gogineni, Keerthi; Schwartzberg, Lee; Austin, Laura K.; Dempsey, Paul W.; Cristofanilli, Massimo

    2016-01-01

    Targeted cancer therapeutics are promised to have a major impact on cancer treatment and survival. Successful application of these novel treatments requires a molecular definition of a patient's disease typically achieved through the use of tissue biopsies. Alternatively, allowing longitudinal monitoring, biomarkers derived from blood, isolated either from circulating tumor cell derived DNA (ctcDNA) or circulating cell-free tumor DNA (ccfDNA) may be evaluated. In order to use blood derived templates for mutational profiling in clinical decisions, it is essential to understand the different template qualities and how they compare to biopsy derived template DNA as both blood-based templates are rare and distinct from the gold-standard. Using a next generation re-sequencing strategy, concordance of the mutational spectrum was evaluated in 32 patient-matched ctcDNA and ccfDNA templates with comparison to tissue biopsy derived DNA template. Different CTC antibody capture systems for DNA isolation from patient blood samples were also compared. Significant overlap was observed between ctcDNA, ccfDNA and tissue derived templates. Interestingly, if the results of ctcDNA and ccfDNA template sequencing were combined, productive samples showed similar detection frequency (56% vs 58%), were temporally flexible, and were complementary both to each other and the gold standard. These observations justify the use of a multiple template approach to the liquid biopsy, where germline, ctcDNA, and ccfDNA templates are employed for clinical diagnostic purposes and open a path to comprehensive blood derived biomarker access. PMID:27049831

  13. Efficient access of compressed data

    SciTech Connect

    Eggers, S.J.; Shoshani, A.

    1980-06-01

    A compression technique is presented that allows a high degree of compression but requires only logarithmic access time. The technique is a constant suppression scheme, and is most applicable to stable databases whose distribution of constants is fairly clustered. Furthermore, the repeated use of the technique permits the suppression of a multiple number of different constants. Of particular interest is the application of the constant suppression technique to databases the composite key of which is made up of an incomplete cross product of several attribute domains. The scheme for compressing the full cross product composite key is well known. This paper, however, also handles the general, incomplete case by applying the constant suppression technique in conjunction with a composite key suppression scheme.

  14. Post-coma persons with extensive multiple disabilities use microswitch technology to access selected stimulus events or operate a radio device.

    PubMed

    Lancioni, Giulio E; Singh, Nirbhay N; O'Reilly, Mark F; Sigafoos, Jeff; Alberti, Gloria; Oliva, Doretta; Megna, Gianfranco; Iliceto, Carla; Damiani, Sabino; Ricci, Irene; Spica, Antonella

    2011-01-01

    The present two studies extended research evidence on the use of microswitch technology by post-coma persons with multiple disabilities. Specifically, Study I examined whether three adults with a diagnosis of minimally conscious state and multiple disabilities could use microswitches as tools to access brief, selected stimulus events. Study II assessed whether an adult, who had emerged from a minimally conscious state but was affected by multiple disabilities, could manage the use of a radio device via a microswitch-aided program. Results showed that the participants of Study I had a significant increase of microswitch responding during the intervention phases. The participant of Study II learned to change radio stations and seemed to spend different amounts of session time on the different stations available (suggesting preferences among the programs characterizing them). The importance of microswitch technology for assisting post-coma persons with multiple disabilities to positively engage with their environment was discussed.

  15. Household trends in access to improved water sources and sanitation facilities in Vietnam and associated factors: findings from the Multiple Indicator Cluster Surveys, 2000–2011

    PubMed Central

    Tuyet-Hanh, Tran Thi; Lee, Jong-Koo; Oh, Juhwan; Van Minh, Hoang; Ou Lee, Chul; Hoan, Le Thi; Nam, You-Seon; Long, Tran Khanh

    2016-01-01

    Background Despite progress made by the Millennium Development Goal (MDG) number 7.C, Vietnam still faces challenges with regard to the provision of access to safe drinking water and basic sanitation. Objective This paper describes household trends in access to improved water sources and sanitation facilities separately, and analyses factors associated with access to improved water sources and sanitation facilities in combination. Design Secondary data from the Vietnam Multiple Indicator Cluster Survey in 2000, 2006, and 2011 were analyzed. Descriptive statistics and tests of significance describe trends over time in access to water and sanitation by location, demographic and socio-economic factors. Binary logistic regressions (2000, 2006, and 2011) describe associations between access to water and sanitation, and geographic, demographic, and socio-economic factors. Results There have been some outstanding developments in access to improved water sources and sanitation facilities from 2000 to 2011. In 2011, the proportion of households with access to improved water sources and sanitation facilities reached 90% and 77%, respectively, meeting the 2015 MDG targets for safe drinking water and basic sanitation set at 88% and 75%, respectively. However, despite these achievements, in 2011, only 74% of households overall had access to combined improved drinking water and sanitation facilities. There were also stark differences between regions. In 2011, only 47% of households had access to both improved water and sanitation facilities in the Mekong River Delta compared with 94% in the Red River Delta. In 2011, households in urban compared to rural areas were more than twice as likely (odds ratio [OR]: 2.2; 95% confidence interval [CI]: 1.9–2.5) to have access to improved water and sanitation facilities in combination, and households in the highest compared with the lowest wealth quintile were over 40 times more likely (OR: 42.3; 95% CI: 29.8–60.0). Conclusions More

  16. Multiple boron-boron bonds in neutral molecules: an insight from the extended transition state method and the natural orbitals for chemical valence scheme.

    PubMed

    Mitoraj, Mariusz P; Michalak, Artur

    2011-03-21

    We have analyzed the character of B═B and B≡B bonds in the neutral molecules of general form: LHB═BHL (2-L) and LB≡BL (3-L), for various ancillary ligands L attached to the boron center, based on a recently developed method that combines the extended transition state scheme with the theory of natural orbitals for chemical valence (ETS-NOCV). In the case of molecules with the B═B bond, 2-L, we have included L = PMe(3), PF(3), PCl(3), PH(3), C(3)H(4)N(2)═C(NHCH)(2), whereas for molecules containing the B≡B connection, 3-L, the following ligands were considered L = CO, PMe(3), PCl(3), (Me(2)NCH(2)CH(2)O)(2)Ge. The results led us to conclude that use of phosphorus ligands leads to strengthening of the B═B bond by 6.4 kcal/mol (for 2-PMe(3)), by 4.4 (for 2-PF(3)) and by 9.2 (for 2-PH(3)), when compared to a molecule developed on the experimental basis, 2-C(3)H(4)N(2) (ΔE(total) = -118.3 kcal/mol). The ETS scheme has shown that all contributions, that is, (i) orbital interaction ΔE(orb), (ii) Pauli repulsion ΔE(Pauli), and (iii) electrostatic stabilization ΔE(elstat), are important in determining the trend in the B═B bond energies, ΔE(total). ETS-NOCV results revealed that both σ(B═B) and π(B═B) contributions are responsible for the changes in ΔE(orb) values. All considered molecules of the type LB≡BL, 3-L, exhibit a stronger B≡B bond when compared to a double B═B connection in 2-L (|ΔE(total)| is lower by 11.8-42.5 kcal/mol, depending on the molecule). The main reason is a lower Pauli repulsion contribution noted for 3-CO, 3-PMe(3), and 3-PCl(3) molecules. In addition, in the case of 3-PMe(3) and 3-PCl(3), the orbital interaction term is more stabilizing; however, the effect is less pronounced compared to the drop in the Pauli repulsion term. In all of the systems with double and triple boron-boron bonds, the electronic factor (ΔE(orb)) dominates over the electrostatic contribution (ΔE(elstat)). Finally, the strongest B

  17. Structuring waveguide-grating-based wavelength-division multiplexing/optical code division multiple access network codecs over topology of concentric circles

    NASA Astrophysics Data System (ADS)

    Huang, Jen-Fa; Nieh, Ta-Chun; Chen, Kai-Sheng

    2013-01-01

    The cyclic period and free spectral range of arrayed-waveguide gratings (AWG) in a wavelength-division multiplexing/optical code division multiple access optical code division multiple access network are exploited. The total optical network unit (ONU) of network capacity is partitioned into groups of different wavelength in accordance with the geographical location of subscribers based on the radial distance of the ONU to the optical line terminal. Combining concentric circles round by round for ONU groups enables a fixed round-trip time in the data transmission and a significant increase in system performance. Using AWG router, the proposed topology of concentric circles retains signature orthogonality and minimizes wavelength collisions on the photo-detector. Furthermore, the adoption of extended M-sequence codes corresponding to the AWG codec provides a simpler, more efficient coding procedure and accommodates more users in a single group.

  18. An energy-efficient SIMD DSP with multiple VLIW configurations and an advanced memory access unit for LTE-A modem LSIs

    NASA Astrophysics Data System (ADS)

    Tomono, Mitsuru; Ito, Makiko; Nomura, Yoshitaka; Mouri, Makoto; Hirose, Yoshio

    2015-12-01

    Energy efficiency is the most important factor in the design of wireless modem LSIs for mobile handset systems. We have developed an energy-efficient SIMD DSP for LTE-A modem LSIs. Our DSP has mainly two hardware features in order to reduce energy consumption. The first one is multiple VLIW configurations to minimize accesses to instruction memories. The second one is an advanced memory access unit to realize complex memory accesses required for wireless baseband processing. With these features, performance of our DSP is about 1.7 times faster than a base DSP on average for standard LTE-A Libraries. Our DSP achieves about 20% improvement in energy efficiency compared to a base DSP for LTE-A modem LSIs.

  19. Recirculating photonic filter: a wavelength-selective time delay for phased-array antennas and wavelength code-division multiple access.

    PubMed

    Yegnanarayanan, S; Trinh, P D; Jalali, B

    1996-05-15

    A novel wavelength-selective photonic time-delay filter is proposed and demonstrated. The device consists of an optical phased-array waveguide grating in a recirculating feedback configuration. It can function as a true-time-delay generator for squint-free beam steering in optically controlled phased-array antennas and as an encoding-decoding filter for wavelength code-division multiple access.

  20. Wavelength-encoding/temporal-spreading optical code division multiple-access system with in-fiber chirped moiré gratings.

    PubMed

    Chen, L R; Smith, P W; de Sterke, C M

    1999-07-20

    We propose an optical code division multiple-access (OCDMA) system that uses in-fiber chirped moiré gratings (CMG's) for encoding and decoding of broadband pulses. In reflection the wavelength-selective and dispersive nature of CMG's can be used to implement wavelength-encoding/temporal-spreading OCDMA. We give examples of codes designed around the constraints imposed by the encoding devices and present numerical simulations that demonstrate the proposed concept.

  1. Peritoneal dialysis as salvage renal replacement therapy after complete failure of hemodialysis access in an elderly patient with multiple comorbidities.

    PubMed

    Onime, Aideloje; Tzamaloukas, Antonios H; Servilla, Karen S; Hartshorne, Michael F

    2007-01-01

    Although peritoneal dialysis (PD) has been advocated as a suitable substitution therapy in patients with failure of hemodialysis (HD) blood access, documentation of the performance of PD in such patients is limited. Here, we present an elderly patient with total failure of HD blood access who has had a remarkably successful course on PD. A 78-year-old man with several comorbidities started continuous ambulatory PD after a 3.5-year course of HD complicated by repeated vascular access infections and clotting episodes. These access complications resulted in 8 hospitalizations and led to inability to ambulate following a right femoral shaft fracture sustained in a fall secondary to confusion during an episode of access sepsis, and to superior vena cava (SVC) syndrome following SVC thrombosis after internal jugular catheter insertion. Over approximately 3 years, PD has been very successful in this patient, with 2 early routine episodes of peritonitis and 1 early episode of exit-site infection, control of hematologic and biochemical values, no hospitalizations in the 2.5 years before the time of writing, and good quality of life. A dedicated spouse performing the PD tasks has been a major factor in the success of PD in this patient. Peritoneal dialysis can be successful as a renal replacement procedure in incapacitated elderly patients with failure of HD blood access. In these cases, the success of PD is enhanced by dedicated family members taking on PD tasks that the patient cannot perform.

  2. Securing electronic health records with broadcast encryption schemes.

    PubMed

    Susilo, Willy; Win, Khin Than

    2006-01-01

    Information security is a concern in integrated electronic health record systems (EHRs). This paper discusses the development of a mathematical model to secure the access of EHRs. In this paper, we incorporate the notion of a broadcast encryption scheme for securing EHRs. We present a novel solution to allow a secure access to the EHRs whilst minimising the number of the encrypted ciphertexts. In a nutshell, our proposed solution enjoys shorter ciphertexts compared to having multiple ciphertexts encrypted for several different participants. Our proposed solution is applicable in practice to solve an existing open problem in the effort of securing EHRs.

  3. SkyDOT: a publicly accessible variability database, containing multiple sky surveys and real-time data

    SciTech Connect

    Starr, D. L.; Wozniak, P. R.; Vestrand, W. T.

    2002-01-01

    SkyDOT (Sky Database for Objects in Time-Domain) is a Virtual Observatory currently comprised of data from the RAPTOR, ROTSE I, and OGLE I1 survey projects. This makes it a very large time domain database. In addition, the RAPTOR project provides SkyDOT with real-time variability data as well as stereoscopic information. With its web interface, we believe SkyDOT will be a very useful tool for both astronomers, and the public. Our main task has been to construct an efficient relational database containing all existing data, while handling a real-time inflow of data. We also provide a useful web interface allowing easy access to both astronomers and the public. Initially, this server will allow common searches, specific queries, and access to light curves. In the future we will include machine learning classification tools and access to spectral information.

  4. Use of Multiple Parallel Interface Strategies To Create a Seamless Accessible Interface for Next-Generation Information Systems.

    ERIC Educational Resources Information Center

    Vanderheiden, Gregg C.

    Information systems in public places such as community centers and libraries require some means to provide access to individuals with physical, visual, and, if sound is involved, hearing impairments. This paper proposes a seamless adaptable human interface protocol that would allow users to incrementally modify the command and presentation aspects…

  5. Multiple Motives, Conflicting Conceptions: Parsing the Contexts of Differentiated Access to Scientific Information in the Federal Government

    ERIC Educational Resources Information Center

    Oltmann, Shannon M.

    2012-01-01

    Scientific information, used by the U.S. federal government to formulate public policy in many arenas, is frequently contested and sometimes altered, blocked from publication, deleted from reports, or restricted in some way. This dissertation examines how and why restricted access to science policy (RASP) occurs through a comparative case study.…

  6. Experimental Electrically Reconfigurable Time-Domain Spectral Amplitude Encoding/Decoding in an Optical Code Division Multiple Access System

    NASA Astrophysics Data System (ADS)

    Tainta, Santiago; Erro, María J.; Garde, María J.; Muriel, Miguel A.

    2013-11-01

    An electrically reconfigurable time-domain spectral amplitude encoding/decoding scheme is proposed herein. The setup is based on the concept of temporally pulse shaping dual to spatial arrangements. The transmitter is based on a short pulse source and uses two conjugate dispersive fiber gratings and an electro-optic intensity modulator placed in between. Proof of concept results are shown for an optical pulse train operating at 1.25 Gbps using codes from the Hadamard family with a length of eight chips. The system is electrically reconfigurable, compatible with fiber systems, and permits scalability in the size of the codes by modifying only the modulator velocity.

  7. Design and Evaluation of a Virtual Quadrant Receiver for 4-ary Pulse Position Modulation/Optical Code Division Multiple Access (4-ary PPM/O-CDMA)

    SciTech Connect

    Mendez, A J; Hernandez, V J; Gagliardi, R M; Bennett, C V

    2006-12-29

    M-ary pulse position modulation (M-ary PPM) is an alternative to on-off-keying (OOK) that transmits multiple bits as a single symbol occupying a frame of M slots. PPM does not require thresholding as in OOK signaling, instead performing a comparison test among all slots in a frame to make the slot decision. Combining PPM with optical code division multiple access (PPM/O-CDMA) adds the benefit of supporting multiple concurrent, asynchronous bursty PPM users. While the advantages of PPM/O-CDMA are well known, implementing a receiver that performs comparison test can be difficult. This paper describes the design of a novel array receiver for M-ary PPM/O-CDMA (M = 4) where the received signal is mapped onto an xy-plane whose quadrants define the PPM slot decision by means of an associated control law. The receiver does not require buffering or nonlinear operations. In this paper we describe a planar lightwave circuit (PLCs) implementation of the receiver. We give detailed numerical simulations that test the concept and investigate the effects of multi-access interference (MAI) and optical beat interference (OBI) on the slot decisions. These simulations provide guidelines for subsequent experimental measurements that will be described.

  8. An application of the edge effect in measuring accessibility to multiple food retailer types in Southwestern Ontario, Canada

    PubMed Central

    2011-01-01

    Background Trends in food retailing associated with the consolidation of smaller-format retailers into fewer, larger-format supercentres have left some rural areas with fewer sources of nutritious, affordable food. Access to nutritious, affordable food is essential for good dietary habits and combating health issues such as type-2 diabetes, obesity, and cardiovascular disease. Many studies on food environments use inaccurate or incomplete methods for locating food retailers, which may be responsible for mischaracterising food deserts. This study uses databases of every residence in and every food retailer in and around Middlesex County, Ontario, Canada. Residences were geocoded to their precise address, and network analysis techniques were performed in a geographic information system (GIS) to determine distances between every residence and different types of food retailers (grocery stores, fast food, fruit and vegetable sources, grocery stores plus fruit and vegetable sources, variety stores), both when considering and neglecting facilities outside the area of study, to account for a deficiency in analysis termed the 'edge effect'. Results Analysis of household accessibility to food outlets by neighbourhood socioeconomic distress level indicated that residents in the most distressed neighbourhoods tended to have better accessibility to all types of food retailers. In the most distressed neighbourhoods, 79 percent of residences were within walking distance of a grocery store, compared to only 10 percent in the least distressed neighbourhoods. When the edge effect was neglected, 37 percent of distance estimates proved inaccurate. Average accessibility to all food retailer types improved dramatically when food outlets adjacent to the study area were considered, thereby controlling for the edge effect. Conclusion By neglecting to consider food retailers just outside study area boundaries, previous studies may significantly over-report the actual distance necessary to

  9. Novel wavelength division multiplex-radio over fiber-passive optical network architecture for multiple access points based on multitone generation and triple sextupling frequency

    NASA Astrophysics Data System (ADS)

    Cheng, Guangming; Guo, Banghong; Liu, Songhao; Huang, Xuguang

    2014-01-01

    An innovative wavelength division multiplex-radio over fiber-passive optical network architecture for multiple access points (AP) based on multitone generation and triple sextupling frequency is proposed and demonstrated. A dual-drive Mach-Zehnder modulator (DD-MZM) is utilized to realize the multitone generation. Even sidebands are suppressed to make the adjacent frequency separation twice the frequency of the local oscillator by adjusting the modulation voltage of the DD-MZM. Due to adopting three fiber Bragg gratings to reflect the unmodulated sidebands for uplink communications source free at optical network unit (ONU), is achieved. The system can support at least three APs at one ONU simultaneously with a 30 km single-mode fiber (SMF) transmission and 5 Gb/s data rate both for uplink and downlink communications. The theoretical analysis and simulation results show the architecture has an excellent performance and will be a promising candidate in future hybrid access networks.

  10. Design and Performance of Overlap FFT Filter-Bank for Dynamic Spectrum Access Applications

    NASA Astrophysics Data System (ADS)

    Tanabe, Motohiro; Umehira, Masahiro

    An OFDMA-based (Orthogonal Frequency Division Multiple Access-based) channel access scheme for dynamic spectrum access has the drawbacks of large PAPR (Peak to Average Power Ratio) and large ACI (Adjacent Channel Interference). To solve these problems, a flexible channel access scheme using an overlap FFT filter-bank was proposed based on single carrier modulation for dynamic spectrum access. In order to apply the overlap FFT filter-bank for dynamic spectrum access, it is necessary to clarify the performance of the overlap FFT filter-bank according to the design parameters since its frequency characteristics are critical for dynamic spectrum access applications. This paper analyzes the overlap FFT filter-bank and evaluates its performance such as frequency characteristics and ACI performance according to the design parameters.

  11. Compact Spreader Schemes

    SciTech Connect

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  12. Compact spreader schemes

    NASA Astrophysics Data System (ADS)

    Placidi, M.; Jung, J.-Y.; Ratti, A.; Sun, C.

    2014-12-01

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  13. A Review on Successive Interference Cancellation Scheme Based on Optical CDMA Network

    NASA Astrophysics Data System (ADS)

    Alsowaidi, N.; Eltaif, T.; Mokhtar, M. R.

    2014-12-01

    Due to various desirable features of optical code division multiple access (OCDMA), it is believed this technique once developed and commercially available will be an integral part of optical access networks. Optical CDMA system suffers from a problem called multiple access interference (MAI) which limits the number of active users, it occurs when number of active users share the same carriers. The aim of this paper is to review successive interference cancellation (SIC) scheme based on optical CDMA system. The paper also reviews the system performance in presence of shot noise, thermal noise, and phase-induced intensity noise (PIIN). A comprehensive review on the mathematical model of SIC scheme using direct detection (DS) and spectral amplitude coding (SAC) were presented in this article.

  14. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    PubMed Central

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  15. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    PubMed

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  16. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    PubMed

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  17. Performance analyses and improvements for the IEEE 802.15.4 CSMA/CA scheme with heterogeneous buffered conditions.

    PubMed

    Zhu, Jianping; Tao, Zhengsu; Lv, Chunfeng

    2012-01-01

    Studies of the IEEE 802.15.4 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme have been received considerable attention recently, with most of these studies focusing on homogeneous or saturated traffic. Two novel transmission schemes-OSTS/BSTS (One Service a Time Scheme/Bulk Service a Time Scheme)-are proposed in this paper to improve the behaviors of time-critical buffered networks with heterogeneous unsaturated traffic. First, we propose a model which contains two modified semi-Markov chains and a macro-Markov chain combined with the theory of M/G/1/K queues to evaluate the characteristics of these two improved CSMA/CA schemes, in which traffic arrivals and accessing packets are bestowed with non-preemptive priority over each other, instead of prioritization. Then, throughput, packet delay and energy consumption of unsaturated, unacknowledged IEEE 802.15.4 beacon-enabled networks are predicted based on the overall point of view which takes the dependent interactions of different types of nodes into account. Moreover, performance comparisons of these two schemes with other non-priority schemes are also proposed. Analysis and simulation results show that delay and fairness of our schemes are superior to those of other schemes, while throughput and energy efficiency are superior to others in more heterogeneous situations. Comprehensive simulations demonstrate that the analysis results of these models match well with the simulation results.

  18. New LNG process scheme

    SciTech Connect

    Foglietta, J.H.

    1999-07-01

    A new LNG cycle has been developed for base load liquefaction facilities. This new design offers a different technical and economical solution comparing in efficiency with the classical technologies. The new LNG scheme could offer attractive business opportunities to oil and gas companies that are trying to find paths to monetize gas sources more effectively; particularly for remote or offshore locations where smaller scale LNG facilities might be applicable. This design offers also an alternative route to classic LNG projects, as well as alternative fuel sources. Conceived to offer simplicity and access to industry standard equipment, This design is a hybrid result of combining a standard refrigeration system and turboexpander technology.

  19. The use of multiple indices of physiological activity to access viability in chlorine disinfected Escherichia coli O157:H7

    NASA Technical Reports Server (NTRS)

    Lisle, J. T.; Pyle, B. H.; McFeters, G. A.

    1999-01-01

    A suite of fluorescent intracellular stains and probes was used, in conjunction with viable plate counts, to assess the effect of chlorine disinfection on membrane potential (rhodamine 123; Rh123 and bis-(1,3-dibutylbarbituric acid) trimethine oxonol; DiBAC4(3)), membrane integrity (LIVE/DEAD BacLight kit), respiratory activity (5-cyano-2,3-ditolyl tetrazolium chloride; CTC) and substrate responsiveness (direct viable counts; DVC) in the commensal pathogen Escherichia coli O157:H7. After a 5 min exposure to the disinfectant, physiological indices were affected in the following order: viable plate counts > substrate responsiveness > membrane potential > respiratory activity > membrane integrity. In situ assessment of physiological activity by examining multiple targets, as demonstrated in this study, permits a more comprehensive determination of the site and extent of injury in bacterial cells following sublethal disinfection with chlorine. This approach to assessing altered bacterial physiology has application in various fields where detection of stressed bacteria is of interest.

  20. A Wide Dynamics and Fast Scan Interrogating Method for a Fiber Bragg Grating Sensor Network Implemented Using Code Division Multiple Access

    PubMed Central

    Kim, Youngbok; Jeon, Sie-Wook; Kwon, Won-Bae; Park, Chang-Soo

    2012-01-01

    We propose and demonstrate a fiber Bragg grating (FBG) sensor network employing the code division multiple access (CDMA) technique to identify information from individual sensors. To detect information without considering time delays between sensors, a sliding correlation method is applied, in which two different signals with the same pseudo-random binary sequence (PRBS) pattern, but slightly different frequencies, are applied to the source and detector sides. Moreover, for time domain detection, a wavelength-to-time conversion technique using a wavelength dispersive medium is introduced. The experimental results show that the proposed sensor network has a wide strain dynamic range of 2,400 με and a low crosstalk of 950:1. PMID:22778619

  1. Four-Channel, 8 x 8 Bit, Two-Dimensional Parallel Transmission by use of Space-Code-Division Multiple-Access Encoder and Decoder Modules.

    PubMed

    Nakamura, M; Kitayama, K; Igasaki, Y; Kaneda, K

    1998-07-10

    We experimentally demonstrate four-channel multiplexing of 64-bit (8 x 8) two-dimensional (2-D) parallel data links on the basis of optical space-code-division multiple access (CDMA) by using new modules of optical spatial encoders and a decoder with a new high-contrast 9-m-long image fiber with 3 x 10(4) cores. Each 8 x 8 bit plane (64-bit parallel data) is optically encoded with an 8 x 8, 2-D optical orthogonal signature pattern. The encoded bit planes are spatially multiplexed and transmitted through an image fiber. A receiver can recover the intended input bit plane by means of an optical decoding process. This result should encourage the application of optical space-CDMA to future high-throughput 2-D parallel data links connecting massively parallel processors.

  2. A wide dynamics and fast scan interrogating method for a fiber Bragg grating sensor network implemented using code division multiple access.

    PubMed

    Kim, Youngbok; Jeon, Sie-Wook; Kwon, Won-Bae; Park, Chang-Soo

    2012-01-01

    We propose and demonstrate a fiber Bragg grating (FBG) sensor network employing the code division multiple access (CDMA) technique to identify information from individual sensors. To detect information without considering time delays between sensors, a sliding correlation method is applied, in which two different signals with the same pseudo-random binary sequence (PRBS) pattern, but slightly different frequencies, are applied to the source and detector sides. Moreover, for time domain detection, a wavelength-to-time conversion technique using a wavelength dispersive medium is introduced. The experimental results show that the proposed sensor network has a wide strain dynamic range of 2,400 με and a low crosstalk of 950:1.

  3. Optical multidimensional multiple access(O-MDMA): a new concept for free-space laser communication based on photonic mixer devices

    NASA Astrophysics Data System (ADS)

    Hess, Holger; Albrecht, Martin; Grothof, Markus; Hussmann, Stephan; Schwarte, Rudolf

    2004-01-01

    Working on optical distance measurement a new optical correlator was developed at the Institute for Data Processing of the University of Siegen in the last years. The so called Photonic Mixer Device (PMD), to be meant originally for laser ranging systems, offers a lot of advantages for wireless optical data communication like high speed spatial light demodulation up to the GHz range and inherent backlight suppression. This contribution describes the application of such PMDs in a free space interconnect based on the principle of Multi Dimensional Multiple Access (MDMA) and the advantages of this new approach, starting from the MDMA principle and followed by the fundamental functionality of PMDs. After that an Optical MDMA (O-MDMA) demonstrator and first measurement results will be presented.

  4. Efficiency droop effects of GaN-based light-emitting diodes on the performance of code division multiple access visible-light communication system

    NASA Astrophysics Data System (ADS)

    Lu, Huimin; Yan, Chaowen; Gao, Wei; Yu, Tongjun; Wang, Jianping

    2016-02-01

    The physical mechanism in efficiency droop of GaN-based light-emitting diodes (LEDs) was investigated using a modified rate equation model considering inhomogeneous carrier distribution and was compared with the measured result. On this basis, the efficiency droop effect on the performance of a code division multiple access (CDMA) visible-light communication (VLC) system using GaN-based LEDs was also analyzed. The results reveal that the obvious transmitted signal error under the effect of LED efficiency droop leads to performance deterioration of multiuser CDMA VLC systems. Also, the performance of CDMA VLC systems is reduced with the user number increase due to LED efficiency droop. The bit error rate of a CDMA VLC system was further calculated for different branch signal levels and bias currents. It is demonstrated that the efficiency droop effect on the performance of CDMA VLC systems can be alleviated by adjusting the branch signal level and the bias current.

  5. An orthogonal wavelet division multiple-access processor architecture for LTE-advanced wireless/radio-over-fiber systems over heterogeneous networks

    NASA Astrophysics Data System (ADS)

    Mahapatra, Chinmaya; Leung, Victor CM; Stouraitis, Thanos

    2014-12-01

    The increase in internet traffic, number of users, and availability of mobile devices poses a challenge to wireless technologies. In long-term evolution (LTE) advanced system, heterogeneous networks (HetNet) using centralized coordinated multipoint (CoMP) transmitting radio over optical fibers (LTE A-ROF) have provided a feasible way of satisfying user demands. In this paper, an orthogonal wavelet division multiple-access (OWDMA) processor architecture is proposed, which is shown to be better suited to LTE advanced systems as compared to orthogonal frequency division multiple access (OFDMA) as in LTE systems 3GPP rel.8 (3GPP, http://www.3gpp.org/DynaReport/36300.htm). ROF systems are a viable alternative to satisfy large data demands; hence, the performance in ROF systems is also evaluated. To validate the architecture, the circuit is designed and synthesized on a Xilinx vertex-6 field-programmable gate array (FPGA). The synthesis results show that the circuit performs with a clock period as short as 7.036 ns (i.e., a maximum clock frequency of 142.13 MHz) for transform size of 512. A pipelined version of the architecture reduces the power consumption by approximately 89%. We compare our architecture with similar available architectures for resource utilization and timing and provide performance comparison with OFDMA systems for various quality metrics of communication systems. The OWDMA architecture is found to perform better than OFDMA for bit error rate (BER) performance versus signal-to-noise ratio (SNR) in wireless channel as well as ROF media. It also gives higher throughput and mitigates the bad effect of peak-to-average-power ratio (PAPR).

  6. The new efficient multi-beamforming method based on multiple-access register block on a post-fractional filtering architecture

    NASA Astrophysics Data System (ADS)

    Kang, Jeeun; Kim, Giduck; Yoon, Changhan; Yoo, Yangmo; Song, Tai-Kyong

    2011-03-01

    In medical ultrasound imaging, a multi-beamforming (MBF) method is used for supporting high frame rate imaging or functional imaging where multiple scanlines are reconstructed from a single excitation event. For efficient MBF, a time-sharing technique (i.e., MBF-TS) can be applied. However, the MBF-TS could degrade image quality due to the decreased beamforming frequency. In this paper, the multi-access register-based MBF (MBF-MAR) method running on the post-fractional filtering (PFF) architecture is presented. In PFF-MBF-MAR, instead of lowering beamforming frequency, a multi-access register at each channel is utilized for generating multiple scanlines simultaneously. To evaluate the performance of the proposed PFF-MBF-MAR method, the phantom experiment was conducted where 64- channel pre-beamformed radio-frequency (RF) data were captured from a tissue mimicking phantom by using a modified commercial ultrasound system (SONOLINE G40, Siemens Inc., USA) using a 3-MHz phased array probe. From the phantom experiment, the PFF-MBF-MAR method showed 4.7 dB and 0.6 improvements in the signal-to-noise ratio (SNR) and the contrast-to-noise ratio (CNR), respectively, compared to the PFF-MBF-TS method, while slightly increasing the hardware complexity (<5.2%). The similar results were achieved with the in vivo thyroid data. These results indicate that the proposed PFF-MBF-MAR method can be used for high frame rate imaging or functional imaging without sacrificing image quality while slightly increasing the hardware complexity.

  7. A robust and novel dynamic-ID-based authentication scheme for care team collaboration with smart cards.

    PubMed

    Chang, Ya-Fen; Chen, Chia-Chen; Chang, Pei-Yu

    2013-04-01

    Nowadays, users/patients may gain desired medical services on-line because of the rapid development of computer network technologies. Conventional healthcare services are provided by a single server. However, care team collaboration by integrating services is the key to improve financial and clinical performance. How a user/patient accesses desired medical services provided by multiple servers becomes a challenge to realize care team collaboration. User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In this paper, we first discuss the perceived security drawbacks of pervasive smart-card-based remote user authentication schemes. Then, we propose a novel dynamic-ID-based user authentication scheme based on elliptic curve cryptosystem (ECC) for multi-server environment with smart cards. The proposed scheme ensures user anonymity and computational efficiency and complies with essential requirements of a secure smart-card-based authentication scheme for multi-server environment to enable care team collaboration.

  8. Lipid Nanoparticles with Accessible Nickel as a Vaccine Delivery System for Single and Multiple His-tagged HIV Antigens.

    PubMed

    Yan, Weili; Jain, Anekant; O'Carra, Ronan; Woodward, Jerold G; Li, Wenxue; Li, Guanhan; Nath, Avindra; Mumper, Russell J

    2009-07-01

    Lipid-based nanoparticles (NPs) with a small amount of surface-chelated nickel (Ni-NPs) were developed to easily formulate the HIV his-tagged Tat protein, as well as to formulate and co-deliver two HIV antigens (his-p24 and his-Nef) on one particle. Female BALB/c mice were immunized by s.c. injection with his-Tat/Ni-NP formulation (1.5 μg Tat-his/mouse) and control formulations on day 0 and 14. The day 28 anti-Tat specific IgG titer with his-Tat/Ni-NP was significantly greater than that with Alum/his-Tat. Furthermore, splenocytes from his-Tat/Ni-NP immunized mice secreted significantly higher IFN-γ than those from mice immunized with Alum/his-Tat. Although Ni-NPs did not show better adjuvant activity than Tat-coated anionic NPs made with sodium dodecyl sulfate (SDS/NPs), they were less toxic than SDS/NPs. The initial results indicated that co-immunization of mice using his-p24/his-Nef/Ni-NP induced greater antibody response compared to using Alum/his-p24/his-Nef. Co-delivery of two antigens using Ni-NPs also increased the immunogenicity of individual antigens compared to delivery of a single antigen by Ni-NPs. In conclusion, Ni-NPs are an efficient delivery system for HIV vaccines including both single antigen delivery and multiple antigen co-delivery. PMID:21966230

  9. Lipid nanoparticles with accessible nickel as a vaccine delivery system for single and multiple his-tagged HIV antigens

    PubMed Central

    Yan, Weili; Jain, Anekant; O’Carra, Ronan; Woodward, Jerold G; Li, Wenxue; Li, Guanhan; Nath, Avindra; Mumper, Russell J

    2009-01-01

    Lipid-based nanoparticles (NPs) with a small amount of surface-chelated nickel (Ni-NPs) were developed to easily formulate the human immunodeficiency virus (HIV) his-tagged Tat (his-Tat) protein, as well as to formulate and co-deliver two HIV antigens (his-p24 and his-Nef) on one particle. Female BALB/c mice were immunized by subcutaneous injection with his-Tat/Ni-NP formulation (1.5 μg his-Tat/mouse) and control formulations on day 0 and 14. The day 28 anti-Tat specific immunoglobulin G titer with his-Tat/Ni-NPs was significantly greater than that with Alum/his-Tat. Furthermore, splenocytes from his-Tat/Ni-NP-immunized mice secreted significantly higher IFN-γ than those from mice immunized with Alum/his-Tat. Although Ni-NPs did not show better adjuvant activity than Tat-coated anionic NPs made with sodium dodecyl sulfate (SDS/NPs), they were less toxic than SDS/NPs. The initial results indicated that co-immunization of mice using his-p24/his-Nef/Ni-NP induced greater antibody response compared to using Alum/his-p24/his-Nef. Co-delivery of two antigens using Ni-NPs also increased the immunogenicity of individual antigens compared to delivery of a single antigen by Ni-NPs. In conclusion, Ni-NPs are an efficient delivery system for HIV vaccines including both single antigen delivery and multiple antigen co-delivery. PMID:21966230

  10. On the Performance of Multiple Pulse Multiple Delay UWB Modulation

    SciTech Connect

    Nekoogar, F; Dowla, F U

    2003-05-23

    Multiple access (MA) in UWB communication is an area of active research. In this paper we introduce and study the performance of a new MA scheme in the context of multiple transmitted-reference short duration (nsec) chirp pulses in the presence of additive white Gaussian noise (AWGN). The transmitted-reference (T-R) receiver is extended using multiple orthogonal pulses. The proposed UWB receiver samples the receiver autocorrelation function (ACF) at both zero- and non-zero lags, thus sampling and matching the shape of ACFs rather than just the shape of the received pulses. Sampling of non-zero ACF lags is a significant new approach. The scheme proposed in this paper is a step towards combining the multi-pulse approach and T-R modulation in a multiple access ultra wideband (MA-UWB) communications system. Improved bit error rate performance over a conventional zero-lag receiver (i.e. energy detection receiver) is demonstrated by simulation. Analytical expressions for the system BER are also derived and confirmed through simulations for the system.

  11. Matroids and quantum-secret-sharing schemes

    SciTech Connect

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-05-15

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  12. Development of a Multiple-Locus Variable-Number Tandem-Repeat Typing Scheme for Genetic Fingerprinting of Burkholderia cenocepacia and Application to Nationwide Epidemiological Analysis

    PubMed Central

    Thouverez, Michelle; Barthe, Antoine; Bossuet-Greif, Nadège; Tisseyre, Lenka; Plésiat, Patrick; Vergnaud, Gilles; Chabanon, Gérard; Pourcel, Christine

    2014-01-01

    Organisms of the Burkholderia cepacia complex are especially important pathogens in cystic fibrosis (CF), with a propensity for patient-to-patient spread and long-term respiratory colonization. B. cenocepacia and Burkholderia multivorans account for the majority of infections in CF, and major epidemic clones have been recognized throughout the world. The aim of the present study was to develop and evaluate a multilocus variable-number tandem-repeat (VNTR) analysis (MLVA) scheme for B. cenocepacia. Potential VNTR loci were identified upon analysis of the annotated genome sequences of B. cenocepacia strains AU1054, J2315, and MCO-3, and 10 of them were selected on the basis of polymorphisms and size. A collection of 100 B. cenocepacia strains, including epidemiologically related and unrelated strains, as well as representatives of the major epidemic lineages, was used to evaluate typeability, epidemiological concordance, and the discriminatory power of MLVA-10 compared with those of pulsed-field gel electrophoresis (PFGE) and multilocus sequence typing (MLST). Longitudinal stability was assessed by testing 39 successive isolates from 14 patients. Typeability ranged from 0.91 to 1, except for that of one marker, which was not amplified in 53% of the B. cenocepacia IIIA strains. The MLVA types were shown to be stable in chronically colonized patients and within outbreak-related strains, with excellent epidemiological concordance. Epidemic and/or globally distributed lineages (epidemic Edinburgh-Toronto electrophoretic type 12 [ET-12], sequence type 32 [ST-32], ST-122, ST-234, and ST-241) were successfully identified. Conversely, the discriminatory power of MLVA was lower than that of PFGE or MLST, although PFGE variations within the epidemic lineages sometimes masked their genetic relatedness. In conclusion, MLVA represents a promising cost-effective first-line tool in B. cenocepacia surveillance. PMID:25411181

  13. Development of a multiple-locus variable-number tandem-repeat typing scheme for genetic fingerprinting of Burkholderia cenocepacia and application to nationwide epidemiological analysis.

    PubMed

    Segonds, Christine; Thouverez, Michelle; Barthe, Antoine; Bossuet-Greif, Nadège; Tisseyre, Lenka; Plésiat, Patrick; Vergnaud, Gilles; Chabanon, Gérard; Pourcel, Christine

    2015-02-01

    Organisms of the Burkholderia cepacia complex are especially important pathogens in cystic fibrosis (CF), with a propensity for patient-to-patient spread and long-term respiratory colonization. B. cenocepacia and Burkholderia multivorans account for the majority of infections in CF, and major epidemic clones have been recognized throughout the world. The aim of the present study was to develop and evaluate a multilocus variable-number tandem-repeat (VNTR) analysis (MLVA) scheme for B. cenocepacia. Potential VNTR loci were identified upon analysis of the annotated genome sequences of B. cenocepacia strains AU1054, J2315, and MCO-3, and 10 of them were selected on the basis of polymorphisms and size. A collection of 100 B. cenocepacia strains, including epidemiologically related and unrelated strains, as well as representatives of the major epidemic lineages, was used to evaluate typeability, epidemiological concordance, and the discriminatory power of MLVA-10 compared with those of pulsed-field gel electrophoresis (PFGE) and multilocus sequence typing (MLST). Longitudinal stability was assessed by testing 39 successive isolates from 14 patients. Typeability ranged from 0.91 to 1, except for that of one marker, which was not amplified in 53% of the B. cenocepacia IIIA strains. The MLVA types were shown to be stable in chronically colonized patients and within outbreak-related strains, with excellent epidemiological concordance. Epidemic and/or globally distributed lineages (epidemic Edinburgh-Toronto electrophoretic type 12 [ET-12], sequence type 32 [ST-32], ST-122, ST-234, and ST-241) were successfully identified. Conversely, the discriminatory power of MLVA was lower than that of PFGE or MLST, although PFGE variations within the epidemic lineages sometimes masked their genetic relatedness. In conclusion, MLVA represents a promising cost-effective first-line tool in B. cenocepacia surveillance.

  14. A Microstrip Patch-Fed Short Backfire Antenna for the Tracking and Data Relay Satellite System-Continuation (TDRSS-C) Multiple Access (MA) Array

    NASA Technical Reports Server (NTRS)

    Nessel, James A.; Kory, Carol L.; Lambert, Kevin M.; Acosta, Roberto J.

    2006-01-01

    Short Backfire Antennas (SBAs) are widely utilized for mobile satellite communications, tracking, telemetry, and wireless local area network (WLAN) applications due to their compact structure and excellent radiation characteristics [1-3]. Typically, these SBA s consist of an excitation element (i.e., a half-wavelength dipole), a reflective bottom plane, a planar sub-reflector located above the "exciter", and an outer circular rim. This configuration is capable of achieving gains on the order of 13-15 dBi, but with relatively narrow bandwidths (approx.3%-5%), making it incompatible with the requirements of the next generation enhanced Tracking and Data Relay Satellite System-Continuation (TDRSS-C) Multiple Access (MA) array [1]. Several attempts have been made to enhance the bandwidth performance of the common dipole-fed SBA by employing various other feeding mechanisms (e.g., waveguide, slot) with moderate success [4-5]. In this paper, a novel method of using a microstrip patch is employed for the first time to excite an SBA. The patch element is fed via two H-shaped slots electromagnetically coupled to a broadband hybrid coupler to maintain a wide bandwidth, as well as provide for dual circular polarization capabilities.

  15. Representing Multiplication

    ERIC Educational Resources Information Center

    Harries, Tony; Barmby, Patrick

    2008-01-01

    In this study, the authors wish to explore the use of visual representations in facilitating the understanding of multiplication. In doing so, they examine the different aspects of multiplication that they can access through different representations. In addition, they draw on a study that they have been carrying out looking at pupils' actual use…

  16. A Query Result Merging Scheme for Providing Energy Efficiency in Underwater Sensor Networks

    PubMed Central

    Kim, Yunsung; Park, Soo-Hyun

    2011-01-01

    Underwater sensor networks are emerging as a promising distributed data management system for various applications in underwater environments, despite their limited accessibility and restricted energy capacity. With the aid of recent developments in ubiquitous data computing, an increasing number of users are expected to overcome low accessibility by applying queries to underwater sensor networks. However, when multiple users send queries to an underwater sensor network in a disorganized manner, it may incur lethal energy waste and problematic network traffic. The current query management mechanisms cannot effectively deal with this matter due to their limited applicability and unrealistic assumptions. In this paper, a novel query management scheme involving query result merging is proposed for underwater sensor networks. The mechanism is based on a relational database model and is adjusted to the practical restrictions affecting underwater communication environments. Network simulations will prove that the scheme becomes more efficient with a greater number of queries and a smaller period range. PMID:22247695

  17. A query result merging scheme for providing energy efficiency in underwater sensor networks.

    PubMed

    Kim, Yunsung; Park, Soo-Hyun

    2011-01-01

    Underwater sensor networks are emerging as a promising distributed data management system for various applications in underwater environments, despite their limited accessibility and restricted energy capacity. With the aid of recent developments in ubiquitous data computing, an increasing number of users are expected to overcome low accessibility by applying queries to underwater sensor networks. However, when multiple users send queries to an underwater sensor network in a disorganized manner, it may incur lethal energy waste and problematic network traffic. The current query management mechanisms cannot effectively deal with this matter due to their limited applicability and unrealistic assumptions. In this paper, a novel query management scheme involving query result merging is proposed for underwater sensor networks. The mechanism is based on a relational database model and is adjusted to the practical restrictions affecting underwater communication environments. Network simulations will prove that the scheme becomes more efficient with a greater number of queries and a smaller period range.

  18. Non-orthogonal optical multicarrier access based on filter bank and SCMA.

    PubMed

    Liu, Bo; Zhang, Lijia; Xin, Xiangjun

    2015-10-19

    This paper proposes a novel non-orthogonal optical multicarrier access system based on filter bank and sparse code multiple access (SCMA). It offers released frequency offset and better spectral efficiency for multicarrier access. An experiment of 73.68 Gb/s filter bank-based multicarrier (FBMC) SCMA system with 60 km single mode fiber link is performed to demonstrate the feasibility. The comparison between fast Fourier transform (FFT) based multicarrier and the proposed scheme is also investigated in the experiment. PMID:26480395

  19. Subranging scheme for SQUID sensors

    NASA Technical Reports Server (NTRS)

    Penanen, Konstantin I. (Inventor)

    2008-01-01

    A readout scheme for measuring the output from a SQUID-based sensor-array using an improved subranging architecture that includes multiple resolution channels (such as a coarse resolution channel and a fine resolution channel). The scheme employs a flux sensing circuit with a sensing coil connected in series to multiple input coils, each input coil being coupled to a corresponding SQUID detection circuit having a high-resolution SQUID device with independent linearizing feedback. A two-resolution configuration (course and fine) is illustrated with a primary SQUID detection circuit for generating a fine readout, and a secondary SQUID detection circuit for generating a course readout, both having feedback current coupled to the respective SQUID devices via feedback/modulation coils. The primary and secondary SQUID detection circuits function and derive independent feedback. Thus, the SQUID devices may be monitored independently of each other (and read simultaneously) to dramatically increase slew rates and dynamic range.

  20. Asynchronous Communication Scheme For Hypercube Computer

    NASA Technical Reports Server (NTRS)

    Madan, Herb S.

    1988-01-01

    Scheme devised for asynchronous-message communication system for Mark III hypercube concurrent-processor network. Network consists of up to 1,024 processing elements connected electrically as though were at corners of 10-dimensional cube. Each node contains two Motorola 68020 processors along with Motorola 68881 floating-point processor utilizing up to 4 megabytes of shared dynamic random-access memory. Scheme intended to support applications requiring passage of both polled or solicited and unsolicited messages.

  1. A Randomised, Double-Blinded, Placebo-Controlled, Parallel Study of Vitamin D3 Supplementation with Different Schemes Based on Multiples of 25,000 IU Doses.

    PubMed

    Cavalier, Etienne; Faché, Werner; Souberbielle, Jean-Claude

    2013-01-01

    Vitamin D (VTD) treatment is recommended in patients presenting different causes of diseases. To treat these patients, physicians rely on the different available pharmaceutical forms present in their country. Unfortunately, even in a given country, there is no consensus on the best way to treat the patients. In Belgium, VTD is mostly prescribed as ampoules containing 25,000 IU of VTD. In this randomised controlled study, we evaluated whether four therapeutic schemes using multiples of 25,000 IU of VTD according to basal vitamin D concentration were able to increase or maintain the 25(OH)D serum level above 30 ng/mL. We randomized 175 subjects who received the drug (n = 140) or placebo (n = 35). Total duration of the study was 12 weeks. Doses ranged from 4167 to 1667 IU/day. Blood sampling was performed at baseline and each 4 visits. In the treated (placebo) subjects, mean 25(OH)D serum concentration was 18.7 (19.1) ng/mL at baseline and 31.5 (20.7) ng/mL at w-12. At the end of the study, 57.1% of the subjects treated with VTD presented 25(OH)D serum concentration ≥30 ng/mL, whereas 94.3% were ≥20 ng/mL. In conclusion, the doses administered were safe and increased or maintained the 25(OH)D concentration ≥20 ng/mL. However, concentrations ≥30 ng/mL were only achieved in 57.1% of the subjects.

  2. A Randomised, Double-Blinded, Placebo-Controlled, Parallel Study of Vitamin D3 Supplementation with Different Schemes Based on Multiples of 25,000 IU Doses

    PubMed Central

    Cavalier, Etienne; Faché, Werner; Souberbielle, Jean-Claude

    2013-01-01

    Vitamin D (VTD) treatment is recommended in patients presenting different causes of diseases. To treat these patients, physicians rely on the different available pharmaceutical forms present in their country. Unfortunately, even in a given country, there is no consensus on the best way to treat the patients. In Belgium, VTD is mostly prescribed as ampoules containing 25,000 IU of VTD. In this randomised controlled study, we evaluated whether four therapeutic schemes using multiples of 25,000 IU of VTD according to basal vitamin D concentration were able to increase or maintain the 25(OH)D serum level above 30 ng/mL. We randomized 175 subjects who received the drug (n = 140) or placebo (n = 35). Total duration of the study was 12 weeks. Doses ranged from 4167 to 1667 IU/day. Blood sampling was performed at baseline and each 4 visits. In the treated (placebo) subjects, mean 25(OH)D serum concentration was 18.7 (19.1) ng/mL at baseline and 31.5 (20.7) ng/mL at w-12. At the end of the study, 57.1% of the subjects treated with VTD presented 25(OH)D serum concentration ≥30 ng/mL, whereas 94.3% were ≥20 ng/mL. In conclusion, the doses administered were safe and increased or maintained the 25(OH)D concentration ≥20 ng/mL. However, concentrations ≥30 ng/mL were only achieved in 57.1% of the subjects. PMID:23431293

  3. Cross-ontological analytics for alignment of different classification schemes

    DOEpatents

    Posse, Christian; Sanfilippo, Antonio P; Gopalan, Banu; Riensche, Roderick M; Baddeley, Robert L

    2010-09-28

    Quantification of the similarity between nodes in multiple electronic classification schemes is provided by automatically identifying relationships and similarities between nodes within and across the electronic classification schemes. Quantifying the similarity between a first node in a first electronic classification scheme and a second node in a second electronic classification scheme involves finding a third node in the first electronic classification scheme, wherein a first product value of an inter-scheme similarity value between the second and third nodes and an intra-scheme similarity value between the first and third nodes is a maximum. A fourth node in the second electronic classification scheme can be found, wherein a second product value of an inter-scheme similarity value between the first and fourth nodes and an intra-scheme similarity value between the second and fourth nodes is a maximum. The maximum between the first and second product values represents a measure of similarity between the first and second nodes.

  4. Channel Access in Erlang

    SciTech Connect

    Nicklaus, Dennis J.

    2013-10-13

    We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PV monitors.

  5. Improving the secrecy rate by turning foes to allies: An auction scheme

    NASA Astrophysics Data System (ADS)

    Ma, Ya-Yan; Wang, Bao-Yun

    2015-09-01

    Security against eavesdroppers is a critical issue in cognitive radio networks (CRNs). In this paper, a scenario consisting of one primary pair and multiple secondary pairs is considered. The secondary transmitters (STs) work in half-duplex mode and they are potential eavesdroppers on the primary transmission unless they are allowed to simultaneously transmit with the primary transmitter (PT). A modified second-price sealed-bid auction scheme is employed to model the interaction between the PT and STs. With the proposed auction scheme, the hostile relationship between the PT and STs is transformed into a cooperative relationship. An iterative algorithm based on the max-min criteria is proposed to find the optimal bidding power of the STs for an access chance in the presence of multiple eavesdroppers. Numerical results show that the proposed auction scheme not only improves the PT’s security but also increases the access opportunities of the STs. Project supported by the National Natural Science Foundation of China (Grant Nos. 61271232 and 61372126) and the University Postgraduate Research and Innovation Project in Jiangsu Province, China (Grant No. CXZZ12-0472).

  6. Accessibility Videos.

    PubMed

    Kurppa, Ari; Nordlund, Marika

    2016-01-01

    It can be difficult to understand accessibility, if you do not have the personal experience. The Accessibility Centre ESKE produced short videos which demonstrate the meaning of accessibility in different situations. Videos will raise accessibility awareness of architects, other planners and professionals in the construction field and maintenance. PMID:27534282

  7. Multiple bit differential detection of offset QPSK

    NASA Technical Reports Server (NTRS)

    Simon, M.

    2003-01-01

    Analogous to multiple symbol differential detection of quadrature phase-shift-keying, a multiple bit differential detection scheme is described for offset QPSK that also exhibits continuous improvement in performance with increasing observation interval. Being derived from maximum-likelihood (ML) considerations, the proposed scheme is purported to be the most power efficient scheme for such a modulation and detection method.

  8. A CDMA synchronisation scheme

    NASA Technical Reports Server (NTRS)

    Soprano, C.

    1993-01-01

    CDMA (Code Division Multiple Access) is known to decrease inter-service interference in Satellite Communication Systems. Its performance is increased by chip quasi-synchronous operation which virtually eliminates the self-noise; however, the theory shows that the time error on the synchronization has to be kept at less than one tenth of a chip which, for 1 Mchip/sec. spreading rate, corresponds to 10(exp -7) sec. This, on the return-link, may only be achieved by means of a closed loop control system which, for mobile communication systems, has to be capable of autonomous operation. Until now some results have been reported on the feasibility of chip quasi-synchronous operation for mobile communication systems only including satellites on GEO (Geostationary Earth Orbit). In what follows, the basic principles are exposed, and results are presented showing how low chip synchronism error may be achieved by means of an autonomous control loop operating through satellites on any Earth orbit.

  9. Power consumption analysis of priority-based service differentiation scheme for LR-WPANs

    NASA Astrophysics Data System (ADS)

    Kim, Meejoung; Hwang, Eenjun

    2016-06-01

    In this paper, we investigate the effect of service differentiation on the power consumption in contention period of IEEE 802.15.4 sensor networks. Power consumption is analysed for two different service differentiation schemes under non-saturation condition. The two service differentiation schemes are the differentiation by the backoff exponent (BED) and differentiation by the contention window (CWD), which provide multilevel differentiated services in beacon-enabled mode with slotted carrier sense multiple access/collision avoidance (CSMA/CA) algorithm. The analysis is based on the stationary probabilities of a discrete-time Markov chain, which is a model of CSMA/CA describing the state of a head packet of a device. Numerical results show that CWD uses the power more efficiently and performs better in terms of throughput, while BED more differentiates the service.

  10. Plotting and Scheming

    NASA Technical Reports Server (NTRS)

    2004-01-01

    [figure removed for brevity, see original site] Figure 1 [figure removed for brevity, see original site] Figure 2 Click for larger view

    These two graphics are planning tools used by Mars Exploration Rover engineers to plot and scheme the perfect location to place the rock abrasion tool on the rock collection dubbed 'El Capitan' near Opportunity's landing site. 'El Capitan' is located within a larger outcrop nicknamed 'Opportunity Ledge.'

    The rover visualization team from NASA Ames Research Center, Moffett Field, Calif., initiated the graphics by putting two panoramic camera images of the 'El Capitan' area into their three-dimensional model. The rock abrasion tool team from Honeybee Robotics then used the visualization tool to help target and orient their instrument on the safest and most scientifically interesting locations. The blue circle represents one of two current targets of interest, chosen because of its size, lack of dust, and most of all its distinct and intriguing geologic features. To see the second target location, see the image titled 'Plotting and Scheming.'

    The rock abrasion tool is sensitive to the shape and texture of a rock, and must safely sit within the 'footprint' indicated by the blue circles. The rock area must be large enough to fit the contact sensor and grounding mechanism within the area of the outer blue circle, and the rock must be smooth enough to get an even grind within the abrasion area of the inner blue circle. If the rock abrasion tool were not grounded by its support mechanism or if the surface were uneven, it could 'run away' from its target. The rock abrasion tool is location on the rover's instrument deployment device, or arm.

    Over the next few martian days, or sols, the rover team will use these and newer, similar graphics created with more recent, higher-resolution panoramic camera images and super-spectral data from the miniature thermal emission spectrometer. These data will be used to pick the best

  11. Living in a 'fat swamp': exposure to multiple sources of accessible, cheap, energy-dense fast foods in a deprived community.

    PubMed

    Saunders, Patrick; Saunders, Annie; Middleton, John

    2015-06-14

    This study assesses the levels of fats, including trans-fatty acids, and salt in common takeaway fast foods in a deprived urban municipality in the West Midlands, England, and implications in the context of the spatial distribution of fast food takeaways. The results of the compositional analysis of over 250 take-out foods were compared with established and derived standards. About 70% of products exceeded the recommendation that a meal should contain less than 30% of a Guideline Daily Amount (GDA). More than half of them exceeded 50% GDA for at least one metric, including 81% of all analyses for SFA. And 17% of samples exceeded the GDA for SFA, including each of two meals that contained about twice the GDA. Over 30% samples exceeded the children's GDA for total fat or SFA. 27% of salt analyses exceeded the GDA. People in Sandwell are exposed to large portion sizes and high levels of fats and salt in takeaway foods, with levels in some foods having increased since 2010. Given this population's limited options to break out of a highly compromising environment of living simultaneously in a 'swamp' of unhealthy, readily accessible and cheap takeaways, and a 'desert' of healthy options, an immediate and innovative package of interventions is required.

  12. Tabled Execution in Scheme

    SciTech Connect

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  13. The NEC Link Scheme

    ERIC Educational Resources Information Center

    Noakes, Peter

    1976-01-01

    Describes the operation of the National Electronics Council (NEC) Link Scheme for schools in Great Britain. The service is intended to provide technical assistance, information concerning surplus equipment, and guest speakers for school aspiring professional electronic counsel. (CP)

  14. Cryptographic Enforcement of Role-Based Access Control

    NASA Astrophysics Data System (ADS)

    Crampton, Jason

    Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, using role-based access control policies rather than information flow policies. In this paper, we provide an alternative formulation of role-based access control that enables us to apply existing cryptographic schemes to core and hierarchical role-based access control policies. We then show that special cases of our cryptographic enforcement schemes for role-based access control are equivalent to cryptographic enforcement schemes for temporal access control and to ciphertext-policy and key-policy attribute-based encryption schemes. Finally, we describe how these special cases can be extended to support richer forms of temporal access control and attribute-based encryption.

  15. A secure biometrics-based authentication scheme for telecare medicine information systems.

    PubMed

    Yan, Xiaopeng; Li, Weiheng; Li, Ping; Wang, Jiantao; Hao, Xinhong; Gong, Peng

    2013-10-01

    The telecare medicine information system (TMIS) allows patients and doctors to access medical services or medical information at remote sites. Therefore, it could bring us very big convenient. To safeguard patients' privacy, authentication schemes for the TMIS attracted wide attention. Recently, Tan proposed an efficient biometrics-based authentication scheme for the TMIS and claimed their scheme could withstand various attacks. However, in this paper, we point out that Tan's scheme is vulnerable to the Denial-of-Service attack. To enhance security, we also propose an improved scheme based on Tan's work. Security and performance analysis shows our scheme not only could overcome weakness in Tan's scheme but also has better performance.

  16. Access to Medications for Cardiovascular Diseases in Low- and Middle-Income Countries.

    PubMed

    Wirtz, Veronika J; Kaplan, Warren A; Kwan, Gene F; Laing, Richard O

    2016-05-24

    Cardiovascular diseases (CVD) represent the highest burden of disease globally. Medicines are a critical intervention used to prevent and treat CVD. This review describes access to medication for CVD from a health system perspective and strategies that have been used to promote access, including providing medicines at lower cost, improving medication supply, ensuring medicine quality, promoting appropriate use, and managing intellectual property issues. Using key evidence in published and gray literature and systematic reviews, we summarize advances in access to cardiovascular medicines using the 5 health system dimensions of access: availability, affordability, accessibility, acceptability, and quality of medicines. There are multiple barriers to access of CVD medicines, particularly in low- and middle-income countries. Low availability of CVD medicines has been reported in public and private healthcare facilities. When patients lack insurance and pay out of pocket to purchase medicines, medicines can be unaffordable. Accessibility and acceptability are low for medicines used in secondary prevention; increasing use is positively related to country income. Fixed-dose combinations have shown a positive effect on adherence and intermediate outcome measures such as blood pressure and cholesterol. We have a new opportunity to improve access to CVD medicines by using strategies such as efficient procurement of low-cost, quality-assured generic medicines, development of fixed-dose combination medicines, and promotion of adherence through insurance schemes that waive copayment for long-term medications. Monitoring progress at all levels, institutional, regional, national, and international, is vital to identifying gaps in access and implementing adequate policies.

  17. Web Accessibility and Accessibility Instruction

    ERIC Educational Resources Information Center

    Green, Ravonne A.; Huprich, Julia

    2009-01-01

    Section 508 of the Americans with Disabilities Act (ADA) mandates that programs and services be accessible to people with disabilities. While schools of library and information science (SLIS*) and university libraries should model accessible Web sites, this may not be the case. This article examines previous studies about the Web accessibility of…

  18. Unique Access to Learning

    ERIC Educational Resources Information Center

    Goble, Don

    2009-01-01

    This article describes the many learning opportunities that broadcast technology students at Ladue Horton Watkins High School in St. Louis, Missouri, experience because of their unique access to technology and methods of learning. Through scaffolding, stepladder techniques, and trial by fire, students learn to produce multiple television programs,…

  19. A robust and novel dynamic-ID-based authentication scheme for care team collaboration with smart cards.

    PubMed

    Chang, Ya-Fen; Chen, Chia-Chen; Chang, Pei-Yu

    2013-04-01

    Nowadays, users/patients may gain desired medical services on-line because of the rapid development of computer network technologies. Conventional healthcare services are provided by a single server. However, care team collaboration by integrating services is the key to improve financial and clinical performance. How a user/patient accesses desired medical services provided by multiple servers becomes a challenge to realize care team collaboration. User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In this paper, we first discuss the perceived security drawbacks of pervasive smart-card-based remote user authentication schemes. Then, we propose a novel dynamic-ID-based user authentication scheme based on elliptic curve cryptosystem (ECC) for multi-server environment with smart cards. The proposed scheme ensures user anonymity and computational efficiency and complies with essential requirements of a secure smart-card-based authentication scheme for multi-server environment to enable care team collaboration. PMID:23355184

  20. Access to health care

    PubMed Central

    Fortin, Martin; Maltais, Danielle; Hudon, Catherine; Lapointe, Lise; Ntetu, Antoine Lutumba

    2005-01-01

    OBJECTIVE To explore access to health care for patients presenting with multiple chronic conditions and to identify barriers and factors conducive to access. DESIGN Qualitative study with focus groups. SETTING Family practice unit in Chicoutimi (Saguenay), Que. PARTICIPANTS Twenty-five male and female adult patients with at least four chronic conditions but no cognitive disorders or decompensating conditions. METHODS For this pilot study, only three focus group discussions were held. MAIN FINDINGS The main barriers to accessing follow-up appointments included long waits on the telephone, automated telephone-answering systems, and needing to attend at specific times to obtain appointments. The main barriers to specialized care were long waiting times and the need to get prescriptions and referrals from family physicians. Factors reported conducive to access included systematic callbacks and the personal involvement of family physicians. Good communication between family physicians and specialists was also perceived to be an important factor in access. CONCLUSION Systematic callbacks, family physicians’ personal efforts to obtain follow-up visits, and better physician-specialist communication were all suggested as ways to improve access to care for patients with multiple chronic conditions. PMID:16926944

  1. Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks.

    PubMed

    Du, Qinghe; Zhao, Weidong; Li, Weimin; Zhang, Xuelin; Sun, Bo; Song, Houbing; Ren, Pinyi; Sun, Li; Wang, Yichen

    2016-07-01

    The prosperity of e-health is boosted by fast development of medical devices with wireless communications capability such as wearable devices, tiny sensors, monitoring equipments, etc., which are randomly distributed in clinic environments. The drastically-increasing population of such devices imposes new challenges on the limited wireless resources. To relieve this problem, key knowledge needs to be extracted from massive connection attempts dispersed in the air towards efficient access control. In this paper, a hybrid periodic-random massive access (HPRMA) scheme for wireless clinical networks employing ultra-narrow band (UNB) techniques is proposed. In particular, the proposed scheme towards accommodating a large population of devices include the following new features. On one hand, it can dynamically adjust the resource allocated for coexisting periodic and random services based on the traffic load learned from signal collision status. On the other hand, the resource allocation within periodic services is thoroughly designed to simultaneously align with the timing requests of differentiated services. Abundant simulation results are also presented to demonstrate the superiority of the proposed HPRMA scheme over baseline schemes including time-division multiple access (TDMA) and random access approach, in terms of channel utilization efficiency, packet drop ratio, etc., for the support of massive devices' services.

  2. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  3. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card. PMID:23321972

  4. A Novel Scheme of Fast-frequency Hopping Optical CDMA System with No-hit-zone Sequence

    NASA Astrophysics Data System (ADS)

    Ji, Jianhua; liu, Ling; Wang, Ke; Zhang, Zhipeng; Xu, Ming

    2013-09-01

    In traditional fast frequency-hopping OCDMA (FFH-OCDMA) system, beat noise and multiple-access interference are the main performance limitations, and complicated power control must be employed to eliminate the near-far effect. In this paper, a novel scheme of FFH-OCDMA with no-hit-zone sequence is proposed, which is named NHZ FFH-OCDMA. In NHZ FFH-OCDMA, the synchronization among users can be controlled within permissible time delay, and the code cross-correlation for different users equals zero. Therefore, near-far effect can be eliminated. Furthermore, beat noise and multiple-access interference also can be removed. Simulation of eight simultaneous users with dada rate 100 Mbit/s is demonstrated, where the fiber link consists of 50 km single-mode fiber, plus 5 km dispersion compensating fiber. Simulation results show that the near-far problem of NHZ FFH-OCDMA can be eliminated, and complicated power control can be removed. Therefore, this scheme is a good candidate for optical access network.

  5. Verifier-based three-party authentication schemes using extended chaotic maps for data exchange in telecare medicine information systems.

    PubMed

    Lee, Tian-Fu

    2014-12-01

    Telecare medicine information systems provide a communicating platform for accessing remote medical resources through public networks, and help health care workers and medical personnel to rapidly making correct clinical decisions and treatments. An authentication scheme for data exchange in telecare medicine information systems enables legal users in hospitals and medical institutes to establish a secure channel and exchange electronic medical records or electronic health records securely and efficiently. This investigation develops an efficient and secure verified-based three-party authentication scheme by using extended chaotic maps for data exchange in telecare medicine information systems. The proposed scheme does not require server's public keys and avoids time-consuming modular exponential computations and scalar multiplications on elliptic curve used in previous related approaches. Additionally, the proposed scheme is proven secure in the random oracle model, and realizes the lower bounds of messages and rounds in communications. Compared to related verified-based approaches, the proposed scheme not only possesses higher security, but also has lower computational cost and fewer transmissions.

  6. A New Era of Open Access?

    ERIC Educational Resources Information Center

    Mercieca, Paul; Macauley, Peter

    2008-01-01

    There has been a push for open access journals for more than a decade in a higher education and research environment in which the "publish or perish" syndrome is as dominant as ever. This article examines the success, or otherwise, of open access schemes in light of the Excellence in Research for Australia (ERA) initiative. It compares the…

  7. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  8. Open Access

    ERIC Educational Resources Information Center

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…

  9. Check-Digit Schemes.

    ERIC Educational Resources Information Center

    Wheeler, Mary L.

    1994-01-01

    Discusses the study of identification codes and check-digit schemes as a way to show students a practical application of mathematics and introduce them to coding theory. Examples include postal service money orders, parcel tracking numbers, ISBN codes, bank identification numbers, and UPC codes. (MKR)

  10. Implicit schemes and parallel computing in unstructured grid CFD

    NASA Technical Reports Server (NTRS)

    Venkatakrishnam, V.

    1995-01-01

    The development of implicit schemes for obtaining steady state solutions to the Euler and Navier-Stokes equations on unstructured grids is outlined. Applications are presented that compare the convergence characteristics of various implicit methods. Next, the development of explicit and implicit schemes to compute unsteady flows on unstructured grids is discussed. Next, the issues involved in parallelizing finite volume schemes on unstructured meshes in an MIMD (multiple instruction/multiple data stream) fashion are outlined. Techniques for partitioning unstructured grids among processors and for extracting parallelism in explicit and implicit solvers are discussed. Finally, some dynamic load balancing ideas, which are useful in adaptive transient computations, are presented.

  11. Gaining Access.

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2000-01-01

    Discusses issues schools and universities have encountered in complying with the Americans with Disabilities Act (ADA) and making their facilities more accessible to the disabled. The ADA's vagueness and the architect's need for understanding the regulations is highlighted. (GR)

  12. Equal Access.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Presents an interview with Stephen McCarthy, co-partner and president of Equal Access ADA Consulting Architects of San Diego, California, about designing schools to naturally integrate compliance with the Americans with Disabilities Act (ADA). (EV)

  13. Capital access.

    PubMed

    Towne, Jennifer

    2004-06-01

    To maintain their viability, hospitals are being compelled to invest in big capital projects such as information technology and renovation and construction. This gatefold examines the trends in credit and capital, and how they affect hospitals' access to money.

  14. Beyond Scheme F

    SciTech Connect

    Elliott, C.J.; Fisher, H.; Pepin, J.; Gillmann, R.

    1996-07-01

    Traffic classification techniques were evaluated using data from a 1993 investigation of the traffic flow patterns on I-20 in Georgia. First we improved the data by sifting through the data base, checking against the original video for questionable events and removing and/or repairing questionable events. We used this data base to critique the performance quantitatively of a classification method known as Scheme F. As a context for improving the approach, we show in this paper that scheme F can be represented as a McCullogh-Pitts neural network, oar as an equivalent decomposition of the plane. We found that Scheme F, among other things, severely misrepresents the number of vehicles in Class 3 by labeling them as Class 2. After discussing the basic classification problem in terms of what is measured, and what is the desired prediction goal, we set forth desirable characteristics of the classification scheme and describe a recurrent neural network system that partitions the high dimensional space up into bins for each axle separation. the collection of bin numbers, one for each of the axle separations, specifies a region in the axle space called a hyper-bin. All the vehicles counted that have the same set of in numbers are in the same hyper-bin. The probability of the occurrence of a particular class in that hyper- bin is the relative frequency with which that class occurs in that set of bin numbers. This type of algorithm produces classification results that are much more balanced and uniform with respect to Classes 2 and 3 and Class 10. In particular, the cancellation of errors of classification that occurs is for many applications the ideal classification scenario. The neural network results are presented in the form of a primary classification network and a reclassification network, the performance matrices for which are presented.

  15. Performance of hashed cache data migration schemes on multicomputers

    NASA Technical Reports Server (NTRS)

    Hiranandani, Seema; Saltz, Joel; Mehrotra, Piyush; Berryman, Harry

    1991-01-01

    After conducting an examination of several data-migration mechanisms which permit an explicit and controlled mapping of data to memory, a set of schemes for storage and retrieval of off-processor array elements is experimentally evaluated and modeled. All schemes considered have their basis in the use of hash tables for efficient access of nonlocal data. The techniques in question are those of hashed cache, partial enumeration, and full enumeration; in these, nonlocal data are stored in hash tables, so that the operative difference lies in the amount of memory used by each scheme and in the retrieval mechanism used for nonlocal data.

  16. Grading Scheme, Test Difficulty, and the Immediate Feedback Assessment Technique

    ERIC Educational Resources Information Center

    DiBattista, David; Gosse, Leanne; Sinnige-Egger, Jo-Anne; Candale, Bela; Sargeson, Kim

    2009-01-01

    The authors examined how the grading scheme affects learning and students' reactions to the Immediate Feedback Assessment Technique (IFAT), an answer form providing immediate feedback on multiple-choice questions. Undergraduate students (N = 141) took a general-knowledge multiple-choice test of low, medium, or high difficulty. They used the IFAT…

  17. Analysis of synchronous digital-modulation schemes for satellite communication

    NASA Technical Reports Server (NTRS)

    Takhar, G. S.; Gupta, S. C.

    1975-01-01

    The multipath communication channel for space communications is modeled as a multiplicative channel. This paper discusses the effects of multiplicative channel processes on the symbol error rate for quadrature modulation (QM) digital modulation schemes. An expression for the upper bound on the probability of error is derived and numerically evaluated. The results are compared with those obtained for additive channels.

  18. Effect of encoder--decoder mismatch due to wavelength and time misalignments on the performance of two-dimensional wavelength--time optical code-division multiple access systems.

    PubMed

    Adams, Rhys; Chen, Lawrence R

    2005-07-10

    We examine the effects of encoder and decoder mismatch due to wavelength and time chip misalignments on the bit-error rate (BER) performance of two-dimensional (2D) wavelength--time optical code-division multiple access systems. We investigate several instances of misalignment in the desired user encoder and decoder as well as in the interfering user encoders. Our simulation methodology can be used to analyze any type of 2D wavelength--time code family as well as probability distribution for misalignment. For illustration purposes, we consider codes generated by use of the depth-first search algorithm and a Gaussian distribution for the misalignment. Our simulation results show that, in the case of a misalignment in either wavelength or time chip, the variance of the distribution for the misalignment must be below 0.01 for the corresponding degradation in the BER system's performance to be less than 1 order of magnitude compared with that when there is no mismatch between the encoders and decoders. The tolerances become even more strict when misalignments in both wavelength and time chips are considered. Furthermore, our results show that the effect of misalignment in wavelength (time chips) is the same regardless of the number of wavelengths (time chips) used in the codes.

  19. A Hybrid Sender- and Receiver-Initiated Protocol Scheme in Underwater Acoustic Sensor Networks

    PubMed Central

    Lee, Jae-Won; Cho, Ho-Shin

    2015-01-01

    In this paper, we propose a method for sharing the handshakes of control packets among multiple nodes, which we call a hybrid sender- and receiver-initiated (HSR) protocol scheme. Handshake-sharing can be achieved by inviting neighbors to join the current handshake and by allowing them to send their data packets without requiring extra handshakes. Thus, HSR can reduce the signaling overhead involved in control packet exchanges during handshakes, as well as resolve the spatial unfairness problem between nodes. From an operational perspective, HSR resembles the well-known handshake-sharing scheme referred to as the medium access control (MAC) protocol using reverse opportunistic packet appending (ROPA). However, in ROPA the waiting time is not controllable for the receiver’s neighbors and thus unexpected collisions may occur at the receiver due to hidden neighbors, whereas the proposed scheme allows all nodes to avoid hidden-node-induced collisions according to an elaborately calculated waiting time. Our computer simulations demonstrated that HSR outperforms ROPA with respect to both the throughput and delay by around 9.65% and 11.36%, respectively. PMID:26556359

  20. A Hybrid Sender- and Receiver-Initiated Protocol Scheme in Underwater Acoustic Sensor Networks.

    PubMed

    Lee, Jae-Won; Cho, Ho-Shin

    2015-01-01

    In this paper, we propose a method for sharing the handshakes of control packets among multiple nodes, which we call a hybrid sender- and receiver-initiated (HSR) protocol scheme. Handshake-sharing can be achieved by inviting neighbors to join the current handshake and by allowing them to send their data packets without requiring extra handshakes. Thus, HSR can reduce the signaling overhead involved in control packet exchanges during handshakes, as well as resolve the spatial unfairness problem between nodes. From an operational perspective, HSR resembles the well-known handshake-sharing scheme referred to as the medium access control (MAC) protocol using reverse opportunistic packet appending (ROPA). However, in ROPA the waiting time is not controllable for the receiver's neighbors and thus unexpected collisions may occur at the receiver due to hidden neighbors, whereas the proposed scheme allows all nodes to avoid hidden-node-induced collisions according to an elaborately calculated waiting time. Our computer simulations demonstrated that HSR outperforms ROPA with respect to both the throughput and delay by around 9.65% and 11.36%, respectively.

  1. GC-based dynamic QoS priority handoff scheme in multimedia cellular systems

    NASA Astrophysics Data System (ADS)

    Chen, Huan; Kumar, Sunil; Kuo, C.-C. Jay

    2001-03-01

    A dynamic call admission control (CAC) and its associated resource reservation (RR) schemes are proposed in this research based on the guard channel (GC) concept for a wireless cellular system supporting multiple QoS classes. A comprehensive service model is developed, which includes not only mobile terminals' bandwidth requirements but also their different levels of priorities, rate adaptivity and mobility. The proposed CAC policy selects the resource access thresold according to the estimated number of incoming call requests of different QoS classes. The amount of resources to be reserved is dynamically adjusted by considering neighboring-cell higher-priority calls which are likely to handoff. The handoff interaction between adjacent cells is estimated by using radio propagation in terms of the signal-to-noise ratio (SNR) and the distance of each active call in neighboring cells. Experiments are conducted by using the OPNET simulator to study the performance of the proposed scheme under various traffic conditions. It is shown that better QoS guarantees can be provided by the proposed CAC and RR schemes.

  2. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks.

    Scope of Contributions

    This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to:
    • Optical access network architectures and protocols
    • Passive optical networks (BPON, EPON, GPON, etc.)
    • Active optical networks
    • Multiple access control
    • Multiservices and QoS provisioning
    • Network survivability
    • Field trials and standards
    • Performance modeling and analysis

    Manuscript Submission

    To submit to this special issue, follow the normal procedure for submission to JON, indicating ``Optical Access Networks feature' in the ``Comments' field of the online submission form. For all other questions relating to this feature issue, please send an e-mail to jon@osa.org, subject line ``Optical Access Networks' Additional information can be found on the JON website: http://www.osa-jon.org/submission/. Submission Deadline: 1 June 2005

  3. Mobile and Accessible Learning for MOOCs

    ERIC Educational Resources Information Center

    Sharples, Mike; Kloos, Carlos Delgado; Dimitriadis, Yannis; Garlatti, Serge; Specht, Marcus

    2015-01-01

    Many modern web-based systems provide a "responsive" design that allows material and services to be accessed on mobile and desktop devices, with the aim of providing "ubiquitous access." Besides offering access to learning materials such as podcasts and videos across multiple locations, mobile, wearable and ubiquitous…

  4. Hemodialysis access - self care

    MedlinePlus

    Kidney failure - chronic-hemodialysis access; Renal failure - chronic-hemodialysis access; Chronic renal insufficiency - hemodialysis access; Chronic kidney failure - hemodialysis access; Chronic renal failure - hemodialysis access; dialysis - hemodialysis access

  5. ESCAP mobile training scheme.

    PubMed

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries. PMID:12265562

  6. Computer-Access-Code Matrices

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr.

    1990-01-01

    Authorized users respond to changing challenges with changing passwords. Scheme for controlling access to computers defeats eavesdroppers and "hackers". Based on password system of challenge and password or sign, challenge, and countersign correlated with random alphanumeric codes in matrices of two or more dimensions. Codes stored on floppy disk or plug-in card and changed frequently. For even higher security, matrices of four or more dimensions used, just as cubes compounded into hypercubes in concurrent processing.

  7. Easy Access

    ERIC Educational Resources Information Center

    Gettelman, Alan

    2009-01-01

    School and university restrooms, locker and shower rooms have specific ADA accessibility requirements that serve the needs of staff, students and campus visitors who are disabled as a result of injury, illness or age. Taking good care of them is good for the reputation of a sensitive community institution, and fosters positive public relations.…

  8. Access Denied

    ERIC Educational Resources Information Center

    Raths, David

    2012-01-01

    As faculty members add online and multimedia elements to their courses, colleges and universities across the country are realizing that there is a lot of work to be done to ensure that disabled students (and employees) have equal access to course material and university websites. Unfortunately, far too few schools consider the task a top priority.…

  9. Expanding Access

    ERIC Educational Resources Information Center

    Roach, Ronald

    2007-01-01

    There is no question that the United States lags behind most industrialized nations in consumer access to broadband Internet service. For many policy makers and activists, this shortfall marks the latest phase in the struggle to overcome the digital divide. To remedy this lack of broadband affordability and availability, one start-up firm--with…

  10. Multilevel Cell Storage and Resistance Variability in Resistive Random Access Memory

    NASA Astrophysics Data System (ADS)

    Pantelis, D. I.; Karakizis, P. N.; Dragatogiannis, D. A.; Charitidis, C. A.

    2016-06-01

    Multilevel per cell (MLC) storage in resistive random access memory (ReRAM) is attractive in achieving high-density and low-cost memory and will be required in future. In this chapter, MLC storage and resistance variability and reliability of multilevel in ReRAM are discussed. Different MLC operation schemes with their physical mechanisms and a comprehensive analysis of resistance variability have been provided. Various factors that can induce variability and their effect on the resistance margin between the multiple resistance levels are assessed. The reliability characteristics and the impact on MLC storage have also been assessed.

  11. Optical beat interference noise reduction in OFDMA optical access link using self-homodyne balanced detection

    NASA Astrophysics Data System (ADS)

    Jung, Sang-Min; Won, Yong-Yuk; Han, Sang-Kook

    2013-12-01

    A Novel technique for reducing the OBI noise in optical OFDMA-PON uplink is presented. OFDMA is a multipleaccess/ multiplexing scheme that can provide multiplexing operation of user data streams onto the downlink sub-channels and uplink multiple access by means of dividing OFDM subcarriers as sub-channels. The main issue of high-speed, single-wavelength upstream OFDMA-PON arises from optical beating interference noise. Because the sub-channels are allocated dynamically to multiple access users over same nominal wavelength, it generates the optical beating interference among upstream signals. In this paper, we proposed a novel scheme using self-homodyne balanced detection in the optical line terminal (OLT) to reduce OBI noise which is generated in the uplink transmission of OFDMA-PON system. When multiple OFDMA sub-channels over the same nominal wavelength are received at the same time in the proposed architecture, OBI noises can be removed using balanced detection. Using discrete multitone modulation (DMT) to generate real valued OFDM signals, the proposed technique is verified through experimental demonstration.

  12. Proposal of Wireless Traffic Control Schemes for Wireless LANs

    NASA Astrophysics Data System (ADS)

    Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji

    This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.

  13. An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM)

    PubMed Central

    Xu, Ke; Liao, Yongjian; Qiao, Li

    2015-01-01

    A broadcast encryption scheme with personalized messages (BEPM) is a scheme in which a broadcaster transmits not only encrypted broadcast messages to a subset of recipients but also encrypted personalized messages to each user individually. Several broadcast encryption (BE) schemes allow a broadcaster encrypts a message for a subset S of recipients with public keys and any user in S can decrypt the message with his/her private key. However, these BE schemes can not provide an efficient way to transmit encrypted personalized messages to each user individually. In this paper, we propose a broadcast encryption scheme with a transmission of personalized messages. Besides, the scheme is based on multilinear maps ensure constant ciphertext size and private key size of each user and the scheme can achieve statically security. More realistically, the scheme can be applied to the Conditional Access System (CAS) of pay television (pay-TV) efficiently and safely. PMID:26629817

  14. An adaptive control scheme for coordinated multimanipulator systems

    SciTech Connect

    Jonghann Jean; Lichen Fu . Dept. of Electrical Engineering)

    1993-04-01

    The problem of adaptive coordinated control of multiple robot arms transporting an object is addressed. A stable adaptive control scheme for both trajectory tracking and internal force control is presented. Detailed analyses on tracking properties of the object position, velocity and the internal forces exerted on the object are given. It is shown that this control scheme can achieve satisfactory tracking performance without using the measurement of contact forces and their derivatives. It can be shown that this scheme can be realized by decentralized implementation to reduce the computational burden. Moreover, some efficient adaptive control strategies can be incorporated to reduce the computational complexity.

  15. A self-learning call admission control scheme for CDMA cellular networks.

    PubMed

    Liu, Derong; Zhang, Yi; Zhang, Huaguang

    2005-09-01

    In the present paper, a call admission control scheme that can learn from the network environment and user behavior is developed for code division multiple access (CDMA) cellular networks that handle both voice and data services. The idea is built upon a novel learning control architecture with only a single module instead of two or three modules in adaptive critic designs (ACDs). The use of adaptive critic approach for call admission control in wireless cellular networks is new. The call admission controller can perform learning in real-time as well as in offline environments and the controller improves its performance as it gains more experience. Another important contribution in the present work is the choice of utility function for the present self-learning control approach which makes the present learning process much more efficient than existing learning control methods. The performance of our algorithm will be shown through computer simulation and compared with existing algorithms. PMID:16252828

  16. The Scheme of Beam Synchronization in MEIC

    SciTech Connect

    Zhang, Yuhong; Derbenev, Yaroslav S.; Hutton, Andrew M.

    2013-06-01

    Synchronizing colliding beams at single or multiple collision points is a critical R&D issue in the design of a medium energy electron-ion collider (MEIC) at Jefferson Lab. The path-length variation due to changes in the ion energy, which varies over 20 to 100 GeV, could be more than several times the bunch spacing. The scheme adopted in the present MEIC baseline is centered on varying the number of bunches (i.e., harmonic number) stored in the collider ring. This could provide a set of discrete energies for proton or ions such that the beam synchronization condition is satisfied. To cover the ion energy between these synchronized values, we further propose to vary simultaneously the electron ring circumference and the frequency of the RF systems in both collider rings. We also present in this paper the requirement of frequency tunability of SRF cavities to support the scheme.

  17. Hemodialysis access procedures

    MedlinePlus

    Kidney failure - chronic-dialysis access; Renal failure - chronic-dialysis access; Chronic renal insufficiency-dialysis access; Chronic kidney failure-dialysis access; Chronic renal failure-dialysis access

  18. Access point selection game with mobile users using correlated equilibrium.

    PubMed

    Sohn, Insoo

    2015-01-01

    One of the most important issues in wireless local area network (WLAN) systems with multiple access points (APs) is the AP selection problem. Game theory is a mathematical tool used to analyze the interactions in multiplayer systems and has been applied to various problems in wireless networks. Correlated equilibrium (CE) is one of the powerful game theory solution concepts, which is more general than the Nash equilibrium for analyzing the interactions in multiplayer mixed strategy games. A game-theoretic formulation of the AP selection problem with mobile users is presented using a novel scheme based on a regret-based learning procedure. Through convergence analysis, we show that the joint actions based on the proposed algorithm achieve CE. Simulation results illustrate that the proposed algorithm is effective in a realistic WLAN environment with user mobility and achieves maximum system throughput based on the game-theoretic formulation. PMID:25785726

  19. Making Your Website More Accessible. Tips

    ERIC Educational Resources Information Center

    Arnone, Marilyn

    2007-01-01

    Employing Universal Design for Learning (UDL) principles, such as multiple means of representation (of content), multiple means of engagement (motivation) and multiple means of expression (sharing the results of research, for example), will put one on the right path toward increasing accessibility for all learners. In this article, the author…

  20. Quantum Walk Schemes for Universal Quantum Computation

    NASA Astrophysics Data System (ADS)

    Underwood, Michael S.

    Random walks are a powerful tool for the efficient implementation of algorithms in classical computation. Their quantum-mechanical analogues, called quantum walks, hold similar promise. Quantum walks provide a model of quantum computation that has recently been shown to be equivalent in power to the standard circuit model. As in the classical case, quantum walks take place on graphs and can undergo discrete or continuous evolution, though quantum evolution is unitary and therefore deterministic until a measurement is made. This thesis considers the usefulness of continuous-time quantum walks to quantum computation from the perspectives of both their fundamental power under various formulations, and their applicability in practical experiments. In one extant scheme, logical gates are effected by scattering processes. The results of an exhaustive search for single-qubit operations in this model are presented. It is shown that the number of distinct operations increases exponentially with the number of vertices in the scattering graph. A catalogue of all graphs on up to nine vertices that implement single-qubit unitaries at a specific set of momenta is included in an appendix. I develop a novel scheme for universal quantum computation called the discontinuous quantum walk, in which a continuous-time quantum walker takes discrete steps of evolution via perfect quantum state transfer through small 'widget' graphs. The discontinuous quantum-walk scheme requires an exponentially sized graph, as do prior discrete and continuous schemes. To eliminate the inefficient vertex resource requirement, a computation scheme based on multiple discontinuous walkers is presented. In this model, n interacting walkers inhabiting a graph with 2n vertices can implement an arbitrary quantum computation on an input of length n, an exponential savings over previous universal quantum walk schemes. This is the first quantum walk scheme that allows for the application of quantum error correction

  1. Multiple image encryption by phase retrieval

    NASA Astrophysics Data System (ADS)

    Di, Hong; Kang, Yanmei; Liu, Yueqin; Zhang, Xin

    2016-07-01

    Multiple image encryption (MIE) was proposed to increase the efficiency of encrypting images by processing several images simultaneously. Because of the advantage of optical technology in processing twodimensional images at high throughput, MIE has been significantly improved by use of methods originating from optics. Phase retrieval was the process of algorithmically finding solutions to the phase loss problem due to light detectors only capturing the intensity. It was to retrieve phase information for the determination of a structure from diffraction data. Error-reduction algorithm is a typical phase retrieval method. Here, we employ it to illustrate that methods in phase retrieval are able to encrypt multiple images and compress them into encrypted data simultaneously. Moreover, the decryption is also designed to handle multiple images at the same time. The whole process including both the encryption and decryption is proposed to improve MIE with respect to the compression and efficiency. The feasibility and encryption of the MIE scheme is demonstrated with encryption experiments under Gaussian white noise and unauthorized access.

  2. A Theoretical Analysis of a New Polarimetric Optical Scheme for Glucose Sensing in the Human Eye

    NASA Technical Reports Server (NTRS)

    Rovati, Luigi L.; Boeckle, Stefan; Ansari, Rafat R.; Salzman, Jack A. (Technical Monitor)

    2002-01-01

    The challenging task of in vivo polarimetric glucose sensing is the identification and selection of a scheme to optically access the aqueous humor of the human eye. In this short communication an earlier approach of Cote et al. is theoretically compared with our new optical scheme. Simulations of the new scheme using the eye model of Navarro, suggest that the new optical geometry can overcome the limitations of the previous approach for in vivo measurements of glucose in a human eye.

  3. Access to Medications for Cardiovascular Diseases in Low- and Middle-Income Countries.

    PubMed

    Wirtz, Veronika J; Kaplan, Warren A; Kwan, Gene F; Laing, Richard O

    2016-05-24

    Cardiovascular diseases (CVD) represent the highest burden of disease globally. Medicines are a critical intervention used to prevent and treat CVD. This review describes access to medication for CVD from a health system perspective and strategies that have been used to promote access, including providing medicines at lower cost, improving medication supply, ensuring medicine quality, promoting appropriate use, and managing intellectual property issues. Using key evidence in published and gray literature and systematic reviews, we summarize advances in access to cardiovascular medicines using the 5 health system dimensions of access: availability, affordability, accessibility, acceptability, and quality of medicines. There are multiple barriers to access of CVD medicines, particularly in low- and middle-income countries. Low availability of CVD medicines has been reported in public and private healthcare facilities. When patients lack insurance and pay out of pocket to purchase medicines, medicines can be unaffordable. Accessibility and acceptability are low for medicines used in secondary prevention; increasing use is positively related to country income. Fixed-dose combinations have shown a positive effect on adherence and intermediate outcome measures such as blood pressure and cholesterol. We have a new opportunity to improve access to CVD medicines by using strategies such as efficient procurement of low-cost, quality-assured generic medicines, development of fixed-dose combination medicines, and promotion of adherence through insurance schemes that waive copayment for long-term medications. Monitoring progress at all levels, institutional, regional, national, and international, is vital to identifying gaps in access and implementing adequate policies. PMID:27217433

  4. A Curriculum Laboratory Classification Scheme for Elementary and Secondary School Textbooks.

    ERIC Educational Resources Information Center

    Martin, Rosetta P.

    Tufts University Library Curriculum Laboratory provides a classification scheme for textbooks designed for simplicity, flexibility, and accessibility. In this scheme elementary materials are separated from secondary materials, and are further subdivided first by subject, then by publisher, grade level, and edition. Further subdivisions are…

  5. Joint Access Control Based on Access Ratio and Resource Utilization for High-Speed Railway Communications

    NASA Astrophysics Data System (ADS)

    Zhou, Yuzhe; Ai, Bo

    2015-05-01

    The fast development of high-speed rails makes people's life more and more convenient. However, provisioning of quality of service of multimedia applications for users on the high-speed train is a critical task for wireless communications. Therefore, new solutions are desirable to be found to address this kind of problem. Current researches mainly focus on providing seamless broadband wireless access for high-speed mobile terminals. In this paper, an algorithm to calculate the optimal resource reservation fraction of handovers is proposed. A joint access control scheme for high-speed railway communication handover scenario is proposed. Metrics of access ratio and resource utilization ratio are considered jointly in the analysis and the performance evaluation. Simulation results show that the proposed algorithm and the scheme improve quality of service compared with other conventional schemes.

  6. Sampling scheme for pyrethroids on multiple surfaces on commercial aircrafts.

    PubMed

    Mohan, Krishnan R; Weisel, Clifford P

    2010-06-01

    A wipe sampler for the collection of permethrin from soft and hard surfaces has been developed for use in aircraft. "Disinsection" or application of pesticides, predominantly pyrethrods, inside commercial aircraft is routinely required by some countries and is done on an as-needed basis by airlines resulting in potential pesticide dermal and inhalation exposures to the crew and passengers. A wipe method using filter paper and water was evaluated for both soft and hard aircraft surfaces. Permethrin was analyzed by GC/MS after its ultrasonication extraction from the sampling medium into hexane and volume reduction. Recoveries, based on spraying known levels of permethrin, were 80-100% from table trays, seat handles and rugs; and 40-50% from seat cushions. The wipe sampler is easy to use, requires minimum training, is compatible with the regulations on what can be brought through security for use on commercial aircraft, and readily adaptable for use in residential and other settings.

  7. Efficient spares matrix multiplication scheme for the CYBER 203

    NASA Technical Reports Server (NTRS)

    Lambiotte, J. J., Jr.

    1984-01-01

    This work has been directed toward the development of an efficient algorithm for performing this computation on the CYBER-203. The desire to provide software which gives the user the choice between the often conflicting goals of minimizing central processing (CPU) time or storage requirements has led to a diagonal-based algorithm in which one of three types of storage is selected for each diagonal. For each storage type, an initialization sub-routine estimates the CPU and storage requirements based upon results from previously performed numerical experimentation. These requirements are adjusted by weights provided by the user which reflect the relative importance the user places on the resources. The three storage types employed were chosen to be efficient on the CYBER-203 for diagonals which are sparse, moderately sparse, or dense; however, for many densities, no diagonal type is most efficient with respect to both resource requirements. The user-supplied weights dictate the choice.

  8. Data Access Performance Through Parallelization and Vectored Access: Some Results

    SciTech Connect

    Furano, Fabrizio; Hanushevsky, Andrew; /SLAC

    2011-11-10

    High Energy Physics data processing and analysis applications typically deal with the problem of accessing and processing data at high speed. Recent studies, development and test work have shown that the latencies due to data access can often be hidden by parallelizing them with the data processing, thus giving the ability to have applications which process remote data with a high level of efficiency. Techniques and algorithms able to reach this result have been implemented in the client side of the Scalla/xrootd system, and in this contribution we describe the results of some tests done in order to compare their performance and characteristics. These techniques, if used together with multiple streams data access, can also be effective in allowing to efficiently and transparently deal with data repositories accessible via a Wide Area Network.

  9. A secure biometrics-based authentication scheme for telecare medicine information systems.

    PubMed

    Yan, Xiaopeng; Li, Weiheng; Li, Ping; Wang, Jiantao; Hao, Xinhong; Gong, Peng

    2013-10-01

    The telecare medicine information system (TMIS) allows patients and doctors to access medical services or medical information at remote sites. Therefore, it could bring us very big convenient. To safeguard patients' privacy, authentication schemes for the TMIS attracted wide attention. Recently, Tan proposed an efficient biometrics-based authentication scheme for the TMIS and claimed their scheme could withstand various attacks. However, in this paper, we point out that Tan's scheme is vulnerable to the Denial-of-Service attack. To enhance security, we also propose an improved scheme based on Tan's work. Security and performance analysis shows our scheme not only could overcome weakness in Tan's scheme but also has better performance. PMID:23996083

  10. Scheme for Quantum Computing Immune to Decoherence

    NASA Technical Reports Server (NTRS)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report

  11. FD/DAMA Scheme For Mobile/Satellite Communications

    NASA Technical Reports Server (NTRS)

    Yan, Tsun-Yee; Wang, Charles C.; Cheng, Unjeng; Rafferty, William; Dessouky, Khaled I.

    1992-01-01

    Integrated-Adaptive Mobile Access Protocol (I-AMAP) proposed to allocate communication channels to subscribers in first-generation MSAT-X mobile/satellite communication network. Based on concept of frequency-division/demand-assigned multiple access (FD/DAMA) where partition of available spectrum adapted to subscribers' demands for service. Requests processed, and competing requests resolved according to channel-access protocol, or free-access tree algorithm described in "Connection Protocol for Mobile/Satellite Communications" (NPO-17735). Assigned spectrum utilized efficiently.

  12. Accessing and visualizing scientific spatiotemporal data

    NASA Technical Reports Server (NTRS)

    Katz, Daniel S.; Bergou, Attila; Berriman, G. Bruce; Block, Gary L.; Collier, Jim; Curkendall, David W.; Good, John; Husman, Laura; Jacob, Joseph C.; Laity, Anastasia; Li, P. Peggy; Miller, Craig; Prince, Tom; Siegel, Herb; Williams, Roy

    2004-01-01

    This paper discusses work done by JPL's Parallel Applications Technologies Group in helping scientists access and visualize very large data sets through the use of multiple computing resources, such as parallel supercomputers, clusters, and grids.

  13. Classification schemes for arteriovenous malformations.

    PubMed

    Davies, Jason M; Kim, Helen; Young, William L; Lawton, Michael T

    2012-01-01

    The wide variety of arteriovenous malformation (AVM) anatomy, size, location, and clinical presentation makes patient selection for surgery a difficult process. Neurosurgeons have identified key factors that determine the risks of surgery and then devised classification schemes that integrate these factors, predict surgical results, and help select patients for surgery. These classification schemes have value because they transform complex decisions into simpler algorithms. In this review, the important grading schemes that have contributed to management of patients with brain AVMs are described, and our current approach to patient selection is outlined.

  14. A novel encoded excitation scheme in a phased array for the improving data acquisition rate.

    PubMed

    Gutiérrez-Fernández, César; Jiménez, Ana; Martín-Arguedas, Carlos Julián; Ureña, Jesús; Hernández, Álvaro

    2013-12-31

    One of the challenges of phased array (PA) ultrasonic imaging systems is their limited capability to deal with real-time applications, such as echocardiography and obstetrics. In its most basic outline, these systems require emitting and receiving with the entire array for each image line to be acquired; therefore, with many image lines, a higher acquisition time and a lower frame rate. This constraint requires one to find alternatives to reduce the total number of emissions needed to obtain the whole image. In this work, we propose a new PA scheme based on the Code Division Multiple Access (CDMA) technique, where a different code is assigned to each steering direction, allowing the array to emit in several directions simultaneously. However, the use of encoding techniques produces a reduction of the image contrast because of the interferences between codes. To solve this, a new scheme based on merging several images is proposed, allowing the system to get close to the theoretical maximum frame rate, as well as to limit the loss of contrast, intrinsic to the technique.

  15. A Novel Encoded Excitation Scheme in a Phased Array for The Improving Data Acquisition Rate

    PubMed Central

    Gutiérrez-Fernández, César; Jiménez, Ana; Martín-Arguedas, Carlos Julián; Ureña, Jesús; Hernández, Álvaro

    2014-01-01

    One of the challenges of phased array (PA) ultrasonic imaging systems is their limited capability to deal with real-time applications, such as echocardiography and obstetrics. In its most basic outline, these systems require emitting and receiving with the entire array for each image line to be acquired; therefore, with many image lines, a higher acquisition time and a lower frame rate. This constraint requires one to find alternatives to reduce the total number of emissions needed to obtain the whole image. In this work, we propose a new PA scheme based on the Code Division Multiple Access (CDMA) technique, where a different code is assigned to each steering direction, allowing the array to emit in several directions simultaneously. However, the use of encoding techniques produces a reduction of the image contrast because of the interferences between codes. To solve this, a new scheme based on merging several images is proposed, allowing the system to get close to the theoretical maximum frame rate, as well as to limit the loss of contrast, intrinsic to the technique. PMID:24385031

  16. Photographed Rapid HIV Test Results Pilot Novel Quality Assessment and Training Schemes

    PubMed Central

    Chiu, Yu-Ho C.; Ong, Joanna; Walker, Sandy; Kumalawati, July; Gartinah, Tintin; McPhee, Dale A.; Dax, Elizabeth M.

    2011-01-01

    HIV rapid diagnostic tests (RDTs) are now used widely in non-laboratory settings by non-laboratory-trained operators. Quality assurance programmes are essential in ensuring the quality of HIV RDT outcomes. However, there is no cost-effective means of supplying the many operators of RDTs with suitable quality assurance schemes. Therefore, it was examined whether photograph-based RDT results could be used and correctly interpreted in the non-laboratory setting. Further it was investigated if a single training session improved the interpretation skills of RDT operators. The photographs were interpreted, a 10-minute tutorial given and then a second interpretation session was held. It was established that the results could be read with accuracy. The participants (n = 75) with a range of skills interpreted results (>80% concordance with reference results) from a panel of 10 samples (three negative and seven positive) using four RDTs. Differences in accuracy of interpretation before and after the tutorial were marked in some cases. Training was more effective for improving the accurate interpretation of more complex results, e.g. results with faint test lines or for multiple test lines, and especially for improving interpretation skills of inexperienced participants. It was demonstrated that interpretation of RDTs was improved using photographed results allied to a 10-minute training session. It is anticipated that this method could be used for training but also for quality assessment of RDT operators without access to conventional quality assurance or training schemes requiring wet samples. PMID:21483842

  17. Community health insurance schemes & patient satisfaction - evidence from India

    PubMed Central

    Devadasan, N.; Criel, Bart; Damme, Wim Van; Lefevre, Pierre; Manoharan, S.; der Stuyft, Patrick Van

    2011-01-01

    Background & objectives: Quality of care is an important determinant for utilizing health services. In India, the quality of care in most health services is poor. The government recognizes this and has been working on both supply and demand aspects. In particular, it is promoting community health insurance (CHI) schemes, so that patients can access quality services. This observational study was undertaken to measure the level of satisfaction among insured and uninsured patients in two CHI schemes in India. Methods: Patient satisfaction was measured, which is an outcome of good quality care. Two CHI schemes, Action for Community Organisation, Rehabilitation and Development (ACCORD) and Kadamalai Kalanjiam Vattara Sangam (KKVS), were chosen. Randomly selected, insured and uninsured households were interviewed. The household where a patient was admitted to a hospital was interviewed in depth about the health seeking behaviour, the cost of treatment and the satisfaction levels. Results: It was found that at both ACCORD and KKVS, there was no significant difference in the levels of satisfaction between the insured and uninsured patients. The main reasons for satisfaction were the availability of doctors and medicines and the recovery by the patient. Interpretation & conclusions: Our study showed that insured hospitalized patients did not have significantly higher levels of satisfaction compared to uninsured hospitalized patients. If CHI schemes want to improve the quality of care for their clients, so that they adhere to the scheme, the scheme managers need to negotiate actively for better quality of care with empanelled providers. PMID:21321418

  18. Small Satellite Access of the Space Network

    NASA Technical Reports Server (NTRS)

    Horan, Stephen; Minnix, Timothy O.; Vigil, J. S.

    1999-01-01

    Small satellites have been perceived as having limited access to NASA's Space Network (SN). The potential for satellite access of the space network when the design utilizes a fixed antenna configuration and low-power, coded transmission is analyzed. From the analysis, satellites using this configuration in high-inclination orbits are shown to have a daily data throughput in the 100 to 1000 Mbit range using the multiple access communications service.

  19. Relaxation schemes for Chebyshev spectral multigrid methods

    NASA Technical Reports Server (NTRS)

    Kang, Yimin; Fulton, Scott R.

    1993-01-01

    Two relaxation schemes for Chebyshev spectral multigrid methods are presented for elliptic equations with Dirichlet boundary conditions. The first scheme is a pointwise-preconditioned Richardson relaxation scheme and the second is a line relaxation scheme. The line relaxation scheme provides an efficient and relatively simple approach for solving two-dimensional spectral equations. Numerical examples and comparisons with other methods are given.

  20. Production scheme for deep water hydrate deposits

    SciTech Connect

    Rose, W.; Pfannkuch, H.O.

    1982-09-01

    There is substantial evidence that enormous natural gas hydrate deposits are entrapped in the bottom sediments underlying many of the deep waters that cover the earth, as well as in subsurface permafrost sediments of the polar regions. This paper addresses the important but largely ignored question of how to recover natural gas from the deep water bottom occurrences. The first problem is to gain access to the resource, the second to promote decomposition of the hydrate, and the third is to collect and bring the exsolved gas to the surface. A scheme assumed to be technically feasible involves the use of closely-spaced flexible hoses imbedded to protrude through the underside of the hydrate layer through which warm water can be circulated downwards and recovered gas brought upwards from and to surface floating platforms equipped with pumps, compressors, conversion facilities, storage vessels and pipeline manifolds.

  1. A Data Gathering Scheme in Wireless Sensor Networks Based on Synchronization of Chaotic Spiking Oscillator Networks

    SciTech Connect

    Nakano, Hidehiro; Utani, Akihide; Miyauchi, Arata; Yamamoto, Hisao

    2011-04-19

    This paper studies chaos-based data gathering scheme in multiple sink wireless sensor networks. In the proposed scheme, each wireless sensor node has a simple chaotic oscillator. The oscillators generate spike signals with chaotic interspike intervals, and are impulsively coupled by the signals via wireless communication. Each wireless sensor node transmits and receives sensor information only in the timing of the couplings. The proposed scheme can exhibit various chaos synchronous phenomena and their breakdown phenomena, and can effectively gather sensor information with the significantly small number of transmissions and receptions compared with the conventional scheme. Also, the proposed scheme can flexibly adapt various wireless sensor networks not only with a single sink node but also with multiple sink nodes. This paper introduces our previous works. Through simulation experiments, we show effectiveness of the proposed scheme and discuss its development potential.

  2. A Data Gathering Scheme in Wireless Sensor Networks Based on Synchronization of Chaotic Spiking Oscillator Networks

    NASA Astrophysics Data System (ADS)

    Nakano, Hidehiro; Utani, Akihide; Miyauchi, Arata; Yamamoto, Hisao

    2011-04-01

    This paper studies chaos-based data gathering scheme in multiple sink wireless sensor networks. In the proposed scheme, each wireless sensor node has a simple chaotic oscillator. The oscillators generate spike signals with chaotic interspike intervals, and are impulsively coupled by the signals via wireless communication. Each wireless sensor node transmits and receives sensor information only in the timing of the couplings. The proposed scheme can exhibit various chaos synchronous phenomena and their breakdown phenomena, and can effectively gather sensor information with the significantly small number of transmissions and receptions compared with the conventional scheme. Also, the proposed scheme can flexibly adapt various wireless sensor networks not only with a single sink node but also with multiple sink nodes. This paper introduces our previous works. Through simulation experiments, we show effectiveness of the proposed scheme and discuss its development potential.

  3. Privacy protection schemes for fingerprint recognition systems

    NASA Astrophysics Data System (ADS)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  4. Implicit Block ACK Scheme for IEEE 802.11 WLANs

    PubMed Central

    Sthapit, Pranesh; Pyun, Jae-Young

    2016-01-01

    The throughput of IEEE 802.11 standard is significantly bounded by the associated Medium Access Control (MAC) overhead. Because of the overhead, an upper limit exists for throughput, which is bounded, including situations where data rates are extremely high. Therefore, an overhead reduction is necessary to achieve higher throughput. The IEEE 802.11e amendment introduced the block ACK mechanism, to reduce the number of control messages in MAC. Although the block ACK scheme greatly reduces overhead, further improvements are possible. In this letter, we propose an implicit block ACK method that further reduces the overhead associated with IEEE 802.11e’s block ACK scheme. The mathematical analysis results are presented for both the original protocol and the proposed scheme. A performance improvement of greater than 10% was achieved with the proposed implementation.

  5. Epistemological Access through Lecture Materials in Multiple Modes and Language Varieties: The Role of Ideologies and Multilingual Literacy Practices in Student Evaluations of Such Materials at a South African University

    ERIC Educational Resources Information Center

    Antia, Bassey E.; Dyers, Charlyn

    2016-01-01

    This paper seeks to address the ways in which ideology and literacy practices shape the responses of students to an ongoing initiative at the University of the Western Cape aimed at diversifying options for epistemological access, specifically the language varieties and the modes in which parts of the curriculum for a third year linguistics module…

  6. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

    PubMed

    Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita

    2014-05-01

    Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme. PMID:24771484

  7. High resolution schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Harten, A.

    1983-01-01

    A class of new explicit second order accurate finite difference schemes for the computation of weak solutions of hyperbolic conservation laws is presented. These highly nonlinear schemes are obtained by applying a nonoscillatory first order accurate scheme to an appropriately modified flux function. The so-derived second order accurate schemes achieve high resolution while preserving the robustness of the original nonoscillatory first order accurate scheme. Numerical experiments are presented to demonstrate the performance of these new schemes.

  8. On applications of chimera grid schemes to store separation

    NASA Technical Reports Server (NTRS)

    Cougherty, F. C.; Benek, J. A.; Steger, J. L.

    1985-01-01

    A finite difference scheme which uses multiple overset meshes to simulate the aerodynamics of aircraft/store interaction and store separation is described. In this chimera, or multiple mesh, scheme, a complex configuration is mapped using a major grid about the main component of the configuration, and minor overset meshes are used to map each additional component such as a store. As a first step in modeling the aerodynamics of store separation, two dimensional inviscid flow calculations were carried out in which one of the minor meshes is allowed to move with respect to the major grid. Solutions of calibrated two dimensional problems indicate that allowing one mesh to move with respect to another does not adversely affect the time accuracy of an unsteady solution. Steady, inviscid three dimensional computations demonstrate the capability to simulate complex configurations, including closely packed multiple bodies.

  9. A quantum access network.

    PubMed

    Fröhlich, Bernd; Dynes, James F; Lucamarini, Marco; Sharpe, Andrew W; Yuan, Zhiliang; Shields, Andrew J

    2013-09-01

    The theoretically proven security of quantum key distribution (QKD) could revolutionize the way in which information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, until now no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we introduce and experimentally demonstrate the concept of a 'quantum access network': based on simple and cost-effective telecommunication technologies, the scheme can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We show that a high-speed single-photon detector positioned at a network node can be shared between up to 64 users for exchanging secret keys with the node, thereby significantly reducing the hardware requirements for each user added to the network. This point-to-multipoint architecture removes one of the main obstacles restricting the widespread application of QKD. It presents a viable method for realizing multi-user QKD networks with efficient use of resources, and brings QKD closer to becoming a widespread technology. PMID:24005413

  10. Fast three-dimensional random access multi-photon microscopy for functional recording of neuronal activity

    NASA Astrophysics Data System (ADS)

    Reddy, Duemani; Saggau, Peter

    2007-07-01

    The dendritic processes of neurons have been shown to possess active and dynamic properties that give them the ability to modulate synaptic integration and shape individual synaptic responses. Effectively studying these properties at multiple locations on a live neuron in highly light scattering brain tissue requires an imaging/recording mechanism with high spatio-temporal resolution as well as optical sectioning and random access site selection capabilities. Our lab has made significant steps in developing such a system by combining the spatial resolution and optical sectioning ability of advanced imaging techniques such as confocal and multi-photon microscopy with the temporal resolution and random access capability provided by acousto-optic laser scanning. However, all systems that have been developed to date restrict fast imaging to two-dimensional (2D) scan patterns. This severely limits the extent to which many neurons can be studied since they represent complex three-dimensional (3D) structures. We have previously demonstrated a scheme for fast 3D scanning which utilizes a unique arrangement of acoustooptic deflectors and does not require axial movements of the objective lens. We have also shown how, when used with the ultra-fast laser pulses needed in multi-photon microscopy, this scheme inherently compensates for the spatial dispersion which would otherwise significantly reduce the resolution of acousto-optic based multi-photon microscopy. We have now coupled this scanning scheme to a modified commercial research microscope and use the combined system to effectively image user-defined sites of interest on fluorescent 3D structures with positioning times that are in the low microsecond (μs) range. The resulting random-access scanning mechanism allows for functional imaging of complex 3D structures such as neuronal dendrites at several thousand volumes per second.

  11. Acceleration of neutrons in a scheme of a tautochronous mathematical pendulum (physical principles)

    SciTech Connect

    Rivlin, Lev A

    2010-12-09

    We consider the physical principles of neutron acceleration through a multiple synchronous interaction with a gradient rf magnetic field in a scheme of a tautochronous mathematical pendulum. (laser applications and other aspects of quantum electronics)

  12. Factors affecting sustainability of rural water schemes in Swaziland

    NASA Astrophysics Data System (ADS)

    Peter, Graciana; Nkambule, Sizwe E.

    The Millennium Development Goal (MDG) target to reduce the proportion of people without sustainable access to safe drinking water by the year 2015 has been met as of 2010, but huge disparities exist. Some regions, particularly Sub-Saharan Africa are lagging behind it is also in this region where up to 30% of the rural schemes are not functional at any given time. There is need for more studies on factors affecting sustainability and necessary measures which when implemented will improve the sustainability of rural water schemes. The main objective of this study was to assess the main factors affecting the sustainability of rural water schemes in Swaziland using a Multi-Criteria Analysis Approach. The main factors considered were: financial, social, technical, environmental and institutional. The study was done in Lubombo region. Fifteen functional water schemes in 11 communities were studied. Data was collected using questionnaires, checklist and focused group discussion guide. A total of 174 heads of households were interviewed. Statistical Package for Social Sciences (SPSS) was used to analyse the data and to calculate sustainability scores for water schemes. SPSS was also used to classify sustainability scores according to sustainability categories: sustainable, partially sustainable and non-sustainable. The averages of the ratings for the different sub-factors studied and the results on the sustainability scores for the sustainable, partially sustainable and non-sustainable schemes were then computed and compared to establish the main factors influencing sustainability of the water schemes. The results indicated technical and social factors as most critical while financial and institutional, although important, played a lesser role. Factors which contributed to the sustainability of water schemes were: functionality; design flow; water fetching time; ability to meet additional demand; use by population; equity; participation in decision making on operation and

  13. Energy partitioning schemes: a dilemma.

    PubMed

    Mayer, I

    2007-01-01

    Two closely related energy partitioning schemes, in which the total energy is presented as a sum of atomic and diatomic contributions by using the "atomic decomposition of identity", are compared on the example of N,N-dimethylformamide, a simple but chemically rich molecule. Both schemes account for different intramolecular interactions, for instance they identify the weak C-H...O intramolecular interactions, but give completely different numbers. (The energy decomposition scheme based on the virial theorem is also considered.) The comparison of the two schemes resulted in a dilemma which is especially striking when these schemes are applied for molecules distorted from their equilibrium structures: one either gets numbers which are "on the chemical scale" and have quite appealing values at the equilibrium molecular geometries, but exhibiting a counter-intuitive distance dependence (the two-center energy components increase in absolute value with the increase of the interatomic distances)--or numbers with too large absolute values but "correct" distance behaviour. The problem is connected with the quick decay of the diatomic kinetic energy components.

  14. Nonlinear secret image sharing scheme.

    PubMed

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  15. Nonlinear secret image sharing scheme.

    PubMed

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively. PMID:25140334

  16. Energy partitioning schemes: a dilemma.

    PubMed

    Mayer, I

    2007-01-01

    Two closely related energy partitioning schemes, in which the total energy is presented as a sum of atomic and diatomic contributions by using the "atomic decomposition of identity", are compared on the example of N,N-dimethylformamide, a simple but chemically rich molecule. Both schemes account for different intramolecular interactions, for instance they identify the weak C-H...O intramolecular interactions, but give completely different numbers. (The energy decomposition scheme based on the virial theorem is also considered.) The comparison of the two schemes resulted in a dilemma which is especially striking when these schemes are applied for molecules distorted from their equilibrium structures: one either gets numbers which are "on the chemical scale" and have quite appealing values at the equilibrium molecular geometries, but exhibiting a counter-intuitive distance dependence (the two-center energy components increase in absolute value with the increase of the interatomic distances)--or numbers with too large absolute values but "correct" distance behaviour. The problem is connected with the quick decay of the diatomic kinetic energy components. PMID:17328441

  17. Nonlinear Secret Image Sharing Scheme

    PubMed Central

    Shin, Sang-Ho; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2⁡m⌉ bit-per-pixel (bpp), respectively. PMID:25140334

  18. Access to What? Access, Diversity and Participation in India's Schools. Research Monograph No. 32

    ERIC Educational Resources Information Center

    Juneja, Nalini

    2010-01-01

    India has witnessed substantial diversification of provision to basic education. Policy changes from 1980s onwards, has seen the creation of para-formal delivery systems and the inclusion in the system of non state providers. The Education Guarantee Scheme and the Alternate Initiatives in Education programmes have generated new pathways to access.…

  19. Consolidating the social health insurance schemes in China: towards an equitable and efficient health system.

    PubMed

    Meng, Qingyue; Fang, Hai; Liu, Xiaoyun; Yuan, Beibei; Xu, Jin

    2015-10-10

    Fragmentation in social health insurance schemes is an important factor for inequitable access to health care and financial protection for people covered by different health insurance schemes in China. To fulfil its commitment of universal health coverage by 2020, the Chinese Government needs to prioritise addressing this issue. After analysing the situation of fragmentation, this Review summarises efforts to consolidate health insurance schemes both in China and internationally. Rural migrants, elderly people, and those with non-communicable diseases in China will greatly benefit from consolidation of the existing health insurance schemes with extended funding pools, thereby narrowing the disparities among health insurance schemes in fund level and benefit package. Political commitments, institutional innovations, and a feasible implementation plan are the major elements needed for success in consolidation. Achievement of universal health coverage in China needs systemic strategies including consolidation of the social health insurance schemes.

  20. A Hybrid Nonlinear Control Scheme for Active Magnetic Bearings

    NASA Technical Reports Server (NTRS)

    Xia, F.; Albritton, N. G.; Hung, J. Y.; Nelms, R. M.

    1996-01-01

    A nonlinear control scheme for active magnetic bearings is presented in this work. Magnet winding currents are chosen as control inputs for the electromechanical dynamics, which are linearized using feedback linearization. Then, the desired magnet currents are enforced by sliding mode control design of the electromagnetic dynamics. The overall control scheme is described by a multiple loop block diagram; the approach also falls in the class of nonlinear controls that are collectively known as the 'integrator backstepping' method. Control system hardware and new switching power electronics for implementing the controller are described. Various experiments and simulation results are presented to demonstrate the concepts' potentials.

  1. [Artificial nutrition in children (I): enteral access].

    PubMed

    Estevão-Costa, José

    2014-01-01

    Appropriate nutritional support is crucial in the therapeutic approach of multiple conditions, which justifies the frequent and increasing use of specific access routes for enteral and parenteral nutrition. This article reviews the relevant literature concerning indications, procedures, effectiveness and complications of enteral access routes in children. The decision between gastric and postpyloric access, and between nasogastric tube and gastrostomy is thoroughly discussed. Percutaneous endoscopic gastrostomy is the most commonly used technique when a long-term gastric access is required, given its efficacy and safety although the associated morbidity is not negligible;laparoscopic gastrostomy emerges as a potentially advantageous alternative.

  2. Vector-quantization-based scheme for data embedding for images

    NASA Astrophysics Data System (ADS)

    Liu, Ning; Subbalakshmi, Koduvayur P.

    2004-06-01

    Today, data hiding has become more and more important in a variety of applications including security. Since Costa's work in the context of communication, the set of quantization based schemes have been proposed as one class of data hiding schemes. Most of these schemes are based on uniform scalar quantizer, which is optimal only if the host signal is uniformly distributed. In this paper, we propose pdf -matched embedding schemes, which not only consider pdf -matched quantizers, but also extend them to multiple dimensions. Specifically, our contributions to this paper are: We propose a pdf-matched embedding (PME) scheme by generalizing the probability distribution of host image and then constructing a pdf-matched quantizer as the starting point. We show experimentally that the proposed pdf-matched quantizer provides better trade-offs between distortion caused by embedding, the robustness to attacks and the embedding capacity. We extend our algorithm to embed a vector of bits in a host signal vector. We show by experiments that our scheme can be closer to the data hiding capacity by embedding larger dimension bit vectors in larger dimension VQs. Two enhancements have been proposed to our method: by vector flipping and by using distortion compensation (DC-PME), that serve to further decrease the embedding distortion. For the 1-D case, the PME scheme shows a 1 dB improvement over the QIM method in a robustness-distortion sense, while DC-PME is 1 dB better than DC-QIM and the 4-D vector quantizer based PME scheme performs about 3 dB better than the 1-D PME.

  3. United States Access Board

    MedlinePlus

    ... Communications & IT Access to information and communication technology (ICT) is addressed by Board standards and guidelines issued ... Engineer (November 3) Access Board Approves Rules on ICT Refresh and Medical Diagnostic Equipment (September 14) Access ...

  4. Modeling mandatory access control in role-based security systems

    SciTech Connect

    Nyanchama, M.; Osborn, S.

    1996-12-31

    This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic definitions of roles, their application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information context. By handling each of the role contexts as independent security levels of information, we simulate mandatory access by imposing the requirements of mandatory access control. Among the key considerations, we propose a means of taming Trojan horses by imposing acyclic information flow among contexts in role-based protection systems. The acyclic information flows and suitable access rules incorporate secrecy which is an essential component of mandatory access control.

  5. A provably-secure ECC-based authentication scheme for wireless sensor networks.

    PubMed

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-11-06

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.

  6. A provably-secure ECC-based authentication scheme for wireless sensor networks.

    PubMed

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009

  7. Invisibly Sanitizable Digital Signature Scheme

    NASA Astrophysics Data System (ADS)

    Miyazaki, Kunihiko; Hanaoka, Goichiro; Imai, Hideki

    A digital signature does not allow any alteration of the document to which it is attached. Appropriate alteration of some signed documents, however, should be allowed because there are security requirements other than the integrity of the document. In the disclosure of official information, for example, sensitive information such as personal information or national secrets is masked when an official document is sanitized so that its nonsensitive information can be disclosed when it is requested by a citizen. If this disclosure is done digitally by using the current digital signature schemes, the citizen cannot verify the disclosed information because it has been altered to prevent the leakage of sensitive information. The confidentiality of official information is thus incompatible with the integrity of that information, and this is called the digital document sanitizing problem. Conventional solutions such as content extraction signatures and digitally signed document sanitizing schemes with disclosure condition control can either let the sanitizer assign disclosure conditions or hide the number of sanitized portions. The digitally signed document sanitizing scheme we propose here is based on the aggregate signature derived from bilinear maps and can do both. Moreover, the proposed scheme can sanitize a signed document invisibly, that is, no one can distinguish whether the signed document has been sanitized or not.

  8. Upwind Compact Finite Difference Schemes

    NASA Astrophysics Data System (ADS)

    Christie, I.

    1985-07-01

    It was shown by Ciment, Leventhal, and Weinberg ( J. Comput. Phys.28 (1978), 135) that the standard compact finite difference scheme may break down in convection dominated problems. An upwinding of the method, which maintains the fourth order accuracy, is suggested and favorable numerical results are found for a number of test problems.

  9. On symmetric and upwind TVD schemes

    NASA Technical Reports Server (NTRS)

    Yee, H. C.

    1985-01-01

    A class of explicit and implicit total variation diminishing (TVD) schemes for the compressible Euler and Navier-Stokes equations was developed. They do not generate spurious oscillations across shocks and contact discontinuities. In general, shocks can be captured within 1 to 2 grid points. For the inviscid case, these schemes are divided into upwind TVD schemes and symmetric (nonupwind) TVD schemes. The upwind TVD scheme is based on the second-order TVD scheme. The symmetric TVD scheme is a generalization of Roe's and Davis' TVD Lax-Wendroff scheme. The performance of these schemes on some viscous and inviscid airfoil steady-state calculations is investigated. The symmetric and upwind TVD schemes are compared.

  10. A maternal health voucher scheme: what have we learned from the demand-side financing scheme in Bangladesh?

    PubMed

    Ahmed, Shakil; Khan, M Mahmud

    2011-01-01

    It is now more than 2 years since the Ministry of Health and Family Welfare of the Government of Bangladesh implemented the Maternal Health Voucher Scheme, a specialized form of demand-side financing programme. To analyse the early lessons from the scheme, information was obtained through semi-structured interviews with stakeholders at the sub-district level. The analysis identified a number of factors affecting the efficiency and performance of the scheme in the program area: delay in the release of voucher funds, selection criteria used for enrolling pregnant women in the programme, incentives created by the reimbursement system, etc. One of the objectives of the scheme was to encourage market competition among health care providers, but it failed to increase market competitiveness in the area. The resources made available through the scheme did not attract any new providers into the market and public facilities remained the only eligible provider both before and after scheme implementation. However, incentives provided through the voucher system did motivate public providers to offer a higher level of services. The beneficiaries expressed their overall satisfaction with the scheme as well. Since the local facility was not technically ready to provide all types of maternal health care services, providing vouchers may not improve access to care for many pregnant women. To improve the performance of the demand-side strategy, it has become important to adopt some supply-side interventions. In poor developing countries, a demand-side strategy may not be very effective without significant expansion of the service delivery capacity of health facilities at the sub-district level.

  11. A Parameter Estimation Scheme for Multiscale Kalman Smoother (MKS) Algorithm Used in Precipitation Data Fusion

    NASA Technical Reports Server (NTRS)

    Wang, Shugong; Liang, Xu

    2013-01-01

    A new approach is presented in this paper to effectively obtain parameter estimations for the Multiscale Kalman Smoother (MKS) algorithm. This new approach has demonstrated promising potentials in deriving better data products based on data of different spatial scales and precisions. Our new approach employs a multi-objective (MO) parameter estimation scheme (called MO scheme hereafter), rather than using the conventional maximum likelihood scheme (called ML scheme) to estimate the MKS parameters. Unlike the ML scheme, the MO scheme is not simply built on strict statistical assumptions related to prediction errors and observation errors, rather, it directly associates the fused data of multiple scales with multiple objective functions in searching best parameter estimations for MKS through optimization. In the MO scheme, objective functions are defined to facilitate consistency among the fused data at multiscales and the input data at their original scales in terms of spatial patterns and magnitudes. The new approach is evaluated through a Monte Carlo experiment and a series of comparison analyses using synthetic precipitation data. Our results show that the MKS fused precipitation performs better using the MO scheme than that using the ML scheme. Particularly, improvements are significant compared to that using the ML scheme for the fused precipitation associated with fine spatial resolutions. This is mainly due to having more criteria and constraints involved in the MO scheme than those included in the ML scheme. The weakness of the original ML scheme that blindly puts more weights onto the data associated with finer resolutions is overcome in our new approach.

  12. An effective BIST scheme for SRAM full speed test

    NASA Astrophysics Data System (ADS)

    Zhang, Lijun; Yu, Yue; Zheng, Jianbin; Song, Xiaoyu

    2011-09-01

    This article presents a novel built-in self-test (BIST) scheme at full speed test where access time test is performed. Based on normal BIST circuits, we harness an all digital phase locked loop to generate a high-frequency clock for static random access memory (SRAM) performance test at full speed. A delay chain is incorporated to achieve the four-phase clock. As inputs to SRAM, clock, address, data are generated in terms of the four-phase clock. Key performance parameters, such as access time, address setup and hold times, are measured. The test chip has been fabricated by United Microelectronics Corporation 55 nm CMOS logic standard process. According to test results, the maximum test frequency is about 1.3 GHz, and the test precision is about 35 ps at the typical process corner with supply voltage 1.0 V and temperature 25°C.

  13. Multiple Pregnancy

    MedlinePlus

    ... is called multiple pregnancy . If more than one egg is released during the menstrual cycle and each ... fraternal twins (or more). When a single fertilized egg splits, it results in multiple identical embryos. This ...

  14. Multiple myeloma

    MedlinePlus

    Plasma cell dyscrasia; Plasma cell myeloma; Malignant plasmacytoma; Plasmacytoma of bone; Myeloma - multiple ... Multiple myeloma most commonly causes: Low red blood cell count ( anemia ), which can lead to fatigue and ...

  15. Multiple Sclerosis

    MedlinePlus

    Multiple sclerosis (MS) is a nervous system disease that affects your brain and spinal cord. It damages the ... attacks healthy cells in your body by mistake. Multiple sclerosis affects women more than men. It often begins ...

  16. Finger Multiplication

    ERIC Educational Resources Information Center

    Simanihuruk, Mudin

    2011-01-01

    Multiplication facts are difficult to teach. Therefore many researchers have put a great deal of effort into finding multiplication strategies. Sherin and Fuson (2005) provided a good survey paper on the multiplication strategies research area. Kolpas (2002), Rendtorff (1908), Dabell (2001), Musser (1966) and Markarian (2009) proposed the finger…

  17. Multiple Sclerosis

    MedlinePlus

    ... Awards Enhancing Diversity Find People About NINDS NINDS Multiple Sclerosis Information Page Condensed from Multiple Sclerosis: Hope Through ... en Español Additional resources from MedlinePlus What is Multiple Sclerosis? An unpredictable disease of the central nervous system, ...

  18. A contention-based bus-control scheme for multiprocessor systems

    NASA Technical Reports Server (NTRS)

    Juang, Jie-Yong; Wah, Benjamin W.

    1991-01-01

    The authors study contention-based bus-control schemes for scheduling processors in using a bit-parallel shared bus. The protocol is designed under the requirements that each processor exhibit a random access behavior, that there be no centralized bus control in the system, and that access be granted in real time. The proposed scheme is based on splitting algorithms used in conventional contention-resolution schemes, and utilizes two-state information obtained from collision detection. Two versions of the bus-control scheme are studied. The static one resolves contentions of N requesting processors in an average of O(logW/2N) iterations, where W is the number of bits in the bit-parallel bus. An adaptive version resolves contentions in an average time that is independent of N.

  19. A Theory of Access

    ERIC Educational Resources Information Center

    Ribot, Jesse C.; Peluso, Nancy Lee

    2003-01-01

    The term "access" is frequently used by property and natural resource analysts without adequate definition. In this paper we develop a concept of access and examine a broad set of factors that differentiate access from property. We define access as "the "ability" to derive benefits from things," broadening from property's classical definition as…

  20. Stability analysis of implicit multi-fluid schemes

    SciTech Connect

    Kunz, R.F.; Cope, W.K.; Venkateswaran, S.

    1997-06-01

    A new implicit method has been developed for solving the viscous full multi-fluid equations, which incorporate transport and generation of mass and momentum for each component present in a system. This work presents stability analysis and application of the important full multi-fluid system in a fully implicit algorithm. The stability analyses presented demonstrate the performance of several iterative schemes applied to the solution of the linearized systems which arise in the formulation. These include block Jacobi and symmetric block Gauss-Siedel schemes with various preconditioners applied. A hierarchy of increasing physical complexity is pursued, starting with one-dimensional, two-fluid systems with minimum inter-field dynamic coupling and no mass transfer. These analyses are extended to systems employing physically important inter-field forces (drag, turbulence dispersion, virtual mass). The effects of mass transfer, multiple fields (i.e., n{phi} > 2) and multiple dimensions are also considered. A two-fluid Navier-Stokes code has been developed based on this new scheme. Results are presented which verify the validity of the stability analyses presented for the coupled scheme. Multi-phase flows which require full multi-fluid modeling arise in a wide class of engineering problems, where non-equilibrium dynamics and thermodynamics of the interfaces between constituents play important roles in the evolution of the ensemble averaged mean flow. Examples include cyclone separators, two-phase flow in jets and curved ducts and boiling flow in heat exchangers.

  1. BLE protection scheme for light-trail WDM mesh networks

    NASA Astrophysics Data System (ADS)

    Xing, Junwei; Wang, Hongxiang; Ji, Yuefeng

    2007-11-01

    Light-trail is a solution to providing high resource utilization and sub-wavelength support [1]. A light-trail is a multi-point light-path, such that multiple users can take part in communication along the trail, through time (differentiated) non-overlapping connections. This multi-point flow model leads to a new set of problems in the area of protecting and restoring light-trail based networks. Conventional link protection which just protects the existed connection in the light-trail at the time of the failure is not sufficient for light-trails because of the potential of having multiple possible source-destination pairs in the same trail over time. The fact is demonstrated and explained detailedly in [4]. In this paper, a novel protection mechanism is proposed for light-trail WDM mesh network, which is Backup Light-trail Expending scheme. Subsequently the performance of this scheme is evaluated and compared to conventional Connection Dedicated Protection Scheme. Numerical results obtained by simulation indicate that, Backup Light-trail Expending Scheme has a faster restoration time and better wavelength utilization.

  2. Multiplicity Counting

    SciTech Connect

    Geist, William H.

    2015-12-01

    This set of slides begins by giving background and a review of neutron counting; three attributes of a verification item are discussed: 240Pueff mass; α, the ratio of (α,n) neutrons to spontaneous fission neutrons; and leakage multiplication. It then takes up neutron detector systems – theory & concepts (coincidence counting, moderation, die-away time); detector systems – some important details (deadtime, corrections); introduction to multiplicity counting; multiplicity electronics and example distributions; singles, doubles, and triples from measured multiplicity distributions; and the point model: multiplicity mathematics.

  3. Group statistical channel coding dimming scheme in visible light communication system

    NASA Astrophysics Data System (ADS)

    Zhuang, Kaiyu; Huang, Zhitong; Zhang, Ruqi; Li, Jianfeng; Ji, Yuefeng

    2016-10-01

    In this paper, we propose a group statistical channel coding (GSCC) scheme, which achieves dimming by changing the ratio of the 0-1 symbol of the original data stream through probabilistic statistics method. The simulation under various brightness conditions displays that the GSCC maintains good performance comparing to PWM dimming with half satisfice of transmission rate and a larger dimming intensity. Simulation of GSCC after combining with other channel coding schemes reflects that GSCC has good compatibility to arbitrary access coded signal.

  4. Multi-area layered multicast scheme for MPLS networks

    NASA Astrophysics Data System (ADS)

    Ma, Yajie; Yang, Zongkai; Wang, Yuming; Chen, Jingwen

    2005-02-01

    Multi-protocol label switching (MPLS) is multiprotocols both at layer 2 and layer 3. It is suggested to overcome the shortcomings of performing complex longest prefix matching in layer 3 routing by using short, fixed length labels. The MPLS community has put more effort into the label switching of unicast IP traffic, but less in the MPLS multicast mechanism. The reasons are the higher label consumption, the dynamical mapping of L3 multicast tree to L2 LSPs and the 20-bit shim header which is much fewer than the IPv4 IP header. On the other hand, heterogeneity of node capability degrades total performance of a multicast group. In order to achieve the scalability as well as the heterogeneity in MPLS networks, a novel scheme of MPLS-based Multi-area Layered Multicast Scheme (MALM) is proposed. Unlike the existing schemes which focus on aggregating the multicast stream, we construct the multicast tree based on the virtual topology aggregation. The MPLS area is divided into different sub-areas to form the hierarchical virtual topology and the multicast group is reconstructed into multiple layers according to the node capability. At the same time, the label stack is used to save the label space. For stability of the MALM protocol, a multi-layer protection scheme is also discussed. The experiment results show that the proposed scheme saves label space and decrease the Multicast Forwarding Table in much degree.

  5. Stable maps and Quot schemes

    NASA Astrophysics Data System (ADS)

    Popa, Mihnea; Roth, Mike

    2003-06-01

    In this paper we study the relationship between two different compactifications of the space of vector bundle quotients of an arbitrary vector bundle on a curve. One is Grothendieck's Quot scheme, while the other is a moduli space of stable maps to the relative Grassmannian. We establish an essentially optimal upper bound on the dimension of the two compactifications. Based on that, we prove that for an arbitrary vector bundle, the Quot schemes of quotients of large degree are irreducible and generically smooth. We precisely describe all the vector bundles for which the same thing holds in the case of the moduli spaces of stable maps. We show that there are in general no natural morphisms between the two compactifications. Finally, as an application, we obtain new cases of a conjecture on effective base point freeness for pluritheta linear series on moduli spaces of vector bundles.

  6. A patient privacy protection scheme for medical information system.

    PubMed

    Lu, Chenglang; Wu, Zongda; Liu, Mingyong; Chen, Wei; Guo, Junfang

    2013-12-01

    In medical information systems, there are a lot of confidential information about patient privacy. It is therefore an important problem how to prevent patient's personal privacy information from being disclosed. Although traditional security protection strategies (such as identity authentication and authorization access control) can well ensure data integrity, they cannot prevent system's internal staff (such as administrators) from accessing and disclosing patient privacy information. In this paper, we present an effective scheme to protect patients' personal privacy for a medical information system. In the scheme, privacy data before being stored in the database of the server of a medical information system would be encrypted using traditional encryption algorithms, so that the data even if being disclosed are also difficult to be decrypted and understood. However, to execute various kinds of query operations over the encrypted data efficiently, we would also augment the encrypted data with additional index, so as to process as much of the query as possible at the server side, without the need to decrypt the data. Thus, in this paper, we mainly explore how the index of privacy data is constructed, and how a query operation over privacy data is translated into a new query over the corresponding index so that it can be executed at the server side immediately. Finally, both theoretical analysis and experimental evaluation validate the practicality and effectiveness of our proposed scheme.

  7. A patient privacy protection scheme for medical information system.

    PubMed

    Lu, Chenglang; Wu, Zongda; Liu, Mingyong; Chen, Wei; Guo, Junfang

    2013-12-01

    In medical information systems, there are a lot of confidential information about patient privacy. It is therefore an important problem how to prevent patient's personal privacy information from being disclosed. Although traditional security protection strategies (such as identity authentication and authorization access control) can well ensure data integrity, they cannot prevent system's internal staff (such as administrators) from accessing and disclosing patient privacy information. In this paper, we present an effective scheme to protect patients' personal privacy for a medical information system. In the scheme, privacy data before being stored in the database of the server of a medical information system would be encrypted using traditional encryption algorithms, so that the data even if being disclosed are also difficult to be decrypted and understood. However, to execute various kinds of query operations over the encrypted data efficiently, we would also augment the encrypted data with additional index, so as to process as much of the query as possible at the server side, without the need to decrypt the data. Thus, in this paper, we mainly explore how the index of privacy data is constructed, and how a query operation over privacy data is translated into a new query over the corresponding index so that it can be executed at the server side immediately. Finally, both theoretical analysis and experimental evaluation validate the practicality and effectiveness of our proposed scheme. PMID:24166018

  8. A biometric signcryption scheme without bilinear pairing

    NASA Astrophysics Data System (ADS)

    Wang, Mingwen; Ren, Zhiyuan; Cai, Jun; Zheng, Wentao

    2013-03-01

    How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis's fuzzy extractor method and Liu's original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.

  9. MAVID multiple alignment server.

    PubMed

    Bray, Nicolas; Pachter, Lior

    2003-07-01

    MAVID is a multiple alignment program suitable for many large genomic regions. The MAVID web server allows biomedical researchers to quickly obtain multiple alignments for genomic sequences and to subsequently analyse the alignments for conserved regions. MAVID has been successfully used for the alignment of closely related species such as primates and also for the alignment of more distant organisms such as human and fugu. The server is fast, capable of aligning hundreds of kilobases in less than a minute. The multiple alignment is used to build a phylogenetic tree for the sequences, which is subsequently used as a basis for identifying conserved regions in the alignment. The server can be accessed at http://baboon.math.berkeley.edu/mavid/.

  10. A user anonymity preserving three-factor authentication scheme for telecare medicine information systems.

    PubMed

    Tan, Zuowen

    2014-03-01

    The telecare medicine information system enables the patients gain health monitoring at home and access medical services over internet or mobile networks. In recent years, the schemes based on cryptography have been proposed to address the security and privacy issues in the telecare medicine information systems. However, many schemes are insecure or they have low efficiency. Recently, Awasthi and Srivastava proposed a three-factor authentication scheme for telecare medicine information systems. In this paper, we show that their scheme is vulnerable to the reflection attacks. Furthermore, it fails to provide three-factor security and the user anonymity. We propose a new three-factor authentication scheme for the telecare medicine information systems. Detailed analysis demonstrates that the proposed scheme provides mutual authentication, server not knowing password and freedom of password, biometric update and three-factor security. Moreover, the new scheme provides the user anonymity. As compared with the previous three-factor authentication schemes, the proposed scheme is more secure and practical. PMID:24643750

  11. A user anonymity preserving three-factor authentication scheme for telecare medicine information systems.

    PubMed

    Tan, Zuowen

    2014-03-01

    The telecare medicine information system enables the patients gain health monitoring at home and access medical services over internet or mobile networks. In recent years, the schemes based on cryptography have been proposed to address the security and privacy issues in the telecare medicine information systems. However, many schemes are insecure or they have low efficiency. Recently, Awasthi and Srivastava proposed a three-factor authentication scheme for telecare medicine information systems. In this paper, we show that their scheme is vulnerable to the reflection attacks. Furthermore, it fails to provide three-factor security and the user anonymity. We propose a new three-factor authentication scheme for the telecare medicine information systems. Detailed analysis demonstrates that the proposed scheme provides mutual authentication, server not knowing password and freedom of password, biometric update and three-factor security. Moreover, the new scheme provides the user anonymity. As compared with the previous three-factor authentication schemes, the proposed scheme is more secure and practical.

  12. World Wide Access: Accessible Web Design.

    ERIC Educational Resources Information Center

    Washington Univ., Seattle.

    This brief paper considers the application of "universal design" principles to Web page design in order to increase accessibility for people with disabilities. Suggestions are based on the World Wide Web Consortium's accessibility initiative, which has proposed guidelines for all Web authors and federal government standards. Seven guidelines for…

  13. Bounds on the information rate of quantum-secret-sharing schemes

    SciTech Connect

    Sarvepalli, Pradeep

    2011-04-15

    An important metric of the performance of a quantum-secret-sharing scheme is its information rate. Beyond the fact that the information rate is upper-bounded by one, very little is known in terms of bounds on the information rate of quantum-secret-sharing schemes. Furthermore, not every scheme can be realized with rate one. In this paper we derive upper bounds for the information rates of quantum-secret-sharing schemes. We show that there exist quantum access structures on n players for which the information rate cannot be better than O((log{sub 2}n)/n). These results are the quantum analogues of the bounds for classical-secret-sharing schemes proved by Csirmaz.

  14. Adaptive Directional Multicast Scheme in mmWave WPANs with Directional Antennas

    NASA Astrophysics Data System (ADS)

    Shin, Kyungchul; Kim, Youngsun; Kang, Chul-Hee

    This letter considers problems with an efficient link layer multicasting technique in a wireless personal area network environment using a directional antenna. First, we propose an adaptive directional multicast scheme (ADMS) for delay-sensitive applications in mmWave WPAN with directional antenna. Second, the proposed ADMS aims to improve throughput as well as satisfy the application-specific delay requirements. We evaluate the performances of legacy Medium Access Control, Life Centric Approach, and adaptive directional multicast schemes via QualNet 5.0. Our results show that the proposed scheme provides better performance in terms of total network throughput, average transmission time, packet delivery ratio and decodable frame ratio.

  15. The interprocedural analysis and automatic parallelization of scheme programs

    SciTech Connect

    Harrison, W.L. III.

    1989-01-01

    Lisp and its descendants are among the most important and widely used of programming languages. At the same time, parallelism in the architecture of computer systems is becoming commonplace. There is a pressing need to extend the technology of automatic parallelization that has become available to Fortran programmers of parallel machines, to the realm of Lisp programs and symbolic computing. In this thesis the authors presents a comprehensive approach to the compilation of Scheme programs for share-memory multiprocessors. The strategy has two principal components: interprocedural analysis and program restructuring. He introduces procedure strings and stack configurations as a framework in which to reason about interprocedural side-effects and object lifetimes, and develop a system of interprocedural analysis, using abstract interpretation, that is used in the dependence analysis and memory management of Scheme programs. He introduces the transformations of exit-loop translation and recursion splitting to treat the control structures of iteration and recursion that arise commonly in Scheme programs. He proposes an alternative representation for s-expressions that facilitates the parallel creation and access of lists. He has implemented these ideas in a parallelizing scheme compiler and run-time system, and he complements the theory of the work with snapshots of programs during the restructuring process, and some preliminary performance results of the execution of object codes produced by the compiler.

  16. Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems.

    PubMed

    Jiang, Qi; Ma, Jianfeng; Lu, Xiang; Tian, Youliang

    2014-02-01

    To ensure only authorized access to medical services, several authentication schemes for telecare medicine information systems (TMIS) have been proposed in the literature. Due to its better performance than traditional cryptography, Hao et al. proposed an authentication scheme for TMIS using chaotic map based cryptography. They claimed that their scheme could resist various attacks, including the smart card stolen attack. However, we identify that their scheme is vulnerable to the stolen smart card attack. The reason causing the stolen smart card attack is that the scheme is designed based on the assumption that the scheme itself achieves user untraceability. Then, we propose a robust authentication and key agreement scheme. Compared with the previous schemes, our scheme not only enjoys more security features, but also has better efficiency. Our analysis indicates that designing a two-factor authentication scheme based on the assumption that privacy protection is achieved in the scheme itself may pose potential security risks. The lesson learned is that, we should avoid this situation in the future design of two-factor authentication schemes. PMID:24493073

  17. TVD schemes for open channel flow

    NASA Astrophysics Data System (ADS)

    Delis, A. I.; Skeels, C. P.

    1998-04-01

    The Saint Venant equations for modelling flow in open channels are solved in this paper, using a variety of total variation diminishing (TVD) schemes. The performance of second- and third-order-accurate TVD schemes is investigated for the computation of free-surface flows, in predicting dam-breaks and extreme flow conditions created by the river bed topography. Convergence of the schemes is quantified by comparing error norms between subsequent iterations. Automatically calculated time steps and entropy corrections allow high CFL numbers and smooth transition between different conditions. In order to compare different approaches with TVD schemes, the most accurate of each type was chosen. All four schemes chosen proved acceptably accurate. However, there are important differences between the schemes in the occurrence of clipping, overshooting and oscillating behaviour and in the highest CFL numbers allowed by a scheme. These variations in behaviour stem from the different orders and inherent properties of the four schemes.

  18. High-performance CAM-based Prolog execution scheme

    NASA Astrophysics Data System (ADS)

    Ali-Yahia, Tahar; Dana, Michel

    1991-03-01

    In this paper, we present an execution scheme allowing a direct and a pipeline evaluation of a Prolog Program. The execution scheme enhances Prolog performances in interpreted mode, by means of associative processing tools embodied in Content Addressable Memories and potential parallelism existing between clauses selection, unification, and access to clause arguments. The interpretation algorithm is distributed on several processing units, which are Content Addressable Memories (CAMs). These latter are generic and reconfigurable dealing with much more Artificial Intelligence applications, through improved target languages like Prolog, Lisp, and Object oriented languages. The model has been evaluated with a functional simulator written in Le-lisp. The results show the CAMs feasibility in improving Prolog execution at performances greater than 160 KLIPS, in interpreted mode.

  19. BJPsych Bulletin author mentoring scheme - helping trainees become published authors.

    PubMed

    Pimm, Jonathan; Galbraith, Niall

    2016-02-01

    The publishing world is changing rapidly. Innovations include the move to open access, the rise of social media and the transition to digitalisation. In the light of these developments and with ever-increasing pressures on early career psychiatrists and trainees to publish papers in journals with a recognised pedigree, the BJPsych Bulletin is piloting an author mentoring scheme. Mentors will help clinicians and aspiring academics develop articles from a pedestrian manuscript to one that will hopefully provoke important debate and aid changes in current practices. The scheme will run on a trial basis for approximately 12 months and will then be reviewed. Mentoring has been found to have an important effect of research output including publication and grant success; the hope is that this new initiative at the BJPsych Bulletin will result in such dividends to all involved. PMID:26958356

  20. BJPsych Bulletin author mentoring scheme - helping trainees become published authors.

    PubMed

    Pimm, Jonathan; Galbraith, Niall

    2016-02-01

    The publishing world is changing rapidly. Innovations include the move to open access, the rise of social media and the transition to digitalisation. In the light of these developments and with ever-increasing pressures on early career psychiatrists and trainees to publish papers in journals with a recognised pedigree, the BJPsych Bulletin is piloting an author mentoring scheme. Mentors will help clinicians and aspiring academics develop articles from a pedestrian manuscript to one that will hopefully provoke important debate and aid changes in current practices. The scheme will run on a trial basis for approximately 12 months and will then be reviewed. Mentoring has been found to have an important effect of research output including publication and grant success; the hope is that this new initiative at the BJPsych Bulletin will result in such dividends to all involved.

  1. Multiobjective hyper heuristic scheme for system design and optimization

    NASA Astrophysics Data System (ADS)

    Rafique, Amer Farhan

    2012-11-01

    As system design is becoming more and more multifaceted, integrated, and complex, the traditional single objective optimization trends of optimal design are becoming less and less efficient and effective. Single objective optimization methods present a unique optimal solution whereas multiobjective methods present pareto front. The foremost intent is to predict a reasonable distributed pareto-optimal solution set independent of the problem instance through multiobjective scheme. Other objective of application of intended approach is to improve the worthiness of outputs of the complex engineering system design process at the conceptual design phase. The process is automated in order to provide the system designer with the leverage of the possibility of studying and analyzing a large multiple of possible solutions in a short time. This article presents Multiobjective Hyper Heuristic Optimization Scheme based on low level meta-heuristics developed for the application in engineering system design. Herein, we present a stochastic function to manage meta-heuristics (low-level) to augment surety of global optimum solution. Generic Algorithm, Simulated Annealing and Swarm Intelligence are used as low-level meta-heuristics in this study. Performance of the proposed scheme is investigated through a comprehensive empirical analysis yielding acceptable results. One of the primary motives for performing multiobjective optimization is that the current engineering systems require simultaneous optimization of conflicting and multiple. Random decision making makes the implementation of this scheme attractive and easy. Injecting feasible solutions significantly alters the search direction and also adds diversity of population resulting in accomplishment of pre-defined goals set in the proposed scheme.

  2. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  3. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks. PMID:25666924

  4. Multiple-Replica Strategies for Free-Energy Calculations in NAMD: Multiple-Walker Adaptive Biasing Force and Walker Selection Rules.

    PubMed

    Comer, Jeffrey; Phillips, James C; Schulten, Klaus; Chipot, Christophe

    2014-12-01

    From the most powerful supercomputers to multicore desktops and laptops, parallel computing architectures have been in the mainstream for some time. However, numerical schemes for calculating free energies in molecular systems that directly leverage this hardware paradigm, usually taking the form of multiple-replica strategies, are just now on the cusp of becoming standard practice. Here, we present a modification of the popular molecular dynamics program NAMD that is envisioned to facilitate the use of powerful multiple-replica strategies to improve ergodic sampling for a specific class of free-energy methods known as adaptive biasing force. We describe the software implementation in a so-called multiple-walker context, alongside the interface that makes the proposed approach accessible to the end users. We further evaluate the performance of the adaptive biasing force multiple-walker strategy for a model system, namely, the reversible folding of a short peptide, and show, in particular, in regions of the transition coordinate where convergence of the free-energy calculation is encumbered by hidden barriers, that the multiple-walker strategy can yield far more reliable results in appreciably less real time on parallel architectures, relative to standard, single-replica calculations. PMID:26583211

  5. Multiple-Replica Strategies for Free-Energy Calculations in NAMD: Multiple-Walker Adaptive Biasing Force and Walker Selection Rules.

    PubMed

    Comer, Jeffrey; Phillips, James C; Schulten, Klaus; Chipot, Christophe

    2014-12-01

    From the most powerful supercomputers to multicore desktops and laptops, parallel computing architectures have been in the mainstream for some time. However, numerical schemes for calculating free energies in molecular systems that directly leverage this hardware paradigm, usually taking the form of multiple-replica strategies, are just now on the cusp of becoming standard practice. Here, we present a modification of the popular molecular dynamics program NAMD that is envisioned to facilitate the use of powerful multiple-replica strategies to improve ergodic sampling for a specific class of free-energy methods known as adaptive biasing force. We describe the software implementation in a so-called multiple-walker context, alongside the interface that makes the proposed approach accessible to the end users. We further evaluate the performance of the adaptive biasing force multiple-walker strategy for a model system, namely, the reversible folding of a short peptide, and show, in particular, in regions of the transition coordinate where convergence of the free-energy calculation is encumbered by hidden barriers, that the multiple-walker strategy can yield far more reliable results in appreciably less real time on parallel architectures, relative to standard, single-replica calculations.

  6. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    NASA Technical Reports Server (NTRS)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  7. Pay scheme preferences and health policy objectives.

    PubMed

    Abelsen, Birgit

    2011-04-01

    This paper studies the preferences among healthcare workers towards pay schemes involving different levels of risk. It identifies which pay scheme individuals would prefer for themselves, and which they think is best in furthering health policy objectives. The paper adds, methodologically, a way of defining pay schemes that include different levels of risk. A questionnaire was mailed to a random sample of 1111 dentists. Respondents provided information about their current and preferred pay schemes, and indicated which pay scheme, in their opinion, would best further overall health policy objectives. A total of 504 dentists (45%) returned the questionnaire, and there was no indication of systematic non-response bias. All public dentists had a current pay scheme based on a fixed salary and the majority of individuals preferred a pay scheme with more income risk. Their preferred pay schemes coincided with the ones believed to further stabilise healthcare personnel. The predominant current pay scheme among private dentists was based solely on individual output, and the majority of respondents preferred this pay scheme. In addition, their preferred pay schemes coincided with the ones believed to further efficiency objectives. Both public and private dentists believed that pay schemes, furthering efficiency objectives, had to include more performance-related pay than the ones believed to further stability and quality objectives. PMID:20565995

  8. Quantum Signature Scheme with Weak Arbitrator

    NASA Astrophysics Data System (ADS)

    Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian

    2012-07-01

    In this paper, we propose one quantum signature scheme with a weak arbitrator to sign classical messages. This scheme can preserve the merits in the original arbitrated scheme with some entanglement resources, and provide a higher efficiency in transmission and reduction the complexity of implementation. The arbitrator is costless and only involved in the disagreement case.

  9. Open Access Alternatives

    ERIC Educational Resources Information Center

    Tenopir, Carol

    2004-01-01

    Open access publishing is a hot topic today. But open access publishing can have many different definitions, and pros and cons vary with the definitions. Open access publishing is especially attractive to companies and small colleges or universities that are likely to have many more readers than authors. A downside is that a membership fee sounds…

  10. [Accessible Rural Housing.

    ERIC Educational Resources Information Center

    Baker, Nick, Ed.

    1995-01-01

    This issue of the quarterly newsletter "Rural Exchange" provides information and resources on accessible rural housing for the disabled. "Accessible Manufactured Housing Could Increase Rural Home Supply" (Nick Baker) suggests that incorporation of access features such as lever door handles and no-step entries into manufactured housing could help…

  11. Demystifying Remote Access

    ERIC Educational Resources Information Center

    Howe, Grant

    2009-01-01

    With money tight, more and more districts are considering remote access as a way to reduce expenses and budget information technology costs more effectively. Remote access allows staff members to work with a hosted software application from any school campus without being tied to a specific physical location. Each school can access critical…

  12. Open Access and beyond.

    PubMed

    Mathur, Shawn; Schmidt, Christian; Das, Chhaya; Tucker, Philip W

    2006-01-01

    Uncensored exchange of scientific results hastens progress. Open Access does not stop at the removal of price and permission barriers; still, censorship and reading disabilities, to name a few, hamper access to information. Here, we invite the scientific community and the public to discuss new methods to distribute, store and manage literature in order to achieve unfettered access to literature. PMID:16956402

  13. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  14. Optical induction scheme for assembling nondiffracting aperiodic Vogel spirals

    SciTech Connect

    Diebel, Falko Rose, Patrick; Boguslawski, Martin; Denz, Cornelia

    2014-05-12

    We introduce an experimental approach to realize aperiodic photonic lattices based on multiplexing of nondiffracting Bessel beams. This holographic optical induction scheme takes advantage of the well localized Bessel beam as a basis to assemble two-dimensional photonic lattices. We present the realization of an optically induced two-dimensional golden-angle Vogel spiral lattice, which belongs to the family of deterministic aperiodic structures. With our technique, a very broad class of photonic refractive index landscapes now becomes accessible to optical induction, which could not be realized with established distributed holographic techniques.

  15. Optical induction scheme for assembling nondiffracting aperiodic Vogel spirals

    NASA Astrophysics Data System (ADS)

    Diebel, Falko; Rose, Patrick; Boguslawski, Martin; Denz, Cornelia

    2014-05-01

    We introduce an experimental approach to realize aperiodic photonic lattices based on multiplexing of nondiffracting Bessel beams. This holographic optical induction scheme takes advantage of the well localized Bessel beam as a basis to assemble two-dimensional photonic lattices. We present the realization of an optically induced two-dimensional golden-angle Vogel spiral lattice, which belongs to the family of deterministic aperiodic structures. With our technique, a very broad class of photonic refractive index landscapes now becomes accessible to optical induction, which could not be realized with established distributed holographic techniques.

  16. Aspects of the Problems of Bibliographic Access to University Library Collections.

    ERIC Educational Resources Information Center

    Aguolu, C. C.

    1979-01-01

    Problems of providing bibliographic access to university library-based information sources are discussed with focus upon bibliographies, card and union catalogs, and library classification schemes. (Author/MBR)

  17. On symmetric and upwind TVD schemes

    NASA Technical Reports Server (NTRS)

    Yee, H. C.

    1986-01-01

    The performance of the upwind and symmetric total variation diminishing (TVD) schemes in viscous and inviscid airfoil steady-state calculations is considered, and the extension of the implicit second-order-accurate TVD scheme for hyperbolic systems of conservative laws in curvilinear coordinates is discussed. For two-dimensional steady-state applications, schemes are implemented in a conservative noniterative alternating direction implicit form, and results illustrate that the algorithm produces a fairly good solution for an RAE2822 airfoil calculation. The study demonstrates that the symmetric TVD scheme is as accurate as the upwind TVD scheme, while requiring less computational effort than it.

  18. Construction of weighted upwind compact scheme

    NASA Astrophysics Data System (ADS)

    Wang, Zhengjie

    Enormous endeavor has been devoted in spatial high order high resolution schemes in more than twenty five years previously, like total variation diminishing (TVD), essentially non-oscillatory scheme, weighted essentially non-oscillatory scheme for finite difference, and Discontinuous Galerkin methods for finite element and the finite volume. In this dissertation, a high order finite difference Weighted Upwind Compact Scheme has been constructed by dissipation and dispersion analysis. Secondly, a new method to construct global weights has been tested. Thirdly, a methodology to compromise dissipation and dispersion in constructing Weighted Upwind Compact Scheme has been derived. Finally, several numerical test cases have been shown.

  19. Multiple Myeloma Treatment (Beyond the Basics)

    MedlinePlus

    ... the Licensed Materials from any location via the Internet. b. STANDALONE WORKSTATION: A standalone subscription permits multiple ... computer. A Standalone Workstation license does not include Internet access to the Licensed Materials. c. INSTITUTIONAL SUBSCRIPTION: ...

  20. Multiple homicides.

    PubMed

    Copeland, A R

    1989-09-01

    A study of multiple homicides or multiple deaths involving a solitary incident of violence by another individual was performed on the case files of the Office of the Medical Examiner of Metropolitan Dade County in Miami, Florida, during 1983-1987. A total of 107 multiple homicides were studied: 88 double, 17 triple, one quadruple, and one quintuple. The 236 victims were analyzed regarding age, race, sex, cause of death, toxicologic data, perpetrator, locale of the incident, and reason for the incident. This article compares this type of slaying with other types of homicide including those perpetrated by serial killers. Suggestions for future research in this field are offered.

  1. A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Wen, Fengtong

    2013-12-01

    User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic. PMID:24146334

  2. An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.

    PubMed

    Chaudhry, Shehzad Ashraf; Mahmood, Khalid; Naqvi, Husnain; Khan, Muhammad Khurram

    2015-11-01

    Telecare medicine information system (TMIS) offers the patients convenient and expedite healthcare services remotely anywhere. Patient security and privacy has emerged as key issues during remote access because of underlying open architecture. An authentication scheme can verify patient's as well as TMIS server's legitimacy during remote healthcare services. To achieve security and privacy a number of authentication schemes have been proposed. Very recently Lu et al. (J. Med. Syst. 39(3):1-8, 2015) proposed a biometric based three factor authentication scheme for TMIS to confiscate the vulnerabilities of Arshad et al.'s (J. Med. Syst. 38(12):136, 2014) scheme. Further, they emphasized the robustness of their scheme against several attacks. However, in this paper we establish that Lu et al.'s scheme is vulnerable to numerous attacks including (1) Patient anonymity violation attack, (2) Patient impersonation attack, and (3) TMIS server impersonation attack. Furthermore, their scheme does not provide patient untraceability. We then, propose an improvement of Lu et al.'s scheme. We have analyzed the security of improved scheme using popular automated tool ProVerif. The proposed scheme while retaining the plusses of Lu et al.'s scheme is also robust against known attacks.

  3. An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.

    PubMed

    Chaudhry, Shehzad Ashraf; Mahmood, Khalid; Naqvi, Husnain; Khan, Muhammad Khurram

    2015-11-01

    Telecare medicine information system (TMIS) offers the patients convenient and expedite healthcare services remotely anywhere. Patient security and privacy has emerged as key issues during remote access because of underlying open architecture. An authentication scheme can verify patient's as well as TMIS server's legitimacy during remote healthcare services. To achieve security and privacy a number of authentication schemes have been proposed. Very recently Lu et al. (J. Med. Syst. 39(3):1-8, 2015) proposed a biometric based three factor authentication scheme for TMIS to confiscate the vulnerabilities of Arshad et al.'s (J. Med. Syst. 38(12):136, 2014) scheme. Further, they emphasized the robustness of their scheme against several attacks. However, in this paper we establish that Lu et al.'s scheme is vulnerable to numerous attacks including (1) Patient anonymity violation attack, (2) Patient impersonation attack, and (3) TMIS server impersonation attack. Furthermore, their scheme does not provide patient untraceability. We then, propose an improvement of Lu et al.'s scheme. We have analyzed the security of improved scheme using popular automated tool ProVerif. The proposed scheme while retaining the plusses of Lu et al.'s scheme is also robust against known attacks. PMID:26399937

  4. High-Order Energy Stable WENO Schemes

    NASA Technical Reports Server (NTRS)

    Yamaleev, Nail K.; Carpenter, Mark H.

    2008-01-01

    A new third-order Energy Stable Weighted Essentially NonOscillatory (ESWENO) finite difference scheme for scalar and vector linear hyperbolic equations with piecewise continuous initial conditions is developed. The new scheme is proven to be stable in the energy norm for both continuous and discontinuous solutions. In contrast to the existing high-resolution shock-capturing schemes, no assumption that the reconstruction should be total variation bounded (TVB) is explicitly required to prove stability of the new scheme. A rigorous truncation error analysis is presented showing that the accuracy of the 3rd-order ESWENO scheme is drastically improved if the tuning parameters of the weight functions satisfy certain criteria. Numerical results show that the new ESWENO scheme is stable and significantly outperforms the conventional third-order WENO finite difference scheme of Jiang and Shu in terms of accuracy, while providing essentially nonoscillatory solutions near strong discontinuities.

  5. On the fly all-optical packet switching based on hybrid WDM/OCDMA labeling scheme

    NASA Astrophysics Data System (ADS)

    Brahmi, Houssem; Giannoulis, Giannis; Menif, Mourad; Katopodis, Vasilis; Kalavrouziotis, Dimitrios; Kouloumentas, Christos; Groumas, Panos; Kanakis, Giannis; Stamatiadis, Christos; Avramopoulos, Hercules; Erasme, Didier

    2014-02-01

    We introduce a novel design of an all-optical packet routing node that allows for the selection and forwarding of optical packets based on the routing information contained in hybrid wavelength division multiplexing/optical code division multiple access (WDM/OCDMA) labels. A stripping paradigm of optical code-label is adopted. The router is built around an optical-code gate that consists in an optical flip-flop controlled by two fiber Bragg grating correlators and is combined with a Mach-Zehnder interferometer (MZI)-based forwarding gate. We experimentally verify the proof-of-principle operation of the proposed self-routing node under NRZ and OCDMA packet traffic conditions. The successful switching of elastic NRZ payload at 40 Gb/s controlled by DS-OCDMA coded labels and the forwarding operation of encoded data using EQC codes are presented. Proper auto-correlation functions are obtained with higher than 8.1 dB contrast ratio, suitable to efficiently trigger the latching device with a contrast ratio of 11.6 dB and switching times below 3.8 ns. Error-free operation is achieved with 1.5 dB penalty for 40 Gb/s NRZ data and with 2.1 dB penalty for DS-OCDMA packets. The scheme can further be applied to large-scale optical packet switching networks by exploiting efficient optical coders allocated at different WDM channels.

  6. The Development of Multiplicative Reasoning in the Learning of Mathematics.

    ERIC Educational Resources Information Center

    Harel, Guershon, Ed.; Confrey, Jere, Ed.

    This book is a compilation of recent research on the development of multiplicative concepts. The sections and chapters are: (1) Theoretical Approaches: "Children's Multiplying Schemes" (L. Steffe), "Multiplicative Conceptual Field: What and Why?" (G. Vergnaud), "Extending the Meaning of Multiplication and Division" (B. Greer); (2) The Role of the…

  7. Assessment of Multiplication Fact Fluency

    ERIC Educational Resources Information Center

    Ford, Marilyn Sue; Usnick, Virginia

    2011-01-01

    This project had two major goals: to determine the usefulness of individually-administered interview process to access elementary students' fluency with basic multiplication facts, and to determine whether a developmental sequence found in Australian mathematics education literature applied to elementary students in the United States. Students in…

  8. Development of a random access multiphoton microscope for fast three-dimensional functional recording of neuronal activity

    NASA Astrophysics Data System (ADS)

    Reddy, Duemani; Saggau, Peter

    2007-02-01

    Over the past two decades, the dendritic processes of neurons have been shown to possess active and dynamic properties that give them the ability to modulate synaptic integration and shape individual synaptic responses. Effectively studying these properties at multiple locations on a live neuron in highly scattering brain tissue requires an imaging/recording mechanism with high spatiotemporal resolution as well as optical sectioning and random access site selection capabilities. Our lab has made significant steps in developing such a system by combining the spatial resolution and optical sectioning ability of imaging techniques such as confocal and multi-photon microscopy with the temporal resolution and random access capability provided by acousto-optic laser scanning. However, all systems that have been developed to date restrict fast imaging to two-dimensional (2D) scan patterns. This severely limits the extent to which many neurons can be studied since they represent complex three-dimensional (3D) structures. We have previously demonstrated a scheme for fast 3D scanning which utilizes a unique arrangement of multiple acousto-optic deflectors and does not require axial movements of the objective lens. Here we couple this scanning scheme to a modified commercial research microscope and use the combined system to effectively image user-defined sites of interest on fluorescent 3D structures with positioning times that are in the low microsecond range. The resulting random-access scanning mechanism allows for functional imaging of complex 3D cellular structures such as neuronal dendrites at frames rates on the order of tens of kilohertz.

  9. Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment.

    PubMed

    Chiou, Shin-Yan; Ying, Zhaoqin; Liu, Junqiang

    2016-04-01

    Medical systems allow patients to receive care at different hospitals. However, this entails considerable inconvenience through the need to transport patients and their medical records between hospitals. The development of Telecare Medicine Information Systems (TMIS) makes it easier for patients to seek medical treatment and to store and access medical records. However, medical data stored in TMIS is not encrypted, leaving patients' private data vulnerable to external leaks. In 2014, scholars proposed a new cloud-based medical information model and authentication scheme which would not only allow patients to remotely access medical services but also protects patient privacy. However, this scheme still fails to provide patient anonymity and message authentication. Furthermore, this scheme only stores patient medical data, without allowing patients to directly access medical advice. Therefore, we propose a new authentication scheme, which provides anonymity, unlinkability, and message authentication, and allows patients to directly and remotely consult with doctors. In addition, our proposed scheme is more efficient in terms of computation cost. The proposed system was implemented in Android system to demonstrate its workability. PMID:26875078

  10. Uniformly second-order-accurate essentially nonoscillatory schemes for the Euler equations

    NASA Astrophysics Data System (ADS)

    Yang, J. Y.

    1990-12-01

    Two time-level explicit and implicit finite-difference shock-capturing schemes based on the characteristic flux difference splitting method and the modified flux approach with the essentially nonoscillatory (ENO) property of Harten and Osher have been developed for the two-dimensional Euler equations. The methods are conservative, uniformly second-order accurate in time and space, even at local extrema. General coordinate systems are used to treat complex geometries. Standard alternating direction implicit approximate factorization is used for constructing implicit schemes. Numerical results have been obtained for unsteady shock wave reflection around general two-dimensional blunt bodies and for steady transonic flows over a circular arc bump in a channel. Properties of ENO schemes as applied to two-dimensional flows with multiple embedded discontinuities are discussed. Comparisons of the performance between the present ENO schemes and the previous total variation diminishing schemes is also included.

  11. The Social Meanings of the C-Card Scheme: The Importance of Friends and Peers

    ERIC Educational Resources Information Center

    Cheetham, Mandy

    2014-01-01

    This paper draws on findings from an analysis of interviews with young people aged 14-18 years, to explore the peer influences in young people's informal social networks which can affect their access to sexual health services. The research focuses on the social meanings of a C-Card condom distribution scheme in North East England. Such…

  12. Classroom Games: The Allocation of Renewable Resources under Different Property Rights and Regulation Schemes.

    ERIC Educational Resources Information Center

    Giraud, Kelly L.; Herrmann, Mark

    2002-01-01

    Describes a renewable resource allocation game designed to stimulate student interest in and understanding of market failure associated with open-access types of resource use. Employs the game to discuss advantages and disadvantages of property rights and regulation schemes. States the game benefits noneconomics majors in natural resource…

  13. What are the emerging features of community health insurance schemes in East Africa?

    PubMed Central

    Basaza, Robert; Pariyo, George; Criel, Bart

    2009-01-01

    Background The three East African countries of Uganda, Tanzania, and Kenya are characterized by high poverty levels, population growth rates, prevalence of HIV/AIDS, under-funding of the health sector, poor access to quality health care, and small health insurance coverage. Tanzania and Kenya have user-fees whereas Uganda abolished user-fees in public-owned health units. Objective To provide comparative description of community health insurance (CHI) schemes in three East African countries of Uganda, Tanzania, and Kenya and thereafter provide a basis for future policy research for development of CHI schemes. Methods An analytical grid of 10 distinctive items pertaining to the nature of CHI schemes was developed so as to have a uniform lens of comparing country situations of CHI. Results and conclusions The majority of the schemes have been in existence for a relatively short time of less than 10 years and their number remains small. There is need for further research to identify what is the mix and weight of factors that cause people to refrain from joining schemes. Specific issues that could also be addressed in subsequent studies are whether the current schemes provide financial protection, increase access to quality of care and impact on the equity of health services financing and delivery. On the basis of this knowledge, rational policy decisions can be taken. The governments thereafter could consider an option of playing more roles in advocacy, paying for the poorest, and developing an enabling policy and legal framework. PMID:22312207

  14. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  15. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  16. MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values

    NASA Astrophysics Data System (ADS)

    Kadhem, Hasan; Amagasa, Toshiyuki; Kitagawa, Hiroyuki

    Encryption can provide strong security for sensitive data against inside and outside attacks. This is especially true in the “Database as Service” model, where confidentiality and privacy are important issues for the client. In fact, existing encryption approaches are vulnerable to a statistical attack because each value is encrypted to another fixed value. This paper presents a novel database encryption scheme called MV-OPES (Multivalued — Order Preserving Encryption Scheme), which allows privacy-preserving queries over encrypted databases with an improved security level. Our idea is to encrypt a value to different multiple values to prevent statistical attacks. At the same time, MV-OPES preserves the order of the integer values to allow comparison operations to be directly applied on encrypted data. Using calculated distance (range), we propose a novel method that allows a join query between relations based on inequality over encrypted values. We also present techniques to offload query execution load to a database server as much as possible, thereby making a better use of server resources in a database outsourcing environment. Our scheme can easily be integrated with current database systems as it is designed to work with existing indexing structures. It is robust against statistical attack and the estimation of true values. MV-OPES experiments show that security for sensitive data can be achieved with reasonable overhead, establishing the practicability of the scheme.

  17. High resolution TVD schemes for interface tracking

    NASA Astrophysics Data System (ADS)

    Nandi, K.; Walker, S. P.; Date, A. W.

    2016-06-01

    A first order upwind difference scheme (UDS) is routinely adopted for representing convection terms in a discretised space. UDS provides stable solutions. However it also introduces false diffusion in situations in which the flow direction is oblique relative to the numerical grid or when the cell-Peclet number is large. In order to predict sharp interface, higher order upwind schemes are preferred because of they reduce numerical dissipation. In interfacial flows, density and viscosity vary sharply in space. Representation of convective terms by Total variation diminishing (TVD) schemes ensures reduced smearing without impairing convergence property. TVD schemes develop formulae for interpolation of a cell-face value of the transported variable. If the interpolated value is bounded by the neighbouring nodal values then the scheme is `Bounded'. However, not all TVD schemes possess this property of `Boundedness'. The Normalised Variable Diagram (NVD) defines a domain within which the TVD scheme is bounded. Thus by combining the features of both TVD schemes and ensuring that they fall with the defined area of NVD, the convergence as well as the boundedness of a computational scheme can be ensured. In this paper, six different higher order schemes are considered some which are TVD bounded or unbounded, to solve the well known interface tracking problem of Rayleigh-Taylor Instability. To the best of our knowledge, a comparison of combined TVD/NVD principles in the case of interface tracking problems has not been reported in published literature.

  18. FORCE schemes on unstructured meshes I: Conservative hyperbolic systems

    NASA Astrophysics Data System (ADS)

    Toro, Eleuterio F.; Hidalgo, Arturo; Dumbser, Michael

    2009-05-01

    This paper is about the construction of numerical fluxes of the centred type for one-step schemes in conservative form for solving general systems of conservation laws in multiple space dimensions on structured and unstructured meshes. The work is a multi-dimensional extension of the one-dimensional FORCE flux and is closely related to the work of Nessyahu-Tadmor and Arminjon. The resulting basic flux is first-order accurate and monotone; it is then extended to arbitrary order of accuracy in space and time on unstructured meshes in the framework of finite volume and discontinuous Galerkin methods. The performance of the schemes is assessed on a suite of test problems for the multi-dimensional Euler and Magnetohydrodynamics equations on unstructured meshes.

  19. An Efficient Scheduling Scheme on Charging Stations for Smart Transportation

    NASA Astrophysics Data System (ADS)

    Kim, Hye-Jin; Lee, Junghoon; Park, Gyung-Leen; Kang, Min-Jae; Kang, Mikyung

    This paper proposes a reservation-based scheduling scheme for the charging station to decide the service order of multiple requests, aiming at improving the satisfiability of electric vehicles. The proposed scheme makes it possible for a customer to reduce the charge cost and waiting time, while a station can extend the number of clients it can serve. A linear rank function is defined based on estimated arrival time, waiting time bound, and the amount of needed power, reducing the scheduling complexity. Receiving the requests from the clients, the power station decides the charge order by the rank function and then replies to the requesters with the waiting time and cost it can guarantee. Each requester can decide whether to charge at that station or try another station. This scheduler can evolve to integrate a new pricing policy and services, enriching the electric vehicle transport system.

  20. A scheme for supporting distributed data structures on multicomputers

    NASA Technical Reports Server (NTRS)

    Hiranandani, Seema; Saltz, Joel; Berryman, Harry; Mehrotra, Piyush

    1990-01-01

    A data migration mechanism is proposed that allows an explicit and controlled mapping of data to memory. While read or write copies of each data element can be assigned to any processor's memory, longer term storage of each data element is assigned to a specific location in the memory of a particular processor. The proposed integration of a data migration scheme with a compiler is able to eliminate the migration of unneeded data that can occur in multiprocessor paging or caching. The overhead of adjudicating multiple concurrent writes to the same page or cache line is also eliminated. Data is presented that suggests that the scheme may be a pratical method for efficiently supporting data migration.

  1. Generation of multiple-particle cluster state via cavity QED

    NASA Astrophysics Data System (ADS)

    Lin, Gong-Wei; Lin, Xiu-Min; Chen, Li-Bo; Du, Qian-Hua; Chen, Zhi-Hua

    2008-01-01

    This paper proposes schemes for generating multiple-photon and multiple-atom cluster states, respectively. The schemes are based on the cavity input-output process and atomic or photonic states measurement, and the successful probabilities approach unity in the ideal case. The numerical simulations show that the produced multiple-particle cluster states have high fidelity even if the Lamb-Dicke condition is not satisfied. Some practical imperfections, such as atomic spontaneous emission and output coupling inefficiency, only decrease the success probability but exert no influence on the fidelity of generated multiple-particle cluster states. From the experimental point of view, smaller operation number and lack of need for individual addressing keeps the schemes easy to implement. These schemes may offer a promising approach to the generation of a large-scale cluster state.

  2. An authentication scheme to healthcare security under wireless sensor networks.

    PubMed

    Hsiao, Tsung-Chih; Liao, Yu-Ting; Huang, Jen-Yan; Chen, Tzer-Shyong; Horng, Gwo-Boa

    2012-12-01

    In recent years, Taiwan has been seeing an extension of the average life expectancy and a drop in overall fertility rate, initiating our country into an aged society. Due to this phenomenon, how to provide the elderly and patients with chronic diseases a suitable healthcare environment has become a critical issue presently. Therefore, we propose a new scheme that integrates healthcare services with wireless sensor technology in which sensor nodes are employed to measure patients' vital signs. Data collected from these sensor nodes are then transmitted to mobile devices of the medical staff and system administrator, promptly enabling them to understand the patients' condition in real time, which will significantly improve patients' healthcare quality. As per the personal data protection act, patients' vital signs can only be accessed by authorized medical staff. In order to protect patients', the system administrator will verify the medical staff's identity through the mobile device using a smart card and password mechanism. Accordingly, only the verified medical staff can obtain patients' vital signs data such as their blood pressure, pulsation, and body temperature, etc.. Besides, the scheme includes a time-bounded characteristic that allows the verified staff access to data without having to have to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrator and user. PMID:22399067

  3. An authentication scheme to healthcare security under wireless sensor networks.

    PubMed

    Hsiao, Tsung-Chih; Liao, Yu-Ting; Huang, Jen-Yan; Chen, Tzer-Shyong; Horng, Gwo-Boa

    2012-12-01

    In recent years, Taiwan has been seeing an extension of the average life expectancy and a drop in overall fertility rate, initiating our country into an aged society. Due to this phenomenon, how to provide the elderly and patients with chronic diseases a suitable healthcare environment has become a critical issue presently. Therefore, we propose a new scheme that integrates healthcare services with wireless sensor technology in which sensor nodes are employed to measure patients' vital signs. Data collected from these sensor nodes are then transmitted to mobile devices of the medical staff and system administrator, promptly enabling them to understand the patients' condition in real time, which will significantly improve patients' healthcare quality. As per the personal data protection act, patients' vital signs can only be accessed by authorized medical staff. In order to protect patients', the system administrator will verify the medical staff's identity through the mobile device using a smart card and password mechanism. Accordingly, only the verified medical staff can obtain patients' vital signs data such as their blood pressure, pulsation, and body temperature, etc.. Besides, the scheme includes a time-bounded characteristic that allows the verified staff access to data without having to have to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrator and user.

  4. Sequential Feedback Scheme Outperforms the Parallel Scheme for Hamiltonian Parameter Estimation

    NASA Astrophysics Data System (ADS)

    Yuan, Haidong

    2016-10-01

    Measurement and estimation of parameters are essential for science and engineering, where the main quest is to find the highest achievable precision with the given resources and design schemes to attain it. Two schemes, the sequential feedback scheme and the parallel scheme, are usually studied in the quantum parameter estimation. While the sequential feedback scheme represents the most general scheme, it remains unknown whether it can outperform the parallel scheme for any quantum estimation tasks. In this Letter, we show that the sequential feedback scheme has a threefold improvement over the parallel scheme for Hamiltonian parameter estimations on two-dimensional systems, and an order of O (d +1 ) improvement for Hamiltonian parameter estimation on d -dimensional systems. We also show that, contrary to the conventional belief, it is possible to simultaneously achieve the highest precision for estimating all three components of a magnetic field, which sets a benchmark on the local precision limit for the estimation of a magnetic field.

  5. Access to modern contraception.

    PubMed

    Welsh, Michael J; Stanback, John; Shelton, James

    2006-06-01

    Access to modern contraception has become a recognized human right, improving the health and well-being of women, families and societies worldwide. However, contraceptive access remains uneven. Irregular contraceptive supply, limited numbers of service delivery points and specific geographic, economic, informational, psychosocial and administrative barriers (including medical barriers) undermine access in many settings. Widening the range of providers enabled to offer contraception can improve contraceptive access, particularly where resources are most scarce. International efforts to remove medical barriers include the World Health Organization's Medical Eligibility Criteria. Based on the best available evidence, these criteria provide guidance for weighing the risks and benefits of contraceptive choice among women with specific clinical conditions. Clinical job aids can also improve access. More research is needed to further elucidate the pathways for expanding contraceptive access. Further progress in removing medical barriers will depend on systems for improving provider education and promoting evidence-based contraceptive service delivery. PMID:16443395

  6. How can conceptual schemes change teaching?

    NASA Astrophysics Data System (ADS)

    Wickman, Per-Olof

    2012-03-01

    Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.

  7. An evolutionary Bayesian search scheme for ultrasound modulated optical tomography

    NASA Astrophysics Data System (ADS)

    Venugopal, Mamatha; Roy, Debasish; Vasu, Ram Mohan

    2016-04-01

    Ultrasound modulated optical tomography (UMOT) combines high optical contrast with high ultrasound resolution to image soft tissues. A focused ultrasound beam introduced to a specific region of interest (ROI) in the object modulates the mean position of the scattering centers locally. This in turn modulates the overall decay of the specific intensity of an incident coherent light beam as it passes through the insonified region. The inverse problem of UMOT aims to recover the mean-squared displacements of the scattering centers from the measured amplitude autocorrelation of light. We propose an evolutionary Bayesian search scheme to invert the measurements through repeated solves of the correlation diffusion equation so as to drive the resultant measurement-prediction misfit to a zero-mean Brownian process. The discretized parameter vector evolves as a stochastic process with respect to an iteration variable and follows a recursive prediction-update algorithm. The conventional multiplicative-weight-based Bayesian update schemes suffer from sample degeneracy and are consequently ill-equipped to solve large dimensional problems in imaging. The key idea of this work is to incorporate a derivative-free additive correction to the predicted parameter process via a gain term that is functionally analogous to the weights. The numerical results for simulated data indicate that the proposed scheme substantively improves the reconstruction accuracy vis-à-vis a popularly adopted regularized Gauss-Newton approach. The advantage of a derivative-free scheme is particularly highlighted in cases characterized by low sensitivity of measurements to variations in the parameters. Moreover, the proposed scheme circumvents the tedious Jacobian calculations involved in a Gauss-Newton approach.

  8. The Impact of Microphysical Schemes on Hurricane Intensity and Track

    NASA Technical Reports Server (NTRS)

    Tao, Wei-Kuo; Shi, Jainn Jong; Chen, Shuyi S.; Lang, Stephen; Lin, Pay-Liam; Hong, Song-You; Peters-Lidard, Christa; Hou, Arthur

    2011-01-01

    During the past decade, both research and operational numerical weather prediction models [e.g. the Weather Research and Forecasting Model (WRF)] have started using more complex microphysical schemes originally developed for high-resolution cloud resolving models (CRMs) with 1-2 km or less horizontal resolutions. WRF is a next-generation meso-scale forecast model and assimilation system. It incorporates a modern software framework, advanced dynamics, numerics and data assimilation techniques, a multiple moveable nesting capability, and improved physical packages. WRF can be used for a wide range of applications, from idealized research to operational forecasting, with an emphasis on horizontal grid sizes in the range of 1-10 km. The current WRF includes several different microphysics options. At NASA Goddard, four different cloud microphysics options have been implemented into WRF. The performance of these schemes is compared to those of the other microphysics schemes available in WRF for an Atlantic hurricane case (Katrina). In addition, a brief review of previous modeling studies on the impact of microphysics schemes and processes on the intensity and track of hurricanes is presented and compared against the current Katrina study. In general, all of the studies show that microphysics schemes do not have a major impact on track forecasts but do have more of an effect on the simulated intensity. Also, nearly all of the previous studies found that simulated hurricanes had the strongest deepening or intensification when using only warm rain physics. This is because all of the simulated precipitating hydrometeors are large raindrops that quickly fall out near the eye-wall region, which would hydrostatically produce the lowest pressure. In addition, these studies suggested that intensities become unrealistically strong when evaporative cooling from cloud droplets and melting from ice particles are removed as this results in much weaker downdrafts in the simulated

  9. On the security of a dynamic ID-based authentication scheme for telecare medical information systems.

    PubMed

    Lin, Han-Yu

    2013-04-01

    Telecare medical information systems (TMISs) are increasingly popular technologies for healthcare applications. Using TMISs, physicians and caregivers can monitor the vital signs of patients remotely. Since the database of TMISs stores patients' electronic medical records (EMRs), only authorized users should be granted the access to this information for the privacy concern. To keep the user anonymity, recently, Chen et al. proposed a dynamic ID-based authentication scheme for telecare medical information system. They claimed that their scheme is more secure and robust for use in a TMIS. However, we will demonstrate that their scheme fails to satisfy the user anonymity due to the dictionary attacks. It is also possible to derive a user password in case of smart card loss attacks. Additionally, an improved scheme eliminating these weaknesses is also presented.

  10. Collision Resolution Scheme with Offset for Improved Performance of Heterogeneous WLAN

    NASA Astrophysics Data System (ADS)

    Upadhyay, Raksha; Vyavahare, Prakash D.; Tokekar, Sanjiv

    2016-03-01

    CSMA/CA based DCF of 802.11 MAC layer employs best effort delivery model, in which all stations compete for channel access with same priority. Heterogeneous conditions result in unfairness among stations and degradation in throughput, therefore, providing different priorities to different applications for required quality of service in heterogeneous networks is challenging task. This paper proposes a collision resolution scheme with a novel concept of introducing offset, which is suitable for heterogeneous networks. Selection of random value by a station for its contention with offset results in reduced probability of collision. Expression for the optimum value of the offset is also derived. Results show that proposed scheme, when applied to heterogeneous networks, has improved throughput and fairness than conventional scheme. Results show that proposed scheme also exhibits higher throughput and fairness with reduced delay in homogeneous networks.

  11. On the security of a dynamic ID-based authentication scheme for telecare medical information systems.

    PubMed

    Lin, Han-Yu

    2013-04-01

    Telecare medical information systems (TMISs) are increasingly popular technologies for healthcare applications. Using TMISs, physicians and caregivers can monitor the vital signs of patients remotely. Since the database of TMISs stores patients' electronic medical records (EMRs), only authorized users should be granted the access to this information for the privacy concern. To keep the user anonymity, recently, Chen et al. proposed a dynamic ID-based authentication scheme for telecare medical information system. They claimed that their scheme is more secure and robust for use in a TMIS. However, we will demonstrate that their scheme fails to satisfy the user anonymity due to the dictionary attacks. It is also possible to derive a user password in case of smart card loss attacks. Additionally, an improved scheme eliminating these weaknesses is also presented. PMID:23345092

  12. Accelerating global access to plant diversity information.

    PubMed

    Lughadha, Eimear Nic; Miller, Chuck

    2009-11-01

    Botanic gardens play key roles in the development and dissemination of plant information resources. Drivers for change have included progress in information technology, growing public expectations of electronic access and international conservation policy. Great advances have been made in the quantity, quality and accessibility of plant information in digital form and the extent to which information from multiple providers can be accessed through a single portal. However, significant challenges remain to be addressed in making botanic gardens resources maximally accessible and impactful, not least the overwhelming volume of material which still awaits digitisation. The year 2010 represents an opportunity for botanic gardens to showcase their collaborative achievements in delivery of electronic plant information and reinforce their relevance to pressing environmental issues.

  13. Curvilinear bicubic spline fit interpolation scheme

    NASA Technical Reports Server (NTRS)

    Chi, C.

    1973-01-01

    Modification of the rectangular bicubic spline fit interpolation scheme so as to make it suitable for use with a polar grid pattern. In the proposed modified scheme the interpolation function is expressed in terms of the radial length and the arc length, and the shape of the patch, which is a wedge or a truncated wedge, is taken into account implicitly. Examples are presented in which the proposed interpolation scheme was used to reproduce the equations of a hemisphere.

  14. Quantum Authentication Scheme Based on Entanglement Swapping

    NASA Astrophysics Data System (ADS)

    Penghao, Niu; Yuan, Chen; Chong, Li

    2016-01-01

    Based on the entanglement swapping, a quantum authentication scheme with a trusted- party is proposed in this paper. With this scheme, two users can perform mutual identity authentication to confirm each other's validity. In addition, the scheme is proved to be secure under circumstances where a malicious attacker is capable of monitoring the classical and quantum channels and has the power to forge all information on the public channel.

  15. Simulation of the Australian Mobilesat signalling scheme

    NASA Technical Reports Server (NTRS)

    Rahman, Mushfiqur

    1990-01-01

    The proposed Australian Mobilesat system will provide a range of circuit switched voice/data services using the B-series satellites. The reliability of the signalling scheme between the Network Management Station (NMS) and the mobile terminal (MT) is of critical importance to the performance of the overall system. Simulation results of the performance of the signalling scheme under various channel conditions and coding schemes are presented.

  16. Web Accessibility and Guidelines

    NASA Astrophysics Data System (ADS)

    Harper, Simon; Yesilada, Yeliz

    Access to, and movement around, complex online environments, of which the World Wide Web (Web) is the most popular example, has long been considered an important and major issue in the Web design and usability field. The commonly used slang phrase ‘surfing the Web’ implies rapid and free access, pointing to its importance among designers and users alike. It has also been long established that this potentially complex and difficult access is further complicated, and becomes neither rapid nor free, if the user is disabled. There are millions of people who have disabilities that affect their use of the Web. Web accessibility aims to help these people to perceive, understand, navigate, and interact with, as well as contribute to, the Web, and thereby the society in general. This accessibility is, in part, facilitated by the Web Content Accessibility Guidelines (WCAG) currently moving from version one to two. These guidelines are intended to encourage designers to make sure their sites conform to specifications, and in that conformance enable the assistive technologies of disabled users to better interact with the page content. In this way, it was hoped that accessibility could be supported. While this is in part true, guidelines do not solve all problems and the new WCAG version two guidelines are surrounded by controversy and intrigue. This chapter aims to establish the published literature related to Web accessibility and Web accessibility guidelines, and discuss limitations of the current guidelines and future directions.

  17. Reoperative venous access.

    PubMed

    Juno, Russell J; Knott, Andrew W; Racadio, John; Warner, Brad W

    2003-05-01

    The maintenance of long-term venous access is critical to the livelihood of children in a variety of clinical situations, especially those who are dependent on parenteral nutrition. Whereas the traditional routes of either peripheral or central venous access are initially adequate, most of these sites eventually succumb to the pitfalls associated with long-term venous access. This review provides a comprehensive and multidisciplinary approach to the management of reoperative venous access with regard to preoperative planning and imaging and specific techniques in interventional radiology and surgery.

  18. Access Interface Strategies

    PubMed Central

    Fager, Susan; Beukelman, David R.; Fried-Oken, Melanie; Jakobs, Tom; Baker, John

    2013-01-01

    Individuals who rely on augmentative and alternative communication (AAC) devices to support their communication often have physical movement challenges that require alternative methods of access. Technology that supports access, particularly for those with the most severe movement deficits, have expanded substantially over the years. The purposes of this article are to review the state of the science of access technologies that interface with augmentative and alternative communication devices and to propose a future research and development agenda that will enhance access options for people with limited movement capability due to developmental and acquired conditions. PMID:22590797

  19. Updating realistic access.

    PubMed

    Rossner, Mike

    2010-05-01

    Nearly six years ago Ira Mellman, then Editor-in-Chief of the JCB, published an editorial entitled "Providing realistic access" (1). It described the Journal's efforts to reconcile its subscription-based business model with the goal of providing public access to scholarly journal content. Since then, developments in the public-access movement are bringing us closer to the ideal of universal public access. But will there still be a place for selective journals like the JCB when we achieve that objective? PMID:20375430

  20. A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes. PMID:25677956

  1. A mosaicing scheme for pose-invariant face recognition.

    PubMed

    Singh, Richa; Vatsa, Mayank; Ross, Arun; Noore, Afzel

    2007-10-01

    Mosaicing entails the consolidation of information represented by multiple images through the application of a registration and blending procedure. We describe a face mosaicing scheme that generates a composite face image during enrollment based on the evidence provided by frontal and semiprofile face images of an individual. Face mosaicing obviates the need to store multiple face templates representing multiple poses of a user's face image. In the proposed scheme, the side profile images are aligned with the frontal image using a hierarchical registration algorithm that exploits neighborhood properties to determine the transformation relating the two images. Multiresolution splining is then used to blend the side profiles with the frontal image, thereby generating a composite face image of the user. A texture-based face recognition technique that is a slightly modified version of the C2 algorithm proposed by Serre et al. is used to compare a probe face image with the gallery face mosaic. Experiments conducted on three different databases indicate that face mosaicing, as described in this paper, offers significant benefits by accounting for the pose variations that are commonly observed in face images. PMID:17926704

  2. AccessAbility @ Cleveland Public Library.

    ERIC Educational Resources Information Center

    Mates, Barbara T.

    2003-01-01

    Describes several programs that were developed by staff at the Cleveland (Ohio) Public Library to be accessible to users with disabilities. Highlights include a Braille reading program; sensory garden; poetry club; book club based on talking books; wheelchair athletics; touching museum artifacts; and a mobile library for users who could not visit…

  3. On Tenth Order Central Spatial Schemes

    SciTech Connect

    Sjogreen, B; Yee, H C

    2007-05-14

    This paper explores the performance of the tenth-order central spatial scheme and derives the accompanying energy-norm stable summation-by-parts (SBP) boundary operators. The objective is to employ the resulting tenth-order spatial differencing with the stable SBP boundary operators as a base scheme in the framework of adaptive numerical dissipation control in high order multistep filter schemes of Yee et al. (1999), Yee and Sj{umlt o}green (2002, 2005, 2006, 2007), and Sj{umlt o}green and Yee (2004). These schemes were designed for multiscale turbulence flows including strong shock waves and combustion.

  4. On central-difference and upwind schemes

    NASA Technical Reports Server (NTRS)

    Swanson, R. C.; Turkel, Eli

    1990-01-01

    A class of numerical dissipation models for central-difference schemes constructed with second- and fourth-difference terms is considered. The notion of matrix dissipation associated with upwind schemes is used to establish improved shock capturing capability for these models. In addition, conditions are given that guarantee that such dissipation models produce a Total Variation Diminishing (TVD) scheme. Appropriate switches for this type of model to ensure satisfaction of the TVD property are presented. Significant improvements in the accuracy of a central-difference scheme are demonstrated by computing both inviscid and viscous transonic airfoil flows.

  5. Direct Eulerian MUSCL scheme for gas dynamics

    SciTech Connect

    Colella, P.

    1985-01-01

    The authors present a second order extension of Godunov's method for gas dynamics in Eulerian coordinates patterned after van Leer's MUSCL scheme for gas dynamics in Lagrangian coordinates. The present method performs the Eulerian calculation in a single step by solving Riemann problems and characteristic equations for the fluxes in the Eulerian frame. The authors also make several modifications in the formulation of MUSCL, applicable to both this scheme and to the original Lagrangian scheme, all aimed at making a more robust and accurate scheme. The authors present the results of test calculations in one and two space variables. 12 references, 5 figures.

  6. A Distributed Network Mobility Management Scheme for Hierarchical Mobile IPv6 Networks

    NASA Astrophysics Data System (ADS)

    Kawano, Keita; Kinoshita, Kazuhiko; Yamai, Nariyoshi

    Route optimization for network mobility is a key technique for providing a node in a mobile network (Mobile Network Node or MNN) with high quality broadband communications. Many schemes adding route optimization function to Network Mobility (NEMO) Basic Support protocol, the standardized network mobility management protocol from the IETF nemo working group, have already been proposed in recent years. One such scheme, a scheme using Hierarchical Mobile IPv6 (HMIPv6) aims to overcome micromobility management issues as well by applying a mechanism based on HMIPv6. The traditional scheme, however, suffers from a significant number of signaling messages as the number of MNNs and/or the number of their Correspondent Nodes (CNs) increase, because many messages notifying the MNNs' Home Agents (HAMNNs) and the CNs of the mobile network's movement are generated simultaneously each time the mobile network moves to the domain of another micromobility management router (Mobility Anchor Point or MAP). This paper proposes a scheme to overcome this problem. Our scheme reduces the number of signaling messages generated at the same time by managing the mobility of MNNs using multiple MAPs distributed within a network for load sharing. The results of simulation experiments show that our scheme works efficiently compared to the traditional scheme when a mobile network has many MNNs and/or these MNNs communicate with many CNs.

  7. Evaluation of Superimposed Sequence Components of Currents based Islanding Detection Scheme during DG Interconnections

    NASA Astrophysics Data System (ADS)

    Sareen, Karan; Bhalja, Bhavesh R.; Maheshwari, Rudra Prakash

    2016-02-01

    A new islanding detection scheme for distribution network containing different types of distributed generations (DGs) is presented in this paper. The proposed scheme is based on acquiring three phase current samples for full cycle duration of each simulation case of islanding/non-islanding conditions at the point of common coupling (PCC) of the targeted DG. Afterwards, superimposed positive & negative sequence components of current are calculated and continuously compared with pre-determined threshold values. Performance of the proposed scheme has been evaluated on diversified islanding and non-islanding events which were generated by modeling standard IEEE 34-bus system using PSCAD/EMTDC software package. The proposed scheme is capable to detect islanding condition rapidly even for perfect power balance situation for both synchronous and inverter based DGs. Furthermore, it remains stable during non-islanding events such as tripping of multiple DGs and different DG interconnection operating conditions. Therefore, the proposed scheme avoids nuisance tripping during diversified non-islanding events. At the end, comparison of the proposed scheme with the existing scheme clearly indicates its advantage over the existing scheme.

  8. Controlled quantum perfect teleportation of multiple arbitrary multi-qubit states

    NASA Astrophysics Data System (ADS)

    Shi, Runhua; Huang, Liusheng; Yang, Wei; Zhong, Hong

    2011-12-01

    We present an efficient controlled quantum perfect teleportation scheme. In our scheme, multiple senders can teleport multiple arbitrary unknown multi-qubit states to a single receiver via a previously shared entanglement state with the help of one or more controllers. Furthermore, our scheme has a very good performance in the measurement and operation complexity, since it only needs to perform Bell state and single-particle measurements and to apply Controlled-Not gate and other single-particle unitary operations. In addition, compared with traditional schemes, our scheme needs less qubits as the quantum resources and exchanges less classical information, and thus obtains higher communication efficiency.

  9. Random access to mobile networks with advanced error correction

    NASA Technical Reports Server (NTRS)

    Dippold, Michael

    1990-01-01

    A random access scheme for unreliable data channels is investigated in conjunction with an adaptive Hybrid-II Automatic Repeat Request (ARQ) scheme using Rate Compatible Punctured Codes (RCPC) Forward Error Correction (FEC). A simple scheme with fixed frame length and equal slot sizes is chosen and reservation is implicit by the first packet transmitted randomly in a free slot, similar to Reservation Aloha. This allows the further transmission of redundancy if the last decoding attempt failed. Results show that a high channel utilization and superior throughput can be achieved with this scheme that shows a quite low implementation complexity. For the example of an interleaved Rayleigh channel and soft decision utilization and mean delay are calculated. A utilization of 40 percent may be achieved for a frame with the number of slots being equal to half the station number under high traffic load. The effects of feedback channel errors and some countermeasures are discussed.

  10. Safety assurance of assistive devices based on a two-level checking scheme.

    PubMed

    Lin, Hua-Sheng; Chang, Yi-Chu; Chen, Chiun-Fan; Luh, Jer-Junn; Chiou, Ying-Han; Lai, Jin-Shin; Kuog, T-S

    2005-01-01

    The increasing number of physically challenged individuals has boosted the demand of powered wheelchairs. This paper is on the subject of a DSP (Digital Signal Processors) based assistive system, which is associated with a two-level checking scheme. The assistive system takes on the M3S (Multiple Master Multiple Slave) regulation for the assurance of safety. The CAN (Control Area Networks) embedded module in the DSP provides robust transmission of information within the system. The hardware interfaces based on the two-level checking scheme is implemented in input devices (e.g. joystick, head control apparatus) and in output devices (e.g. manipulator, prime mover motors). PMID:17281868

  11. Fourier domain multispectral multiple scattering low coherence interferometry.

    PubMed

    Matthews, Thomas E; Giacomelli, Michael G; Brown, William J; Wax, Adam

    2013-12-01

    We have implemented multispectral multiple scattering low coherence interferometry (ms2/LCI) with Fourier domain data collection. The ms2/LCI system is designed to localize features with spectroscopic contrast with millimeter resolution up to 1 cm deep in scattering samples by using photons that have undergone multiple low-angle (forward) scattering events. Fourier domain detection both increases the data acquisition speed of the system and gives access to rich spectroscopic information, compared to the previous single channel, time-domain implementation. Separate delivery and detection angular apertures reduce collection of the diffuse background signal in order to isolate localized spectral features from deeper in scattering samples than would be possible with traditional spectroscopic optical coherence tomography. Light from a supercontinuum source is used to acquire absorption spectra of chromophores in the visible range within a tissue-like scattering phantom. An intensity modulation and digital lock-in detection scheme is implemented to mitigate relative intensity and spectral noise inherent in supercontinuum sources. The technical parameters of the system and comparative analysis are presented.

  12. Multiple Sclerosis.

    ERIC Educational Resources Information Center

    Plummer, Nancy; Michael, Nancy, Ed.

    This module on multiple sclerosis is intended for use in inservice or continuing education programs for persons who administer medications in long-term care facilities. Instructor information, including teaching suggestions, and a listing of recommended audiovisual materials and their sources appear first. The module goal and objectives are then…

  13. Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems.

    PubMed

    Yau, Wei-Chuen; Phan, Raphael C-W

    2013-12-01

    Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.

  14. Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems.

    PubMed

    Yau, Wei-Chuen; Phan, Raphael C-W

    2013-12-01

    Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system. PMID:24194093

  15. On the security flaws in ID-based password authentication schemes for telecare medical information systems.

    PubMed

    Mishra, Dheerendra

    2015-01-01

    Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack. PMID:25486891

  16. On the security flaws in ID-based password authentication schemes for telecare medical information systems.

    PubMed

    Mishra, Dheerendra

    2015-01-01

    Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.

  17. Structure for common access and support of fuel cell stacks

    DOEpatents

    Walsh, Michael M.

    2000-01-01

    A structure provides common support and access to multiple fuel cells externally mounted thereto. The structure has openings leading to passages defined therein for providing the access. Various other fuel cell power system components are connected at the openings, such as reactant and coolant sources.

  18. Simulation study on the efficiencies of MOET nucleus breeding schemes applying marker assisted selection in dairy cattle.

    PubMed

    Luo, WeiZhen; Wang, YaChun; Zhang, Yuan

    2009-03-01

    Advantages of breeding schemes using genetic marker information and/or multiple ovulation and embryo transfer (MOET) technology over the traditional approach were extensively evaluated through simulation. Milk yield was the trait of interest and QTL was the genetic marker utilized. Eight dairy cattle breeding scenarios were considered, i.e., traditional progeny testing breeding scheme (denoted as STANPT), GASPT scheme including a pre-selection of young bulls entering progeny testing based on their own QTL information, MOETPT scheme using MOET technology to generate young bulls and a selection of young bulls limited within the full-sib family, GAMOPT scheme adopting both QTL pre-selection and MOET technology, COMBPT scheme using a mixed linear model which considered QTL genotype instead of the BLUP model in GAMOPT, and three non-progeny testing schemes, i.e. the MOET, GAMO and COMB schemes, corresponding to MOETPT, GAMOPT and COMBPT with progeny testing being part of the system. Animals were selected based on their breeding value which was estimated under an animal model framework. Sequential selection over 17 years was performed in the simulations and 30 replicates were designed for each scenario. The influences of using QTL information and MOET technology on favorable QTL allele frequency, true breeding values, polygenetic breeding values and the accumulated genetic superiority were extensively evaluated, for five different populations including active sires, lactating cows, bull dams, bull sires, and young bulls. The results showed that the combined schemes significantly outperformed other approaches wherein accumulated true breeding value progressed. The difference between schemes exclusively using QTL information or MOET technology was not significant. The STANPT scheme was the least efficient among the 8 schemes. The schemes using MOET technology had a higher polygenetic response than others in the 17th year. The increases of frequency of the favorable QTL

  19. Asymptotic teleportation scheme as a universal programmable quantum processor.

    PubMed

    Ishizaka, Satoshi; Hiroshima, Tohya

    2008-12-12

    We consider a scheme of quantum teleportation where a receiver has multiple (N) output ports and obtains the teleported state by merely selecting one of the N ports according to the outcome of the sender's measurement. We demonstrate that such teleportation is possible by showing an explicit protocol where N pairs of maximally entangled qubits are employed. The optimal measurement performed by a sender is the square-root measurement, and a perfect teleportation fidelity is asymptotically achieved for a large N limit. Such asymptotic teleportation can be utilized as a universal programmable processor.

  20. Multiplex imaging with multiple-pinhole cameras

    NASA Technical Reports Server (NTRS)

    Brown, C.

    1974-01-01

    When making photographs in X rays or gamma rays with a multiple-pinhole camera, the individual images of an extended object such as the sun may be allowed to overlap. Then the situation is in many ways analogous to that in a multiplexing device such as a Fourier spectroscope. Some advantages and problems arising with such use of the camera are discussed, and expressions are derived to describe the relative efficacy of three exposure/postprocessing schemes using multiple-pinhole cameras.

  1. Access to Higher Education

    ERIC Educational Resources Information Center

    Briscoe, Felecia; De Oliver, Miguel

    2006-01-01

    This case study researches the degree to which the location and services offered by a multicampus university, geographically situated consistent with the commercial principles of a large mass-market enterprise, facilitate access for educationally underserved groups. First, the necessity of democratizing educational access to an underprivileged…

  2. Accessing the Microform Publication.

    ERIC Educational Resources Information Center

    Schindler, Stan

    1985-01-01

    Characterizes types of indexing programs used by Research Publications, Inc. and describes provision of access to four major projects: "The Official Washington Post Index" (provides access to newspaper and microfilm edition); "The Eighteenth Century"; "The Declassified Documents Reference System" (ongoing fiche project abstracted and indexed…

  3. Planning for Accessibility.

    ERIC Educational Resources Information Center

    Cassell, Marianne Kotch

    This practical manual provides useful, concrete ideas and suggestions to help public libraries make libraries more accessible to persons with disabilities. Most suggestions are for persons who have difficulty with mobility. Reviews of pertinent laws and regulations are followed by concrete, step-by step suggestions for planning for accessibility,…

  4. Intellectual Access to Images.

    ERIC Educational Resources Information Center

    Chen, Hsin-Liang; Rasmussen, Edie M.

    1999-01-01

    The increased availability of digital images is accompanied by a need for solutions to the problems inherent in indexing them for retrieval. Problems in image description and access are discussed, with a perspective on traditional and new solutions. Recent developments in intellectual access to images are surveyed and contrasted with…

  5. Granting Each Equal Access.

    ERIC Educational Resources Information Center

    Walling, Linda Lucas

    1992-01-01

    Summarizes federal legislation regarding equal access for students with disabilities and discusses environmental barriers to accessibility in the library media center. Solutions to these design problems are suggested in the following areas: material formats and space requirements; the physical setting, including furniture, floor coverings,…

  6. Improving School Access Control

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…

  7. A New Cooperative MIMO Scheme Based on SM for Energy-Efficiency Improvement in Wireless Sensor Network

    PubMed Central

    Peng, Yuyang; Choi, Jaeho

    2014-01-01

    Improving the energy efficiency in wireless sensor networks (WSN) has attracted considerable attention nowadays. The multiple-input multiple-output (MIMO) technique has been proved as a good candidate for improving the energy efficiency, but it may not be feasible in WSN which is due to the size limitation of the sensor node. As a solution, the cooperative multiple-input multiple-output (CMIMO) technique overcomes this constraint and shows a dramatically good performance. In this paper, a new CMIMO scheme based on the spatial modulation (SM) technique named CMIMO-SM is proposed for energy-efficiency improvement. We first establish the system model of CMIMO-SM. Based on this model, the transmission approach is introduced graphically. In order to evaluate the performance of the proposed scheme, a detailed analysis in terms of energy consumption per bit of the proposed scheme compared with the conventional CMIMO is presented. Later, under the guide of this new scheme we extend our proposed CMIMO-SM to a multihop clustered WSN for further achieving energy efficiency by finding an optimal hop-length. Equidistant hop as the traditional scheme will be compared in this paper. Results from the simulations and numerical experiments indicate that by the use of the proposed scheme, significant savings in terms of total energy consumption can be achieved. Combining the proposed scheme with monitoring sensor node will provide a good performance in arbitrary deployed WSN such as forest fire detection system. PMID:24707224

  8. A new cooperative MIMO scheme based on SM for energy-efficiency improvement in wireless sensor network.

    PubMed

    Peng, Yuyang; Choi, Jaeho

    2014-01-01

    Improving the energy efficiency in wireless sensor networks (WSN) has attracted considerable attention nowadays. The multiple-input multiple-output (MIMO) technique has been proved as a good candidate for improving the energy efficiency, but it may not be feasible in WSN which is due to the size limitation of the sensor node. As a solution, the cooperative multiple-input multiple-output (CMIMO) technique overcomes this constraint and shows a dramatically good performance. In this paper, a new CMIMO scheme based on the spatial modulation (SM) technique named CMIMO-SM is proposed for energy-efficiency improvement. We first establish the system model of CMIMO-SM. Based on this model, the transmission approach is introduced graphically. In order to evaluate the performance of the proposed scheme, a detailed analysis in terms of energy consumption per bit of the proposed scheme compared with the conventional CMIMO is presented. Later, under the guide of this new scheme we extend our proposed CMIMO-SM to a multihop clustered WSN for further achieving energy efficiency by finding an optimal hop-length. Equidistant hop as the traditional scheme will be compared in this paper. Results from the simulations and numerical experiments indicate that by the use of the proposed scheme, significant savings in terms of total energy consumption can be achieved. Combining the proposed scheme with monitoring sensor node will provide a good performance in arbitrary deployed WSN such as forest fire detection system.

  9. [Innovative medicines and market access agreements].

    PubMed

    Toumi, M; Zard, J; Duvillard, R; Jommi, C

    2013-09-01

    Market Access Agreements (MAA) for drugs have emerged in response to the need to control health expenditures, as well as to the uncertainty about the true benefit of a drug. It is possible to group MAA in two types of agreements: financial agreements and outcome-based agreements. MAA is a growing trend and is shifting towards conditional access. However, the willingness to use these contracts and their implementation differ across countries, and some are still resistant to put them in place. The MAA challenges to overcome encompass the complexity of the schemes, the administrative burden and the difficulty of evaluating MAA. It is likely that these agreements might experience further evolution in the future to become a faster pathway for therapeutic innovations, at a fair price.

  10. Myeloma (multiple)

    PubMed Central

    2006-01-01

    Introduction Multiple myeloma is the most common primary cancer of the bones in adults, representing about 1% of all cancers diagnosed in the US in 2004, and 14% of all haematological malignancies. In the UK, multiple myeloma accounts for 1% of all new cases of cancer diagnosed each year. Methods and outcomes We conducted a systematic review and aimed to answer the following clinical questions: What are the effects of treatment in people with asymptomatic early stage multiple myeloma (stage I)? What are the effects of first-line treatments in people with advanced stage multiple myeloma (stages II and III)? What are the effect of salvage treatments, or supportive therapy, in people with advanced stage multiple myeloma (stages II and III)? We searched: Medline, Embase, The Cochrane Library and other important databases up to November 2004 (Clinical Evidence reviews are updated periodically, please check our website for the most up-to-date version of this review). We included harms alerts from relevant organisations such as the US Food and Drug Administration (FDA) and the UK Medicines and Healthcare products Regulatory Agency (MHRA). Results We found 71 systematic reviews, RCTs, or observational studies that met our inclusion criteria. Conclusions In this systematic review we present information relating to the effectiveness and safety of the following interventions: allogenic transplant (non-myeloablative), autologous stem cell transplant (early or late transplantation, double or single, purging of), bisphosphonates, bone marrow stem cells, bortezomib, chemotherapy (combination, conventional dose, intermediate dose plus stem cell rescue, high-dose plus stem cell rescue), combination chemotherapy plus corticosteroids, deferred treatment (in stage I disease), early chemotherapy plus corticosteroids (in stage I disease), epoetin alpha, first-line treatments, infection prophylaxis, interferon, maintenance therapy (in advanced multiple myeloma), melphalan (normal dose

  11. Modeling Students' Mathematics Using Steffe's Fraction Schemes

    ERIC Educational Resources Information Center

    Norton, Anderson H.; McCloskey, Andrea V.

    2008-01-01

    Each year, more teachers learn about the successful intervention program known as Math Recovery (USMRC 2008; Wright 2003). The program uses Steffe's whole-number schemes to model, understand, and support children's development of whole-number reasoning. Readers are probably less familiar with Steffe's fraction schemes, which have proven similarly…

  12. Finite volume renormalization scheme for fermionic operators

    SciTech Connect

    Monahan, Christopher; Orginos, Kostas

    2013-11-01

    We propose a new finite volume renormalization scheme. Our scheme is based on the Gradient Flow applied to both fermion and gauge fields and, much like the Schr\\"odinger functional method, allows for a nonperturbative determination of the scale dependence of operators using a step-scaling approach. We give some preliminary results for the pseudo-scalar density in the quenched approximation.

  13. An Accounting Scheme for Personality Study.

    ERIC Educational Resources Information Center

    Dillon, James J.; Feldman, S. Shirley

    Realizing the importance of human personality variables in comprehensive educational assessment structures, Operation PEP sought to develop a tool to assess specific human personality characteristics. The resulting accounting scheme is divided into three chapters: (1) an outline and definition of relevant terminology, (2) a scheme to account for…

  14. Multiple-reflection conical microwave antenna

    NASA Technical Reports Server (NTRS)

    Oliver, R. E.

    1973-01-01

    Conical-Gregorian antenna concept, using conical reflector, promises excellent rf performance and offers potential advantages in areas of mechanical and structural design, surface measurement, and in furlability. Multiple reflection scheme between one or more subreflectors and main reflector is utilized. Subreflector can be reduced to as little as 0.1 the diameter of main reflector.

  15. A novel key management scheme using biometrics

    NASA Astrophysics Data System (ADS)

    Sui, Yan; Yang, Kai; Du, Yingzi; Orr, Scott; Zou, Xukai

    2010-04-01

    Key management is one of the most important issues in cryptographic systems. Several important challenges in such a context are represented by secure and efficient key generation, key distribution, as well as key revocation. Addressing such challenges requires a comprehensive solution which is robust, secure and efficient. Compared to traditional key management schemes, key management using biometrics requires the presence of the user, which can reduce fraud and protect the key better. In this paper, we propose a novel key management scheme using iris based biometrics. Our newly proposed scheme outperforms traditional key management schemes as well as some existing key-binding biometric schemes in terms of security, diversity and/or efficiency.

  16. The basic function scheme of polynomial type

    SciTech Connect

    WU, Wang-yi; Lin, Guang

    2009-12-01

    A new numerical method---Basic Function Method is proposed. This method can directly discrete differential operator on unstructured grids. By using the expansion of basic function to approach the exact function, the central and upwind schemes of derivative are constructed. By using the second-order polynomial as basic function and applying the technique of flux splitting method and the combination of central and upwind schemes to suppress the non-physical fluctuation near the shock wave, the second-order basic function scheme of polynomial type for solving inviscid compressible flow numerically is constructed in this paper. Several numerical results of many typical examples for two dimensional inviscid compressible transonic and supersonic steady flow illustrate that it is a new scheme with high accuracy and high resolution for shock wave. Especially, combining with the adaptive remeshing technique, the satisfactory results can be obtained by these schemes.

  17. Efficient DSMC collision-partner selection schemes.

    SciTech Connect

    Gallis, Michail A.; Torczynski, John Robert

    2010-07-01

    The effect of collision-partner selection schemes on the accuracy and the efficiency of the Direct Simulation Monte Carlo (DSMC) method of Bird is investigated. Several schemes to reduce the total discretization error as a function of the mean collision separation and the mean collision time are examined. These include the historically first sub-cell scheme, the more recent nearest-neighbor scheme, and various near-neighbor schemes, which are evaluated for their effect on the thermal conductivity for Fourier flow. Their convergence characteristics as a function of spatial and temporal discretization and the number of simulators per cell are compared to the convergence characteristics of the sophisticated and standard DSMC algorithms. Improved performance is obtained if the population from which possible collision partners are selected is an appropriate fraction of the population of the cell.

  18. Two level scheme solvers for nuclear spectroscopy

    NASA Astrophysics Data System (ADS)

    Jansson, Kaj; DiJulio, Douglas; Cederkäll, Joakim

    2011-10-01

    A program for building level schemes from γ-spectroscopy coincidence data has been developed. The scheme builder was equipped with two different algorithms: a statistical one based on the Metropolis method and a more logical one, called REMP (REcurse, Merge and Permute), developed from scratch. These two methods are compared both on ideal cases and on experimental γ-ray data sets. The REMP algorithm is based on coincidences and transition energies. Using correct and complete coincidence data, it has solved approximately half a million schemes without failures. Also, for incomplete data and data with minor errors, the algorithm produces consistent sub-schemes when it is not possible to obtain a complete scheme from the provided data.

  19. Efficient DSMC collision-partner selection schemes.

    SciTech Connect

    Gallis, Michail A.; Torczynski, John Robert

    2010-05-01

    The effect of collision-partner selection schemes on the accuracy and the efficiency of the Direct Simulation Monte Carlo (DSMC) method of Bird is investigated. Several schemes to reduce the total discretization error as a function of the mean collision separation and the mean collision time are examined. These include the historically first sub-cell scheme, the more recent nearest-neighbor scheme, and various near-neighbor schemes, which are evaluated for their effect on the thermal conductivity for Fourier flow. Their convergence characteristics as a function of spatial and temporal discretization and the number of simulators per cell are compared to the convergence characteristics of the sophisticated and standard DSMC algorithms. Improved performance is obtained if the population from which possible collision partners are selected is an appropriate fraction of the population of the cell.

  20. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication. PMID